Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
LATEST PROJECTS UPDATES PhD Guidance COLLEGE MINI PROJECTS PYTHON PROJECT - IEEE
MACHINE LEARNING-ML(Data Scientist) NEW TECHNOLOGY-HELP VIDEO BLOCK CHAIN TECH - BITCOIN R - DATA SCIENCE - ML
WEKA-Machine Learning Internet of things (IoT) BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018
BIGDATA mongoDB JOBS CONSULTANCY - SOFT SKILLS JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18
ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS
IEEE PHP Projects 2017-18 IEEE PHP Projects PHP Application Projects ASP.NET MVC Framework
JAVA IEEE LATEST JAVA IEEE 2016-17 Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects
IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project Dot Net IEEE 2017-18
ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17
Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects
IEEE 2011-2012 Dotnet Projects Java Application Projects Dotnet Application Projects Dotnet Mini Projects
Struts Application Projects Java Mini Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS
HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS RESTful Web services
 
LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
PYTHON - AI
1. Object Detection
2. Rainfall Rate Prediction
3. Drug Usage in Social Media
4. SUBWAY PASSENGER FLOW FORECASTING


PhD Guidance
Cyber Security and Privacy
Developing PhD proposal
5. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
6. Diabetics Dataset
7. MEDICAL DATA ANALYSES
8. R IEEE PROJECTS
9. PhD Project Guidance
10. PhD Projects


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
11. HOTEL MANAGEMENT
12. GYM MANAGEMENT APPLICATION
13. ONLINE BOOK STORE


PYTHON PROJECT - IEEE
MORE PYTHON IEEE
14. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
15. Personalized Recommendation of Social Images by Constructing a User Interest
16. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
17. Opinion Mining using Ontological Spam Detection
18. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
19. Phishing Web Sites Features Classification
20. using data mining to predict hospital admissions from the emergency department
21. Correlated Matrix Factorization for Recommendation with Implicit Feedback
22. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
23. Currency Recognition System
PYTHON TRAINING WITH PROJECT
24. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
25. Opinion Mining using Ontological Spam Detection
26. Predicting the top-N popular videos via cross-domain hybrid model
27. Fraquent itemsets mining with differential privacy over large scale data
28. Phishing Web Sites Features Classification
29. Dynamic Facet Ordering for Faceted Product Search Engines
30. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
31. Machine Learning and Deep Learning Methods for Cybersecurity
32. Linear Regression Algorithm Predict the volution of Community in Future
33. A User-Centric Machine Learning Framework for Cyber Security Operations Center
34. Linear Regression Algorithm
35. A Machine Learning Approach to Routing
36. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
37. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
38. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
39. CYBER SECURITY
40. Automatic Sentiment Detection in Naturalistic Audio
41. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
42. Student Performance Analysis - PYTHON
43. E-assessment using image processing in ∞Exams
44. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
45. NLP - NATURAL LANGUAGE PROCESSING
46. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
47. Image Based Appraisal of Real Estate Properties-IEEE 2017
48. FOOD WASTE ORGANIZER
49. PYTHON PROJECT FLOW
50. PYTHON PROGRAM EXECUTION
51. PYTHON INSTALLATION
PYTHON APPLICATION
52. BOOK RECOMMENDATION SYSTEM PYTHON
53. Web Scraping Using PYTHON
54. MULTIMEDIA CONTENT PROTECTION
55. Student Performance Analysis - PYTHON
56. HOTEL MANAGEMENT
57. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
58. Speech Recognition in Social Care - NLP
59. Text-to-Speech (TTS)- NLP
60. Voice Scheduler - NLP
61. VOICE SEARCH ENGINE - NLP
62. LINEAR REGRESSION - PYTHON
63. LATENT DIRICHLET ALLOCATION
64. DIGITAL IMAGE PROCESSING - PYTHON
65. DECISION TREE LEARNING - ALGORITHM
66. NAIVE BAYES CLASSIFIER
67. K - MEANS CLUSTERING
68. Dengu Data Analysis Using R-program
69. Shopping Data set Analyse Using R Machine Learning
70. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
71. Polynomial Time Algorithm-PTA
72. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
73. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
74. K-Means For Clustering


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
75. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
76. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
77. NAIVE BAYES CLASSIFIER
78. K - MEANS CLUSTERING
79. LINEAR REGRESSION - PYTHON
80. LATENT DIRICHLET ALLOCATION
81. DIGITAL IMAGE PROCESSING - PYTHON
82. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
83. MACHINE LEARNING-ML ALGORITHM
84. WHAT IS MACHINE LEARNING - AI
85. NATURAL LANGAUAGE PROCESSING - NLP
86. VISION - Visual Data


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
87. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
88. R - ADVANCE IMAGE PROCESSING
89. Dengu Data Analysis Using R-program
90. Shopping Data set Analysis Using R Machine Learning
91. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
92. R PROGRAM TRAINING
93. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
94. COMAPRISON OF VARIOUS DOCKING SCORES
95. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
96. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
97. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
98. MICRO ARRAY GENE EXPRESSION ANALYSIS
99. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
100. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
101. Diabetics Dataset
102. Excercise Dataset
103. MEDICAL DATA ANALYSES
104. WEKA PRIVACY DATA SET ANALYSES


Internet of things (IoT)
IoT Projects
105. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
106. Who Moved My Data? Privacy Protection in Smartphones
107. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
108. IOT Projects
109. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
110. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
111. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
112. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
113. MRSIM: Mitigating Reducer Skew In MapReduce
114. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
115. HADOOP WITH HEALTHCARE DATA ANALYSYS
116. HADOOP WEBLOG DATA ANALYSES
117. BANK DATA ANALYTIC WITH HADOOP
118. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
119. Bucket Based Data Deduplication Technique for Big Data Storage System
120. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
121. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
122. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
123. Efficient Recommendation of De-identification Policies using MapReduce
124. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
125. Big Scholarly Data: A Survey
126. SocialQ&A: An Online Social Network Based Question and Answer System
127. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
128. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
129. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
130. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
131. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
132. User-Centric Similarity Search
133. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
134. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
135. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
136. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
137. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
138. Processing Incomplete k Nearest Neighbor Search
139. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
140. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
141. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
142. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
143. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
144. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
145. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
146. Deduplication on Encrypted Big Data in Cloud
147. Dynamic Resource Allocation for MapReduce with Partitioning Skew
148. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
149. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
150. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
151. Self-Healing in Mobile Networks with Big Data
152. Secure Sensitive Data Sharing on a Big Data Platform
153. Big Data, Big Knowledge: Big Data for Personalized Healthcare
154. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
155. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
156. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
157. Differentially Private Frequent Itemset Mining via Transaction Splitting
158. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
159. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
160. Fast Best-Effort Pattern Matching in Large Attributed Graphs


JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
161. E-assessment using image processing in ∞Exams
162. NLP - NATURAL LANGUAGE PROCESSING
163. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
164. Dengu Data Analysis Using R-program
165. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
166. Big Scholarly Data: A Survey
167. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
168. Big Data, Big Knowledge Big Data for Personalized Healthcare
169. Deduplication on Encrypted Big Data in Cloud
170. Secure Sensitive Data Sharing on a Big Data Platform
171. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
172. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
173. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
174. Self-Healing in Mobile Networks with Big Data
175. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
176. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
177. Child Monitoring - ANDROID APPS
178. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
179. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
180. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
181. Developing Apps for visually imapired people: Lessons learned from social network
182. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
183. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
184. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
185. Design of secure location and message sharing system for android platform
186. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
187. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
188. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
189. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
190. Privacy Protection based Access Control Scheme in Cloud-based Services
191. Privacy-Preserving Selective Aggregation of Online User Behavior Data
192. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
193. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
194. FISHING DISASTER MANAGEMENT SYSTEM
195. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
196. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
197. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
198. Who Moved My Data? Privacy Protection in Smartphones
199. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
200. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
201. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
202. Privacy-Preserving Aggregate Queries for Optimal Location Selection
203. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
204. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
205. Efficient Clue-based Route Search on Road Networks
206. Privacy-Preserving Location-Proximity for Mobile Apps
207. Cooperative Query Answer Authentication
208. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
209. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
210. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
211. ZapDroid: Managing Infrequently Used Applications on Smartphones
212. Searching Trajectories by Regions of Interest
213. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
214. A Classroom Scheduling Service for Smart Classes
215. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
216. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
217. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
218. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
219. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
220. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
221. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
222. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
223. Authentication of Smartphone Users Using Behavioral Biometrics
224. An Exploration of Geographic Authentication Schemes
225. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
226. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
227. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
228. Distributed secret sharing approach with cheater prevention
229. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
230. Efficient privacy preserving location based query over outsourced encrypted data
231. Utilizing the Cloud to Store Hijacked Camera Images
232. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
233. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
234. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
235. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
236. Enabling privacy preserving location proof for mobile users.
237. Optimizing User Experience in Choosing Android Applications
238. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
239. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
240. FoodForCare: An Android Application for Self-Care with Healthy Food
241. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
242. Silence is Golden: Enhancing Privacy of Location-Based Services
243. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
244. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
245. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
246. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
247. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
248. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
249. Adapting to User Interest Drift for POI Recommendation
250. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
251. Developing Apps for visually imapired people: Lessons learned from social network
252. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
253. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
254. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
255. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
256. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
257. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
258. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
259. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
260. Mobile cloud support for semantic enriched speech recognition in social care
261. Distributing secret sharing approach with cheater prevention based on QR code
262. Design of Secure Location and Message Sharing System for Android Platform
263. The impact of cloud technology on the automation of businesses
264. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
265. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
266. Rescue Management System
267. Android Army - Military Apps
268. Android Beauty Parlor
269. Android E Municipality
270. ANDROID NURSE AID
271. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
272. Human Resource (HR)- APPS
273. GPS Employee Tracking System
OUR MODERN SOCITY
274. GENERIC MEDICINE
275. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
276. RECYCLE APP WASTE COLLECTION REUSE
277. Bikes Rental - APPS
278. Location Based Alarm - GPS
279. ANDROID APPS FOR INSURANCE SYSTEM
280. BUDGET HOME DESIGN -ANDROID APPS
281. Former To Former Apps
282. Pets Care
ONLINE CONSUMERS PROCESSING
283. House Hold Appliancies Warranty Management
284. GPS Transport Packers and Movers
Android Apps
285. MY LIBRARY
286. FACULTY RATING SYSTEM
287. App for self organizer
288. ONLINE DOCTOR APPOINTMENT
289. Conference Event Mobile Assistant
290. Mobile Prescription
291. Metastore Application
292. Android SmartCampus
293. Android Shopping Mall
294. TOLL GATE -Barcode Billing System --ANDROID
295. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
296. Taste Hunt For Restaurants
297. POLICE APPS
298. Android Blood Bank
299. Mobile Expense Claim System Android
300. Android Intelligent Time Tracking System TICK
301. Android Course and Attendance Management System
302. Android Event Reminder
303. Android Attendance Assessment
304. Android Advance Shopping
305. Android CAR POOLING
306. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
307. Android HOSPITAL
308. ATHLETE MEET GUIDE
309. Android Apps PARKING MANAGER
310. Love and Care
311. Food Waste Management System
312. Travel Guide
313. Android Provisional Store
314. Best Baby Care with Vaccines Remainder
315. Android Assist for Lecturer and Student
316. Android Personal Assistance (PA)
317. Android Application for College Management System
318. Tollgate Payment system in android
319. Intelligence Quotient (IQ) Test
320. GPS LOCATION ALARM SYSTEM
321. Location Based Intelligent Mobile Organizer
322. BANK ACCOUNT TRACKER FOR ANDROID
323. UNIT CONVERTER
324. Tips and Tax Calculator in Android
325. TEXT EDITOR FOR ANDROID
326. Student Attendance Tracking System
327. Smart Money With Daily Expenses
328. Simple And Secure Android TO DO List Application
329. Restaurant Table Order Management System
330. Online Shopping
331. Online Examination System For Android
332. ANDROID SHOPPING LOCATION IDENTIFIER
333. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
334. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
335. MICRO CREDIT BANKING ON SMARTPHONE
336. LOCATION BASED ALARM
337. Insurance in android
338. GOOGLE PLACE FINDER
339. Friend Mapper on Mobiles - Friend Locator
340. EXPENSE MANAGER
341. Employee Diractory
342. Online job search
343. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
344. ANDROID STUDENT RESULT ANALYZING SYSTEM
345. CloudMoV : Cloud-based Mobile Social TV
346. Bus Reservation
347. Budget Planner
348. Android SMS Systems
349. ANDROID LEAVE MANAGEMENT SYSTEM
350. ANDROID EVENT SCHEDULER/REMINDER
351. Android Grocery Shopping List
352. Android Attack Application
353. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
354. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
355. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
356. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
357. Optimizing Display Advertising Markets
358. Using Knowledge Libraries to Transfer Expert Knowledge
359. Semantic Retrieval of Trademarks Based on Conceptual Similarity
360. Understanding and Predicting Question Subjectivity in Social Question and Answering
361. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
362. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
363. Fast Top-K Path-based Relevance Query on Massive Graphs
364. Web Image Search Re-ranking with Click-based Similarity and Typicality
365. Automatically Mining Facets for Queries from Their Search Results
366. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
367. Statistical Entity Extraction from Web
368. Question Answering System for an Effective Collaborative Learning
369. Lost in Translation: Improving Decoy Documents via Automated Translation
370. Learn to Personalized Image Search from the Photo Sharing Websites
371. In Tags We Trust Trust modeling in social tagging of multimedia content
372. Efficient Anonymous Message Submission
373. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
374. Employment Knowledge Database
375. Organise Corporate Training For Client Project s
376. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
377. ONLINE VEHICLE SHOWROOM SYSTEMS
378. Online Voting
379. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
380. School Management System
381. Secure Online Course Automation
382. School Automation System
383. Online Aquarum
384. Web Direct Recruitment Analysis
PHP Apps
385. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
386. TRADE / INDUSTRY WEB PORTAL
387. Feeding the poor from the supermarket
388. Application for recording your goals and habits
389. VISUAL WAY TO RAISE AWARENESS
390. Municipal Corporation
391. Online Polling For Publishers And Brands
392. Avoid Food Wastage
393. Web Doctor
394. ONLINE FOOD ORDERING SYSTEM
395. E-Tendering
396. Improving Rural Communities
397. Green Planet Awarness
398. Development of an Online Course Portal for a campus
399. Auxon Test
400. WEB BASED LEARNING SYSTEM
401. Tagging in online social networks
402. Secured file Downloading system
403. Cryptonite : A Secure and Performant Data Repository on Public Clouds
404. searching a image from websites
405. Online University
406. Online product Opinion and Ranking System
407. MNC LEAVE MANAGEMENT SYSTEM
408. Home appliances online purchase
409. Freelancer Job
410. E-Tutor Online Jobs
411. Statistical Entity Extraction from Web
412. Effective Collaborative Learning
413. Development of an e-Post Office System
414. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
415. Towards Effective Bug Triage with Software Data Reduction Techniques
416. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
417. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
418. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
419. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
420. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
421. Proof of retrievability with public verifiability resilient against related-key attacks
422. Secure Anonymous Key Distribution Scheme for Smart Grid
423. Converses For Secret Key Agreement and Secure Computing
424. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE LATEST
IEEE Transactions on Big Data
425. Improving Instance Selection Methods for Big Data Classification
426. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
427. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
428. A Web Service Discovery Approach Based on Common Topic Groups Extraction
429. Dynamic Facet Ordering for Faceted Product Search Engines
430. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
431. Flexible Wildcard Searchable Encryption System
432. QoS Recommendation in Cloud Services
433. Securing Aggregate Queries for DNA Databases
434. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
435. A robust reputation management mechanism in the federated cloud
436. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
437. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
438. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
439. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
440. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
441. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
442. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
443. Energy-efficient Query Processing in Web Search Engines
444. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
445. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
446. BiRank: Towards Ranking on Bipartite Graphs
447. QoS Recommendation in Cloud Services
448. Public Interest Analysis Based on Implicit Feedback of IPTV Users
449. Search Rank Fraud and Malware Detection in Google Play
450. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
451. Influence Maximization in Trajectory Databases
452. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
453. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
454. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
455. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
456. Computing Semantic Similarity of Concepts in Knowledge Graphs
457. QDA: A Query-Driven Approach to Entity Resolution
458. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
459. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
460. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
461. CONTENT BASED IMAGE RETRIEVAL
462. Identifying At Risk Students for Early Interventions A Time Series Clustering
463. Two Layer Clustering model for Mobile Customer Analysis
464. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
465. Consumer oriented web services ranking and classification
466. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
467. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
468. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
469. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
470. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
471. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
472. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
473. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
474. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
475. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
476. Two-Factor Data Security Protection Mechanism for Cloud Storage System
477. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
478. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
479. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
480. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
481. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
482. Where You Are Is Who You Are User Identification by Matching Statistics
483. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
484. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
485. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
486. Online Subgraph Skyline Analysis Over Knowledge Graphs
487. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
488. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
489. ID2S Password-Authenticated Key Exchange Protocols
490. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
491. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
492. Classification model to predict the learners' academic performance using big data
493. Electronic Commerce Meets the Semantic Web
494. Mining High Utility Patterns in One Phase without Generating Candidates
495. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
496. Automatic Generation of Social Event Storyboard from Image Click-through Data
497. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
498. Understanding Deep Representations Learned in Modeling Users Likes
499. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
500. Topic-Oriented Exploratory Search Based on an Indexing Network
501. Relevance Feedback Algorithms Inspired By Quantum Detection
502. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
503. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
504. Efficiently Estimating Statistics of Points of Interests on Maps
505. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
506. Aspect-level Influence Discovery from Graphs
507. Sentiment Embeddings with Applications to Sentiment Analysis
508. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
509. Resolving Multi-party Privacy Conflicts in Social Media
510. Encrypted Data Management with Deduplication in Cloud Computing
511. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
512. Crawling Hidden Objects with kNN Queries
513. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
514. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
515. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
516. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
517. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
518. Nearest Keyword Set Search in Multi-dimensional Datasets
519. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
520. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
521. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
522. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
523. Immutable Authentication and Integrity Schemes for Outsourced Databases
524. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
525. Server-Aided Public Key Encryption with Keyword Search
526. Online Learning in Large-Scale Contextual Recommender Systems
527. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
528. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
529. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
530. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
531. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
532. Multi-Modal Event Topic Model for Social Event Analysis
533. Social friend recommendation on multiple network correlation
534. Tag Based Image Search by Social Re-ranking
535. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
536. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
537. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
538. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
539. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
540. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
541. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
542. Rank-Based Similarity Search: Reducing the Dimensional Dependence
543. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
544. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
545. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
546. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
547. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
548. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
549. On the Security of data access control for multiauthority cloud storage system
550. Trust-based Service Management for Social Internet of Things Systems
551. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
552. Formalization and Verification of Group Behavior Interactions
553. Group Key Agreement with Local Connectivity
554. Data Lineage in Malicious Environments
555. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
556. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
557. Enabling Cloud Storage Auditing with Key-Exposure Resistance
558. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
559. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
560. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
561. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
562. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
563. Quantitative Reasoning About Cloud Security Using Service Level Agreements
564. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
565. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
566. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
567. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
568. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
569. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
570. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
571. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
572. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
573. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
574. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
575. Enabling Cloud Storage Auditing with Key-Exposure Resistance
576. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
577. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
578. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
579. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
580. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
581. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
582. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
583. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
584. Secure Auditing and Deduplicating Data in Cloud
585. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
586. Towards reproducibility in online social network Research
587. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
588. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
589. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
590. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
591. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
592. Making Digital Artifacts on the Web Verifiable and Reliable
593. Anonymizing Collections of Tree-Structured Data
594. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
595. FOCS: Fast Overlapped Community Search
596. Sparsity Learning Formulations for Mining Time-Varying Data
597. The Impact of View Histories on Edit Recommendations
598. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
599. Discovery of Ranking Fraud for Mobile Apps
600. Towards Effective Bug Triage with Software Data Reduction Techniques
601. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
602. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
603. Auditing for Distributed Storage Systems
604. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
605. Uploader Intent for Online Video: Typology, Inference and Applications
606. YouTube Video Promotion by Cross-network
607. Semantic-Improved Color Imaging Applications: It Is All About Context
608. Geolocalized Modeling for Dish Recognition
609. Learning to Rank Image Tags with Limited Training Examples
610. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
611. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
612. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
613. Tracking Temporal Community Strength in Dynamic Networks
614. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
615. Towards Information Diffusion in Mobile Social Networks
616. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
617. An Efficient Privacy-Preserving Ranked Keyword Search Method
618. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
619. Dispersing Instant Social Video Service Across Multiple Clouds
620. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
621. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
622. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
623. A Computational Dynamic Trust Model for User Authorization
624. Secure Distributed Deduplication Systems with Improved Reliability
625. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
626. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
627. Leveraging the Tail Time for Saving Energy in Cellular Networks
628. Keylogging-resistant Visual Authentication Protocols
629. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
630. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
631. Preserving Location Privacy in Geo-Social Applications
632. Efficient Authentication for Mobile and Pervasive Computing
633. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
634. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
635. Typicality-Based Collaborative Filtering Recommendation
636. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
637. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
638. Keyword Search Over Probabilistic RDF Graphs
639. Efficient Prediction of Difficult Keyword Queries over Databases
640. Interpreting the Public Sentiment Variations on Twitter
641. An Efficient Recommendation Method for Improving Business Process Modeling
642. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
643. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
644. On the use of Side Information for Mining Text Data
645. Privacy Preserving and Content Protecting Location based Queries
646. Fast Nearest Neighbor Search with Keywords
647. Towards Differential Query Services in Cost-Efficient Clouds
648. Facilitating Document Annotation using Content and Querying Value
649. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
650. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
651. Secure Outsourced Attribute-Based Signatures
652. Supporting Privacy Protection in Personalized Web Search
653. Dealing With Concept Drifts in Process Mining
654. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
655. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
656. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
657. Active Learning of Constraints for Semi-Supervised Clustering
658. Best Keyword Cover Search
659. Personalized Recommendation Combining User Interest and Social Circle
660. Online Feature Selection and Its Applications
661. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
662. Incremental Affinity Propagation Clustering Based on Message Passing
663. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
664. Secure kNN Query Processing in Untrusted Cloud Environments
665. Malware Propagation in Large-Scale Networks
666. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
667. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
668. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
669. Efficient Ranking on Entity Graphs with Personalized Relationships
670. Task Trail: An Effective Segmentation of User Search Behavior
671. Privacy-Preserving Enhanced Collaborative Tagging
672. XSPath Navigation on XML Schemas Made Easy
673. Security Evaluation of Pattern Classifiers under Attack
674. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
675. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
676. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
677. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
678. Nothing is for Free: Security in Searching Shared and Encrypted Data
679. SocialTube: P2P-assisted Video Sharing in Online Social Networks
680. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
681. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
682. Behavioral Malware Detection in Delay Tolerant Networks
683. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
684. Private Searching on Streaming Data Based on Keyword Frequency
685. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
686. On the Security of Trustee-Based Social Authentications
687. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
688. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
689. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
690. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
691. A Two-stage Deanonymization Attack Against Anonymized Social Networks
692. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
693. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
694. Scalable architecture for multi-user encrypted SQL operations on cloud database services
695. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
696. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
697. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
698. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
699. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
700. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
701. Secure kNN Query Processing in Untrusted Cloud Environments
702. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
703. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
704. A Hybrid Cloud Approach for Secure Authorized Deduplication
705. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
706. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
707. A Novel Model for Competition and Cooperation Among Cloud Providers
708. CLOUDQUAL: A Quality Model for Cloud Services
709. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
710. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
711. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
712. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
713. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
714. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
715. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
716. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
717. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
718. Enhanced Security for Association Rule Mining to secure Transactional Databases
719. Operational Pattern Revealing Technique in Text Mining
720. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
721. Personalized web search using Browsing history and domain Knowledge
722. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
723. Data Security the Challenge of Cloud Computing
724. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
725. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
726. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
727. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
728. User Action Interpretation for Online Content Optimization
729. Spatial Query Integrity with Voronoi Neighbors
730. Spatial Approximate String Search
731. Sensitive Label Privacy Protection on Social Network Data
732. Secure Mining of Association Rules in Horizontally Distributed Databases
733. Secure Logging As a Service Delegating Log Management to the Cloud
734. Robust Module-based Data Management
735. Ranking on Data Manifold with Sink Points
736. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
737. Privacy-Enhanced Web Service Composition
738. Privacy against Aggregate Knowledge Attacks
739. Preventing Private Information Inference Attacks on Social Networks
740. PMSE: A Personalized Mobile Search Engine
741. Personalized QoS-Aware Web Service Recommendation and Visualization
742. Optimal Client-Server Assignment for Internet Distributed Systems
743. Online Search and Buying Behaviour in Consumer Markets
744. M-Privacy for Collaborative Data Publishing
745. Mining User Queries with Markov Chains: Application to Online Image Retrieval
746. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
747. Incentive Compatible Privacy-Preserving Data Analysis
748. Improving Security and Efficiency in Attribute-Based Data Sharing
749. FoCUS: Learning to Crawl Web Forums
750. Fast Nearest Neighbor Search with Keywords
751. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
752. Facilitating Effective User Navigation through Website Structure Improvement
753. Facilitating Document Annotation using Content and Querying Value
754. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
755. Efficient Evaluation of SUM Queries over Probabilistic Data*
756. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
757. Dynamic Query Forms for Database Queries
758. Dynamic Personalized Recommendation on Sparse Data
759. Distributed Strategies for Mining Outliers in Large Data Sets
760. Crowdsourcing Predictors of Behavioral Outcomes
761. Co-Occurrence-Based Diffusion for Expert Search on the Web
762. Comparable Entity Mining from Comparative Questions
763. CloudMoV: Cloud-based Mobile Social TV
764. Anomaly Detection via Online Oversampling Principal Component Analysis
765. Anomaly Detection Approach Using Hidden Markov Model
766. Annotating Search Results from Web Databases
767. A System to Filter Unwanted Messages from OSN User Walls
768. A Survey of XML Tree Patterns
769. A Probabilistic Approach to String Transformation
770. A New Algorithm for Inferring User Search Goals with Feedback Sessions
771. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
772. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
773. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
774. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
775. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
776. Towards Differential Query Services in Cost-Efficient Clouds
777. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
778. SocialTube: P2P-assisted Video Sharing in Online Social Networks
779. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
780. QoS Ranking Prediction for Cloud Services
781. Priority-Based Consolidation of Parallel Workloads in the Cloud
782. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
783. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
784. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
785. Load Rebalancing for Distributed File Systems in Clouds
786. Label-Embedding for Attribute-Based Classification
787. IP-Geolocation Mapping for Moderately Connected Internet Regions
788. Identity-Based Secure Distributed Data Storage Schemes
789. Hint-based Execution of Workloads in Clouds with Nefeli
790. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
791. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
792. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
793. Efficient Two-Server Password-Only Authenticated Key Exchange
794. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
795. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
796. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
797. Winds of Change: From Vendor Lock-In to the Meta Cloud
798. Supporting the Migration of Applications to the Cloud through a Decision Support System
799. Storing Shared Data on the Cloud via Security-Mediator
800. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
801. Privacy-Preserving Public Auditing for Secure Cloud Storage
802. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
803. Outsourcing Privacy-Preserving Social Networks to a Cloud
804. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
805. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
806. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
807. Efficient Security Solution for Privacy-Preserving Cloud Services
808. Collaboration in Multicloud Computing Environments: Framework and Security Issues
809. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
810. Cloud-based DDoS Attacks and Defenses
811. Cloud computing for mobile users can offloading compution save energy
812. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
813. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
814. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
815. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
816. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
817. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
818. Two tales of privacy in online social networks
819. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
820. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
821. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
822. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
823. Security and Privacy-Enhancing Multicloud Architectures
824. Security Using Colors and Armstrong Numbers
825. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
826. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
827. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
828. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
829. Privacy Preserving Data Analytics for Smart Homes
830. On Inference-Proof View Processing of XML Documents
831. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
832. Extracting Spread-Spectrum Hidden Data from Digital Media
833. Efficiently Outsourcing Multiparty Computation under Multiple Keys
834. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
835. Craigslist Scams and Community Composition: Investigating Online Fraud
836. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
837. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
838. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
839. Super-Resolution-based Inpainting
840. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
841. Image Authentication Using Stochastic Diffusion
842. Hierarchical Super-Resolution-Based Inpainting
843. Circular Reranking for Visual Search
844. Bootstrapping Visual Categorization With Relevant Negatives
845. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
846. An extended visual cryptography scheme without pixel expansion for halftone images
847. An Adaptive Cloud Downloading Service
NETWORKING
848. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
849. Topological Conditions for In-Network Stabilization of Dynamical Systems
850. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
851. Price Differentiation for Communication Networks
852. Participatory Privacy: Enabling Privacy in Participatory Sensing
853. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
854. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
855. On the Role of Mobility for Multi-message Gossip
856. Fully Anonymous Profile Matching in Mobile Social Networks
857. Fault Node Recovery Algorithm for a Wireless Sensor Network
858. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
859. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
860. Access Policy Consolidation for Event Processing Systems
861. A Fast Re-Route Method
SOFTWARE ENGINEERING
862. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
863. Vampire attacks: Draining life from wireless ad-hoc sensor networks
864. Towards a Statistical Framework for Source Anonymity in Sensor Networks
865. Search Me If You Can: Privacy-preserving Location Query Service
866. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
867. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
868. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
869. Distributed Cooperative Caching in Social Wireless Networks
870. Community-Aware Opportunistic Routing in Mobile Social Networks
871. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
872. The Devils Behind Web Application Vulnerabilities
873. Security Architecture for Cloud Networking
874. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
875. Secure Overlay Cloud Storage with Access Control and Assured Deletion
876. Risk-Aware Mitigation for MANET Routing Attacks
877. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
878. Privacy-preserving Enforcement of Spatially Aware RBAC
879. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
880. pCloud: A Distributed System for Practical PIR
881. Packet-Hiding Methods for Preventing Selective Jamming Attacks
882. Online Modeling of Proactive Moderation System for Auction Fraud Detection
883. Fast and accurate annotation of short texts with Wikipedia pages
884. FADE: Secure Overlay Cloud Storage with File Assured Deletion
885. Ensuring Distributed Accountability for Data Sharing in the Cloud
886. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
887. Direct and Indirect Discrimination Prevention Methods
888. Detecting Spam Zombies by Monitoring Outgoing Messages
889. Detecting Anomalous Insiders in Collaborative Information Systems
890. Data-Provenance Verification For Secure Hosts
891. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
892. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
893. Payments for Outsourced Computations
894. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
895. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
896. Toward Private Joins on Outsourced Data
897. Statistical Entity Extraction from Web
898. Slicing: A New Approach to Privacy Preserving Data Publishing
899. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
900. Resilient Identity Crime Detection
901. Ranking Model Adaptation for Domain-Specific Search
902. Organizing User Search Histories
903. On the Spectral Characterization and Scalable Mining of Network Communities
904. Multiparty Access Control for Online Social Networks: Model and Mechanisms
905. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
906. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
907. How do Facebookers use Friendlists
908. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
909. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
910. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
911. Enabling Multilevel Trust in Privacy Preserving Data Mining
912. Enabling cross-site interactions in social networks
913. Efficient Similarity Search over Encrypted Data
914. Efficient Extended Boolean Retrieval
915. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
916. Efficient Anonymous Message Submission
917. Effective Pattern Discovery for Text Mining
918. DDD: A New Ensemble Approach for Dealing with Concept Drift
919. Credibility Ranking of Tweets during High Impact Events
920. Creating Evolving User Behavior Profiles Automatically
921. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
922. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
923. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
924. Anomaly Detection for Discrete Sequences: A Survey
925. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
926. Advance Mining of Temporal High Utility Itemset
927. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
928. Reliable Re-encryption in Unreliable Clouds
929. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
930. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
931. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
932. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
933. Gossip-based Resource Management for Cloud Environments
934. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
935. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
936. Cloud Data Protection for the Masses
937. Cloud Computing Security: From Single to Multi-Clouds
938. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
939. In Tags We Trust Trust modeling in social tagging of multimedia content
940. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
941. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
942. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
943. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
944. Cut Detection in Wireless Sensor Networks
945. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
946. TrickleDNS: Bootstrapping DNS Security using Social Trust
947. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
948. Policy-by-Example for Online Social Networks
949. Packet Loss Control Using Tokens at the Network Edge
950. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
951. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
952. Independent Directed Acyclic Graphs for Resilient Multipath Routing
953. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
954. Game-Theoretic Pricing for Video Streaming in Mobile Networks
955. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
956. Auditing for Network Coding Storage
957. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
958. Privacy Preserving Cloud Data Access With Multi-Authorities
959. Movie Rating and Review Summarization in Mobile Environment
960. IDSaaS: Intrusion Detection System as a Service in Public Clouds
961. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
962. BibPro: A Citation Parser Based on Sequence Alignment Techniques
963. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
964. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
965. RITAS: Services for Randomized Intrusion Tolerance
966. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
967. Nymble: Blocking Misbehaving Users in Anonymizing Networks
968. Modeling and Detection of Camouflaging Worm
969. Coding for Cryptographic Security Enhancement using Stopping Sets
970. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
971. Wireless Sensor Network Security model using Zero Knowledge Protocol
972. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
973. Throughput Optimization in Mobile Backbone Networks
974. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
975. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
976. Fast Data Collection in Tree-Based Wireless Sensor Networks
977. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
978. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
979. SPAF: Stateless FSA-based Packet Filters
980. Selfish Overlay Network Creation and Maintenance
981. ProgME: Towards Programmable Network MEasurement
982. Locating Equivalent Servants over P2P Networks
983. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
984. Buffer Sizing for 802.11 Based Networks
985. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
986. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
987. Improving Utilization of Infrastructure Clouds
988. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
989. CloudTPS: Scalable Transactions for Web Applications in the Cloud
990. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
991. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
992. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
993. Ranking Spatial Data by Quality Preferences
994. Making Aggregation Work in Uncertain and Probabilistic Databases
995. Load Shedding in Mobile Systems with MobiQual
996. Group Enclosing Queries
997. Extended XML Tree Pattern Matching: Theories and Algorithms
998. Effective Navigation of Query Results Based on Concept Hierarchies
999. Discovering Conditional Functional Dependencies
1000. Decision Trees for Uncertain Data
1001. Data Leakage Detection
1002. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1003. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1004. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1005. Privacy Protection based Access Control Scheme in Cloud-based Services
1006. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1007. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1008. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1009. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1010. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1011. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1012. Explaining Missing Answers to Top-k SQL Queries
1013. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1014. Continuous Top-k Monitoring on Document Streams
1015. Generating Query Facets using Knowledge Bases
1016. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1017. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1018. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1019. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1020. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1021. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1022. Generating Query Facets using Knowledge Bases
1023. Private Over-threshold Aggregation Protocols over Distributed Datasets
1024. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1025. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1026. Privacy Protection based Access Control Scheme in Cloud-based Services
1027. Dynamic Facet Ordering for Faceted Product Search Engines
1028. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1029. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1030. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1031. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1032. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1033. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1034. A Recommendation System to Facilitate Business Process Modeling
1035. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1036. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1037. User Differentiated Verifiable File Search on the Cloud
1038. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1039. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1040. Incremental Consolidation of Data-Intensive Multi-flows
1041. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1042. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1043. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1044. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1045. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1046. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1047. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1048. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1049. TagBook: A Semantic Video Representation without Supervision for Event Detection
1050. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1051. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1052. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1053. The Impact of Review Environment on Review Credibility
1054. Private Over-threshold Aggregation Protocols over Distributed Datasets
1055. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1056. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1057. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1058. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1059. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1060. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1061. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1062. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1063. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1064. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1065. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1066. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1067. What Is Happening in The Video Annotate Video by Sentence
1068. Two level QR code for private message sharing and document authentication.
1069. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1070. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1071. Mining Health Examination Records A Graph-based Approach
1072. A Credibility Analysis System for Assessing Information on Twitter
1073. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1074. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1075. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1076. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1077. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1078. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1079. Predicting Personalized Image Emotion Perceptions in Social Networks
1080. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1081. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1082. Explaining Missing Answers to Top-k SQL Queries
1083. Bilevel Feature Extraction Based Text Mining
1084. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1085. Privacy-Preserving Outsourced Media Search
1086. Modeling and Verification of Online Shopping Business Processes
1087. User Preference Learning for Online Social Recommendation
1088. Steganalysis Features for Content-Adaptive JPEG Steganography
1089. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1090. PiCode: a New Picture-Embedding 2D Barcode
1091. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1092. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1093. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1094. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1095. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1096. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1097. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1098. Cloud workflow scheduling with deadlines and time slot availability
1099. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1100. Path-Based Epidemic Spreading in Networks
1101. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1102. On the Resiliency of Static Forwarding Tables
1103. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1104. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1105. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1106. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1107. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1108. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1109. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1110. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1111. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1112. Hacking is not random: a case-control study of webser ver-compromise risk
1113. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1114. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1115. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1116. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1117. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1118. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1119. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1120. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1121. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1122. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1123. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1124. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1125. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1126. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1127. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1128. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1129. Cross-Domain Feature Learning in Multimedia
1130. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1131. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1132. Saliency-based color accessibility
1133. Contextual Online Learning for Multimedia Content Aggregation
1134. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1135. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1136. An Attribute-assisted Reranking Model for Web Image Search
1137. RRW - A Robust and Reversible Watermarking
1138. Steganography Using Reversible Texture Synthesis
1139. Single Image Super-Resolution Based on Gradient Profile Sharpness
1140. Detection and Rectification of Distorted Fingerprints
1141. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1142. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1143. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1144. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1145. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1146. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1147. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1148. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1149. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1150. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1151. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1152. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1153. Authenticated Key Exchange Protocols for Parallel Network File Systems
1154. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1155. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1156. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1157. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1158. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1159. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1160. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1161. Context-based Diversification for Keyword Queries over XML Data
1162. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1163. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1164. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1165. Tweet Segmentation and Its Application to Named Entity Recognition
1166. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1167. Automatic Group Happiness Intensity Analysis
1168. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1169. Query Aware Determinization of Uncertain Objects
1170. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1171. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1172. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1173. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1174. Efficient Community Formation for Web Services
1175. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1176. Secure Mining of Association Rules in Hor izontally Distributed Databases
1177. Dynamic Query Forms for Database Queries
1178. Secure kNN Query Processing in Untrusted Cloud Environments
1179. An Empirical Performance Evaluation of Relational Keyword Search Systems
1180. Keyword Query Routing
1181. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1182. Demand Bidding Program and Its Application in Hotel Energy Management
1183. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1184. Incremental Detection of Inconsistencies in Distributed Data
1185. A Cocktail Approach for Travel Package Recommendation
1186. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1187. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1188. Analysis of Field Data on Web Security Vulnerabilities
1189. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1190. A Reliability Improvement Method for SOA-Based Applications
1191. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1192. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1193. Web Service Recommendation via Exploiting Location and QoS Information
1194. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1195. Exploiting Rateless Codes in Cloud Storage Systems
1196. COMIC:Cost Optimization for Internet Content Multihoming
1197. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1198. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1199. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1200. Uniform Embedding for Efficient JPEG Steganography
1201. Secure Deduplication with Efficient and Reliable Convergent Key Management
1202. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1203. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1204. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1205. Location Aware Keyword Query Suggestion Based on Document Proximity
1206. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1207. A secure data self-destructing scheme in cloud computing
1208. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1209. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1210. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1211. Secure kNN Query Processing in Untrusted Cloud Environments
1212. Exploiting Rateless Codes in Cloud Storage Systems
1213. Fuzzy Authorization for Cloud Storage
1214. Planning vs. dynamic control Resource allocation in corporate clouds
1215. Automatic Scaling of Internet Applications for Cloud Computing Services
1216. Strategy-proof Pricing for Cloud Service Composition
1217. Privacy Preserving Delegated Access Control in Public Clouds
1218. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1219. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1220. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1221. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1222. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1223. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1224. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1225. A Scientometric Analysis of Cloud Computing Literature
1226. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1227. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1228. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1229. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1230. FeatureMatch: A General ANNF Estimation Technique and its Applications
1231. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1232. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1233. As-Projective-As-Possible Image Stitching with Moving DLT
1234. Sharing Visual Secrets in Single Image Random Dot Stereograms
1235. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1236. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1237. A New Iterative Triclass Thresholding Technique in Image Segmentation
1238. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1239. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1240. An Iranian License Plate Recognition System Based on Color Features
1241. Learning Layouts for Single-Page Graphic Designs
1242. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1243. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1244. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1245. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1246. Fingerprint Compression Based on Sparse Representation
1247. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1248. LBP-Based Edge-Texture Features for Object Recoginition
1249. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1250. Toward Experiential Mobile Media Processing
1251. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1252. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1253. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1254. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1255. Designing Truthful Spectrum Double Auctions with Local Markets
1256. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1257. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1258. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1259. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1260. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1261. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1262. A Study on Clinical Prediction Using Data Mining Techniques
1263. Online Payment System using Steganography and Visual Cryptography
1264. Efficient Instant-Fuzzy Search with Proximity Ranking
1265. Attribute Based Encryption with Privacy Preserving In Clouds
1266. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1267. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1268. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1269. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1270. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1271. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1272. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1273. The Target Tracking in Mobile Sensor Networks
1274. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1275. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1276. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1277. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1278. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1279. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1280. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1281. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1282. SUSIE: Search Using Services and Information Extraction
1283. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1284. Secure Mining of Association Rules in Horizontally Distributed Databases
1285. Sampling Online Social Networks
1286. Privacy Preserving Delegated Access Control in Public Clouds
1287. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1288. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1289. Ginix : Generalized Inverted Index for Keyword Search
1290. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1291. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1292. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1293. Dynamic Query Forms for Database Queries
1294. Cost-Based Optimization of Service Compositions
1295. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1296. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1297. Automatic Extraction of Top-k Lists from the Web
1298. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1299. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1300. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1301. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1302. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1303. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1304. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1305. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1306. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1307. Privacy Preserving Data Sharing With Anonymous ID Assignment
1308. Non-Cooperative Location Privacy
1309. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1310. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1311. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1312. Cloud based emails boundaries and vulnerabilities
1313. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1314. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1315. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1316. Optimal Content Downloading in Vehicular Networks
1317. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1318. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1319. View-invariant action recognition based on Artificial Neural Networks
1320. User-aware Image Tag Refinement via Ternary Semantic Analysis
1321. Separable Reversible Data Hiding in Encrypted Image
1322. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1323. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1324. Robust Face-Name Graph Matching for Movie Character Identification
1325. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1326. Improving Color Constancy by Photometric Edge Weighting
1327. Exploring the design space of social network-based Sybil defenses
1328. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1329. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1330. AnnoSearch: Image Auto-Annotation by Search
1331. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1332. Scalable Scheduling of Updates in Streaming Data Warehouses
1333. Scalable Learning of Collective Behavior
1334. Ranking Model Adaptation for Domain-Specific Search
1335. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1336. Outsourced Similarity Search on Metric Data Assets
1337. Organizing User Search Histories
1338. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1339. Mining Web Graphs for Recommendations
1340. Joint Top K Spatial Keyword Query Processing
1341. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1342. Identifying Content for Planned Events Across Social Media Sites
1343. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1344. Generative Models for Item Adoptions Using Social Correlation
1345. Efficient Data Mining for XML Queries Answering Support
1346. Efficient audit service outsourcing for data integrity in clouds
1347. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1348. Effective Pattern Discovery for Text Mining
1349. Combined Mining: Discovering Informative Knowledge in Complex Data
1350. Decentralized Probabilistic Text Clustering
1351. Computing Structural Statistics by Keywords in Databases
1352. Bridging Social and Data Networks
1353. Answering General Time-Sensitive Queries
1354. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1355. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1356. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1357. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1358. Resource-Aware Application State Monitoring
1359. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1360. Query Access Assurance in Outsourced Databases
1361. Linear and Differential Cryptanalysis
1362. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1363. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1364. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1365. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1366. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1367. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1368. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1369. ROAuth: Recommendation Based Open Authorization
1370. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1371. Recommendation Models for Open Authorization
1372. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1373. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1374. On Privacy of Encrypted Speech Communications
1375. OAuth Web Authorization Protocol
1376. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1377. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1378. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1379. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1380. Fast Matrix Embedding by Matrix Extending
1381. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1382. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1383. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1384. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1385. Measuring Code Quality to Improve Specification Mining
1386. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1387. Towards Secure and Dependable Storage Services in Cloud Computing
1388. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1389. Remote Display Solutions for Mobile Cloud Computing
1390. Privacy Preserving Delegated Access Control in Public Clouds
1391. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1392. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1393. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1394. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1395. Load-Balancing Multipath Switching System with Flow Slice
1396. Assessing the Veracity of Identity Assertions via OSNs
1397. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1398. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1399. A New Cell-Counting-Based Attack Against Tor
1400. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1401. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1402. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1403. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1404. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1405. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1406. Fast Release Capture Sampling in Large-Scale Sensor Networks
1407. Cooperative download in vehicular environments
1408. Cooperative Data Dissemination via Roadside WLANs
1409. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1410. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1411. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1412. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1413. Hiding Sensitive Association Rule for Privacy Preservation
1414. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1415. Development of Certificate Authority Services for Web Applications
1416. Detecting and Validating Sybil Groups in theWild
1417. Association Rule Extracting Knowledge Using Market Basket Analysis
1418. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1419. Valuable Detours: Least-Cost Anypath Routing
1420. Self-Reconfigurable Wireless Mesh Networks
1421. Reliability in Layered Networks with Random Link Failures
1422. NABS:Novel Approaches for Biometric Systems
1423. Live Streaming with Receiver-based Peer-division Multiplexing
1424. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1425. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1426. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1427. Virtualized Screen: A Third Element for CloudMobile Convergence
1428. Steganographic Embedding in JPEG Images with Visual Criterion
1429. On the Typical Statistic Features for Image Blind Steganalysis
1430. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1431. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1432. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1433. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1434. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1435. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1436. Vulnerability Analysis in SOA-Based Business Processes
1437. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1438. Service-Centric Framework for a Digital Government Application
1439. Server-Side Streaming Processing of WS-Security
1440. OWLPath: An OWL Ontology-Guided Query Editor
1441. Monitoring Service Systems from a Language-Action Perspective
1442. Extracting Product Features and Sentiments from Chinese Customer Reviews
1443. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1444. Automated Certification for Compliant Cloud-based Business Processes
1445. Addressing Dependability throughout the SOA Life Cycle
1446. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1447. The Geometric Efficient Matching Algorithm for Firewalls
1448. Secure Service-Oriented Architecture for Mobile Transactions
1449. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1450. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1451. Privacy-Preserving Updates to Anonymous and Confidential Databases
1452. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1453. IPAS: Implicit Password Authentication System
1454. Improving Security and Performance in the Tor Network through Tunable Path Selection
1455. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1456. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1457. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1458. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1459. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1460. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1461. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1462. Data Delivery Properties of Human Contact Networks
1463. Converge-Cast: On the Capacity and Delay Tradeoffs
1464. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1465. USHER: Improving Data Quality with Dynamic Forms
1466. The World in a Nutshell: Concise Range Queries
1467. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1468. Scalable Scheduling of Updates in Streaming Data Warehouses
1469. Scalable Learning of Collective Behavior
1470. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1471. Publishing Search Logs A Comparative Study of Privacy Guarantees
1472. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1473. Optimal Service Pricing for a Cloud Cache
1474. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1475. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1476. Mining Web Graphs for Recommendations
1477. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1478. Integration of Sound Signature Authentication System
1479. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1480. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1481. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1482. Exploring Application-Level Semantics for Data Compression
1483. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1484. Data Leakage Detection
1485. Cost-aware rank join with random and sorted access
1486. Collaborative Filtering with Personalized Skylines
1487. Bridging Socially-Enhanced Virtual Communities
1488. Automatic Discovery of Personal Name Aliases from the Web
1489. A Personalized Ontology Model for Web Information Gathering
1490. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1491. A Query Formulation Language for the Data Web
1492. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1493. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1494. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1495. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1496. Towards Secure and Dependable Storage Services in Cloud Computing
1497. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1498. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1499. Data Integrity Proofs in Cloud Storage
1500. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1501. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1502. Feature-level Sentiment Analysis for Chinese Product Reviews
1503. Equal-sized Cells Mean Equal-sized Packets in Tor?
1504. Customer Relationship Management Based on Data Mining Technique
1505. Authentication Schemes for Session Passwords using Color and Images
1506. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1507. Young Talent Tracker
1508. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1509. International Plant Import and Export
OUR MODERN SOCITY
1510. Trained Volunteers Create A Successful Social Campaign
1511. Finger thump Based Shopping Cart
1512. Finger Print E-Voting Systems
1513. Create a Successful Anti- Nuclear Campaign
1514. Crowding Funding Mobilization
1515. People Power of India
1516. Modern Finger Print Voting System
1517. Election Commission Management
1518. Online Painting Auction
1519. Reality Show Ticket Booking System
1520. Online Broadway Motel Food Ordering System
1521. Fashion Studio Model Management
1522. Women's Selfhelp Group
Advance Health Care System
1523. Organizing medical camp for public health development
1524. Homeopathy Health Record
1525. Consumer Legal Advicer
1526. Raw Requried Online Medicine
1527. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1528. I School
1529. Job fair section process
1530. Advertising in E-Book
1531. Students Skills With Modern Industries
1532. College Placement And College Event
1533. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1534. Cloud Storage Public Digital Certificate
ERP PROJECTS
1535. Customer Relationship Management
1536. Corporate Trouble Shooter
1537. Corporate Event Organisation
1538. Engnering Lab Maintenance
1539. Select Your Age(Business Motivation all age group)
1540. Software Requirements Analysis for Client Side
1541. ERP System (Enterprint Resource Plan
LATEST BANKING
1542. User Opinion For Indian Banking Service And Cashless Economy
1543. Advanced Banking System
1544. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1545. Economic Usage of Solar Energy
1546. Gps Consumers Complients
1547. Online Softskills Tracks
1548. Online Buy And Sale Software
1549. Budget Home Design
1550. Online Product Exchange
1551. Jewellery Management
1552. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1553. E TENDERING -JAVA
1554. Moderate Robatics System with Public Opinion
Java Apps
1555. Online overview of skills really used in jobs
1556. Land Bank for Nursery
1557. Developing Rural Economy
1558. ECOPS - Electronics Police Record Management System
1559. Website Evaluation Using Opinion Mining
1560. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1561. INSURANCE MANAGEMENT SYSTEM
1562. e-Fraud Prevention based on the Self- Authentication of e-Documents
1563. Hope Center
1564. Exam crazy
1565. BUGS REPORTING SYSTEM
1566. LOCATION BASED CONSUMER COMPLAINT
1567. Speed Racing
1568. ROADSTER
1569. META CAFE
1570. ONLINE VIDEO LOCKER
1571. Management System in Metro Train
1572. Plant Shopping on Web
1573. Reporting Online Media News Systems
1574. Informative Content Extraction
1575. E-commerce Complaint Management System
1576. Modern Agriculture Development System
1577. Loan Online Application
1578. Rural Community Developement
1579. LOVE AND CARE
1580. GREEN PLANT
1581. Advance Couier Service
1582. Community Awarness
1583. E_Music
1584. Staff Management System
1585. E-TENDERING
1586. Hotel Management
1587. Crime File Management System
1588. Cloud Cyber Attack
1589. Cloud Cost Management for Customer Sensitive Data
1590. Advance Web based Multimedia Answer Generation
1591. Commaunity Awareness
1592. E-Commerce Complaints
1593. Modern Agriculture Development System
1594. Plant Shopping on Web
1595. ONLINE VIDEO LOCKER
1596. ONLINE VIDEO LOCKER
1597. Reporting Online Media News Systems
1598. Online Plant Shopping
1599. Community Awareness
1600. Loan Online Application
1601. Modern Agriculture Development System
1602. Online Digital Library
1603. Geo Base Services
1604. Civil Supplies and Consumer Protection Department
1605. Citizen Opinions vs Government Policies
1606. Protecting Used Data Privacy for Attackers
1607. Web Hospital Management
1608. Easy SQL Query for Non-IT Manager
1609. Online Shopping with Fraud detection
1610. Efficient Spatial Query Processing
1611. Cryptographic Key Exchange Authentication
1612. Online Global Information Service Center
1613. Contracts Business Events Management
1614. Online Secure image Social Networks
1615. Outsourcing of Online Image Reconstruction
1616. Trust based Profile Matching Secure Social Network
1617. Secure and Distance based Online Social Network (OSN)
1618. Efficient Online Image Retrieval System
1619. Data Sharing In Cloud Storage by Using Key-Aggregate
1620. Multicast Key Management for Cloud
1621. Face-to-face contact on Mobile Social Networks
1622. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1623. Dynamically Growing Online Survey for Behavioral Outcomes
1624. Advance Web based Multimedia Answer Generation
1625. College Result Analysis with Horizontally Distributed Databases
1626. Feedback Decision Support for mHealth monitoring
1627. Exchange Secrete Key for Data Producers and Consumers
1628. Efficient Information Retrieval Using Ranked Query (EIRQ)
1629. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1630. Web Hosting On Cloud
1631. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1632. Web Server Security with Web Client Management System
1633. Web Parser on Sequence Alignment Techniques
1634. Web Page re-Ranking System for Library
1635. Web Eye
1636. Voting System for Web Library
1637. VIRTUAL CLASSROOM SYSTEM
1638. Unique Web Resources Utilization Monitoring System
1639. Transport Management System
1640. Pre-paid Recharging System on Banking
1641. Tollgate Management
1642. Time To Time Stock Market Updater and Monitoring System
1643. Sql Tuner
1644. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1645. SMS Based Mobile Banking with Security
1646. Sms Topup
1647. Vendor Information System For Shipping
1648. Sequential Anomaly Detection from User Behaviour
1649. Secure SMS Transaction System on banking
1650. Secure Online Documents Management System in Cloud
1651. Secure File Uploading Server with Advance Protecting System
1652. Secure File Monitoring System on Cloud
1653. Relational Logic Search Engine On Healthcare
1654. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1655. Quick Customer decision support on Web Sales Portal
1656. Query Response System for File Management
1657. Quality Visualization on Web TV
1658. Project Work Tracking System
1659. Product Market Manipulations on Asian stock market
1660. Predicting Top Company Share Based on High Utility Data
1661. Automation of Analysis and Development Management
1662. Pharmacy Information System
1663. Personalize Your News on Web
1664. Online University
1665. Online tagging for multimedia content
1666. Online Search Ranking On Multiple Domain
1667. Online Rental House Web Portal
1668. Online Recruitment System
1669. Online Real Estate Property Management
1670. Online Multi Type Documents Search Engine
1671. ONLINE MOBILE BILLING SYSTEM
1672. Online Jewelry Management
1673. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1674. Online Examination System
1675. Online Ensemble Learning Approach
1676. Online Banking With Fraud Detecting
1677. Online Auction Bit
1678. ONLINE ADVERTISING SYSTEM
1679. Nutraceuticals Management System
1680. Nearest Shopping Location Identification Systems
1681. Multilevel Images Authentication Systems
1682. Multi New Product Survey Management
1683. Movie Recommender Systems via User- Item Subgroups
1684. Movie Rating and Recommendation on Mobile
1685. Modern Municipal Corporation
1686. Mobile TV Quality Management
1687. Mobile Banking WAP
1688. Manifold Entrust Scheme
1689. Management System in Train
1690. Secure Mailing System
1691. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1692. LEAVE MANAGEMENT SYSTEM FOR MNC
1693. Knowledge Based Decision Support System(KMS)
1694. Key Management for Content Integration
1695. Inter Bank Fund Transfer in Distributed Network
1696. Information and Knowledge Extracting from a large amount of data
1697. Industry Standard Authorization For Sensitive Resources
1698. Implementation and Validating Environmental and Health
1699. iKnoweb Extracting and Integrating Entity Information System
1700. HUMAN ASSURANCE ADMINISTRATION
1701. High_level network Security Using Packet Filtering
1702. High and Low Level SQL Query Executor
1703. GLOBAL COUNSELLING SYSTEM
1704. A Game Theory for Online Security
1705. Distributed Transaction Proxy
1706. Freelancer Job
1707. File Security With Multi Database System
1708. FILE SEARCH ENGINE
1709. Fertilizer Management System
1710. Fast Web Information Gathering with Alias Detection
1711. E-Tutor Online Jobs
1712. Enterprise Stock and Accounting System
1713. Ensuring Data Storage Security in Cloud Computing
1714. Encrypted IT Auditing on Cloud Computing
1715. Encrypted Data Storage Vs Data Against illegal Access
1716. Enabling Site Interaction In Social Community
1717. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1718. E-Music world
1719. Employee Resource Management
1720. Employee Management System
1721. E-Learning
1722. E Fraud Prevention based on the Self Authentication of e Documents
1723. Distribution System for Discount Sales
1724. Distributed Data Integration on Electricity Board
1725. Disease Information Hiding on Publishing Healthcare Data
1726. Digital Documents Attestation Systems
1727. Defending Against Web Application Vulnerabilities
1728. Defects Analysis Systems
1729. Data theft detection mobile cloud computing
1730. Data Base Fraud Detection Systems
1731. Customer Information Hiding for Data Mismanagement in Banking
1732. Company Security Reporting System(CSRS)
1733. E -Crime File Management System
1734. Credit Card Management System
1735. Corporate Requirement System
1736. Consumer Sales Online Fake Product Detection and Deletion
1737. Company Information Tracking System
1738. Cloud Policy-Based File Assure Deletion
1739. Cloud Data Theft Attacks
1740. Cloud Cyber Attacks against Social Networks
1741. Cloud Cost Management for Customer Sensitive Data
1742. Client Favorite Photo Search Engine on Web
1743. Citizen Card System
1744. Card Management System
1745. Design &Development of Car Parking and Automation Billing Systems
1746. Customer Care Service
1747. BPO Call Center
1748. Automation of IT Process Management
1749. Modeling and Automated Containment of Worms
1750. Attribute Key Based Data Security System
1751. As Needed Basis Accountability for Cloud Data Sharing
1752. Annotation of short texts With Wikipedia pages
1753. AIRLINE RESERVATION SYSTEM
1754. Advance User Management on Social Website
1755. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1756. Online Trends Management Service in It Industry
1757. Session Management System in It Industry
1758. Tools for Non IT Expert Developer
ERP PROJECTS
1759. New Company Policy Clearance System
1760. Recommend To Friend
1761. Consultanting About the Foreign Peoples
1762. Performance System Analysis In Industry
1763. Non It People Performance
MODERN AGRICULTURE
1764. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1765. Agriculture Marketing in Generation
1766. Agriculture Assist
1767. Sponsor For Agriculture
SPORTS
1768. Play Ground Booking
OUR MODERN SOCITY
1769. ADHAR VOTING SYSTEM
1770. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1771. RAILWAY SEAT RESERVATION SYSTEM
1772. Railway Management Service
1773. It Park Media
1774. Automation Transport Maintance
1775. Yell Help For Children
1776. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1777. Apartment Maintenance
1778. Power Consumption Monitoring House Hold Electronic Device
1779. Direct Q Less Reservation System in train
Advance Health Care System
1780. MAC Sensing Protocol
1781. World Wide Cloud Inter Hospital Acess Health Care System
1782. Live Doctor
Dotnet Apps
1783. TELEVISION CHANNEL PROGRAM MANAGEMENT
1784. WIN THE TRUST OF AN INDIAN CONSUMER
1785. ONLINE ACCOUNT MANAGEMENT
1786. SMART CAB BOOKING SYSTEM
1787. ONLINE FAST FOOD ORDER
1788. Travel Mate Add Module
1789. Work Order System Call Centre
1790. SPORTS MANAGEMENT SYSTEM
1791. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1792. Pick-It Courier Service
1793. Online Taxi Booking
1794. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1795. INCOMETAX MAINTAINANCE SYSTEM
1796. Hotel Reservation
1797. ERP System
1798. Bug Tracking System
1799. Vendor Information System For Shiping
1800. Top-K ranking System
1801. Secure Medical Image Archive System
1802. Business Activity Coordination Using Web Services
1803. Management Portal
1804. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1805. Secure Data Filtering Recommendation System
1806. Online Resources Sharing via Social Networks
1807. Secure self-destructing in Cloud Computing
1808. Web Resourecs File Authorization Management
1809. Click based image re-ranking system
1810. Tree Structure Data Analiysis Mining
1811. Web Resource Allocation for CorPerate
1812. Web Vulnerabilities and Security
1813. Fuzzy Cloud Search Using XML
1814. Cloud Data Supporting Secure Query Search
1815. Tour Recommender Systems on Web
1816. Distributed Interactive Web Applications
1817. Secure Query Processing for Cloud
1818. Online Data Storage with less pricing
1819. Cost Based Web Content Managemnts
1820. Web Hospital Management
1821. Online Data storage with low price
1822. Secure Online Data Block Authorization
1823. Profitable Onlin web Server System
1824. Online Economies File Manager for Multi Keying
1825. Online Community Management
1826. Key based Online Data Managements
1827. Critical Workflow Management for Web Documents
1828. Secure Online Documents Managements for Group Sharing
1829. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1830. Online Marketing Automation System
1831. Internal organization change management System
1832. Secure confirmation of sensitive transaction data in modern Internet banking services
1833. Privacy security with TPA in cloud computing
1834. Company Information Tracking System
1835. Online Virtualized screen Processing
1836. Web Service for Airline Management
1837. Web Social Club
1838. Quantum Key Cryptography
1839. Patient Data Management Based On Hospital Location
1840. Online Software Developer Community
1841. Online Developed Software sales
1842. Avoid repeated measurements On Genetics Dataset
1843. College Lab Maintenance System
1844. Industrial Manpower Resource Organizer
1845. Web Query Construction and Search on Complex Data
1846. Hospital Emergency Data Management
1847. Data confidentiality On Health-care Information System
1848. Secure Online Trading
1849. Fast Real-Time Event Alert Using social Network
1850. Secure E-Mail Organizer
1851. Web User Service Management System
1852. Easy SQL Query for Non-IT Manager
1853. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1854. Customer Relationship Management (CRM) on Banking
1855. Online Company ERP System
1856. Constructing E-Tourism
1857. Web based Multi Service Ranking System
1858. Dynamic Customer Data Hiding in Banking
1859. Online Distributed Social Clubs
1860. Virtual Shopping with Negative Feedback Reputation Systems
1861. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1862. Web Service Oriented Query Authentication Technique
1863. Web Based Customer Favorite vehicle Search Engine
1864. Web Based Book Publishing System
1865. Virtual Energy- Based Encryption and Keying
1866. Video Fraud Detecting On social Network
1867. Video Compression with Data hiding & Data Extraction
1868. Vendor Information System for Shipping
1869. VALUE ADDED TAX (VAT)
1870. Universal Smart Card
1871. Ultimate Location Information Systems
1872. Top K Ranking System
1873. Techno Task Manager
1874. Supply Chain Management
1875. Substitution-Permutation cryptanalysis System
1876. Streaming Data Warehouse Updations
1877. Step by Step Monitoring for Product Purchasing System
1878. Steganography for Data Reading and Writing AVI files
1879. SQL TUNER
1880. SMS Transaction Security
1881. Session Authentication Passwords using Color
1882. Service Availability Guarantees on Virtual Economy
1883. Server Fraud Detection on Cloud
1884. Sentence Based Search on Cloud
1885. Semantic Web Search Engines
1886. Secured Image communicator
1887. Secure smart application on web application
1888. Secure Service-Oriented Smartcard systems
1889. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1890. Secure Location Identification System
1891. Secure and Cloud Based Patient Information Systems
1892. Reduce the Password Guessing Attacks using Click Point
1893. Recommendation System Based on Graph
1894. Quantum Key Cryptography
1895. Quality Controller
1896. Public Web Status Monitoring System
1897. Project Trade Pool
1898. Product Marketing Analysis On Public Opinion
1899. Predicting Users Behaviors Using Web Mining
1900. Personal Health Information on M-Healthcare Emergency
1901. Optimum Online Knowledge Base
1902. Online Training Program
1903. Online Time sensitive queries
1904. Online Tag Based Image Retrieval and Effective Management
1905. Online Social networks controls using cloud
1906. Online Rental System
1907. Online product Opinion and Ranking System
1908. Online Dynamic form creation for Non-IT Peoples
1909. Online Digital Contract Signing in Mistrusted Parities
1910. Online Aventure
1911. Online Shopping
1912. News Ticker Project
1913. Net Bank in Recharge
1914. Multi User Public Auditing System of Data Storage Security
1915. Multi Location Networked Mobile Auto Intimates
1916. Modern Distributed Business Applications for Supply Chain Management
1917. Market Intelligence Based Public Sentiment Analysis
1918. Leave Management System
1919. Joint processing of spatial keyword queries
1920. Intelligence Missing Items in Shopping Cart
1921. Information Leak Detection and Prevention
1922. Industrial Manpower Resource Organizer
1923. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1924. Human Expertise Search Engine
1925. Home appliances online Purchase
1926. High Secure Corporate Web Search Engine
1927. High Degree Patient Privacy on Secure Data Outsourcing
1928. Group Movement Pattern Discovery
1929. Graph Based Share Market Data Updating
1930. Generic Business Portal
1931. Flight Booking Portal
1932. Firewall using Packet Filtering
1933. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1934. Ethical and Social issues in File sharing system
1935. Enterprener Sales Report Management
1936. Encyclopedia for Computer Science
1937. Employee Based Performance Monitoring and Action Systems
1938. Emerging Patient Health Information Exchange System On Cloud
1939. Efficient Search on Outsourced data using Cloud
1940. Efficient and Secure Data Processing on Queries Similarity
1941. Distributed Database Optimization on HealthCare
1942. Digital Asset Management Systems (DAMS) Using Watermarking
1943. Detecting Fraud on Vehicle Insurance System
1944. Defeating Lazy Servers Database Vs Query Access Assurance
1945. Data Processing for Disease-Treatment Relations
1946. Data Mining Analysis on EB bill system
1947. Data confidential against untrusted servers using attribute-based encryption (ABE)
1948. Data Aggregation using SQL clustering
1949. Customer Sales Analysis System Based On Purchasing
1950. Cryptography on Personal confidential information
1951. Cost Based Secure Cloud Data Systems
1952. Market Based Analysis for consumer correct decision
1953. Construction Company Work Order System
1954. Complete Medical Transcription System(Mts)
1955. Company Security Reporting System(CSRS)
1956. College Result Analysis
1957. Cloud Economic Benefit On Scientific Computing
1958. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1959. Centralized Event Planer across Social Media Sites
1960. Call Center Management
1961. A Reservation-Based Coordination Protocol for Web Services
1962. Building construction and cost estimation
1963. Budget Planner
1964. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1965. Automatically identifying query groups on Web Search Engine
1966. Auditing Data integrity and data storage using cloud
1967. Application layer blocker for preventing on cyber security
1968. Advanced One-Click User Web Search Engine
1969. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1970. VALUE ADDED TAX (VAT)
1971. User Oriented Network Attacks
1972. Secure Back Up
1973. Screen Capture And Mouse I/O
1974. Sales Bill Printing System using Excel
1975. Password Security
1976. Online User Mobile Rating
1977. Online Sensex Graph System
1978. Online Book Publishing
1979. NEWS TICKER PROJECT
1980. Multi Storage file
1981. Message Chating
1982. Medical Equipment in WAP
1983. Login Authentication Scheme
1984. Information Alert System
1985. Image Encryption And Decryption
1986. Generic Business Portal
1987. Flight Booking Portal
1988. File Transfer using Cryptography Techniques
1989. File Splitting
1990. Excel Format in Report
1991. EB Management System
1992. Dynamic Web Form Creation
1993. Android Image Search


Struts Application Projects
Struts Apps
1994. Public Sentiment Analysis with Online Shopping Using Struts
1995. Modern distributed business for supply-chain management
1996. High Confidential Personal Disease Reporting System
1997. Distributor Sensitive Data Management Using Struts
1998. Development of Certificate Authority Services for Web Applications
1999. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
2000. Website Tracking System
2001. Website Ranking System
2002. Treasure Warehouse
2003. Student Information System
2004. Storage security
2005. PRISON MANAGEMENT SYSTEM
2006. E-Licence Investigation System
2007. Online Secure File Transfer System
2008. Online Medicine Purchase
2009. ONLINE EDUCATION
2010. Online Agriculture System
2011. Mobile Survey
2012. ISSUE TRACKING SYSYTEM
2013. HOSPITAL MANAGEMENT SYSYTEMS
2014. HealthCare Management System
2015. Global Employee Acclaimer
2016. E-VOTING FOR ASSOCIATION
2017. Encrypted Register Form
2018. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
2019. E INSURANCE
2020. Courier Tracking Systems
2021. corporate Transportation
2022. Collectorate Communication Systems
2023. Budget Approval System
2024. BLOOD BANK MANAGEMENT SYSTEMS
2025. ATTENDANCE MANAGEMENT SYSTEM
2026. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2027. Sponsor For Agriculture
2028. Agriculture Assist
2029. Agriculture Marketing in Generation
2030. International Plant Import and Export
MODERN EDUCATION SYSTEM
2031. Old In Gold
2032. I School
2033. College Placement And Events
2034. Rural Area Educational Trouble Shooter
2035. Web Direct Recruitment Analysis
2036. Online Aquarum
2037. School Automation System
2038. Secure Online Course Automation
2039. Session Management System in It Industry
2040. Tools for Non IT Expert Developer
2041. Students Skills With Modern Industries
MODERN TECHNOLOGY
2042. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2043. Customer Favarate Greeting Card Design
2044. GPS Transport Packers and Movers
2045. House Hold Appliancies Warranty Management
2046. Direct Q Less Reservation System in train
2047. Power Consumption Monitoring House Hold Electronic Device
2048. Apartment Maintenance
2049. Budget Home Design
2050. Online Buy And Sale Software
2051. Online Softskills Tracks
2052. Gps Consumers Complients
2053. Economic Usage of Solar Energy
Advance Health Care System
2054. Organizing medical camp for public health development
2055. LIVE WEB DOCTOR CONSULTATION
2056. World Wide Cloud Inter Hospital Acess Health Care System
2057. MAC Sensing Protocol
2058. Medical Record Authentication
2059. Raw Requried Online Medicine
2060. Consumer Legal Advicer
2061. Homeopathy Health Record
SPORTS
2062. Play Ground Booking
2063. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2064. Cloud Storage Public Digital Certificate
ERP PROJECTS
2065. Corporate Trouble Shooter
2066. Entrepreneur Fault Analysis
2067. Organise Corporate Training For Client Projects
2068. Employment Knowledge Database
2069. GPS Employee Tracking System
2070. Non It People Performance
2071. Performance System Analysis In Industry
2072. Consultanting About the Foreign Peoples
2073. Recommend To Friend
2074. New Company Policy Clearance System
2075. ERP System (Enterprint Resource Plan
2076. Software Requirements Analysis for Client Side
2077. Select Your Age(Business Motivation all age group)
2078. Engnering Lab Maintenance
2079. Corporate Event Organisation
LATEST BANKING
2080. EyeBank Management System
2081. Advanced Banking System
OUR MODERN SOCIETY
2082. Trained Volunteers Create A Successful Social Campaign
2083. Finger thump Based Shopping Cart
2084. Railway Management Service
2085. Create a Successful Anti- Nuclear Campaign
2086. Crowding Funding Mobilization
2087. People Power of India
2088. Pets Care
2089. Feature in Best Potitical Leader in India
2090. Yell Help For Children
2091. Automation Transport Maintance
2092. It Park Media
2093. Online Painting Auction
2094. Election Commission Management
2095. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2096. ANDROID APPS FOR INSURANCE SYSTEM
2097. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2098. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2099. ANDROID APPS FOR DOCTOR APPOINTMENT
2100. LIVE WEB DOCTOR CONSULTATION
2101. ANDROID APPS ON DOCTOR WITH NURSE
2102. HOSPITAL ANDROID APPS
2103. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2104. Fertilizer Management System -Java, JSP, MySQL
2105. Land Bank for Nursery -Java, JSP, MySQL
2106. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2107. FORMER APPS - ANDROID
2108. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2109. Online Banking with Fraud Detecting- Java JSP, MySQL
2110. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2111. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2112. Big Scholarly Data: A Survey
2113. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved