Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
HOT IT SOFT SKILLS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB ANDROID IEEE 2017 -18
ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS
IEEE PHP Projects 2017-18 IEEE PHP Projects PHP Application Projects Dot Net IEEE 2017-18
RAZOR MVC 4 ASP.NET 2017-18 ANGULAR JS , Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET
ASP.NET MVC Framework Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects
IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Dotnet Application Projects JAVA IEEE 2017-18
JAVA IEEE 2016-17 Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects
IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project Java Application Projects Dotnet Mini Projects
Struts Application Projects Java Mini Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS
HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS Internet of things (IoT)
RESTful Web services
 
HOT IT SOFT SKILLS
MEAN: MongoDB, Ember, AngularJS and nodeJS
1. Big Scholarly Data: A Survey
2. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
3. Big Data, Big Knowledge Big Data for Personalized Healthcare
4. Deduplication on Encrypted Big Data in Cloud
5. Secure Sensitive Data Sharing on a Big Data Platform
6. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
7. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
8. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
9. Self-Healing in Mobile Networks with Big Data
10. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
11. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
12. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
13. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
14. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
15. Developing Apps for visually imapired people: Lessons learned from social network
16. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
17. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
18. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
19. Design of secure location and message sharing system for android platform
20. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
21. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
22. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
23. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
24. Privacy Protection based Access Control Scheme in Cloud-based Services
25. Privacy-Preserving Selective Aggregation of Online User Behavior Data
26. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
27. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
28. Big Scholarly Data: A Survey
29. SocialQ&A: An Online Social Network Based Question and Answer System
30. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
31. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
32. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
33. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
34. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
35. User-Centric Similarity Search
36. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
37. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
38. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
39. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
40. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
41. Processing Incomplete k Nearest Neighbor Search
42. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
43. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
44. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
45. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
46. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
47. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
48. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
49. Deduplication on Encrypted Big Data in Cloud
50. Dynamic Resource Allocation for MapReduce with Partitioning Skew
51. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
52. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
53. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
54. Self-Healing in Mobile Networks with Big Data
55. Secure Sensitive Data Sharing on a Big Data Platform
56. Big Data, Big Knowledge: Big Data for Personalized Healthcare
57. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
58. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
59. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
60. Differentially Private Frequent Itemset Mining via Transaction Splitting
61. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
62. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
63. Fast Best-Effort Pattern Matching in Large Attributed Graphs


ANDROID IEEE 2017 -18
IEEE Internet of Things (IoT)
64. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
65. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
66. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
67. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
68. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
69. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
70. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
71. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
72. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
73. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
74. Authentication of Smartphone Users Using Behavioral Biometrics
75. An Exploration of Geographic Authentication Schemes
76. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
77. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
78. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
79. Distributed secret sharing approach with cheater prevention
80. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
81. Efficient privacy preserving location based query over outsourced encrypted data
82. Utilizing the Cloud to Store Hijacked Camera Images
83. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
84. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
85. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
86. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
87. Enabling privacy preserving location proof for mobile users.
88. Optimizing User Experience in Choosing Android Applications
89. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
90. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
91. FoodForCare: An Android Application for Self-Care with Healthy Food
92. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
93. Silence is Golden: Enhancing Privacy of Location-Based Services
94. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
95. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
96. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
97. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
98. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
99. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
100. Adapting to User Interest Drift for POI Recommendation
101. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
102. Developing Apps for visually imapired people: Lessons learned from social network
103. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
104. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
105. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
106. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
107. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
108. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
109. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
110. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
111. Mobile cloud support for semantic enriched speech recognition in social care
112. Distributing secret sharing approach with cheater prevention based on QR code
113. Design of Secure Location and Message Sharing System for Android Platform
114. The impact of cloud technology on the automation of businesses
115. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
116. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
117. Rescue Management System
118. Android Army - Military Apps
119. Android Beauty Parlor
120. Android E Municipality
121. ANDROID NURSE AID
122. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
123. GPS Employee Tracking System
OUR MODERN SOCITY
124. ANDROID APPS FOR INSURANCE SYSTEM
125. BUDGET HOME DESIGN -ANDROID APPS
126. Former To Former Apps
127. Pets Care
ONLINE CONSUMERS PROCESSING
128. House Hold Appliancies Warranty Management
129. GPS Transport Packers and Movers
Android Apps
130. MY LIBRARY
131. FACULTY RATING SYSTEM
132. App for self organizer
133. ONLINE DOCTOR APPOINTMENT
134. Conference Event Mobile Assistant
135. Mobile Prescription
136. Metastore Application
137. Android SmartCampus
138. Android Shopping Mall
139. TOLL GATE -Barcode Billing System --ANDROID
140. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
141. Taste Hunt For Restaurants
142. POLICE APPS
143. Android Blood Bank
144. Mobile Expense Claim System Android
145. Android Intelligent Time Tracking System TICK
146. Android Course and Attendance Management System
147. Android Event Reminder
148. Android Attendance Assessment
149. Android Advance Shopping
150. Android CAR POOLING
151. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
152. Android HOSPITAL
153. ATHLETE MEET GUIDE
154. Android Apps PARKING MANAGER
155. Love and Care
156. Food Waste Management System
157. Travel Guide
158. Android Provisional Store
159. Best Baby Care with Vaccines Remainder
160. Android Assist for Lecturer and Student
161. Android Personal Assistance (PA)
162. Android Application for College Management System
163. Tollgate Payment system in android
164. Intelligence Quotient (IQ) Test
165. GPS LOCATION ALARM SYSTEM
166. Location Based Intelligent Mobile Organizer
167. BANK ACCOUNT TRACKER FOR ANDROID
168. UNIT CONVERTER
169. Tips and Tax Calculator in Android
170. TEXT EDITOR FOR ANDROID
171. Student Attendance Tracking System
172. Smart Money With Daily Expenses
173. Simple And Secure Android TO DO List Application
174. Restaurant Table Order Management System
175. Online Shopping
176. Online Examination System For Android
177. ANDROID SHOPPING LOCATION IDENTIFIER
178. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
179. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
180. MICRO CREDIT BANKING ON SMARTPHONE
181. LOCATION BASED ALARM
182. Insurance in android
183. GOOGLE PLACE FINDER
184. Friend Mapper on Mobiles - Friend Locator
185. EXPENSE MANAGER
186. Employee Diractory
187. Online job search
188. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
189. ANDROID STUDENT RESULT ANALYZING SYSTEM
190. CloudMoV : Cloud-based Mobile Social TV
191. Bus Reservation
192. Budget Planner
193. Android SMS Systems
194. ANDROID LEAVE MANAGEMENT SYSTEM
195. ANDROID EVENT SCHEDULER/REMINDER
196. Android Grocery Shopping List
197. Android Attack Application
198. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
199. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
200. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
201. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
202. Optimizing Display Advertising Markets
203. Using Knowledge Libraries to Transfer Expert Knowledge
204. Semantic Retrieval of Trademarks Based on Conceptual Similarity
205. Understanding and Predicting Question Subjectivity in Social Question and Answering
206. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
207. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
208. Fast Top-K Path-based Relevance Query on Massive Graphs
209. Web Image Search Re-ranking with Click-based Similarity and Typicality
210. Automatically Mining Facets for Queries from Their Search Results
211. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
212. Statistical Entity Extraction from Web
213. Question Answering System for an Effective Collaborative Learning
214. Lost in Translation: Improving Decoy Documents via Automated Translation
215. Learn to Personalized Image Search from the Photo Sharing Websites
216. In Tags We Trust Trust modeling in social tagging of multimedia content
217. Efficient Anonymous Message Submission
218. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
219. Employment Knowledge Database
220. Organise Corporate Training For Client Project s
221. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
222. ONLINE VEHICLE SHOWROOM SYSTEMS
223. Online Voting
224. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
225. School Management System
226. Secure Online Course Automation
227. School Automation System
228. Online Aquarum
229. Web Direct Recruitment Analysis
PHP Apps
230. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
231. TRADE / INDUSTRY WEB PORTAL
232. Feeding the poor from the supermarket
233. Application for recording your goals and habits
234. VISUAL WAY TO RAISE AWARENESS
235. Municipal Corporation
236. Online Polling For Publishers And Brands
237. Avoid Food Wastage
238. Web Doctor
239. ONLINE FOOD ORDERING SYSTEM
240. E-Tendering
241. Improving Rural Communities
242. Green Planet Awarness
243. Development of an Online Course Portal for a campus
244. Auxon Test
245. WEB BASED LEARNING SYSTEM
246. Tagging in online social networks
247. Secured file Downloading system
248. Cryptonite : A Secure and Performant Data Repository on Public Clouds
249. searching a image from websites
250. Online University
251. Online product Opinion and Ranking System
252. MNC LEAVE MANAGEMENT SYSTEM
253. Home appliances online purchase
254. Freelancer Job
255. E-Tutor Online Jobs
256. Statistical Entity Extraction from Web
257. Effective Collaborative Learning
258. Development of an e-Post Office System
259. Question Answering System for an Effective Collaborative Learning


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
260. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
261. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
262. Privacy Protection based Access Control Scheme in Cloud-based Services
263. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
264. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
265. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
266. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
267. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
268. Explaining Missing Answers to Top-k SQL Queries
269. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
270. Continuous Top-k Monitoring on Document Streams
271. Generating Query Facets using Knowledge Bases
272. Query Reorganization Algorithms for Efficient Boolean Information Filtering


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
273. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
274. Privacy Protection based Access Control Scheme in Cloud-based Services
275. Dynamic Facet Ordering for Faceted Product Search Engines
276. Continuous Top-k Monitoring on Document Streams


ANGULAR JS ,
ANGULAR JS
277. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
278. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
279. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
280. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
281. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
282. Generating Query Facets using Knowledge Bases
283. Private Over-threshold Aggregation Protocols over Distributed Datasets
284. Private Over-threshold Aggregation Protocols over Distributed Datasets


Dot Net IEEE 2016-17
IEEE Transactions on Computers
285. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
286. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
287. TagBook: A Semantic Video Representation without Supervision for Event Detection
288. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
289. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
290. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
291. The Impact of Review Environment on Review Credibility
292. Private Over-threshold Aggregation Protocols over Distributed Datasets
293. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
294. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
295. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
296. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
297. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
298. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
299. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
300. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
301. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
302. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
303. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
304. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
305. What Is Happening in The Video Annotate Video by Sentence
306. Two level QR code for private message sharing and document authentication.
307. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
308. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
309. Mining Health Examination Records A Graph-based Approach
310. A Credibility Analysis System for Assessing Information on Twitter
311. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
312. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
313. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
314. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
315. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
316. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
317. Predicting Personalized Image Emotion Perceptions in Social Networks
318. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
319. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
320. Explaining Missing Answers to Top-k SQL Queries
321. Bilevel Feature Extraction Based Text Mining
322. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
323. Privacy-Preserving Outsourced Media Search
324. Modeling and Verification of Online Shopping Business Processes
325. User Preference Learning for Online Social Recommendation
326. Steganalysis Features for Content-Adaptive JPEG Steganography
327. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
328. PiCode: a New Picture-Embedding 2D Barcode
329. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
330. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
331. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
332. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
333. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
334. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
335. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
336. Cloud workflow scheduling with deadlines and time slot availability
337. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
338. Path-Based Epidemic Spreading in Networks
339. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
340. On the Resiliency of Static Forwarding Tables
341. Network Capability in Localizing Node Failures via End-to-End Path Measurements
342. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
343. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
344. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
345. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
346. A Forecasting Methodology for Workload Forecasting in Cloud Systems
347. Optimal Shipping Strategy and Return Service Charge Under No-Reason
348. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
349. A Recommendation System to Facilitate Business Process Modeling
350. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
351. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
352. User Differentiated Verifiable File Search on the Cloud
353. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
354. Statistical Features Based Real-time Detection of Drifted Twitter Spam
355. Incremental Consolidation of Data-Intensive Multi-flows
356. Service Pattern: An Integrated Business Process Model for Modern Service Industry
357. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
358. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
359. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
360. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
361. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
362. Towards Effective Bug Triage with Software Data Reduction Techniques
363. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
364. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
365. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
366. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
367. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
368. Proof of retrievability with public verifiability resilient against related-key attacks
369. Secure Anonymous Key Distribution Scheme for Smart Grid
370. Converses For Secret Key Agreement and Secure Computing
371. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
372. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
373. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
374. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
375. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
376. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
377. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
378. Hacking is not random: a case-control study of webser ver-compromise risk
379. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
380. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
381. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
382. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
383. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
384. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
385. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
386. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
387. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
388. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
389. Diversifying Web Service Recommendation Results via Exploring Service Usage History
390. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
391. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
392. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
393. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
394. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
395. Cross-Domain Feature Learning in Multimedia
396. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
397. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
398. Saliency-based color accessibility
399. Contextual Online Learning for Multimedia Content Aggregation
400. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
401. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
402. An Attribute-assisted Reranking Model for Web Image Search
403. RRW - A Robust and Reversible Watermarking
404. Steganography Using Reversible Texture Synthesis
405. Single Image Super-Resolution Based on Gradient Profile Sharpness
406. Detection and Rectification of Distorted Fingerprints
407. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
408. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
409. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
410. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
411. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
412. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
413. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
414. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
415. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
416. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
417. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
418. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
419. Authenticated Key Exchange Protocols for Parallel Network File Systems
420. Data Collection in Multi-Application Sharing Wireless Sensor Networks
421. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
422. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
423. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
424. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
425. Optimum Power Allocation in Sensor Networks for Active Radar Applications
426. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
427. Context-based Diversification for Keyword Queries over XML Data
428. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
429. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
430. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
431. Tweet Segmentation and Its Application to Named Entity Recognition
432. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
433. Automatic Group Happiness Intensity Analysis
434. RRW - A Robust and Reversible Watermarking Technique for Relational Data
435. Query Aware Determinization of Uncertain Objects
436. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
437. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
438. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
439. Cotton Leaf Disease Identification using Pattern Recognition Techniques
440. Efficient Community Formation for Web Services
441. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
442. Secure Mining of Association Rules in Hor izontally Distributed Databases
443. Dynamic Query Forms for Database Queries
444. Secure kNN Query Processing in Untrusted Cloud Environments
445. An Empirical Performance Evaluation of Relational Keyword Search Systems
446. Keyword Query Routing
447. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
448. Demand Bidding Program and Its Application in Hotel Energy Management
449. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
450. Incremental Detection of Inconsistencies in Distributed Data
451. A Cocktail Approach for Travel Package Recommendation
452. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
453. A Random Decision Tree Framework for Privacy-Preserving Data Mining
454. Analysis of Field Data on Web Security Vulnerabilities
455. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
456. A Reliability Improvement Method for SOA-Based Applications
457. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
458. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
459. Web Service Recommendation via Exploiting Location and QoS Information
460. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
461. Exploiting Rateless Codes in Cloud Storage Systems
462. COMIC:Cost Optimization for Internet Content Multihoming
463. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
464. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
465. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
466. Uniform Embedding for Efficient JPEG Steganography
467. Secure Deduplication with Efficient and Reliable Convergent Key Management
468. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
469. Link Quality Aware Code Dissemination in Wireless Sensor Networks
470. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
471. Location Aware Keyword Query Suggestion Based on Document Proximity
472. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
473. A secure data self-destructing scheme in cloud computing
474. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
475. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
476. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
477. Secure kNN Query Processing in Untrusted Cloud Environments
478. Exploiting Rateless Codes in Cloud Storage Systems
479. Fuzzy Authorization for Cloud Storage
480. Planning vs. dynamic control Resource allocation in corporate clouds
481. Automatic Scaling of Internet Applications for Cloud Computing Services
482. Strategy-proof Pricing for Cloud Service Composition
483. Privacy Preserving Delegated Access Control in Public Clouds
484. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
485. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
486. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
487. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
488. A Mechanism Design Approach to Resource Procurement in Cloud Computing
489. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
490. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
491. A Scientometric Analysis of Cloud Computing Literature
492. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
493. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
494. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
495. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
496. FeatureMatch: A General ANNF Estimation Technique and its Applications
497. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
498. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
499. As-Projective-As-Possible Image Stitching with Moving DLT
500. Sharing Visual Secrets in Single Image Random Dot Stereograms
501. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
502. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
503. A New Iterative Triclass Thresholding Technique in Image Segmentation
504. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
505. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
506. An Iranian License Plate Recognition System Based on Color Features
507. Learning Layouts for Single-Page Graphic Designs
508. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
509. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
510. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
511. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
512. Fingerprint Compression Based on Sparse Representation
513. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
514. LBP-Based Edge-Texture Features for Object Recoginition
515. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
516. Toward Experiential Mobile Media Processing
517. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
518. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
519. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
520. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
521. Designing Truthful Spectrum Double Auctions with Local Markets
522. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
523. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
524. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
525. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
526. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
527. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
528. A Study on Clinical Prediction Using Data Mining Techniques
529. Online Payment System using Steganography and Visual Cryptography
530. Efficient Instant-Fuzzy Search with Proximity Ranking
531. Attribute Based Encryption with Privacy Preserving In Clouds
532. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
533. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
534. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
535. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
536. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
537. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
538. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
539. The Target Tracking in Mobile Sensor Networks
540. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
541. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
542. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
543. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
544. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
545. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
546. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
547. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
548. SUSIE: Search Using Services and Information Extraction
549. SeDas: A Self-Destructing Data System Based on Active Storage Framework
550. Secure Mining of Association Rules in Horizontally Distributed Databases
551. Sampling Online Social Networks
552. Privacy Preserving Delegated Access Control in Public Clouds
553. Mining Order-Preserving Submatrices from Data with Repeated Measurements
554. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
555. Ginix : Generalized Inverted Index for Keyword Search
556. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
557. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
558. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
559. Dynamic Query Forms for Database Queries
560. Cost-Based Optimization of Service Compositions
561. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
562. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
563. Automatic Extraction of Top-k Lists from the Web
564. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
565. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
566. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
567. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
568. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
569. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
570. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
571. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
572. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
573. Privacy Preserving Data Sharing With Anonymous ID Assignment
574. Non-Cooperative Location Privacy
575. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
576. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
577. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
578. Cloud based emails boundaries and vulnerabilities
579. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
580. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
581. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
582. Optimal Content Downloading in Vehicular Networks
583. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
584. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
585. View-invariant action recognition based on Artificial Neural Networks
586. User-aware Image Tag Refinement via Ternary Semantic Analysis
587. Separable Reversible Data Hiding in Encrypted Image
588. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
589. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
590. Robust Face-Name Graph Matching for Movie Character Identification
591. IntentSearch:Capturing User Intention for One-Click Internet Image Search
592. Improving Color Constancy by Photometric Edge Weighting
593. Exploring the design space of social network-based Sybil defenses
594. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
595. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
596. AnnoSearch: Image Auto-Annotation by Search
597. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
598. Scalable Scheduling of Updates in Streaming Data Warehouses
599. Scalable Learning of Collective Behavior
600. Ranking Model Adaptation for Domain-Specific Search
601. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
602. Outsourced Similarity Search on Metric Data Assets
603. Organizing User Search Histories
604. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
605. Mining Web Graphs for Recommendations
606. Joint Top K Spatial Keyword Query Processing
607. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
608. Identifying Content for Planned Events Across Social Media Sites
609. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
610. Generative Models for Item Adoptions Using Social Correlation
611. Efficient Data Mining for XML Queries Answering Support
612. Efficient audit service outsourcing for data integrity in clouds
613. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
614. Effective Pattern Discovery for Text Mining
615. Combined Mining: Discovering Informative Knowledge in Complex Data
616. Decentralized Probabilistic Text Clustering
617. Computing Structural Statistics by Keywords in Databases
618. Bridging Social and Data Networks
619. Answering General Time-Sensitive Queries
620. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
621. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
622. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
623. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
624. Resource-Aware Application State Monitoring
625. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
626. Query Access Assurance in Outsourced Databases
627. Linear and Differential Cryptanalysis
628. Expert Discovery and Interactions in Mixed Service-Oriented Systems
629. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
630. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
631. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
632. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
633. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
634. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
635. ROAuth: Recommendation Based Open Authorization
636. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
637. Recommendation Models for Open Authorization
638. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
639. Packet-Hiding Methods for Preventing Selective Jamming Attacks
640. On Privacy of Encrypted Speech Communications
641. OAuth Web Authorization Protocol
642. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
643. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
644. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
645. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
646. Fast Matrix Embedding by Matrix Extending
647. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
648. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
649. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
650. Access control for online social networks third party applications
SOFTWARE ENGINEERING
651. Measuring Code Quality to Improve Specification Mining
652. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
653. Towards Secure and Dependable Storage Services in Cloud Computing
654. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
655. Remote Display Solutions for Mobile Cloud Computing
656. Privacy Preserving Delegated Access Control in Public Clouds
657. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
658. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
659. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
660. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
661. Load-Balancing Multipath Switching System with Flow Slice
662. Assessing the Veracity of Identity Assertions via OSNs
663. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
664. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
665. A New Cell-Counting-Based Attack Against Tor
666. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
667. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
668. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
669. Network Assisted Mobile Computing with Optimal Uplink Query Processing
670. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
671. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
672. Fast Release Capture Sampling in Large-Scale Sensor Networks
673. Cooperative download in vehicular environments
674. Cooperative Data Dissemination via Roadside WLANs
675. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
676. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
677. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
678. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
679. Hiding Sensitive Association Rule for Privacy Preservation
680. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
681. Development of Certificate Authority Services for Web Applications
682. Detecting and Validating Sybil Groups in theWild
683. Association Rule Extracting Knowledge Using Market Basket Analysis
684. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
685. Valuable Detours: Least-Cost Anypath Routing
686. Self-Reconfigurable Wireless Mesh Networks
687. Reliability in Layered Networks with Random Link Failures
688. NABS:Novel Approaches for Biometric Systems
689. Live Streaming with Receiver-based Peer-division Multiplexing
690. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
691. Continuous Neighbor Discovery in Asynchronous Sensor Networks
692. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
693. Virtualized Screen: A Third Element for CloudMobile Convergence
694. Steganographic Embedding in JPEG Images with Visual Criterion
695. On the Typical Statistic Features for Image Blind Steganalysis
696. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
697. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
698. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
699. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
700. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
701. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
702. Vulnerability Analysis in SOA-Based Business Processes
703. Service-Oriented Architecture for High-Dimensional Private Data Mashup
704. Service-Centric Framework for a Digital Government Application
705. Server-Side Streaming Processing of WS-Security
706. OWLPath: An OWL Ontology-Guided Query Editor
707. Monitoring Service Systems from a Language-Action Perspective
708. Extracting Product Features and Sentiments from Chinese Customer Reviews
709. Expert Discovery and Interactions in Mixed Service-Oriented Systems
710. Automated Certification for Compliant Cloud-based Business Processes
711. Addressing Dependability throughout the SOA Life Cycle
712. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
713. The Geometric Efficient Matching Algorithm for Firewalls
714. Secure Service-Oriented Architecture for Mobile Transactions
715. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
716. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
717. Privacy-Preserving Updates to Anonymous and Confidential Databases
718. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
719. IPAS: Implicit Password Authentication System
720. Improving Security and Performance in the Tor Network through Tunable Path Selection
721. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
722. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
723. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
724. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
725. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
726. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
727. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
728. Data Delivery Properties of Human Contact Networks
729. Converge-Cast: On the Capacity and Delay Tradeoffs
730. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
731. USHER: Improving Data Quality with Dynamic Forms
732. The World in a Nutshell: Concise Range Queries
733. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
734. Scalable Scheduling of Updates in Streaming Data Warehouses
735. Scalable Learning of Collective Behavior
736. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
737. Publishing Search Logs A Comparative Study of Privacy Guarantees
738. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
739. Optimal Service Pricing for a Cloud Cache
740. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
741. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
742. Mining Web Graphs for Recommendations
743. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
744. Integration of Sound Signature Authentication System
745. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
746. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
747. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
748. Exploring Application-Level Semantics for Data Compression
749. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
750. Data Leakage Detection
751. Cost-aware rank join with random and sorted access
752. Collaborative Filtering with Personalized Skylines
753. Bridging Socially-Enhanced Virtual Communities
754. Automatic Discovery of Personal Name Aliases from the Web
755. A Personalized Ontology Model for Web Information Gathering
756. Adaptive Provisioning of Human Expertise in Service-oriented Systems
757. A Query Formulation Language for the Data Web
758. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
759. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
760. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
761. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
762. Towards Secure and Dependable Storage Services in Cloud Computing
763. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
764. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
765. Data Integrity Proofs in Cloud Storage
766. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
767. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
768. Feature-level Sentiment Analysis for Chinese Product Reviews
769. Equal-sized Cells Mean Equal-sized Packets in Tor?
770. Customer Relationship Management Based on Data Mining Technique
771. Authentication Schemes for Session Passwords using Color and Images
772. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
773. Online Trends Management Service in It Industry
774. Session Management System in It Industry
775. Tools for Non IT Expert Developer
ERP PROJECTS
776. New Company Policy Clearance System
777. Recommend To Friend
778. Consultanting About the Foreign Peoples
779. Performance System Analysis In Industry
780. Non It People Performance
MODERN AGRICULTURE
781. Cotton Leaf Disease Identification using Pattern Recognition Techniques
782. Agriculture Marketing in Generation
783. Agriculture Assist
784. Sponsor For Agriculture
SPORTS
785. Play Ground Booking
OUR MODERN SOCITY
786. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
787. RAILWAY SEAT RESERVATION SYSTEM
788. Railway Management Service
789. It Park Media
790. Automation Transport Maintance
791. Yell Help For Children
792. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
793. Apartment Maintenance
794. Power Consumption Monitoring House Hold Electronic Device
795. Direct Q Less Reservation System in train
Advance Health Care System
796. MAC Sensing Protocol
797. World Wide Cloud Inter Hospital Acess Health Care System
798. Live Doctor
Dotnet Apps
799. TELEVISION CHANNEL PROGRAM MANAGEMENT
800. WIN THE TRUST OF AN INDIAN CONSUMER
801. ONLINE ACCOUNT MANAGEMENT
802. SMART CAB BOOKING SYSTEM
803. ONLINE FAST FOOD ORDER
804. Travel Mate Add Module
805. Work Order System Call Centre
806. SPORTS MANAGEMENT SYSTEM
807. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
808. Pick-It Courier Service
809. Online Taxi Booking
810. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
811. INCOMETAX MAINTAINANCE SYSTEM
812. Hotel Reservation
813. ERP System
814. Bug Tracking System
815. Vendor Information System For Shiping
816. Top-K ranking System
817. Secure Medical Image Archive System
818. Business Activity Coordination Using Web Services
819. Management Portal
820. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
821. Secure Data Filtering Recommendation System
822. Online Resources Sharing via Social Networks
823. Secure self-destructing in Cloud Computing
824. Web Resourecs File Authorization Management
825. Click based image re-ranking system
826. Tree Structure Data Analiysis Mining
827. Web Resource Allocation for CorPerate
828. Web Vulnerabilities and Security
829. Fuzzy Cloud Search Using XML
830. Cloud Data Supporting Secure Query Search
831. Tour Recommender Systems on Web
832. Distributed Interactive Web Applications
833. Secure Query Processing for Cloud
834. Online Data Storage with less pricing
835. Cost Based Web Content Managemnts
836. Web Hospital Management
837. Online Data storage with low price
838. Secure Online Data Block Authorization
839. Profitable Onlin web Server System
840. Online Economies File Manager for Multi Keying
841. Online Community Management
842. Key based Online Data Managements
843. Critical Workflow Management for Web Documents
844. Secure Online Documents Managements for Group Sharing
845. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
846. Online Marketing Automation System
847. Internal organization change management System
848. Secure confirmation of sensitive transaction data in modern Internet banking services
849. Privacy security with TPA in cloud computing
850. Company Information Tracking System
851. Online Virtualized screen Processing
852. Web Service for Airline Management
853. Web Social Club
854. Quantum Key Cryptography
855. Patient Data Management Based On Hospital Location
856. Online Software Developer Community
857. Online Developed Software sales
858. Avoid repeated measurements On Genetics Dataset
859. College Lab Maintenance System
860. Industrial Manpower Resource Organizer
861. Web Query Construction and Search on Complex Data
862. Hospital Emergency Data Management
863. Data confidentiality On Health-care Information System
864. Secure Online Trading
865. Fast Real-Time Event Alert Using social Network
866. Secure E-Mail Organizer
867. Web User Service Management System
868. Easy SQL Query for Non-IT Manager
869. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
870. Customer Relationship Management (CRM) on Banking
871. Online Company ERP System
872. Constructing E-Tourism
873. Web based Multi Service Ranking System
874. Dynamic Customer Data Hiding in Banking
875. Online Distributed Social Clubs
876. Virtual Shopping with Negative Feedback Reputation Systems
877. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
878. Web Service Oriented Query Authentication Technique
879. Web Based Customer Favorite vehicle Search Engine
880. Web Based Book Publishing System
881. Virtual Energy- Based Encryption and Keying
882. Video Fraud Detecting On social Network
883. Video Compression with Data hiding & Data Extraction
884. Vendor Information System for Shipping
885. VALUE ADDED TAX (VAT)
886. Universal Smart Card
887. Ultimate Location Information Systems
888. Top K Ranking System
889. Techno Task Manager
890. Supply Chain Management
891. Substitution-Permutation cryptanalysis System
892. Streaming Data Warehouse Updations
893. Step by Step Monitoring for Product Purchasing System
894. Steganography for Data Reading and Writing AVI files
895. SQL TUNER
896. SMS Transaction Security
897. Session Authentication Passwords using Color
898. Service Availability Guarantees on Virtual Economy
899. Server Fraud Detection on Cloud
900. Sentence Based Search on Cloud
901. Semantic Web Search Engines
902. Secured Image communicator
903. Secure smart application on web application
904. Secure Service-Oriented Smartcard systems
905. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
906. Secure Location Identification System
907. Secure and Cloud Based Patient Information Systems
908. Reduce the Password Guessing Attacks using Click Point
909. Recommendation System Based on Graph
910. Quantum Key Cryptography
911. Quality Controller
912. Public Web Status Monitoring System
913. Project Trade Pool
914. Product Marketing Analysis On Public Opinion
915. Predicting Users Behaviors Using Web Mining
916. Personal Health Information on M-Healthcare Emergency
917. Optimum Online Knowledge Base
918. Online Training Program
919. Online Time sensitive queries
920. Online Tag Based Image Retrieval and Effective Management
921. Online Social networks controls using cloud
922. Online Rental System
923. Online product Opinion and Ranking System
924. Online Dynamic form creation for Non-IT Peoples
925. Online Digital Contract Signing in Mistrusted Parities
926. Online Aventure
927. Online Shopping
928. News Ticker Project
929. Net Bank in Recharge
930. Multi User Public Auditing System of Data Storage Security
931. Multi Location Networked Mobile Auto Intimates
932. Modern Distributed Business Applications for Supply Chain Management
933. Market Intelligence Based Public Sentiment Analysis
934. Leave Management System
935. Joint processing of spatial keyword queries
936. Intelligence Missing Items in Shopping Cart
937. Information Leak Detection and Prevention
938. Industrial Manpower Resource Organizer
939. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
940. Human Expertise Search Engine
941. Home appliances online Purchase
942. High Secure Corporate Web Search Engine
943. High Degree Patient Privacy on Secure Data Outsourcing
944. Group Movement Pattern Discovery
945. Graph Based Share Market Data Updating
946. Generic Business Portal
947. Flight Booking Portal
948. Firewall using Packet Filtering
949. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
950. Ethical and Social issues in File sharing system
951. Enterprener Sales Report Management
952. Encyclopedia for Computer Science
953. Employee Based Performance Monitoring and Action Systems
954. Emerging Patient Health Information Exchange System On Cloud
955. Efficient Search on Outsourced data using Cloud
956. Efficient and Secure Data Processing on Queries Similarity
957. Distributed Database Optimization on HealthCare
958. Digital Asset Management Systems (DAMS) Using Watermarking
959. Detecting Fraud on Vehicle Insurance System
960. Defeating Lazy Servers Database Vs Query Access Assurance
961. Data Processing for Disease-Treatment Relations
962. Data Mining Analysis on EB bill system
963. Data confidential against untrusted servers using attribute-based encryption (ABE)
964. Data Aggregation using SQL clustering
965. Customer Sales Analysis System Based On Purchasing
966. Cryptography on Personal confidential information
967. Cost Based Secure Cloud Data Systems
968. Market Based Analysis for consumer correct decision
969. Construction Company Work Order System
970. Complete Medical Transcription System(Mts)
971. Company Security Reporting System(CSRS)
972. College Result Analysis
973. Cloud Economic Benefit On Scientific Computing
974. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
975. Centralized Event Planer across Social Media Sites
976. Call Center Management
977. A Reservation-Based Coordination Protocol for Web Services
978. Building construction and cost estimation
979. Budget Planner
980. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
981. Automatically identifying query groups on Web Search Engine
982. Auditing Data integrity and data storage using cloud
983. Application layer blocker for preventing on cyber security
984. Advanced One-Click User Web Search Engine
985. Advance Patient Management System


JAVA IEEE 2017-18
IEEE Transactions on Big Data
986. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
987. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
988. Influence Maximization in Trajectory Databases
989. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
990. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
991. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
992. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
993. Computing Semantic Similarity of Concepts in Knowledge Graphs
994. QDA: A Query-Driven Approach to Entity Resolution
995. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
996. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
997. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
998. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
999. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
1000. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
1001. Two-Factor Data Security Protection Mechanism for Cloud Storage System
1002. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
1003. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
1004. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
1005. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
1006. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
1007. Where You Are Is Who You Are User Identification by Matching Statistics
1008. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
1009. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
1010. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
1011. Online Subgraph Skyline Analysis Over Knowledge Graphs
1012. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
1013. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
1014. ID2S Password-Authenticated Key Exchange Protocols
1015. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
1016. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
1017. Classification model to predict the learners' academic performance using big data
1018. Electronic Commerce Meets the Semantic Web
1019. Mining High Utility Patterns in One Phase without Generating Candidates
1020. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
1021. Automatic Generation of Social Event Storyboard from Image Click-through Data
1022. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
1023. Understanding Deep Representations Learned in Modeling Users Likes
1024. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
1025. Topic-Oriented Exploratory Search Based on an Indexing Network
1026. Relevance Feedback Algorithms Inspired By Quantum Detection
1027. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
1028. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1029. Efficiently Estimating Statistics of Points of Interests on Maps
1030. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
1031. Aspect-level Influence Discovery from Graphs
1032. Sentiment Embeddings with Applications to Sentiment Analysis
1033. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
1034. Resolving Multi-party Privacy Conflicts in Social Media
1035. Encrypted Data Management with Deduplication in Cloud Computing
1036. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1037. Crawling Hidden Objects with kNN Queries
1038. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
1039. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
1040. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
1041. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
1042. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
1043. Nearest Keyword Set Search in Multi-dimensional Datasets
1044. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
1045. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
1046. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
1047. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
1048. Immutable Authentication and Integrity Schemes for Outsourced Databases
1049. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
1050. Server-Aided Public Key Encryption with Keyword Search
1051. Online Learning in Large-Scale Contextual Recommender Systems
1052. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
1053. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
1054. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
1055. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
1056. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
1057. Multi-Modal Event Topic Model for Social Event Analysis
1058. Social friend recommendation on multiple network correlation
1059. Tag Based Image Search by Social Re-ranking
1060. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
1061. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
1062. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
1063. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
1064. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
1065. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
1066. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
1067. Rank-Based Similarity Search: Reducing the Dimensional Dependence
1068. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
1069. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
1070. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
1071. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
1072. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1073. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
1074. On the Security of data access control for multiauthority cloud storage system
1075. Trust-based Service Management for Social Internet of Things Systems
1076. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1077. Formalization and Verification of Group Behavior Interactions
1078. Group Key Agreement with Local Connectivity
1079. Data Lineage in Malicious Environments
1080. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1081. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
1082. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1083. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
1084. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
1085. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1086. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
1087. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
1088. Quantitative Reasoning About Cloud Security Using Service Level Agreements
1089. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
1090. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
1091. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
1092. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
1093. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
1094. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
1095. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1096. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
1097. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1098. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1099. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
1100. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1101. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
1102. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
1103. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
1104. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
1105. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1106. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1107. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1108. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
1109. Secure Auditing and Deduplicating Data in Cloud
1110. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1111. Towards reproducibility in online social network Research
1112. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
1113. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
1114. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
1115. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
1116. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
1117. Making Digital Artifacts on the Web Verifiable and Reliable
1118. Anonymizing Collections of Tree-Structured Data
1119. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1120. FOCS: Fast Overlapped Community Search
1121. Sparsity Learning Formulations for Mining Time-Varying Data
1122. The Impact of View Histories on Edit Recommendations
1123. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
1124. Discovery of Ranking Fraud for Mobile Apps
1125. Towards Effective Bug Triage with Software Data Reduction Techniques
1126. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
1127. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1128. Auditing for Distributed Storage Systems
1129. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1130. Uploader Intent for Online Video: Typology, Inference and Applications
1131. YouTube Video Promotion by Cross-network
1132. Semantic-Improved Color Imaging Applications: It Is All About Context
1133. Geolocalized Modeling for Dish Recognition
1134. Learning to Rank Image Tags with Limited Training Examples
1135. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
1136. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1137. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
1138. Tracking Temporal Community Strength in Dynamic Networks
1139. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
1140. Towards Information Diffusion in Mobile Social Networks
1141. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1142. An Efficient Privacy-Preserving Ranked Keyword Search Method
1143. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
1144. Dispersing Instant Social Video Service Across Multiple Clouds
1145. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1146. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
1147. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
1148. A Computational Dynamic Trust Model for User Authorization
1149. Secure Distributed Deduplication Systems with Improved Reliability
1150. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1151. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1152. Leveraging the Tail Time for Saving Energy in Cellular Networks
1153. Keylogging-resistant Visual Authentication Protocols
1154. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
1155. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
1156. Preserving Location Privacy in Geo-Social Applications
1157. Efficient Authentication for Mobile and Pervasive Computing
1158. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
1159. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1160. Typicality-Based Collaborative Filtering Recommendation
1161. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
1162. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
1163. Keyword Search Over Probabilistic RDF Graphs
1164. Efficient Prediction of Difficult Keyword Queries over Databases
1165. Interpreting the Public Sentiment Variations on Twitter
1166. An Efficient Recommendation Method for Improving Business Process Modeling
1167. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
1168. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
1169. On the use of Side Information for Mining Text Data
1170. Privacy Preserving and Content Protecting Location based Queries
1171. Fast Nearest Neighbor Search with Keywords
1172. Towards Differential Query Services in Cost-Efficient Clouds
1173. Facilitating Document Annotation using Content and Querying Value
1174. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
1175. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
1176. Secure Outsourced Attribute-Based Signatures
1177. Supporting Privacy Protection in Personalized Web Search
1178. Dealing With Concept Drifts in Process Mining
1179. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
1180. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
1181. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
1182. Active Learning of Constraints for Semi-Supervised Clustering
1183. Best Keyword Cover Search
1184. Personalized Recommendation Combining User Interest and Social Circle
1185. Online Feature Selection and Its Applications
1186. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
1187. Incremental Affinity Propagation Clustering Based on Message Passing
1188. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
1189. Secure kNN Query Processing in Untrusted Cloud Environments
1190. Malware Propagation in Large-Scale Networks
1191. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
1192. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
1193. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
1194. Efficient Ranking on Entity Graphs with Personalized Relationships
1195. Task Trail: An Effective Segmentation of User Search Behavior
1196. Privacy-Preserving Enhanced Collaborative Tagging
1197. XSPath Navigation on XML Schemas Made Easy
1198. Security Evaluation of Pattern Classifiers under Attack
1199. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
1200. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1201. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
1202. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1203. Nothing is for Free: Security in Searching Shared and Encrypted Data
1204. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1205. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1206. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1207. Behavioral Malware Detection in Delay Tolerant Networks
1208. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
1209. Private Searching on Streaming Data Based on Keyword Frequency
1210. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1211. On the Security of Trustee-Based Social Authentications
1212. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1213. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
1214. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
1215. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1216. A Two-stage Deanonymization Attack Against Anonymized Social Networks
1217. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
1218. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
1219. Scalable architecture for multi-user encrypted SQL operations on cloud database services
1220. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1221. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1222. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1223. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1224. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1225. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1226. Secure kNN Query Processing in Untrusted Cloud Environments
1227. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
1228. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
1229. A Hybrid Cloud Approach for Secure Authorized Deduplication
1230. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
1231. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
1232. A Novel Model for Competition and Cooperation Among Cloud Providers
1233. CLOUDQUAL: A Quality Model for Cloud Services
1234. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
1235. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
1236. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
1237. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
1238. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
1239. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
1240. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
1241. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
1242. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
1243. Enhanced Security for Association Rule Mining to secure Transactional Databases
1244. Operational Pattern Revealing Technique in Text Mining
1245. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
1246. Personalized web search using Browsing history and domain Knowledge
1247. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
1248. Data Security the Challenge of Cloud Computing
1249. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
1250. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1251. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
1252. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
1253. User Action Interpretation for Online Content Optimization
1254. Spatial Query Integrity with Voronoi Neighbors
1255. Spatial Approximate String Search
1256. Sensitive Label Privacy Protection on Social Network Data
1257. Secure Mining of Association Rules in Horizontally Distributed Databases
1258. Secure Logging As a Service Delegating Log Management to the Cloud
1259. Robust Module-based Data Management
1260. Ranking on Data Manifold with Sink Points
1261. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
1262. Privacy-Enhanced Web Service Composition
1263. Privacy against Aggregate Knowledge Attacks
1264. Preventing Private Information Inference Attacks on Social Networks
1265. PMSE: A Personalized Mobile Search Engine
1266. Personalized QoS-Aware Web Service Recommendation and Visualization
1267. Optimal Client-Server Assignment for Internet Distributed Systems
1268. Online Search and Buying Behaviour in Consumer Markets
1269. M-Privacy for Collaborative Data Publishing
1270. Mining User Queries with Markov Chains: Application to Online Image Retrieval
1271. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
1272. Incentive Compatible Privacy-Preserving Data Analysis
1273. Improving Security and Efficiency in Attribute-Based Data Sharing
1274. FoCUS: Learning to Crawl Web Forums
1275. Fast Nearest Neighbor Search with Keywords
1276. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
1277. Facilitating Effective User Navigation through Website Structure Improvement
1278. Facilitating Document Annotation using Content and Querying Value
1279. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
1280. Efficient Evaluation of SUM Queries over Probabilistic Data*
1281. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
1282. Dynamic Query Forms for Database Queries
1283. Dynamic Personalized Recommendation on Sparse Data
1284. Distributed Strategies for Mining Outliers in Large Data Sets
1285. Crowdsourcing Predictors of Behavioral Outcomes
1286. Co-Occurrence-Based Diffusion for Expert Search on the Web
1287. Comparable Entity Mining from Comparative Questions
1288. CloudMoV: Cloud-based Mobile Social TV
1289. Anomaly Detection via Online Oversampling Principal Component Analysis
1290. Anomaly Detection Approach Using Hidden Markov Model
1291. Annotating Search Results from Web Databases
1292. A System to Filter Unwanted Messages from OSN User Walls
1293. A Survey of XML Tree Patterns
1294. A Probabilistic Approach to String Transformation
1295. A New Algorithm for Inferring User Search Goals with Feedback Sessions
1296. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
1297. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
1298. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
1299. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
1300. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
1301. Towards Differential Query Services in Cost-Efficient Clouds
1302. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
1303. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1304. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
1305. QoS Ranking Prediction for Cloud Services
1306. Priority-Based Consolidation of Parallel Workloads in the Cloud
1307. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1308. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
1309. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
1310. Load Rebalancing for Distributed File Systems in Clouds
1311. Label-Embedding for Attribute-Based Classification
1312. IP-Geolocation Mapping for Moderately Connected Internet Regions
1313. Identity-Based Secure Distributed Data Storage Schemes
1314. Hint-based Execution of Workloads in Clouds with Nefeli
1315. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
1316. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
1317. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
1318. Efficient Two-Server Password-Only Authenticated Key Exchange
1319. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
1320. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
1321. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
1322. Winds of Change: From Vendor Lock-In to the Meta Cloud
1323. Supporting the Migration of Applications to the Cloud through a Decision Support System
1324. Storing Shared Data on the Cloud via Security-Mediator
1325. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
1326. Privacy-Preserving Public Auditing for Secure Cloud Storage
1327. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
1328. Outsourcing Privacy-Preserving Social Networks to a Cloud
1329. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
1330. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
1331. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
1332. Efficient Security Solution for Privacy-Preserving Cloud Services
1333. Collaboration in Multicloud Computing Environments: Framework and Security Issues
1334. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
1335. Cloud-based DDoS Attacks and Defenses
1336. Cloud computing for mobile users can offloading compution save energy
1337. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
1338. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
1339. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
1340. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
1341. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
1342. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
1343. Two tales of privacy in online social networks
1344. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
1345. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
1346. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
1347. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
1348. Security and Privacy-Enhancing Multicloud Architectures
1349. Security Using Colors and Armstrong Numbers
1350. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
1351. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
1352. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
1353. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
1354. Privacy Preserving Data Analytics for Smart Homes
1355. On Inference-Proof View Processing of XML Documents
1356. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
1357. Extracting Spread-Spectrum Hidden Data from Digital Media
1358. Efficiently Outsourcing Multiparty Computation under Multiple Keys
1359. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
1360. Craigslist Scams and Community Composition: Investigating Online Fraud
1361. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
1362. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
1363. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
1364. Super-Resolution-based Inpainting
1365. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
1366. Image Authentication Using Stochastic Diffusion
1367. Hierarchical Super-Resolution-Based Inpainting
1368. Circular Reranking for Visual Search
1369. Bootstrapping Visual Categorization With Relevant Negatives
1370. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
1371. An extended visual cryptography scheme without pixel expansion for halftone images
1372. An Adaptive Cloud Downloading Service
NETWORKING
1373. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
1374. Topological Conditions for In-Network Stabilization of Dynamical Systems
1375. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
1376. Price Differentiation for Communication Networks
1377. Participatory Privacy: Enabling Privacy in Participatory Sensing
1378. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
1379. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1380. On the Role of Mobility for Multi-message Gossip
1381. Fully Anonymous Profile Matching in Mobile Social Networks
1382. Fault Node Recovery Algorithm for a Wireless Sensor Network
1383. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
1384. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
1385. Access Policy Consolidation for Event Processing Systems
1386. A Fast Re-Route Method
SOFTWARE ENGINEERING
1387. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
1388. Vampire attacks: Draining life from wireless ad-hoc sensor networks
1389. Towards a Statistical Framework for Source Anonymity in Sensor Networks
1390. Search Me If You Can: Privacy-preserving Location Query Service
1391. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
1392. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
1393. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
1394. Distributed Cooperative Caching in Social Wireless Networks
1395. Community-Aware Opportunistic Routing in Mobile Social Networks
1396. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
1397. The Devils Behind Web Application Vulnerabilities
1398. Security Architecture for Cloud Networking
1399. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
1400. Secure Overlay Cloud Storage with Access Control and Assured Deletion
1401. Risk-Aware Mitigation for MANET Routing Attacks
1402. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
1403. Privacy-preserving Enforcement of Spatially Aware RBAC
1404. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
1405. pCloud: A Distributed System for Practical PIR
1406. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1407. Online Modeling of Proactive Moderation System for Auction Fraud Detection
1408. Fast and accurate annotation of short texts with Wikipedia pages
1409. FADE: Secure Overlay Cloud Storage with File Assured Deletion
1410. Ensuring Distributed Accountability for Data Sharing in the Cloud
1411. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
1412. Direct and Indirect Discrimination Prevention Methods
1413. Detecting Spam Zombies by Monitoring Outgoing Messages
1414. Detecting Anomalous Insiders in Collaborative Information Systems
1415. Data-Provenance Verification For Secure Hosts
1416. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
1417. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
1418. Payments for Outsourced Computations
1419. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
1420. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1421. Toward Private Joins on Outsourced Data
1422. Statistical Entity Extraction from Web
1423. Slicing: A New Approach to Privacy Preserving Data Publishing
1424. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
1425. Resilient Identity Crime Detection
1426. Ranking Model Adaptation for Domain-Specific Search
1427. Organizing User Search Histories
1428. On the Spectral Characterization and Scalable Mining of Network Communities
1429. Multiparty Access Control for Online Social Networks: Model and Mechanisms
1430. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
1431. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1432. How do Facebookers use Friendlists
1433. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
1434. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
1435. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
1436. Enabling Multilevel Trust in Privacy Preserving Data Mining
1437. Enabling cross-site interactions in social networks
1438. Efficient Similarity Search over Encrypted Data
1439. Efficient Extended Boolean Retrieval
1440. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
1441. Efficient Anonymous Message Submission
1442. Effective Pattern Discovery for Text Mining
1443. DDD: A New Ensemble Approach for Dealing with Concept Drift
1444. Credibility Ranking of Tweets during High Impact Events
1445. Creating Evolving User Behavior Profiles Automatically
1446. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
1447. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
1448. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
1449. Anomaly Detection for Discrete Sequences: A Survey
1450. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
1451. Advance Mining of Temporal High Utility Itemset
1452. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
1453. Reliable Re-encryption in Unreliable Clouds
1454. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
1455. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
1456. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
1457. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
1458. Gossip-based Resource Management for Cloud Environments
1459. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
1460. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
1461. Cloud Data Protection for the Masses
1462. Cloud Computing Security: From Single to Multi-Clouds
1463. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
1464. In Tags We Trust Trust modeling in social tagging of multimedia content
1465. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
1466. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
1467. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
1468. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
1469. Cut Detection in Wireless Sensor Networks
1470. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
1471. TrickleDNS: Bootstrapping DNS Security using Social Trust
1472. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
1473. Policy-by-Example for Online Social Networks
1474. Packet Loss Control Using Tokens at the Network Edge
1475. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1476. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
1477. Independent Directed Acyclic Graphs for Resilient Multipath Routing
1478. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
1479. Game-Theoretic Pricing for Video Streaming in Mobile Networks
1480. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
1481. Auditing for Network Coding Storage
1482. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
1483. Privacy Preserving Cloud Data Access With Multi-Authorities
1484. Movie Rating and Review Summarization in Mobile Environment
1485. IDSaaS: Intrusion Detection System as a Service in Public Clouds
1486. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
1487. BibPro: A Citation Parser Based on Sequence Alignment Techniques
1488. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1489. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1490. RITAS: Services for Randomized Intrusion Tolerance
1491. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1492. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1493. Modeling and Detection of Camouflaging Worm
1494. Coding for Cryptographic Security Enhancement using Stopping Sets
1495. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1496. Wireless Sensor Network Security model using Zero Knowledge Protocol
1497. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1498. Throughput Optimization in Mobile Backbone Networks
1499. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1500. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1501. Fast Data Collection in Tree-Based Wireless Sensor Networks
1502. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1503. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1504. SPAF: Stateless FSA-based Packet Filters
1505. Selfish Overlay Network Creation and Maintenance
1506. ProgME: Towards Programmable Network MEasurement
1507. Locating Equivalent Servants over P2P Networks
1508. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1509. Buffer Sizing for 802.11 Based Networks
1510. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1511. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1512. Improving Utilization of Infrastructure Clouds
1513. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1514. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1515. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1516. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1517. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1518. Ranking Spatial Data by Quality Preferences
1519. Making Aggregation Work in Uncertain and Probabilistic Databases
1520. Load Shedding in Mobile Systems with MobiQual
1521. Group Enclosing Queries
1522. Extended XML Tree Pattern Matching: Theories and Algorithms
1523. Effective Navigation of Query Results Based on Concept Hierarchies
1524. Discovering Conditional Functional Dependencies
1525. Decision Trees for Uncertain Data
1526. Data Leakage Detection
1527. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1528. Young Talent Tracker
1529. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1530. International Plant Import and Export
OUR MODERN SOCITY
1531. Trained Volunteers Create A Successful Social Campaign
1532. Finger thump Based Shopping Cart
1533. Finger Print E-Voting Systems
1534. Create a Successful Anti- Nuclear Campaign
1535. Crowding Funding Mobilization
1536. People Power of India
1537. Modern Finger Print Voting System
1538. Election Commission Management
1539. Online Painting Auction
1540. Reality Show Ticket Booking System
1541. Online Broadway Motel Food Ordering System
1542. Fashion Studio Model Management
1543. Women's Selfhelp Group
Advance Health Care System
1544. Organizing medical camp for public health development
1545. Homeopathy Health Record
1546. Consumer Legal Advicer
1547. Raw Requried Online Medicine
1548. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1549. I School
1550. Job fair section process
1551. Advertising in E-Book
1552. Students Skills With Modern Industries
1553. College Placement And College Event
1554. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1555. Cloud Storage Public Digital Certificate
ERP PROJECTS
1556. Customer Relationship Management
1557. Corporate Trouble Shooter
1558. Corporate Event Organisation
1559. Engnering Lab Maintenance
1560. Select Your Age(Business Motivation all age group)
1561. Software Requirements Analysis for Client Side
1562. ERP System (Enterprint Resource Plan
LATEST BANKING
1563. User Opinion For Indian Banking Service And Cashless Economy
1564. Advanced Banking System
1565. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1566. Economic Usage of Solar Energy
1567. Gps Consumers Complients
1568. Online Softskills Tracks
1569. Online Buy And Sale Software
1570. Budget Home Design
1571. Online Product Exchange
1572. Jewellery Management
1573. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1574. Moderate Robatics System with Public Opinion
Java Apps
1575. Online overview of skills really used in jobs
1576. Land Bank for Nursery
1577. Developing Rural Economy
1578. ECOPS - Electronics Police Record Management System
1579. Website Evaluation Using Opinion Mining
1580. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1581. INSURANCE MANAGEMENT SYSTEM
1582. e-Fraud Prevention based on the Self- Authentication of e-Documents
1583. Hope Center
1584. Exam crazy
1585. BUGS REPORTING SYSTEM
1586. LOCATION BASED CONSUMER COMPLAINT
1587. Speed Racing
1588. ROADSTER
1589. META CAFE
1590. ONLINE VIDEO LOCKER
1591. Management System in Metro Train
1592. Plant Shopping on Web
1593. Reporting Online Media News Systems
1594. Informative Content Extraction
1595. E-commerce Complaint Management System
1596. Modern Agriculture Development System
1597. Loan Online Application
1598. Rural Community Developement
1599. LOVE AND CARE
1600. GREEN PLANT
1601. Advance Couier Service
1602. Community Awarness
1603. E_Music
1604. Staff Management System
1605. E-TENDERING
1606. Hotel Management
1607. Crime File Management System
1608. Cloud Cyber Attack
1609. Cloud Cost Management for Customer Sensitive Data
1610. Advance Web based Multimedia Answer Generation
1611. Commaunity Awareness
1612. E-Commerce Complaints
1613. Modern Agriculture Development System
1614. Plant Shopping on Web
1615. ONLINE VIDEO LOCKER
1616. ONLINE VIDEO LOCKER
1617. Reporting Online Media News Systems
1618. Online Plant Shopping
1619. Community Awareness
1620. Loan Online Application
1621. Modern Agriculture Development System
1622. Online Digital Library
1623. Geo Base Services
1624. Civil Supplies and Consumer Protection Department
1625. Citizen Opinions vs Government Policies
1626. Protecting Used Data Privacy for Attackers
1627. Web Hospital Management
1628. Easy SQL Query for Non-IT Manager
1629. Online Shopping with Fraud detection
1630. Efficient Spatial Query Processing
1631. Cryptographic Key Exchange Authentication
1632. Online Global Information Service Center
1633. Contracts Business Events Management
1634. Online Secure image Social Networks
1635. Outsourcing of Online Image Reconstruction
1636. Trust based Profile Matching Secure Social Network
1637. Secure and Distance based Online Social Network (OSN)
1638. Efficient Online Image Retrieval System
1639. Data Sharing In Cloud Storage by Using Key-Aggregate
1640. Multicast Key Management for Cloud
1641. Face-to-face contact on Mobile Social Networks
1642. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1643. Dynamically Growing Online Survey for Behavioral Outcomes
1644. Advance Web based Multimedia Answer Generation
1645. College Result Analysis with Horizontally Distributed Databases
1646. Feedback Decision Support for mHealth monitoring
1647. Exchange Secrete Key for Data Producers and Consumers
1648. Efficient Information Retrieval Using Ranked Query (EIRQ)
1649. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1650. Web Hosting On Cloud
1651. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1652. Web Server Security with Web Client Management System
1653. Web Parser on Sequence Alignment Techniques
1654. Web Page re-Ranking System for Library
1655. Web Eye
1656. Voting System for Web Library
1657. VIRTUAL CLASSROOM SYSTEM
1658. Unique Web Resources Utilization Monitoring System
1659. Transport Management System
1660. Pre-paid Recharging System on Banking
1661. Tollgate Management
1662. Time To Time Stock Market Updater and Monitoring System
1663. Sql Tuner
1664. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1665. SMS Based Mobile Banking with Security
1666. Sms Topup
1667. Vendor Information System For Shipping
1668. Sequential Anomaly Detection from User Behaviour
1669. Secure SMS Transaction System on banking
1670. Secure Online Documents Management System in Cloud
1671. Secure File Uploading Server with Advance Protecting System
1672. Secure File Monitoring System on Cloud
1673. Relational Logic Search Engine On Healthcare
1674. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1675. Quick Customer decision support on Web Sales Portal
1676. Query Response System for File Management
1677. Quality Visualization on Web TV
1678. Project Work Tracking System
1679. Product Market Manipulations on Asian stock market
1680. Predicting Top Company Share Based on High Utility Data
1681. Automation of Analysis and Development Management
1682. Pharmacy Information System
1683. Personalize Your News on Web
1684. Online University
1685. Online tagging for multimedia content
1686. Online Search Ranking On Multiple Domain
1687. Online Rental House Web Portal
1688. Online Recruitment System
1689. Online Real Estate Property Management
1690. Online Multi Type Documents Search Engine
1691. ONLINE MOBILE BILLING SYSTEM
1692. Online Jewelry Management
1693. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1694. Online Examination System
1695. Online Ensemble Learning Approach
1696. Online Banking With Fraud Detecting
1697. Online Auction Bit
1698. ONLINE ADVERTISING SYSTEM
1699. Nutraceuticals Management System
1700. Nearest Shopping Location Identification Systems
1701. Multilevel Images Authentication Systems
1702. Multi New Product Survey Management
1703. Movie Recommender Systems via User- Item Subgroups
1704. Movie Rating and Recommendation on Mobile
1705. Modern Municipal Corporation
1706. Mobile TV Quality Management
1707. Mobile Banking WAP
1708. Manifold Entrust Scheme
1709. Management System in Train
1710. Secure Mailing System
1711. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1712. LEAVE MANAGEMENT SYSTEM FOR MNC
1713. Knowledge Based Decision Support System(KMS)
1714. Key Management for Content Integration
1715. Inter Bank Fund Transfer in Distributed Network
1716. Information and Knowledge Extracting from a large amount of data
1717. Industry Standard Authorization For Sensitive Resources
1718. Implementation and Validating Environmental and Health
1719. iKnoweb Extracting and Integrating Entity Information System
1720. HUMAN ASSURANCE ADMINISTRATION
1721. High_level network Security Using Packet Filtering
1722. High and Low Level SQL Query Executor
1723. GLOBAL COUNSELLING SYSTEM
1724. A Game Theory for Online Security
1725. Distributed Transaction Proxy
1726. Freelancer Job
1727. File Security With Multi Database System
1728. FILE SEARCH ENGINE
1729. Fertilizer Management System
1730. Fast Web Information Gathering with Alias Detection
1731. E-Tutor Online Jobs
1732. Enterprise Stock and Accounting System
1733. Ensuring Data Storage Security in Cloud Computing
1734. Encrypted IT Auditing on Cloud Computing
1735. Encrypted Data Storage Vs Data Against illegal Access
1736. Enabling Site Interaction In Social Community
1737. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1738. E-Music world
1739. Employee Resource Management
1740. Employee Management System
1741. E-Learning
1742. E Fraud Prevention based on the Self Authentication of e Documents
1743. Distribution System for Discount Sales
1744. Distributed Data Integration on Electricity Board
1745. Disease Information Hiding on Publishing Healthcare Data
1746. Digital Documents Attestation Systems
1747. Defending Against Web Application Vulnerabilities
1748. Defects Analysis Systems
1749. Data theft detection mobile cloud computing
1750. Data Base Fraud Detection Systems
1751. Customer Information Hiding for Data Mismanagement in Banking
1752. Company Security Reporting System(CSRS)
1753. E -Crime File Management System
1754. Credit Card Management System
1755. Corporate Requirement System
1756. Consumer Sales Online Fake Product Detection and Deletion
1757. Company Information Tracking System
1758. Cloud Policy-Based File Assure Deletion
1759. Cloud Data Theft Attacks
1760. Cloud Cyber Attacks against Social Networks
1761. Cloud Cost Management for Customer Sensitive Data
1762. Client Favorite Photo Search Engine on Web
1763. Citizen Card System
1764. Card Management System
1765. Design &Development of Car Parking and Automation Billing Systems
1766. Customer Care Service
1767. BPO Call Center
1768. Automation of IT Process Management
1769. Modeling and Automated Containment of Worms
1770. Attribute Key Based Data Security System
1771. As Needed Basis Accountability for Cloud Data Sharing
1772. Annotation of short texts With Wikipedia pages
1773. AIRLINE RESERVATION SYSTEM
1774. Advance User Management on Social Website
1775. A Semantic Web Based Scientific News Aggregator


Dotnet Mini Projects
Mini Projects
1776. VALUE ADDED TAX (VAT)
1777. User Oriented Network Attacks
1778. Secure Back Up
1779. Screen Capture And Mouse I/O
1780. Sales Bill Printing System using Excel
1781. Password Security
1782. Online User Mobile Rating
1783. Online Sensex Graph System
1784. Online Book Publishing
1785. NEWS TICKER PROJECT
1786. Multi Storage file
1787. Message Chating
1788. Medical Equipment in WAP
1789. Login Authentication Scheme
1790. Information Alert System
1791. Image Encryption And Decryption
1792. Generic Business Portal
1793. Flight Booking Portal
1794. File Transfer using Cryptography Techniques
1795. File Splitting
1796. Excel Format in Report
1797. EB Management System
1798. Dynamic Web Form Creation
1799. Android Image Search


Struts Application Projects
Struts Apps
1800. Public Sentiment Analysis with Online Shopping Using Struts
1801. Modern distributed business for supply-chain management
1802. High Confidential Personal Disease Reporting System
1803. Distributor Sensitive Data Management Using Struts
1804. Development of Certificate Authority Services for Web Applications
1805. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1806. Website Tracking System
1807. Website Ranking System
1808. Treasure Warehouse
1809. Student Information System
1810. Storage security
1811. PRISON MANAGEMENT SYSTEM
1812. E-Licence Investigation System
1813. Online Secure File Transfer System
1814. Online Medicine Purchase
1815. ONLINE EDUCATION
1816. Online Agriculture System
1817. Mobile Survey
1818. ISSUE TRACKING SYSYTEM
1819. HOSPITAL MANAGEMENT SYSYTEMS
1820. HealthCare Management System
1821. Global Employee Acclaimer
1822. E-VOTING FOR ASSOCIATION
1823. Encrypted Register Form
1824. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1825. E INSURANCE
1826. Courier Tracking Systems
1827. corporate Transportation
1828. Collectorate Communication Systems
1829. Budget Approval System
1830. BLOOD BANK MANAGEMENT SYSTEMS
1831. ATTENDANCE MANAGEMENT SYSTEM
1832. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1833. Sponsor For Agriculture
1834. Agriculture Assist
1835. Agriculture Marketing in Generation
1836. International Plant Import and Export
MODERN EDUCATION SYSTEM
1837. Old In Gold
1838. I School
1839. College Placement And Events
1840. Rural Area Educational Trouble Shooter
1841. Web Direct Recruitment Analysis
1842. Online Aquarum
1843. School Automation System
1844. Secure Online Course Automation
1845. Session Management System in It Industry
1846. Tools for Non IT Expert Developer
1847. Students Skills With Modern Industries
MODERN TECHNOLOGY
1848. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1849. Customer Favarate Greeting Card Design
1850. GPS Transport Packers and Movers
1851. House Hold Appliancies Warranty Management
1852. Direct Q Less Reservation System in train
1853. Power Consumption Monitoring House Hold Electronic Device
1854. Apartment Maintenance
1855. Budget Home Design
1856. Online Buy And Sale Software
1857. Online Softskills Tracks
1858. Gps Consumers Complients
1859. Economic Usage of Solar Energy
Advance Health Care System
1860. Organizing medical camp for public health development
1861. LIVE WEB DOCTOR CONSULTATION
1862. World Wide Cloud Inter Hospital Acess Health Care System
1863. MAC Sensing Protocol
1864. Medical Record Authentication
1865. Raw Requried Online Medicine
1866. Consumer Legal Advicer
1867. Homeopathy Health Record
SPORTS
1868. Play Ground Booking
1869. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1870. Cloud Storage Public Digital Certificate
ERP PROJECTS
1871. Corporate Trouble Shooter
1872. Entrepreneur Fault Analysis
1873. Organise Corporate Training For Client Projects
1874. Employment Knowledge Database
1875. GPS Employee Tracking System
1876. Non It People Performance
1877. Performance System Analysis In Industry
1878. Consultanting About the Foreign Peoples
1879. Recommend To Friend
1880. New Company Policy Clearance System
1881. ERP System (Enterprint Resource Plan
1882. Software Requirements Analysis for Client Side
1883. Select Your Age(Business Motivation all age group)
1884. Engnering Lab Maintenance
1885. Corporate Event Organisation
LATEST BANKING
1886. EyeBank Management System
1887. Advanced Banking System
OUR MODERN SOCIETY
1888. Trained Volunteers Create A Successful Social Campaign
1889. Finger thump Based Shopping Cart
1890. Railway Management Service
1891. Create a Successful Anti- Nuclear Campaign
1892. Crowding Funding Mobilization
1893. People Power of India
1894. Pets Care
1895. Feature in Best Potitical Leader in India
1896. Yell Help For Children
1897. Automation Transport Maintance
1898. It Park Media
1899. Online Painting Auction
1900. Election Commission Management
1901. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
1902. ANDROID APPS FOR INSURANCE SYSTEM
1903. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
1904. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
1905. ANDROID APPS FOR DOCTOR APPOINTMENT
1906. LIVE WEB DOCTOR CONSULTATION
1907. ANDROID APPS ON DOCTOR WITH NURSE
1908. HOSPITAL ANDROID APPS
1909. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
1910. Fertilizer Management System -Java, JSP, MySQL
1911. Land Bank for Nursery -Java, JSP, MySQL
1912. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
1913. FORMER APPS - ANDROID
1914. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
1915. Online Banking with Fraud Detecting- Java JSP, MySQL
1916. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
1917. MICRO CREDIT BANKING ON SMARTPHONE


Internet of things (IoT)
IoT Projects
1918. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
1919. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1920. FogRoute: DTN-based Data Dissemination Model in Fog Computing


RESTful Web services
REST API
1921. Big Scholarly Data: A Survey
1922. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved