Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
JOBS CONSULTANCY - SOFT SKILLS Internet of things (IoT) PYTHON PROJECT R - DATA SCIENCE - ML
BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB BIG DATA - HADOOP PROJECTS WEKA-Machine Learning
MACHINE LEARNING-ML(Data Scientist) PhD Projects JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18
ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS
IEEE PHP Projects 2017-18 IEEE PHP Projects PHP Application Projects ASP.NET MVC Framework
JAVA IEEE 2017-18 JAVA IEEE 2016-17 Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects
IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project Dot Net IEEE 2017-18
ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17
Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects
IEEE 2011-2012 Dotnet Projects Java Application Projects Dotnet Application Projects Dotnet Mini Projects
Struts Application Projects Java Mini Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS
HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS RESTful Web services
 
JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
1. E-assessment using image processing in ∞Exams
2. NLP - NATURAL LANGUAGE PROCESSING
3. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
4. Dengu Data Analysis Using R-program
5. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
6. Big Scholarly Data: A Survey
7. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
8. Big Data, Big Knowledge Big Data for Personalized Healthcare
9. Deduplication on Encrypted Big Data in Cloud
10. Secure Sensitive Data Sharing on a Big Data Platform
11. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
12. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
13. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
14. Self-Healing in Mobile Networks with Big Data
15. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
16. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
17. Child Monitoring - ANDROID APPS
18. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
19. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
20. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
21. Developing Apps for visually imapired people: Lessons learned from social network
22. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
23. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
24. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
25. Design of secure location and message sharing system for android platform
26. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
27. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
28. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
29. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
30. Privacy Protection based Access Control Scheme in Cloud-based Services
31. Privacy-Preserving Selective Aggregation of Online User Behavior Data
32. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
33. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


Internet of things (IoT)
IoT Projects
34. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
35. Who Moved My Data? Privacy Protection in Smartphones
36. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
37. IOT Projects
38. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
39. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
40. FogRoute: DTN-based Data Dissemination Model in Fog Computing


PYTHON PROJECT
PYTHON TRAINING WITH PROJECT
41. E-assessment using image processing in ∞Exams
42. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
43. NLP - NATURAL LANGUAGE PROCESSING
44. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
45. Image Based Appraisal of Real Estate Properties-IEEE 2017
46. FOOD WASTE ORGANIZER
47. PYTHON PROJECT FLOW
48. PYTHON PROGRAM EXECUTION
49. PYTHON INSTALLATION


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
50. R - ADVANCE IMAGE PROCESSING
51. Dengu Data Analysis Using R-program
52. Shopping Data set Analysis Using R Machine Learning
53. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
54. R PROGRAM TRAINING
55. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
56. COMAPRISON OF VARIOUS DOCKING SCORES
57. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
58. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
59. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
60. MICRO ARRAY GENE EXPRESSION ANALYSIS
61. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
62. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
63. Bucket Based Data Deduplication Technique for Big Data Storage System
64. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
65. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
66. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
67. Efficient Recommendation of De-identification Policies using MapReduce
68. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
69. Big Scholarly Data: A Survey
70. SocialQ&A: An Online Social Network Based Question and Answer System
71. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
72. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
73. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
74. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
75. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
76. User-Centric Similarity Search
77. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
78. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
79. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
80. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
81. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
82. Processing Incomplete k Nearest Neighbor Search
83. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
84. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
85. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
86. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
87. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
88. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
89. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
90. Deduplication on Encrypted Big Data in Cloud
91. Dynamic Resource Allocation for MapReduce with Partitioning Skew
92. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
93. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
94. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
95. Self-Healing in Mobile Networks with Big Data
96. Secure Sensitive Data Sharing on a Big Data Platform
97. Big Data, Big Knowledge: Big Data for Personalized Healthcare
98. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
99. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
100. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
101. Differentially Private Frequent Itemset Mining via Transaction Splitting
102. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
103. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
104. Fast Best-Effort Pattern Matching in Large Attributed Graphs


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
105. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
106. MRSIM: Mitigating Reducer Skew In MapReduce
107. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
108. HADOOP WITH HEALTHCARE DATA ANALYSYS
109. HADOOP WEBLOG DATA ANALYSES
110. BANK DATA ANALYTIC WITH HADOOP
111. HADOOP TRAINING


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
112. Diabetics Dataset
113. Excercise Dataset
114. MEDICAL DATA ANALYSES
115. WEKA PRIVACY DATA SET ANALYSES


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
116. Dengu Data Analysis Using R-program
117. Shopping Data set Analyse Using R Machine Learning
118. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
119. Polynomial Time Algorithm-PTA
120. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
121. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
122. K-Means For Clustering


PhD Projects
Developing PhD proposal
123. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
124. Diabetics Dataset
125. MEDICAL DATA ANALYSES
126. R IEEE PROJECTS
127. PhD Project Guidance
128. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
129. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
130. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
131. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
132. Who Moved My Data? Privacy Protection in Smartphones
133. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
134. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
135. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
136. Privacy-Preserving Aggregate Queries for Optimal Location Selection
137. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
138. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
139. Efficient Clue-based Route Search on Road Networks
140. Privacy-Preserving Location-Proximity for Mobile Apps
141. Cooperative Query Answer Authentication
142. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
143. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
144. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
145. ZapDroid: Managing Infrequently Used Applications on Smartphones
146. Searching Trajectories by Regions of Interest
147. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
148. A Classroom Scheduling Service for Smart Classes
149. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
150. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
151. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
152. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
153. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
154. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
155. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
156. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
157. Authentication of Smartphone Users Using Behavioral Biometrics
158. An Exploration of Geographic Authentication Schemes
159. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
160. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
161. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
162. Distributed secret sharing approach with cheater prevention
163. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
164. Efficient privacy preserving location based query over outsourced encrypted data
165. Utilizing the Cloud to Store Hijacked Camera Images
166. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
167. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
168. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
169. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
170. Enabling privacy preserving location proof for mobile users.
171. Optimizing User Experience in Choosing Android Applications
172. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
173. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
174. FoodForCare: An Android Application for Self-Care with Healthy Food
175. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
176. Silence is Golden: Enhancing Privacy of Location-Based Services
177. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
178. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
179. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
180. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
181. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
182. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
183. Adapting to User Interest Drift for POI Recommendation
184. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
185. Developing Apps for visually imapired people: Lessons learned from social network
186. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
187. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
188. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
189. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
190. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
191. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
192. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
193. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
194. Mobile cloud support for semantic enriched speech recognition in social care
195. Distributing secret sharing approach with cheater prevention based on QR code
196. Design of Secure Location and Message Sharing System for Android Platform
197. The impact of cloud technology on the automation of businesses
198. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
199. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
200. Rescue Management System
201. Android Army - Military Apps
202. Android Beauty Parlor
203. Android E Municipality
204. ANDROID NURSE AID
205. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
206. Human Resource (HR)- APPS
207. GPS Employee Tracking System
OUR MODERN SOCITY
208. RECYCLE APP WASTE COLLECTION REUSE
209. Bikes Rental - APPS
210. Location Based Alarm - GPS
211. ANDROID APPS FOR INSURANCE SYSTEM
212. BUDGET HOME DESIGN -ANDROID APPS
213. Former To Former Apps
214. Pets Care
ONLINE CONSUMERS PROCESSING
215. House Hold Appliancies Warranty Management
216. GPS Transport Packers and Movers
Android Apps
217. MY LIBRARY
218. FACULTY RATING SYSTEM
219. App for self organizer
220. ONLINE DOCTOR APPOINTMENT
221. Conference Event Mobile Assistant
222. Mobile Prescription
223. Metastore Application
224. Android SmartCampus
225. Android Shopping Mall
226. TOLL GATE -Barcode Billing System --ANDROID
227. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
228. Taste Hunt For Restaurants
229. POLICE APPS
230. Android Blood Bank
231. Mobile Expense Claim System Android
232. Android Intelligent Time Tracking System TICK
233. Android Course and Attendance Management System
234. Android Event Reminder
235. Android Attendance Assessment
236. Android Advance Shopping
237. Android CAR POOLING
238. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
239. Android HOSPITAL
240. ATHLETE MEET GUIDE
241. Android Apps PARKING MANAGER
242. Love and Care
243. Food Waste Management System
244. Travel Guide
245. Android Provisional Store
246. Best Baby Care with Vaccines Remainder
247. Android Assist for Lecturer and Student
248. Android Personal Assistance (PA)
249. Android Application for College Management System
250. Tollgate Payment system in android
251. Intelligence Quotient (IQ) Test
252. GPS LOCATION ALARM SYSTEM
253. Location Based Intelligent Mobile Organizer
254. BANK ACCOUNT TRACKER FOR ANDROID
255. UNIT CONVERTER
256. Tips and Tax Calculator in Android
257. TEXT EDITOR FOR ANDROID
258. Student Attendance Tracking System
259. Smart Money With Daily Expenses
260. Simple And Secure Android TO DO List Application
261. Restaurant Table Order Management System
262. Online Shopping
263. Online Examination System For Android
264. ANDROID SHOPPING LOCATION IDENTIFIER
265. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
266. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
267. MICRO CREDIT BANKING ON SMARTPHONE
268. LOCATION BASED ALARM
269. Insurance in android
270. GOOGLE PLACE FINDER
271. Friend Mapper on Mobiles - Friend Locator
272. EXPENSE MANAGER
273. Employee Diractory
274. Online job search
275. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
276. ANDROID STUDENT RESULT ANALYZING SYSTEM
277. CloudMoV : Cloud-based Mobile Social TV
278. Bus Reservation
279. Budget Planner
280. Android SMS Systems
281. ANDROID LEAVE MANAGEMENT SYSTEM
282. ANDROID EVENT SCHEDULER/REMINDER
283. Android Grocery Shopping List
284. Android Attack Application
285. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
286. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
287. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
288. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
289. Optimizing Display Advertising Markets
290. Using Knowledge Libraries to Transfer Expert Knowledge
291. Semantic Retrieval of Trademarks Based on Conceptual Similarity
292. Understanding and Predicting Question Subjectivity in Social Question and Answering
293. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
294. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
295. Fast Top-K Path-based Relevance Query on Massive Graphs
296. Web Image Search Re-ranking with Click-based Similarity and Typicality
297. Automatically Mining Facets for Queries from Their Search Results
298. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
299. Statistical Entity Extraction from Web
300. Question Answering System for an Effective Collaborative Learning
301. Lost in Translation: Improving Decoy Documents via Automated Translation
302. Learn to Personalized Image Search from the Photo Sharing Websites
303. In Tags We Trust Trust modeling in social tagging of multimedia content
304. Efficient Anonymous Message Submission
305. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
306. Employment Knowledge Database
307. Organise Corporate Training For Client Project s
308. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
309. ONLINE VEHICLE SHOWROOM SYSTEMS
310. Online Voting
311. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
312. School Management System
313. Secure Online Course Automation
314. School Automation System
315. Online Aquarum
316. Web Direct Recruitment Analysis
PHP Apps
317. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
318. TRADE / INDUSTRY WEB PORTAL
319. Feeding the poor from the supermarket
320. Application for recording your goals and habits
321. VISUAL WAY TO RAISE AWARENESS
322. Municipal Corporation
323. Online Polling For Publishers And Brands
324. Avoid Food Wastage
325. Web Doctor
326. ONLINE FOOD ORDERING SYSTEM
327. E-Tendering
328. Improving Rural Communities
329. Green Planet Awarness
330. Development of an Online Course Portal for a campus
331. Auxon Test
332. WEB BASED LEARNING SYSTEM
333. Tagging in online social networks
334. Secured file Downloading system
335. Cryptonite : A Secure and Performant Data Repository on Public Clouds
336. searching a image from websites
337. Online University
338. Online product Opinion and Ranking System
339. MNC LEAVE MANAGEMENT SYSTEM
340. Home appliances online purchase
341. Freelancer Job
342. E-Tutor Online Jobs
343. Statistical Entity Extraction from Web
344. Effective Collaborative Learning
345. Development of an e-Post Office System
346. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
347. Towards Effective Bug Triage with Software Data Reduction Techniques
348. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
349. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
350. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
351. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
352. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
353. Proof of retrievability with public verifiability resilient against related-key attacks
354. Secure Anonymous Key Distribution Scheme for Smart Grid
355. Converses For Secret Key Agreement and Secure Computing
356. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE 2017-18
IEEE Transactions on Big Data
357. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
358. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
359. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
360. Two Layer Clustering model for Mobile Customer Analysis
361. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
362. Consumer oriented web services ranking and classification
363. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
364. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
365. QoS Recommendation in Cloud Services
366. Securing Aggregate Queries for DNA Databases
367. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
368. A robust reputation management mechanism in the federated cloud
369. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
370. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
371. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
372. Energy-efficient Query Processing in Web Search Engines
373. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
374. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
375. BiRank: Towards Ranking on Bipartite Graphs
376. QoS Recommendation in Cloud Services
377. Public Interest Analysis Based on Implicit Feedback of IPTV Users
378. Search Rank Fraud and Malware Detection in Google Play
379. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
380. Influence Maximization in Trajectory Databases
381. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
382. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
383. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
384. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
385. Computing Semantic Similarity of Concepts in Knowledge Graphs
386. QDA: A Query-Driven Approach to Entity Resolution
387. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
388. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
389. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
390. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
391. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
392. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
393. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
394. Two-Factor Data Security Protection Mechanism for Cloud Storage System
395. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
396. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
397. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
398. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
399. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
400. Where You Are Is Who You Are User Identification by Matching Statistics
401. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
402. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
403. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
404. Online Subgraph Skyline Analysis Over Knowledge Graphs
405. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
406. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
407. ID2S Password-Authenticated Key Exchange Protocols
408. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
409. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
410. Classification model to predict the learners' academic performance using big data
411. Electronic Commerce Meets the Semantic Web
412. Mining High Utility Patterns in One Phase without Generating Candidates
413. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
414. Automatic Generation of Social Event Storyboard from Image Click-through Data
415. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
416. Understanding Deep Representations Learned in Modeling Users Likes
417. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
418. Topic-Oriented Exploratory Search Based on an Indexing Network
419. Relevance Feedback Algorithms Inspired By Quantum Detection
420. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
421. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
422. Efficiently Estimating Statistics of Points of Interests on Maps
423. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
424. Aspect-level Influence Discovery from Graphs
425. Sentiment Embeddings with Applications to Sentiment Analysis
426. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
427. Resolving Multi-party Privacy Conflicts in Social Media
428. Encrypted Data Management with Deduplication in Cloud Computing
429. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
430. Crawling Hidden Objects with kNN Queries
431. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
432. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
433. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
434. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
435. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
436. Nearest Keyword Set Search in Multi-dimensional Datasets
437. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
438. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
439. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
440. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
441. Immutable Authentication and Integrity Schemes for Outsourced Databases
442. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
443. Server-Aided Public Key Encryption with Keyword Search
444. Online Learning in Large-Scale Contextual Recommender Systems
445. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
446. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
447. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
448. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
449. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
450. Multi-Modal Event Topic Model for Social Event Analysis
451. Social friend recommendation on multiple network correlation
452. Tag Based Image Search by Social Re-ranking
453. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
454. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
455. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
456. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
457. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
458. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
459. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
460. Rank-Based Similarity Search: Reducing the Dimensional Dependence
461. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
462. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
463. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
464. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
465. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
466. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
467. On the Security of data access control for multiauthority cloud storage system
468. Trust-based Service Management for Social Internet of Things Systems
469. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
470. Formalization and Verification of Group Behavior Interactions
471. Group Key Agreement with Local Connectivity
472. Data Lineage in Malicious Environments
473. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
474. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
475. Enabling Cloud Storage Auditing with Key-Exposure Resistance
476. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
477. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
478. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
479. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
480. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
481. Quantitative Reasoning About Cloud Security Using Service Level Agreements
482. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
483. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
484. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
485. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
486. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
487. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
488. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
489. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
490. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
491. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
492. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
493. Enabling Cloud Storage Auditing with Key-Exposure Resistance
494. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
495. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
496. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
497. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
498. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
499. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
500. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
501. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
502. Secure Auditing and Deduplicating Data in Cloud
503. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
504. Towards reproducibility in online social network Research
505. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
506. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
507. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
508. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
509. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
510. Making Digital Artifacts on the Web Verifiable and Reliable
511. Anonymizing Collections of Tree-Structured Data
512. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
513. FOCS: Fast Overlapped Community Search
514. Sparsity Learning Formulations for Mining Time-Varying Data
515. The Impact of View Histories on Edit Recommendations
516. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
517. Discovery of Ranking Fraud for Mobile Apps
518. Towards Effective Bug Triage with Software Data Reduction Techniques
519. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
520. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
521. Auditing for Distributed Storage Systems
522. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
523. Uploader Intent for Online Video: Typology, Inference and Applications
524. YouTube Video Promotion by Cross-network
525. Semantic-Improved Color Imaging Applications: It Is All About Context
526. Geolocalized Modeling for Dish Recognition
527. Learning to Rank Image Tags with Limited Training Examples
528. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
529. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
530. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
531. Tracking Temporal Community Strength in Dynamic Networks
532. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
533. Towards Information Diffusion in Mobile Social Networks
534. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
535. An Efficient Privacy-Preserving Ranked Keyword Search Method
536. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
537. Dispersing Instant Social Video Service Across Multiple Clouds
538. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
539. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
540. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
541. A Computational Dynamic Trust Model for User Authorization
542. Secure Distributed Deduplication Systems with Improved Reliability
543. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
544. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
545. Leveraging the Tail Time for Saving Energy in Cellular Networks
546. Keylogging-resistant Visual Authentication Protocols
547. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
548. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
549. Preserving Location Privacy in Geo-Social Applications
550. Efficient Authentication for Mobile and Pervasive Computing
551. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
552. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
553. Typicality-Based Collaborative Filtering Recommendation
554. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
555. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
556. Keyword Search Over Probabilistic RDF Graphs
557. Efficient Prediction of Difficult Keyword Queries over Databases
558. Interpreting the Public Sentiment Variations on Twitter
559. An Efficient Recommendation Method for Improving Business Process Modeling
560. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
561. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
562. On the use of Side Information for Mining Text Data
563. Privacy Preserving and Content Protecting Location based Queries
564. Fast Nearest Neighbor Search with Keywords
565. Towards Differential Query Services in Cost-Efficient Clouds
566. Facilitating Document Annotation using Content and Querying Value
567. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
568. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
569. Secure Outsourced Attribute-Based Signatures
570. Supporting Privacy Protection in Personalized Web Search
571. Dealing With Concept Drifts in Process Mining
572. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
573. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
574. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
575. Active Learning of Constraints for Semi-Supervised Clustering
576. Best Keyword Cover Search
577. Personalized Recommendation Combining User Interest and Social Circle
578. Online Feature Selection and Its Applications
579. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
580. Incremental Affinity Propagation Clustering Based on Message Passing
581. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
582. Secure kNN Query Processing in Untrusted Cloud Environments
583. Malware Propagation in Large-Scale Networks
584. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
585. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
586. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
587. Efficient Ranking on Entity Graphs with Personalized Relationships
588. Task Trail: An Effective Segmentation of User Search Behavior
589. Privacy-Preserving Enhanced Collaborative Tagging
590. XSPath Navigation on XML Schemas Made Easy
591. Security Evaluation of Pattern Classifiers under Attack
592. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
593. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
594. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
595. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
596. Nothing is for Free: Security in Searching Shared and Encrypted Data
597. SocialTube: P2P-assisted Video Sharing in Online Social Networks
598. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
599. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
600. Behavioral Malware Detection in Delay Tolerant Networks
601. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
602. Private Searching on Streaming Data Based on Keyword Frequency
603. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
604. On the Security of Trustee-Based Social Authentications
605. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
606. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
607. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
608. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
609. A Two-stage Deanonymization Attack Against Anonymized Social Networks
610. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
611. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
612. Scalable architecture for multi-user encrypted SQL operations on cloud database services
613. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
614. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
615. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
616. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
617. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
618. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
619. Secure kNN Query Processing in Untrusted Cloud Environments
620. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
621. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
622. A Hybrid Cloud Approach for Secure Authorized Deduplication
623. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
624. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
625. A Novel Model for Competition and Cooperation Among Cloud Providers
626. CLOUDQUAL: A Quality Model for Cloud Services
627. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
628. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
629. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
630. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
631. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
632. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
633. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
634. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
635. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
636. Enhanced Security for Association Rule Mining to secure Transactional Databases
637. Operational Pattern Revealing Technique in Text Mining
638. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
639. Personalized web search using Browsing history and domain Knowledge
640. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
641. Data Security the Challenge of Cloud Computing
642. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
643. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
644. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
645. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
646. User Action Interpretation for Online Content Optimization
647. Spatial Query Integrity with Voronoi Neighbors
648. Spatial Approximate String Search
649. Sensitive Label Privacy Protection on Social Network Data
650. Secure Mining of Association Rules in Horizontally Distributed Databases
651. Secure Logging As a Service Delegating Log Management to the Cloud
652. Robust Module-based Data Management
653. Ranking on Data Manifold with Sink Points
654. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
655. Privacy-Enhanced Web Service Composition
656. Privacy against Aggregate Knowledge Attacks
657. Preventing Private Information Inference Attacks on Social Networks
658. PMSE: A Personalized Mobile Search Engine
659. Personalized QoS-Aware Web Service Recommendation and Visualization
660. Optimal Client-Server Assignment for Internet Distributed Systems
661. Online Search and Buying Behaviour in Consumer Markets
662. M-Privacy for Collaborative Data Publishing
663. Mining User Queries with Markov Chains: Application to Online Image Retrieval
664. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
665. Incentive Compatible Privacy-Preserving Data Analysis
666. Improving Security and Efficiency in Attribute-Based Data Sharing
667. FoCUS: Learning to Crawl Web Forums
668. Fast Nearest Neighbor Search with Keywords
669. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
670. Facilitating Effective User Navigation through Website Structure Improvement
671. Facilitating Document Annotation using Content and Querying Value
672. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
673. Efficient Evaluation of SUM Queries over Probabilistic Data*
674. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
675. Dynamic Query Forms for Database Queries
676. Dynamic Personalized Recommendation on Sparse Data
677. Distributed Strategies for Mining Outliers in Large Data Sets
678. Crowdsourcing Predictors of Behavioral Outcomes
679. Co-Occurrence-Based Diffusion for Expert Search on the Web
680. Comparable Entity Mining from Comparative Questions
681. CloudMoV: Cloud-based Mobile Social TV
682. Anomaly Detection via Online Oversampling Principal Component Analysis
683. Anomaly Detection Approach Using Hidden Markov Model
684. Annotating Search Results from Web Databases
685. A System to Filter Unwanted Messages from OSN User Walls
686. A Survey of XML Tree Patterns
687. A Probabilistic Approach to String Transformation
688. A New Algorithm for Inferring User Search Goals with Feedback Sessions
689. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
690. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
691. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
692. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
693. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
694. Towards Differential Query Services in Cost-Efficient Clouds
695. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
696. SocialTube: P2P-assisted Video Sharing in Online Social Networks
697. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
698. QoS Ranking Prediction for Cloud Services
699. Priority-Based Consolidation of Parallel Workloads in the Cloud
700. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
701. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
702. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
703. Load Rebalancing for Distributed File Systems in Clouds
704. Label-Embedding for Attribute-Based Classification
705. IP-Geolocation Mapping for Moderately Connected Internet Regions
706. Identity-Based Secure Distributed Data Storage Schemes
707. Hint-based Execution of Workloads in Clouds with Nefeli
708. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
709. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
710. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
711. Efficient Two-Server Password-Only Authenticated Key Exchange
712. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
713. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
714. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
715. Winds of Change: From Vendor Lock-In to the Meta Cloud
716. Supporting the Migration of Applications to the Cloud through a Decision Support System
717. Storing Shared Data on the Cloud via Security-Mediator
718. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
719. Privacy-Preserving Public Auditing for Secure Cloud Storage
720. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
721. Outsourcing Privacy-Preserving Social Networks to a Cloud
722. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
723. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
724. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
725. Efficient Security Solution for Privacy-Preserving Cloud Services
726. Collaboration in Multicloud Computing Environments: Framework and Security Issues
727. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
728. Cloud-based DDoS Attacks and Defenses
729. Cloud computing for mobile users can offloading compution save energy
730. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
731. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
732. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
733. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
734. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
735. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
736. Two tales of privacy in online social networks
737. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
738. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
739. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
740. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
741. Security and Privacy-Enhancing Multicloud Architectures
742. Security Using Colors and Armstrong Numbers
743. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
744. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
745. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
746. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
747. Privacy Preserving Data Analytics for Smart Homes
748. On Inference-Proof View Processing of XML Documents
749. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
750. Extracting Spread-Spectrum Hidden Data from Digital Media
751. Efficiently Outsourcing Multiparty Computation under Multiple Keys
752. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
753. Craigslist Scams and Community Composition: Investigating Online Fraud
754. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
755. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
756. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
757. Super-Resolution-based Inpainting
758. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
759. Image Authentication Using Stochastic Diffusion
760. Hierarchical Super-Resolution-Based Inpainting
761. Circular Reranking for Visual Search
762. Bootstrapping Visual Categorization With Relevant Negatives
763. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
764. An extended visual cryptography scheme without pixel expansion for halftone images
765. An Adaptive Cloud Downloading Service
NETWORKING
766. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
767. Topological Conditions for In-Network Stabilization of Dynamical Systems
768. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
769. Price Differentiation for Communication Networks
770. Participatory Privacy: Enabling Privacy in Participatory Sensing
771. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
772. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
773. On the Role of Mobility for Multi-message Gossip
774. Fully Anonymous Profile Matching in Mobile Social Networks
775. Fault Node Recovery Algorithm for a Wireless Sensor Network
776. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
777. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
778. Access Policy Consolidation for Event Processing Systems
779. A Fast Re-Route Method
SOFTWARE ENGINEERING
780. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
781. Vampire attacks: Draining life from wireless ad-hoc sensor networks
782. Towards a Statistical Framework for Source Anonymity in Sensor Networks
783. Search Me If You Can: Privacy-preserving Location Query Service
784. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
785. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
786. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
787. Distributed Cooperative Caching in Social Wireless Networks
788. Community-Aware Opportunistic Routing in Mobile Social Networks
789. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
790. The Devils Behind Web Application Vulnerabilities
791. Security Architecture for Cloud Networking
792. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
793. Secure Overlay Cloud Storage with Access Control and Assured Deletion
794. Risk-Aware Mitigation for MANET Routing Attacks
795. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
796. Privacy-preserving Enforcement of Spatially Aware RBAC
797. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
798. pCloud: A Distributed System for Practical PIR
799. Packet-Hiding Methods for Preventing Selective Jamming Attacks
800. Online Modeling of Proactive Moderation System for Auction Fraud Detection
801. Fast and accurate annotation of short texts with Wikipedia pages
802. FADE: Secure Overlay Cloud Storage with File Assured Deletion
803. Ensuring Distributed Accountability for Data Sharing in the Cloud
804. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
805. Direct and Indirect Discrimination Prevention Methods
806. Detecting Spam Zombies by Monitoring Outgoing Messages
807. Detecting Anomalous Insiders in Collaborative Information Systems
808. Data-Provenance Verification For Secure Hosts
809. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
810. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
811. Payments for Outsourced Computations
812. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
813. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
814. Toward Private Joins on Outsourced Data
815. Statistical Entity Extraction from Web
816. Slicing: A New Approach to Privacy Preserving Data Publishing
817. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
818. Resilient Identity Crime Detection
819. Ranking Model Adaptation for Domain-Specific Search
820. Organizing User Search Histories
821. On the Spectral Characterization and Scalable Mining of Network Communities
822. Multiparty Access Control for Online Social Networks: Model and Mechanisms
823. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
824. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
825. How do Facebookers use Friendlists
826. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
827. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
828. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
829. Enabling Multilevel Trust in Privacy Preserving Data Mining
830. Enabling cross-site interactions in social networks
831. Efficient Similarity Search over Encrypted Data
832. Efficient Extended Boolean Retrieval
833. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
834. Efficient Anonymous Message Submission
835. Effective Pattern Discovery for Text Mining
836. DDD: A New Ensemble Approach for Dealing with Concept Drift
837. Credibility Ranking of Tweets during High Impact Events
838. Creating Evolving User Behavior Profiles Automatically
839. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
840. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
841. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
842. Anomaly Detection for Discrete Sequences: A Survey
843. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
844. Advance Mining of Temporal High Utility Itemset
845. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
846. Reliable Re-encryption in Unreliable Clouds
847. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
848. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
849. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
850. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
851. Gossip-based Resource Management for Cloud Environments
852. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
853. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
854. Cloud Data Protection for the Masses
855. Cloud Computing Security: From Single to Multi-Clouds
856. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
857. In Tags We Trust Trust modeling in social tagging of multimedia content
858. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
859. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
860. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
861. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
862. Cut Detection in Wireless Sensor Networks
863. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
864. TrickleDNS: Bootstrapping DNS Security using Social Trust
865. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
866. Policy-by-Example for Online Social Networks
867. Packet Loss Control Using Tokens at the Network Edge
868. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
869. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
870. Independent Directed Acyclic Graphs for Resilient Multipath Routing
871. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
872. Game-Theoretic Pricing for Video Streaming in Mobile Networks
873. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
874. Auditing for Network Coding Storage
875. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
876. Privacy Preserving Cloud Data Access With Multi-Authorities
877. Movie Rating and Review Summarization in Mobile Environment
878. IDSaaS: Intrusion Detection System as a Service in Public Clouds
879. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
880. BibPro: A Citation Parser Based on Sequence Alignment Techniques
881. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
882. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
883. RITAS: Services for Randomized Intrusion Tolerance
884. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
885. Nymble: Blocking Misbehaving Users in Anonymizing Networks
886. Modeling and Detection of Camouflaging Worm
887. Coding for Cryptographic Security Enhancement using Stopping Sets
888. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
889. Wireless Sensor Network Security model using Zero Knowledge Protocol
890. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
891. Throughput Optimization in Mobile Backbone Networks
892. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
893. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
894. Fast Data Collection in Tree-Based Wireless Sensor Networks
895. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
896. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
897. SPAF: Stateless FSA-based Packet Filters
898. Selfish Overlay Network Creation and Maintenance
899. ProgME: Towards Programmable Network MEasurement
900. Locating Equivalent Servants over P2P Networks
901. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
902. Buffer Sizing for 802.11 Based Networks
903. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
904. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
905. Improving Utilization of Infrastructure Clouds
906. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
907. CloudTPS: Scalable Transactions for Web Applications in the Cloud
908. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
909. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
910. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
911. Ranking Spatial Data by Quality Preferences
912. Making Aggregation Work in Uncertain and Probabilistic Databases
913. Load Shedding in Mobile Systems with MobiQual
914. Group Enclosing Queries
915. Extended XML Tree Pattern Matching: Theories and Algorithms
916. Effective Navigation of Query Results Based on Concept Hierarchies
917. Discovering Conditional Functional Dependencies
918. Decision Trees for Uncertain Data
919. Data Leakage Detection
920. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
921. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
922. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
923. Privacy Protection based Access Control Scheme in Cloud-based Services
924. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
925. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
926. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
927. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
928. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
929. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
930. Explaining Missing Answers to Top-k SQL Queries
931. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
932. Continuous Top-k Monitoring on Document Streams
933. Generating Query Facets using Knowledge Bases
934. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
935. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
936. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
937. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
938. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
939. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
940. Generating Query Facets using Knowledge Bases
941. Private Over-threshold Aggregation Protocols over Distributed Datasets
942. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
943. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
944. Privacy Protection based Access Control Scheme in Cloud-based Services
945. Dynamic Facet Ordering for Faceted Product Search Engines
946. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
947. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
948. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
949. A Forecasting Methodology for Workload Forecasting in Cloud Systems
950. Optimal Shipping Strategy and Return Service Charge Under No-Reason
951. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
952. A Recommendation System to Facilitate Business Process Modeling
953. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
954. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
955. User Differentiated Verifiable File Search on the Cloud
956. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
957. Statistical Features Based Real-time Detection of Drifted Twitter Spam
958. Incremental Consolidation of Data-Intensive Multi-flows
959. Service Pattern: An Integrated Business Process Model for Modern Service Industry
960. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
961. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
962. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
963. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
964. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
965. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
966. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
967. TagBook: A Semantic Video Representation without Supervision for Event Detection
968. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
969. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
970. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
971. The Impact of Review Environment on Review Credibility
972. Private Over-threshold Aggregation Protocols over Distributed Datasets
973. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
974. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
975. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
976. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
977. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
978. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
979. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
980. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
981. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
982. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
983. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
984. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
985. What Is Happening in The Video Annotate Video by Sentence
986. Two level QR code for private message sharing and document authentication.
987. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
988. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
989. Mining Health Examination Records A Graph-based Approach
990. A Credibility Analysis System for Assessing Information on Twitter
991. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
992. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
993. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
994. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
995. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
996. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
997. Predicting Personalized Image Emotion Perceptions in Social Networks
998. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
999. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1000. Explaining Missing Answers to Top-k SQL Queries
1001. Bilevel Feature Extraction Based Text Mining
1002. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1003. Privacy-Preserving Outsourced Media Search
1004. Modeling and Verification of Online Shopping Business Processes
1005. User Preference Learning for Online Social Recommendation
1006. Steganalysis Features for Content-Adaptive JPEG Steganography
1007. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1008. PiCode: a New Picture-Embedding 2D Barcode
1009. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1010. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1011. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1012. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1013. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1014. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1015. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1016. Cloud workflow scheduling with deadlines and time slot availability
1017. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1018. Path-Based Epidemic Spreading in Networks
1019. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1020. On the Resiliency of Static Forwarding Tables
1021. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1022. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1023. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1024. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1025. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1026. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1027. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1028. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1029. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1030. Hacking is not random: a case-control study of webser ver-compromise risk
1031. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1032. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1033. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1034. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1035. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1036. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1037. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1038. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1039. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1040. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1041. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1042. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1043. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1044. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1045. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1046. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1047. Cross-Domain Feature Learning in Multimedia
1048. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1049. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1050. Saliency-based color accessibility
1051. Contextual Online Learning for Multimedia Content Aggregation
1052. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1053. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1054. An Attribute-assisted Reranking Model for Web Image Search
1055. RRW - A Robust and Reversible Watermarking
1056. Steganography Using Reversible Texture Synthesis
1057. Single Image Super-Resolution Based on Gradient Profile Sharpness
1058. Detection and Rectification of Distorted Fingerprints
1059. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1060. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1061. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1062. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1063. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1064. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1065. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1066. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1067. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1068. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1069. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1070. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1071. Authenticated Key Exchange Protocols for Parallel Network File Systems
1072. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1073. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1074. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1075. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1076. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1077. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1078. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1079. Context-based Diversification for Keyword Queries over XML Data
1080. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1081. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1082. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1083. Tweet Segmentation and Its Application to Named Entity Recognition
1084. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1085. Automatic Group Happiness Intensity Analysis
1086. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1087. Query Aware Determinization of Uncertain Objects
1088. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1089. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1090. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1091. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1092. Efficient Community Formation for Web Services
1093. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1094. Secure Mining of Association Rules in Hor izontally Distributed Databases
1095. Dynamic Query Forms for Database Queries
1096. Secure kNN Query Processing in Untrusted Cloud Environments
1097. An Empirical Performance Evaluation of Relational Keyword Search Systems
1098. Keyword Query Routing
1099. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1100. Demand Bidding Program and Its Application in Hotel Energy Management
1101. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1102. Incremental Detection of Inconsistencies in Distributed Data
1103. A Cocktail Approach for Travel Package Recommendation
1104. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1105. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1106. Analysis of Field Data on Web Security Vulnerabilities
1107. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1108. A Reliability Improvement Method for SOA-Based Applications
1109. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1110. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1111. Web Service Recommendation via Exploiting Location and QoS Information
1112. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1113. Exploiting Rateless Codes in Cloud Storage Systems
1114. COMIC:Cost Optimization for Internet Content Multihoming
1115. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1116. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1117. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1118. Uniform Embedding for Efficient JPEG Steganography
1119. Secure Deduplication with Efficient and Reliable Convergent Key Management
1120. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1121. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1122. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1123. Location Aware Keyword Query Suggestion Based on Document Proximity
1124. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1125. A secure data self-destructing scheme in cloud computing
1126. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1127. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1128. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1129. Secure kNN Query Processing in Untrusted Cloud Environments
1130. Exploiting Rateless Codes in Cloud Storage Systems
1131. Fuzzy Authorization for Cloud Storage
1132. Planning vs. dynamic control Resource allocation in corporate clouds
1133. Automatic Scaling of Internet Applications for Cloud Computing Services
1134. Strategy-proof Pricing for Cloud Service Composition
1135. Privacy Preserving Delegated Access Control in Public Clouds
1136. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1137. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1138. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1139. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1140. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1141. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1142. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1143. A Scientometric Analysis of Cloud Computing Literature
1144. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1145. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1146. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1147. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1148. FeatureMatch: A General ANNF Estimation Technique and its Applications
1149. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1150. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1151. As-Projective-As-Possible Image Stitching with Moving DLT
1152. Sharing Visual Secrets in Single Image Random Dot Stereograms
1153. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1154. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1155. A New Iterative Triclass Thresholding Technique in Image Segmentation
1156. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1157. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1158. An Iranian License Plate Recognition System Based on Color Features
1159. Learning Layouts for Single-Page Graphic Designs
1160. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1161. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1162. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1163. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1164. Fingerprint Compression Based on Sparse Representation
1165. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1166. LBP-Based Edge-Texture Features for Object Recoginition
1167. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1168. Toward Experiential Mobile Media Processing
1169. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1170. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1171. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1172. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1173. Designing Truthful Spectrum Double Auctions with Local Markets
1174. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1175. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1176. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1177. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1178. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1179. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1180. A Study on Clinical Prediction Using Data Mining Techniques
1181. Online Payment System using Steganography and Visual Cryptography
1182. Efficient Instant-Fuzzy Search with Proximity Ranking
1183. Attribute Based Encryption with Privacy Preserving In Clouds
1184. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1185. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1186. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1187. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1188. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1189. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1190. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1191. The Target Tracking in Mobile Sensor Networks
1192. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1193. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1194. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1195. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1196. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1197. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1198. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1199. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1200. SUSIE: Search Using Services and Information Extraction
1201. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1202. Secure Mining of Association Rules in Horizontally Distributed Databases
1203. Sampling Online Social Networks
1204. Privacy Preserving Delegated Access Control in Public Clouds
1205. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1206. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1207. Ginix : Generalized Inverted Index for Keyword Search
1208. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1209. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1210. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1211. Dynamic Query Forms for Database Queries
1212. Cost-Based Optimization of Service Compositions
1213. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1214. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1215. Automatic Extraction of Top-k Lists from the Web
1216. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1217. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1218. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1219. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1220. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1221. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1222. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1223. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1224. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1225. Privacy Preserving Data Sharing With Anonymous ID Assignment
1226. Non-Cooperative Location Privacy
1227. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1228. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1229. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1230. Cloud based emails boundaries and vulnerabilities
1231. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1232. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1233. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1234. Optimal Content Downloading in Vehicular Networks
1235. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1236. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1237. View-invariant action recognition based on Artificial Neural Networks
1238. User-aware Image Tag Refinement via Ternary Semantic Analysis
1239. Separable Reversible Data Hiding in Encrypted Image
1240. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1241. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1242. Robust Face-Name Graph Matching for Movie Character Identification
1243. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1244. Improving Color Constancy by Photometric Edge Weighting
1245. Exploring the design space of social network-based Sybil defenses
1246. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1247. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1248. AnnoSearch: Image Auto-Annotation by Search
1249. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1250. Scalable Scheduling of Updates in Streaming Data Warehouses
1251. Scalable Learning of Collective Behavior
1252. Ranking Model Adaptation for Domain-Specific Search
1253. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1254. Outsourced Similarity Search on Metric Data Assets
1255. Organizing User Search Histories
1256. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1257. Mining Web Graphs for Recommendations
1258. Joint Top K Spatial Keyword Query Processing
1259. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1260. Identifying Content for Planned Events Across Social Media Sites
1261. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1262. Generative Models for Item Adoptions Using Social Correlation
1263. Efficient Data Mining for XML Queries Answering Support
1264. Efficient audit service outsourcing for data integrity in clouds
1265. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1266. Effective Pattern Discovery for Text Mining
1267. Combined Mining: Discovering Informative Knowledge in Complex Data
1268. Decentralized Probabilistic Text Clustering
1269. Computing Structural Statistics by Keywords in Databases
1270. Bridging Social and Data Networks
1271. Answering General Time-Sensitive Queries
1272. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1273. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1274. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1275. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1276. Resource-Aware Application State Monitoring
1277. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1278. Query Access Assurance in Outsourced Databases
1279. Linear and Differential Cryptanalysis
1280. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1281. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1282. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1283. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1284. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1285. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1286. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1287. ROAuth: Recommendation Based Open Authorization
1288. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1289. Recommendation Models for Open Authorization
1290. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1291. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1292. On Privacy of Encrypted Speech Communications
1293. OAuth Web Authorization Protocol
1294. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1295. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1296. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1297. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1298. Fast Matrix Embedding by Matrix Extending
1299. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1300. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1301. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1302. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1303. Measuring Code Quality to Improve Specification Mining
1304. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1305. Towards Secure and Dependable Storage Services in Cloud Computing
1306. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1307. Remote Display Solutions for Mobile Cloud Computing
1308. Privacy Preserving Delegated Access Control in Public Clouds
1309. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1310. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1311. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1312. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1313. Load-Balancing Multipath Switching System with Flow Slice
1314. Assessing the Veracity of Identity Assertions via OSNs
1315. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1316. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1317. A New Cell-Counting-Based Attack Against Tor
1318. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1319. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1320. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1321. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1322. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1323. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1324. Fast Release Capture Sampling in Large-Scale Sensor Networks
1325. Cooperative download in vehicular environments
1326. Cooperative Data Dissemination via Roadside WLANs
1327. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1328. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1329. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1330. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1331. Hiding Sensitive Association Rule for Privacy Preservation
1332. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1333. Development of Certificate Authority Services for Web Applications
1334. Detecting and Validating Sybil Groups in theWild
1335. Association Rule Extracting Knowledge Using Market Basket Analysis
1336. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1337. Valuable Detours: Least-Cost Anypath Routing
1338. Self-Reconfigurable Wireless Mesh Networks
1339. Reliability in Layered Networks with Random Link Failures
1340. NABS:Novel Approaches for Biometric Systems
1341. Live Streaming with Receiver-based Peer-division Multiplexing
1342. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1343. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1344. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1345. Virtualized Screen: A Third Element for CloudMobile Convergence
1346. Steganographic Embedding in JPEG Images with Visual Criterion
1347. On the Typical Statistic Features for Image Blind Steganalysis
1348. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1349. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1350. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1351. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1352. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1353. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1354. Vulnerability Analysis in SOA-Based Business Processes
1355. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1356. Service-Centric Framework for a Digital Government Application
1357. Server-Side Streaming Processing of WS-Security
1358. OWLPath: An OWL Ontology-Guided Query Editor
1359. Monitoring Service Systems from a Language-Action Perspective
1360. Extracting Product Features and Sentiments from Chinese Customer Reviews
1361. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1362. Automated Certification for Compliant Cloud-based Business Processes
1363. Addressing Dependability throughout the SOA Life Cycle
1364. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1365. The Geometric Efficient Matching Algorithm for Firewalls
1366. Secure Service-Oriented Architecture for Mobile Transactions
1367. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1368. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1369. Privacy-Preserving Updates to Anonymous and Confidential Databases
1370. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1371. IPAS: Implicit Password Authentication System
1372. Improving Security and Performance in the Tor Network through Tunable Path Selection
1373. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1374. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1375. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1376. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1377. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1378. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1379. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1380. Data Delivery Properties of Human Contact Networks
1381. Converge-Cast: On the Capacity and Delay Tradeoffs
1382. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1383. USHER: Improving Data Quality with Dynamic Forms
1384. The World in a Nutshell: Concise Range Queries
1385. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1386. Scalable Scheduling of Updates in Streaming Data Warehouses
1387. Scalable Learning of Collective Behavior
1388. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1389. Publishing Search Logs A Comparative Study of Privacy Guarantees
1390. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1391. Optimal Service Pricing for a Cloud Cache
1392. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1393. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1394. Mining Web Graphs for Recommendations
1395. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1396. Integration of Sound Signature Authentication System
1397. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1398. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1399. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1400. Exploring Application-Level Semantics for Data Compression
1401. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1402. Data Leakage Detection
1403. Cost-aware rank join with random and sorted access
1404. Collaborative Filtering with Personalized Skylines
1405. Bridging Socially-Enhanced Virtual Communities
1406. Automatic Discovery of Personal Name Aliases from the Web
1407. A Personalized Ontology Model for Web Information Gathering
1408. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1409. A Query Formulation Language for the Data Web
1410. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1411. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1412. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1413. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1414. Towards Secure and Dependable Storage Services in Cloud Computing
1415. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1416. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1417. Data Integrity Proofs in Cloud Storage
1418. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1419. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1420. Feature-level Sentiment Analysis for Chinese Product Reviews
1421. Equal-sized Cells Mean Equal-sized Packets in Tor?
1422. Customer Relationship Management Based on Data Mining Technique
1423. Authentication Schemes for Session Passwords using Color and Images
1424. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1425. Young Talent Tracker
1426. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1427. International Plant Import and Export
OUR MODERN SOCITY
1428. Trained Volunteers Create A Successful Social Campaign
1429. Finger thump Based Shopping Cart
1430. Finger Print E-Voting Systems
1431. Create a Successful Anti- Nuclear Campaign
1432. Crowding Funding Mobilization
1433. People Power of India
1434. Modern Finger Print Voting System
1435. Election Commission Management
1436. Online Painting Auction
1437. Reality Show Ticket Booking System
1438. Online Broadway Motel Food Ordering System
1439. Fashion Studio Model Management
1440. Women's Selfhelp Group
Advance Health Care System
1441. Organizing medical camp for public health development
1442. Homeopathy Health Record
1443. Consumer Legal Advicer
1444. Raw Requried Online Medicine
1445. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1446. I School
1447. Job fair section process
1448. Advertising in E-Book
1449. Students Skills With Modern Industries
1450. College Placement And College Event
1451. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1452. Cloud Storage Public Digital Certificate
ERP PROJECTS
1453. Customer Relationship Management
1454. Corporate Trouble Shooter
1455. Corporate Event Organisation
1456. Engnering Lab Maintenance
1457. Select Your Age(Business Motivation all age group)
1458. Software Requirements Analysis for Client Side
1459. ERP System (Enterprint Resource Plan
LATEST BANKING
1460. User Opinion For Indian Banking Service And Cashless Economy
1461. Advanced Banking System
1462. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1463. Economic Usage of Solar Energy
1464. Gps Consumers Complients
1465. Online Softskills Tracks
1466. Online Buy And Sale Software
1467. Budget Home Design
1468. Online Product Exchange
1469. Jewellery Management
1470. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1471. Moderate Robatics System with Public Opinion
Java Apps
1472. Online overview of skills really used in jobs
1473. Land Bank for Nursery
1474. Developing Rural Economy
1475. ECOPS - Electronics Police Record Management System
1476. Website Evaluation Using Opinion Mining
1477. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1478. INSURANCE MANAGEMENT SYSTEM
1479. e-Fraud Prevention based on the Self- Authentication of e-Documents
1480. Hope Center
1481. Exam crazy
1482. BUGS REPORTING SYSTEM
1483. LOCATION BASED CONSUMER COMPLAINT
1484. Speed Racing
1485. ROADSTER
1486. META CAFE
1487. ONLINE VIDEO LOCKER
1488. Management System in Metro Train
1489. Plant Shopping on Web
1490. Reporting Online Media News Systems
1491. Informative Content Extraction
1492. E-commerce Complaint Management System
1493. Modern Agriculture Development System
1494. Loan Online Application
1495. Rural Community Developement
1496. LOVE AND CARE
1497. GREEN PLANT
1498. Advance Couier Service
1499. Community Awarness
1500. E_Music
1501. Staff Management System
1502. E-TENDERING
1503. Hotel Management
1504. Crime File Management System
1505. Cloud Cyber Attack
1506. Cloud Cost Management for Customer Sensitive Data
1507. Advance Web based Multimedia Answer Generation
1508. Commaunity Awareness
1509. E-Commerce Complaints
1510. Modern Agriculture Development System
1511. Plant Shopping on Web
1512. ONLINE VIDEO LOCKER
1513. ONLINE VIDEO LOCKER
1514. Reporting Online Media News Systems
1515. Online Plant Shopping
1516. Community Awareness
1517. Loan Online Application
1518. Modern Agriculture Development System
1519. Online Digital Library
1520. Geo Base Services
1521. Civil Supplies and Consumer Protection Department
1522. Citizen Opinions vs Government Policies
1523. Protecting Used Data Privacy for Attackers
1524. Web Hospital Management
1525. Easy SQL Query for Non-IT Manager
1526. Online Shopping with Fraud detection
1527. Efficient Spatial Query Processing
1528. Cryptographic Key Exchange Authentication
1529. Online Global Information Service Center
1530. Contracts Business Events Management
1531. Online Secure image Social Networks
1532. Outsourcing of Online Image Reconstruction
1533. Trust based Profile Matching Secure Social Network
1534. Secure and Distance based Online Social Network (OSN)
1535. Efficient Online Image Retrieval System
1536. Data Sharing In Cloud Storage by Using Key-Aggregate
1537. Multicast Key Management for Cloud
1538. Face-to-face contact on Mobile Social Networks
1539. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1540. Dynamically Growing Online Survey for Behavioral Outcomes
1541. Advance Web based Multimedia Answer Generation
1542. College Result Analysis with Horizontally Distributed Databases
1543. Feedback Decision Support for mHealth monitoring
1544. Exchange Secrete Key for Data Producers and Consumers
1545. Efficient Information Retrieval Using Ranked Query (EIRQ)
1546. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1547. Web Hosting On Cloud
1548. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1549. Web Server Security with Web Client Management System
1550. Web Parser on Sequence Alignment Techniques
1551. Web Page re-Ranking System for Library
1552. Web Eye
1553. Voting System for Web Library
1554. VIRTUAL CLASSROOM SYSTEM
1555. Unique Web Resources Utilization Monitoring System
1556. Transport Management System
1557. Pre-paid Recharging System on Banking
1558. Tollgate Management
1559. Time To Time Stock Market Updater and Monitoring System
1560. Sql Tuner
1561. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1562. SMS Based Mobile Banking with Security
1563. Sms Topup
1564. Vendor Information System For Shipping
1565. Sequential Anomaly Detection from User Behaviour
1566. Secure SMS Transaction System on banking
1567. Secure Online Documents Management System in Cloud
1568. Secure File Uploading Server with Advance Protecting System
1569. Secure File Monitoring System on Cloud
1570. Relational Logic Search Engine On Healthcare
1571. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1572. Quick Customer decision support on Web Sales Portal
1573. Query Response System for File Management
1574. Quality Visualization on Web TV
1575. Project Work Tracking System
1576. Product Market Manipulations on Asian stock market
1577. Predicting Top Company Share Based on High Utility Data
1578. Automation of Analysis and Development Management
1579. Pharmacy Information System
1580. Personalize Your News on Web
1581. Online University
1582. Online tagging for multimedia content
1583. Online Search Ranking On Multiple Domain
1584. Online Rental House Web Portal
1585. Online Recruitment System
1586. Online Real Estate Property Management
1587. Online Multi Type Documents Search Engine
1588. ONLINE MOBILE BILLING SYSTEM
1589. Online Jewelry Management
1590. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1591. Online Examination System
1592. Online Ensemble Learning Approach
1593. Online Banking With Fraud Detecting
1594. Online Auction Bit
1595. ONLINE ADVERTISING SYSTEM
1596. Nutraceuticals Management System
1597. Nearest Shopping Location Identification Systems
1598. Multilevel Images Authentication Systems
1599. Multi New Product Survey Management
1600. Movie Recommender Systems via User- Item Subgroups
1601. Movie Rating and Recommendation on Mobile
1602. Modern Municipal Corporation
1603. Mobile TV Quality Management
1604. Mobile Banking WAP
1605. Manifold Entrust Scheme
1606. Management System in Train
1607. Secure Mailing System
1608. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1609. LEAVE MANAGEMENT SYSTEM FOR MNC
1610. Knowledge Based Decision Support System(KMS)
1611. Key Management for Content Integration
1612. Inter Bank Fund Transfer in Distributed Network
1613. Information and Knowledge Extracting from a large amount of data
1614. Industry Standard Authorization For Sensitive Resources
1615. Implementation and Validating Environmental and Health
1616. iKnoweb Extracting and Integrating Entity Information System
1617. HUMAN ASSURANCE ADMINISTRATION
1618. High_level network Security Using Packet Filtering
1619. High and Low Level SQL Query Executor
1620. GLOBAL COUNSELLING SYSTEM
1621. A Game Theory for Online Security
1622. Distributed Transaction Proxy
1623. Freelancer Job
1624. File Security With Multi Database System
1625. FILE SEARCH ENGINE
1626. Fertilizer Management System
1627. Fast Web Information Gathering with Alias Detection
1628. E-Tutor Online Jobs
1629. Enterprise Stock and Accounting System
1630. Ensuring Data Storage Security in Cloud Computing
1631. Encrypted IT Auditing on Cloud Computing
1632. Encrypted Data Storage Vs Data Against illegal Access
1633. Enabling Site Interaction In Social Community
1634. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1635. E-Music world
1636. Employee Resource Management
1637. Employee Management System
1638. E-Learning
1639. E Fraud Prevention based on the Self Authentication of e Documents
1640. Distribution System for Discount Sales
1641. Distributed Data Integration on Electricity Board
1642. Disease Information Hiding on Publishing Healthcare Data
1643. Digital Documents Attestation Systems
1644. Defending Against Web Application Vulnerabilities
1645. Defects Analysis Systems
1646. Data theft detection mobile cloud computing
1647. Data Base Fraud Detection Systems
1648. Customer Information Hiding for Data Mismanagement in Banking
1649. Company Security Reporting System(CSRS)
1650. E -Crime File Management System
1651. Credit Card Management System
1652. Corporate Requirement System
1653. Consumer Sales Online Fake Product Detection and Deletion
1654. Company Information Tracking System
1655. Cloud Policy-Based File Assure Deletion
1656. Cloud Data Theft Attacks
1657. Cloud Cyber Attacks against Social Networks
1658. Cloud Cost Management for Customer Sensitive Data
1659. Client Favorite Photo Search Engine on Web
1660. Citizen Card System
1661. Card Management System
1662. Design &Development of Car Parking and Automation Billing Systems
1663. Customer Care Service
1664. BPO Call Center
1665. Automation of IT Process Management
1666. Modeling and Automated Containment of Worms
1667. Attribute Key Based Data Security System
1668. As Needed Basis Accountability for Cloud Data Sharing
1669. Annotation of short texts With Wikipedia pages
1670. AIRLINE RESERVATION SYSTEM
1671. Advance User Management on Social Website
1672. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1673. Online Trends Management Service in It Industry
1674. Session Management System in It Industry
1675. Tools for Non IT Expert Developer
ERP PROJECTS
1676. New Company Policy Clearance System
1677. Recommend To Friend
1678. Consultanting About the Foreign Peoples
1679. Performance System Analysis In Industry
1680. Non It People Performance
MODERN AGRICULTURE
1681. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1682. Agriculture Marketing in Generation
1683. Agriculture Assist
1684. Sponsor For Agriculture
SPORTS
1685. Play Ground Booking
OUR MODERN SOCITY
1686. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1687. RAILWAY SEAT RESERVATION SYSTEM
1688. Railway Management Service
1689. It Park Media
1690. Automation Transport Maintance
1691. Yell Help For Children
1692. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1693. Apartment Maintenance
1694. Power Consumption Monitoring House Hold Electronic Device
1695. Direct Q Less Reservation System in train
Advance Health Care System
1696. MAC Sensing Protocol
1697. World Wide Cloud Inter Hospital Acess Health Care System
1698. Live Doctor
Dotnet Apps
1699. TELEVISION CHANNEL PROGRAM MANAGEMENT
1700. WIN THE TRUST OF AN INDIAN CONSUMER
1701. ONLINE ACCOUNT MANAGEMENT
1702. SMART CAB BOOKING SYSTEM
1703. ONLINE FAST FOOD ORDER
1704. Travel Mate Add Module
1705. Work Order System Call Centre
1706. SPORTS MANAGEMENT SYSTEM
1707. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1708. Pick-It Courier Service
1709. Online Taxi Booking
1710. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1711. INCOMETAX MAINTAINANCE SYSTEM
1712. Hotel Reservation
1713. ERP System
1714. Bug Tracking System
1715. Vendor Information System For Shiping
1716. Top-K ranking System
1717. Secure Medical Image Archive System
1718. Business Activity Coordination Using Web Services
1719. Management Portal
1720. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1721. Secure Data Filtering Recommendation System
1722. Online Resources Sharing via Social Networks
1723. Secure self-destructing in Cloud Computing
1724. Web Resourecs File Authorization Management
1725. Click based image re-ranking system
1726. Tree Structure Data Analiysis Mining
1727. Web Resource Allocation for CorPerate
1728. Web Vulnerabilities and Security
1729. Fuzzy Cloud Search Using XML
1730. Cloud Data Supporting Secure Query Search
1731. Tour Recommender Systems on Web
1732. Distributed Interactive Web Applications
1733. Secure Query Processing for Cloud
1734. Online Data Storage with less pricing
1735. Cost Based Web Content Managemnts
1736. Web Hospital Management
1737. Online Data storage with low price
1738. Secure Online Data Block Authorization
1739. Profitable Onlin web Server System
1740. Online Economies File Manager for Multi Keying
1741. Online Community Management
1742. Key based Online Data Managements
1743. Critical Workflow Management for Web Documents
1744. Secure Online Documents Managements for Group Sharing
1745. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1746. Online Marketing Automation System
1747. Internal organization change management System
1748. Secure confirmation of sensitive transaction data in modern Internet banking services
1749. Privacy security with TPA in cloud computing
1750. Company Information Tracking System
1751. Online Virtualized screen Processing
1752. Web Service for Airline Management
1753. Web Social Club
1754. Quantum Key Cryptography
1755. Patient Data Management Based On Hospital Location
1756. Online Software Developer Community
1757. Online Developed Software sales
1758. Avoid repeated measurements On Genetics Dataset
1759. College Lab Maintenance System
1760. Industrial Manpower Resource Organizer
1761. Web Query Construction and Search on Complex Data
1762. Hospital Emergency Data Management
1763. Data confidentiality On Health-care Information System
1764. Secure Online Trading
1765. Fast Real-Time Event Alert Using social Network
1766. Secure E-Mail Organizer
1767. Web User Service Management System
1768. Easy SQL Query for Non-IT Manager
1769. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1770. Customer Relationship Management (CRM) on Banking
1771. Online Company ERP System
1772. Constructing E-Tourism
1773. Web based Multi Service Ranking System
1774. Dynamic Customer Data Hiding in Banking
1775. Online Distributed Social Clubs
1776. Virtual Shopping with Negative Feedback Reputation Systems
1777. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1778. Web Service Oriented Query Authentication Technique
1779. Web Based Customer Favorite vehicle Search Engine
1780. Web Based Book Publishing System
1781. Virtual Energy- Based Encryption and Keying
1782. Video Fraud Detecting On social Network
1783. Video Compression with Data hiding & Data Extraction
1784. Vendor Information System for Shipping
1785. VALUE ADDED TAX (VAT)
1786. Universal Smart Card
1787. Ultimate Location Information Systems
1788. Top K Ranking System
1789. Techno Task Manager
1790. Supply Chain Management
1791. Substitution-Permutation cryptanalysis System
1792. Streaming Data Warehouse Updations
1793. Step by Step Monitoring for Product Purchasing System
1794. Steganography for Data Reading and Writing AVI files
1795. SQL TUNER
1796. SMS Transaction Security
1797. Session Authentication Passwords using Color
1798. Service Availability Guarantees on Virtual Economy
1799. Server Fraud Detection on Cloud
1800. Sentence Based Search on Cloud
1801. Semantic Web Search Engines
1802. Secured Image communicator
1803. Secure smart application on web application
1804. Secure Service-Oriented Smartcard systems
1805. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1806. Secure Location Identification System
1807. Secure and Cloud Based Patient Information Systems
1808. Reduce the Password Guessing Attacks using Click Point
1809. Recommendation System Based on Graph
1810. Quantum Key Cryptography
1811. Quality Controller
1812. Public Web Status Monitoring System
1813. Project Trade Pool
1814. Product Marketing Analysis On Public Opinion
1815. Predicting Users Behaviors Using Web Mining
1816. Personal Health Information on M-Healthcare Emergency
1817. Optimum Online Knowledge Base
1818. Online Training Program
1819. Online Time sensitive queries
1820. Online Tag Based Image Retrieval and Effective Management
1821. Online Social networks controls using cloud
1822. Online Rental System
1823. Online product Opinion and Ranking System
1824. Online Dynamic form creation for Non-IT Peoples
1825. Online Digital Contract Signing in Mistrusted Parities
1826. Online Aventure
1827. Online Shopping
1828. News Ticker Project
1829. Net Bank in Recharge
1830. Multi User Public Auditing System of Data Storage Security
1831. Multi Location Networked Mobile Auto Intimates
1832. Modern Distributed Business Applications for Supply Chain Management
1833. Market Intelligence Based Public Sentiment Analysis
1834. Leave Management System
1835. Joint processing of spatial keyword queries
1836. Intelligence Missing Items in Shopping Cart
1837. Information Leak Detection and Prevention
1838. Industrial Manpower Resource Organizer
1839. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1840. Human Expertise Search Engine
1841. Home appliances online Purchase
1842. High Secure Corporate Web Search Engine
1843. High Degree Patient Privacy on Secure Data Outsourcing
1844. Group Movement Pattern Discovery
1845. Graph Based Share Market Data Updating
1846. Generic Business Portal
1847. Flight Booking Portal
1848. Firewall using Packet Filtering
1849. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1850. Ethical and Social issues in File sharing system
1851. Enterprener Sales Report Management
1852. Encyclopedia for Computer Science
1853. Employee Based Performance Monitoring and Action Systems
1854. Emerging Patient Health Information Exchange System On Cloud
1855. Efficient Search on Outsourced data using Cloud
1856. Efficient and Secure Data Processing on Queries Similarity
1857. Distributed Database Optimization on HealthCare
1858. Digital Asset Management Systems (DAMS) Using Watermarking
1859. Detecting Fraud on Vehicle Insurance System
1860. Defeating Lazy Servers Database Vs Query Access Assurance
1861. Data Processing for Disease-Treatment Relations
1862. Data Mining Analysis on EB bill system
1863. Data confidential against untrusted servers using attribute-based encryption (ABE)
1864. Data Aggregation using SQL clustering
1865. Customer Sales Analysis System Based On Purchasing
1866. Cryptography on Personal confidential information
1867. Cost Based Secure Cloud Data Systems
1868. Market Based Analysis for consumer correct decision
1869. Construction Company Work Order System
1870. Complete Medical Transcription System(Mts)
1871. Company Security Reporting System(CSRS)
1872. College Result Analysis
1873. Cloud Economic Benefit On Scientific Computing
1874. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1875. Centralized Event Planer across Social Media Sites
1876. Call Center Management
1877. A Reservation-Based Coordination Protocol for Web Services
1878. Building construction and cost estimation
1879. Budget Planner
1880. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1881. Automatically identifying query groups on Web Search Engine
1882. Auditing Data integrity and data storage using cloud
1883. Application layer blocker for preventing on cyber security
1884. Advanced One-Click User Web Search Engine
1885. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1886. VALUE ADDED TAX (VAT)
1887. User Oriented Network Attacks
1888. Secure Back Up
1889. Screen Capture And Mouse I/O
1890. Sales Bill Printing System using Excel
1891. Password Security
1892. Online User Mobile Rating
1893. Online Sensex Graph System
1894. Online Book Publishing
1895. NEWS TICKER PROJECT
1896. Multi Storage file
1897. Message Chating
1898. Medical Equipment in WAP
1899. Login Authentication Scheme
1900. Information Alert System
1901. Image Encryption And Decryption
1902. Generic Business Portal
1903. Flight Booking Portal
1904. File Transfer using Cryptography Techniques
1905. File Splitting
1906. Excel Format in Report
1907. EB Management System
1908. Dynamic Web Form Creation
1909. Android Image Search


Struts Application Projects
Struts Apps
1910. Public Sentiment Analysis with Online Shopping Using Struts
1911. Modern distributed business for supply-chain management
1912. High Confidential Personal Disease Reporting System
1913. Distributor Sensitive Data Management Using Struts
1914. Development of Certificate Authority Services for Web Applications
1915. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1916. Website Tracking System
1917. Website Ranking System
1918. Treasure Warehouse
1919. Student Information System
1920. Storage security
1921. PRISON MANAGEMENT SYSTEM
1922. E-Licence Investigation System
1923. Online Secure File Transfer System
1924. Online Medicine Purchase
1925. ONLINE EDUCATION
1926. Online Agriculture System
1927. Mobile Survey
1928. ISSUE TRACKING SYSYTEM
1929. HOSPITAL MANAGEMENT SYSYTEMS
1930. HealthCare Management System
1931. Global Employee Acclaimer
1932. E-VOTING FOR ASSOCIATION
1933. Encrypted Register Form
1934. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1935. E INSURANCE
1936. Courier Tracking Systems
1937. corporate Transportation
1938. Collectorate Communication Systems
1939. Budget Approval System
1940. BLOOD BANK MANAGEMENT SYSTEMS
1941. ATTENDANCE MANAGEMENT SYSTEM
1942. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1943. Sponsor For Agriculture
1944. Agriculture Assist
1945. Agriculture Marketing in Generation
1946. International Plant Import and Export
MODERN EDUCATION SYSTEM
1947. Old In Gold
1948. I School
1949. College Placement And Events
1950. Rural Area Educational Trouble Shooter
1951. Web Direct Recruitment Analysis
1952. Online Aquarum
1953. School Automation System
1954. Secure Online Course Automation
1955. Session Management System in It Industry
1956. Tools for Non IT Expert Developer
1957. Students Skills With Modern Industries
MODERN TECHNOLOGY
1958. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1959. Customer Favarate Greeting Card Design
1960. GPS Transport Packers and Movers
1961. House Hold Appliancies Warranty Management
1962. Direct Q Less Reservation System in train
1963. Power Consumption Monitoring House Hold Electronic Device
1964. Apartment Maintenance
1965. Budget Home Design
1966. Online Buy And Sale Software
1967. Online Softskills Tracks
1968. Gps Consumers Complients
1969. Economic Usage of Solar Energy
Advance Health Care System
1970. Organizing medical camp for public health development
1971. LIVE WEB DOCTOR CONSULTATION
1972. World Wide Cloud Inter Hospital Acess Health Care System
1973. MAC Sensing Protocol
1974. Medical Record Authentication
1975. Raw Requried Online Medicine
1976. Consumer Legal Advicer
1977. Homeopathy Health Record
SPORTS
1978. Play Ground Booking
1979. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1980. Cloud Storage Public Digital Certificate
ERP PROJECTS
1981. Corporate Trouble Shooter
1982. Entrepreneur Fault Analysis
1983. Organise Corporate Training For Client Projects
1984. Employment Knowledge Database
1985. GPS Employee Tracking System
1986. Non It People Performance
1987. Performance System Analysis In Industry
1988. Consultanting About the Foreign Peoples
1989. Recommend To Friend
1990. New Company Policy Clearance System
1991. ERP System (Enterprint Resource Plan
1992. Software Requirements Analysis for Client Side
1993. Select Your Age(Business Motivation all age group)
1994. Engnering Lab Maintenance
1995. Corporate Event Organisation
LATEST BANKING
1996. EyeBank Management System
1997. Advanced Banking System
OUR MODERN SOCIETY
1998. Trained Volunteers Create A Successful Social Campaign
1999. Finger thump Based Shopping Cart
2000. Railway Management Service
2001. Create a Successful Anti- Nuclear Campaign
2002. Crowding Funding Mobilization
2003. People Power of India
2004. Pets Care
2005. Feature in Best Potitical Leader in India
2006. Yell Help For Children
2007. Automation Transport Maintance
2008. It Park Media
2009. Online Painting Auction
2010. Election Commission Management
2011. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2012. ANDROID APPS FOR INSURANCE SYSTEM
2013. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2014. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2015. ANDROID APPS FOR DOCTOR APPOINTMENT
2016. LIVE WEB DOCTOR CONSULTATION
2017. ANDROID APPS ON DOCTOR WITH NURSE
2018. HOSPITAL ANDROID APPS
2019. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2020. Fertilizer Management System -Java, JSP, MySQL
2021. Land Bank for Nursery -Java, JSP, MySQL
2022. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2023. FORMER APPS - ANDROID
2024. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2025. Online Banking with Fraud Detecting- Java JSP, MySQL
2026. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2027. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2028. Big Scholarly Data: A Survey
2029. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved