Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
hot IT job skills for 2016-17 BIGDATA mongoDB JAVA IEEE 2016-17 ANDROID IEEE 2016 -17
CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET
ASP.NET MVC Framework IEEE PHP Projects Latest IEEE 2015-2016 Java Projects Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Java Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Java Projects IEEE 2013-2014 Dotnet Projects
IEEE 2012-2013 Java Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Java Project IEEE 2011-2012 Dotnet Projects
ANDROID APPS PHP Application Projects Dotnet Application Projects Java Application Projects
Struts Application Projects Java Mini Projects Dotnet Mini Projects SOFT IDEA FOR DIGITAL SOCIETY
 
hot IT job skills for 2016-17
MEAN: MongoDB, Ember, AngularJS and nodeJS
1. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
2. Big Data, Big Knowledge Big Data for Personalized Healthcare
3. Deduplication on Encrypted Big Data in Cloud
4. Secure Sensitive Data Sharing on a Big Data Platform
5. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
6. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
7. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
8. Self-Healing in Mobile Networks with Big Data
9. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
10. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
11. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
12. Developing Apps for visually imapired people: Lessons learned from social network
13. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
14. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
15. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
16. Design of secure location and message sharing system for android platform
17. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
18. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
19. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
20. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
21. Privacy-Preserving Selective Aggregation of Online User Behavior Data
22. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
23. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
24. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
25. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
26. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
27. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
28. Processing Incomplete k Nearest Neighbor Search
29. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
30. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
31. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
32. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
33. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
34. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
35. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
36. Deduplication on Encrypted Big Data in Cloud
37. Dynamic Resource Allocation for MapReduce with Partitioning Skew
38. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
39. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
40. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
41. Self-Healing in Mobile Networks with Big Data
42. Secure Sensitive Data Sharing on a Big Data Platform
43. Big Data, Big Knowledge: Big Data for Personalized Healthcare
44. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
45. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
46. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
47. Differentially Private Frequent Itemset Mining via Transaction Splitting
48. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
49. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
50. Fast Best-Effort Pattern Matching in Large Attributed Graphs


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
51. Two-Factor Data Security Protection Mechanism for Cloud Storage System
52. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
53. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
54. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
55. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
56. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
57. Where You Are Is Who You Are User Identification by Matching Statistics
58. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
59. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
60. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
61. Online Subgraph Skyline Analysis Over Knowledge Graphs
62. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
63. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
64. ID2S Password-Authenticated Key Exchange Protocols
65. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
66. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
67. Electronic Commerce Meets the Semantic Web
68. Mining High Utility Patterns in One Phase without Generating Candidates
69. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
70. Automatic Generation of Social Event Storyboard from Image Click-through Data
71. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
72. Understanding Deep Representations Learned in Modeling Users Likes
73. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
74. Topic-Oriented Exploratory Search Based on an Indexing Network
75. Relevance Feedback Algorithms Inspired By Quantum Detection
76. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
77. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
78. Efficiently Estimating Statistics of Points of Interests on Maps
79. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
80. Aspect-level Influence Discovery from Graphs
81. Sentiment Embeddings with Applications to Sentiment Analysis
82. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
83. Resolving Multi-party Privacy Conflicts in Social Media
84. Encrypted Data Management with Deduplication in Cloud Computing
85. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
86. Crawling Hidden Objects with kNN Queries
87. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
88. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
89. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
90. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
91. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
92. Nearest Keyword Set Search in Multi-dimensional Datasets
93. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
94. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
95. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
96. Immutable Authentication and Integrity Schemes for Outsourced Databases
97. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
98. Server-Aided Public Key Encryption with Keyword Search
99. Online Learning in Large-Scale Contextual Recommender Systems
100. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
101. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
102. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
103. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
104. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
105. Multi-Modal Event Topic Model for Social Event Analysis
106. Social friend recommendation on multiple network correlation
107. Tag Based Image Search by Social Re-ranking
108. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
109. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
110. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
111. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
112. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
113. Packet-Scale Congestion Control Paradigm


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
114. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
115. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
116. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
117. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
118. Authentication of Smartphone Users Using Behavioral Biometrics
119. An Exploration of Geographic Authentication Schemes
120. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
121. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
122. Distributed secret sharing approach with cheater prevention
123. Distributed secret sharing approach with cheater prevention
124. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
125. Efficient privacy preserving location based query over outsourced encrypted data
126. Utilizing the Cloud to Store Hijacked Camera Images
127. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
128. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
129. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
130. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
131. Enabling privacy preserving location proof for mobile users.
132. Optimizing User Experience in Choosing Android Applications
133. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
134. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
135. FoodForCare: An Android Application for Self-Care with Healthy Food
136. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
137. Silence is Golden: Enhancing Privacy of Location-Based Services
138. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
139. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
140. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
141. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
142. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
143. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
144. Adapting to User Interest Drift for POI Recommendation
145. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
146. Developing Apps for visually imapired people: Lessons learned from social network
147. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
148. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
149. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
150. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
151. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
152. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
153. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
154. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
155. Mobile cloud support for semantic enriched speech recognition in social care
156. Distributing secret sharing approach with cheater prevention based on QR code
157. Design of Secure Location and Message Sharing System for Android Platform
158. The impact of cloud technology on the automation of businesses
159. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
160. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
161. Rescue Management System
162. Android Army - Military Apps
163. Android Beauty Parlor
164. Android E Municipality
165. ANDROID NURSE AID
166. Android Customer Care ANDROID, PHP JSON, MySQL


Dot Net IEEE 2016-17
IEEE Transactions on Computers
167. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
168. TagBook: A Semantic Video Representation without Supervision for Event Detection
169. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
170. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
171. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
172. The Impact of Review Environment on Review Credibility
173. Private Over-threshold Aggregation Protocols over Distributed Datasets
174. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
175. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
176. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
177. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
178. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
179. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
180. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
181. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
182. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
183. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
184. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
185. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
186. What Is Happening in The Video Annotate Video by Sentence
187. Two level QR code for private message sharing and document authentication.
188. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
189. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
190. Mining Health Examination Records A Graph-based Approach
191. A Credibility Analysis System for Assessing Information on Twitter
192. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
193. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
194. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
195. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
196. Generating Query Facets using Knowledge Bases
197. Predicting Personalized Image Emotion Perceptions in Social Networks
198. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
199. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
200. Explaining Missing Answers to Top-k SQL Queries
201. Bilevel Feature Extraction Based Text Mining
202. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
203. Privacy-Preserving Outsourced Media Search
204. Modeling and Verification of Online Shopping Business Processes
205. User Preference Learning for Online Social Recommendation
206. Steganalysis Features for Content-Adaptive JPEG Steganography
207. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
208. PiCode: a New Picture-Embedding 2D Barcode
209. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
210. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
211. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
212. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
213. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
214. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
215. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
216. Cloud workflow scheduling with deadlines and time slot availability
217. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
218. Path-Based Epidemic Spreading in Networks
219. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
220. On the Resiliency of Static Forwarding Tables
221. Network Capability in Localizing Node Failures via End-to-End Path Measurements
222. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
223. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
224. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
225. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
226. A Forecasting Methodology for Workload Forecasting in Cloud Systems
227. Optimal Shipping Strategy and Return Service Charge Under No-Reason
228. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
229. A Recommendation System to Facilitate Business Process Modeling
230. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
231. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
232. User Differentiated Verifiable File Search on the Cloud
233. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
234. Statistical Features Based Real-time Detection of Drifted Twitter Spam
235. Privacy-Preserving Selective Aggregation of Online User Behavior Data
236. Incremental Consolidation of Data-Intensive Multi-flows
237. Service Pattern: An Integrated Business Process Model for Modern Service Industry
238. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
239. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
240. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
241. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
242. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
243. Towards Effective Bug Triage with Software Data Reduction Techniques
244. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
245. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
246. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
247. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
248. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
249. Proof of retrievability with public verifiability resilient against related-key attacks
250. Secure Anonymous Key Distribution Scheme for Smart Grid
251. Converses For Secret Key Agreement and Secure Computing
252. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


IEEE PHP Projects
PHP Projects
253. Using Knowledge Libraries to Transfer Expert Knowledge
254. Semantic Retrieval of Trademarks Based on Conceptual Similarity
255. Understanding and Predicting Question Subjectivity in Social Question and Answering
256. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
257. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
258. Fast Top-K Path-based Relevance Query on Massive Graphs
259. Web Image Search Re-ranking with Click-based Similarity and Typicality
260. Automatically Mining Facets for Queries from Their Search Results
261. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
262. Statistical Entity Extraction from Web
263. Question Answering System for an Effective Collaborative Learning
264. Lost in Translation: Improving Decoy Documents via Automated Translation
265. Learn to Personalized Image Search from the Photo Sharing Websites
266. In Tags We Trust Trust modeling in social tagging of multimedia content
267. Efficient Anonymous Message Submission
268. Cryptonite: A Secure and Performant Data Repository on Public Clouds


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
269. Rank-Based Similarity Search: Reducing the Dimensional Dependence
270. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
271. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
272. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
273. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
274. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
275. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
276. On the Security of data access control for multiauthority cloud storage system
277. Trust-based Service Management for Social Internet of Things Systems
278. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
279. Formalization and Verification of Group Behavior Interactions
280. Group Key Agreement with Local Connectivity
281. Data Lineage in Malicious Environments
282. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
283. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
284. Enabling Cloud Storage Auditing with Key-Exposure Resistance
285. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
286. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
287. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
288. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
289. Quantitative Reasoning About Cloud Security Using Service Level Agreements
290. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
291. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
292. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
293. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
294. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
295. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
296. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
297. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
298. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
299. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
300. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
301. Enabling Cloud Storage Auditing with Key-Exposure Resistance
302. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
303. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
304. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
305. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
306. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
307. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
308. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
309. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
310. Secure Auditing and Deduplicating Data in Cloud
311. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
312. Towards reproducibility in online social network Research
313. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
314. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
315. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
316. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
317. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
318. Making Digital Artifacts on the Web Verifiable and Reliable
319. Anonymizing Collections of Tree-Structured Data
320. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
321. FOCS: Fast Overlapped Community Search
322. Sparsity Learning Formulations for Mining Time-Varying Data
323. The Impact of View Histories on Edit Recommendations
324. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
325. Discovery of Ranking Fraud for Mobile Apps
326. Towards Effective Bug Triage with Software Data Reduction Techniques
327. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
328. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
329. Auditing for Distributed Storage Systems
330. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
331. Uploader Intent for Online Video: Typology, Inference and Applications
332. YouTube Video Promotion by Cross-network
333. Semantic-Improved Color Imaging Applications: It Is All About Context
334. Geolocalized Modeling for Dish Recognition
335. Learning to Rank Image Tags with Limited Training Examples
336. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
337. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
338. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
339. Tracking Temporal Community Strength in Dynamic Networks
340. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
341. Towards Information Diffusion in Mobile Social Networks
342. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
343. An Efficient Privacy-Preserving Ranked Keyword Search Method
344. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
345. Dispersing Instant Social Video Service Across Multiple Clouds
346. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
347. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
348. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
349. A Computational Dynamic Trust Model for User Authorization
350. Secure Distributed Deduplication Systems with Improved Reliability
351. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
352. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
353. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
354. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
355. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
356. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
357. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
358. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
359. Hacking is not random: a case-control study of webser ver-compromise risk
360. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
361. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
362. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
363. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
364. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
365. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
366. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
367. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
368. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
369. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
370. Diversifying Web Service Recommendation Results via Exploring Service Usage History
371. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
372. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
373. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
374. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
375. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
376. Cross-Domain Feature Learning in Multimedia
377. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
378. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
379. Saliency-based color accessibility
380. Contextual Online Learning for Multimedia Content Aggregation
381. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
382. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
383. An Attribute-assisted Reranking Model for Web Image Search
384. RRW - A Robust and Reversible Watermarking
385. Steganography Using Reversible Texture Synthesis
386. Single Image Super-Resolution Based on Gradient Profile Sharpness
387. Detection and Rectification of Distorted Fingerprints
388. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
389. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
390. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
391. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
392. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
393. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
394. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
395. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
396. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
397. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
398. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
399. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
400. Authenticated Key Exchange Protocols for Parallel Network File Systems
401. Data Collection in Multi-Application Sharing Wireless Sensor Networks
402. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
403. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
404. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
405. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
406. Optimum Power Allocation in Sensor Networks for Active Radar Applications
407. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
408. Context-based Diversification for Keyword Queries over XML Data
409. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
410. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
411. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
412. Tweet Segmentation and Its Application to Named Entity Recognition
413. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
414. Automatic Group Happiness Intensity Analysis
415. RRW - A Robust and Reversible Watermarking Technique for Relational Data
416. Query Aware Determinization of Uncertain Objects
417. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
418. Leveraging the Tail Time for Saving Energy in Cellular Networks
419. Keylogging-resistant Visual Authentication Protocols
420. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
421. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
422. Preserving Location Privacy in Geo-Social Applications
423. Efficient Authentication for Mobile and Pervasive Computing
424. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
425. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
426. Typicality-Based Collaborative Filtering Recommendation
427. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
428. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
429. Keyword Search Over Probabilistic RDF Graphs
430. Efficient Prediction of Difficult Keyword Queries over Databases
431. Interpreting the Public Sentiment Variations on Twitter
432. An Efficient Recommendation Method for Improving Business Process Modeling
433. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
434. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
435. On the use of Side Information for Mining Text Data
436. Privacy Preserving and Content Protecting Location based Queries
437. Fast Nearest Neighbor Search with Keywords
438. Towards Differential Query Services in Cost-Efficient Clouds
439. Facilitating Document Annotation using Content and Querying Value
440. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
441. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
442. Secure Outsourced Attribute-Based Signatures
443. Supporting Privacy Protection in Personalized Web Search
444. Dealing With Concept Drifts in Process Mining
445. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
446. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
447. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
448. Active Learning of Constraints for Semi-Supervised Clustering
449. Best Keyword Cover Search
450. Personalized Recommendation Combining User Interest and Social Circle
451. Online Feature Selection and Its Applications
452. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
453. Incremental Affinity Propagation Clustering Based on Message Passing
454. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
455. Secure kNN Query Processing in Untrusted Cloud Environments
456. Malware Propagation in Large-Scale Networks
457. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
458. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
459. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
460. Efficient Ranking on Entity Graphs with Personalized Relationships
461. Task Trail: An Effective Segmentation of User Search Behavior
462. Privacy-Preserving Enhanced Collaborative Tagging
463. XSPath Navigation on XML Schemas Made Easy
464. Security Evaluation of Pattern Classifiers under Attack
465. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
466. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
467. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
468. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
469. Nothing is for Free: Security in Searching Shared and Encrypted Data
470. SocialTube: P2P-assisted Video Sharing in Online Social Networks
471. Behavioral Malware Detection in Delay Tolerant Networks
472. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
473. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
474. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
475. Private Searching on Streaming Data Based on Keyword Frequency
476. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
477. On the Security of Trustee-Based Social Authentications
478. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
479. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
480. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
481. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
482. A Two-stage Deanonymization Attack Against Anonymized Social Networks
483. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
484. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
485. Scalable architecture for multi-user encrypted SQL operations on cloud database services
486. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
487. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
488. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
489. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
490. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
491. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
492. Secure kNN Query Processing in Untrusted Cloud Environments
493. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
494. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
495. A Hybrid Cloud Approach for Secure Authorized Deduplication
496. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
497. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
498. A Novel Model for Competition and Cooperation Among Cloud Providers
499. CLOUDQUAL: A Quality Model for Cloud Services
500. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
501. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
502. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
503. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
504. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
505. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
506. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
507. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
508. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
509. Enhanced Security for Association Rule Mining to secure Transactional Databases
510. Operational Pattern Revealing Technique in Text Mining
511. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
512. Personalized web search using Browsing history and domain Knowledge
513. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
514. Data Security the Challenge of Cloud Computing
515. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
516. A Cloud Enviroment for Backup and Data Storage


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
517. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
518. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
519. Efficient Community Formation for Web Services
520. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
521. Secure Mining of Association Rules in Hor izontally Distributed Databases
522. Dynamic Query Forms for Database Queries
523. Secure kNN Query Processing in Untrusted Cloud Environments
524. An Empirical Performance Evaluation of Relational Keyword Search Systems
525. Keyword Query Routing
526. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
527. Demand Bidding Program and Its Application in Hotel Energy Management
528. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
529. Incremental Detection of Inconsistencies in Distributed Data
530. A Cocktail Approach for Travel Package Recommendation
531. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
532. A Random Decision Tree Framework for Privacy-Preserving Data Mining
533. Analysis of Field Data on Web Security Vulnerabilities
534. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
535. A Reliability Improvement Method for SOA-Based Applications
536. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
537. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
538. Web Service Recommendation via Exploiting Location and QoS Information
539. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
540. Exploiting Rateless Codes in Cloud Storage Systems
541. COMIC:Cost Optimization for Internet Content Multihoming
542. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
543. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
544. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
545. Uniform Embedding for Efficient JPEG Steganography
546. Secure Deduplication with Efficient and Reliable Convergent Key Management
547. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
548. Link Quality Aware Code Dissemination in Wireless Sensor Networks
549. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
550. Location Aware Keyword Query Suggestion Based on Document Proximity
551. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
552. A secure data self-destructing scheme in cloud computing
553. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
554. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
555. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
556. Secure kNN Query Processing in Untrusted Cloud Environments
557. Exploiting Rateless Codes in Cloud Storage Systems
558. Fuzzy Authorization for Cloud Storage
559. Planning vs. dynamic control Resource allocation in corporate clouds
560. Automatic Scaling of Internet Applications for Cloud Computing Services
561. Strategy-proof Pricing for Cloud Service Composition
562. Privacy Preserving Delegated Access Control in Public Clouds
563. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
564. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
565. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
566. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
567. A Mechanism Design Approach to Resource Procurement in Cloud Computing
568. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
569. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
570. A Scientometric Analysis of Cloud Computing Literature
571. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
572. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
573. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
574. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
575. FeatureMatch: A General ANNF Estimation Technique and its Applications
576. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
577. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
578. As-Projective-As-Possible Image Stitching with Moving DLT
579. Sharing Visual Secrets in Single Image Random Dot Stereograms
580. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
581. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
582. A New Iterative Triclass Thresholding Technique in Image Segmentation
583. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
584. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
585. An Iranian License Plate Recognition System Based on Color Features
586. Learning Layouts for Single-Page Graphic Designs
587. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
588. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
589. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
590. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
591. Fingerprint Compression Based on Sparse Representation
592. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
593. LBP-Based Edge-Texture Features for Object Recoginition
594. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
595. Toward Experiential Mobile Media Processing
596. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
597. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
598. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
599. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
600. Designing Truthful Spectrum Double Auctions with Local Markets
601. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
602. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
603. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
604. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
605. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
606. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
607. A Study on Clinical Prediction Using Data Mining Techniques
608. Online Payment System using Steganography and Visual Cryptography
609. Efficient Instant-Fuzzy Search with Proximity Ranking
610. Attribute Based Encryption with Privacy Preserving In Clouds
611. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
612. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
613. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
614. User Action Interpretation for Online Content Optimization
615. Spatial Query Integrity with Voronoi Neighbors
616. Spatial Approximate String Search
617. Sensitive Label Privacy Protection on Social Network Data
618. Secure Mining of Association Rules in Horizontally Distributed Databases
619. Secure Logging As a Service Delegating Log Management to the Cloud
620. Robust Module-based Data Management
621. Ranking on Data Manifold with Sink Points
622. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
623. Privacy-Enhanced Web Service Composition
624. Privacy against Aggregate Knowledge Attacks
625. Preventing Private Information Inference Attacks on Social Networks
626. PMSE: A Personalized Mobile Search Engine
627. Personalized QoS-Aware Web Service Recommendation and Visualization
628. Optimal Client-Server Assignment for Internet Distributed Systems
629. Online Search and Buying Behaviour in Consumer Markets
630. M-Privacy for Collaborative Data Publishing
631. Mining User Queries with Markov Chains: Application to Online Image Retrieval
632. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
633. Incentive Compatible Privacy-Preserving Data Analysis
634. Improving Security and Efficiency in Attribute-Based Data Sharing
635. FoCUS: Learning to Crawl Web Forums
636. Fast Nearest Neighbor Search with Keywords
637. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
638. Facilitating Effective User Navigation through Website Structure Improvement
639. Facilitating Document Annotation using Content and Querying Value
640. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
641. Efficient Evaluation of SUM Queries over Probabilistic Data*
642. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
643. Dynamic Query Forms for Database Queries
644. Dynamic Personalized Recommendation on Sparse Data
645. Distributed Strategies for Mining Outliers in Large Data Sets
646. Crowdsourcing Predictors of Behavioral Outcomes
647. Co-Occurrence-Based Diffusion for Expert Search on the Web
648. Comparable Entity Mining from Comparative Questions
649. CloudMoV: Cloud-based Mobile Social TV
650. Anomaly Detection via Online Oversampling Principal Component Analysis
651. Anomaly Detection Approach Using Hidden Markov Model
652. Annotating Search Results from Web Databases
653. A System to Filter Unwanted Messages from OSN User Walls
654. A Survey of XML Tree Patterns
655. A Probabilistic Approach to String Transformation
656. A New Algorithm for Inferring User Search Goals with Feedback Sessions
657. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
658. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
659. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
660. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
661. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
662. Towards Differential Query Services in Cost-Efficient Clouds
663. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
664. SocialTube: P2P-assisted Video Sharing in Online Social Networks
665. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
666. QoS Ranking Prediction for Cloud Services
667. Priority-Based Consolidation of Parallel Workloads in the Cloud
668. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
669. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
670. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
671. Load Rebalancing for Distributed File Systems in Clouds
672. Label-Embedding for Attribute-Based Classification
673. IP-Geolocation Mapping for Moderately Connected Internet Regions
674. Identity-Based Secure Distributed Data Storage Schemes
675. Hint-based Execution of Workloads in Clouds with Nefeli
676. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
677. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
678. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
679. Efficient Two-Server Password-Only Authenticated Key Exchange
680. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
681. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
682. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
683. Winds of Change: From Vendor Lock-In to the Meta Cloud
684. Supporting the Migration of Applications to the Cloud through a Decision Support System
685. Storing Shared Data on the Cloud via Security-Mediator
686. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
687. Privacy-Preserving Public Auditing for Secure Cloud Storage
688. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
689. Outsourcing Privacy-Preserving Social Networks to a Cloud
690. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
691. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
692. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
693. Efficient Security Solution for Privacy-Preserving Cloud Services
694. Collaboration in Multicloud Computing Environments: Framework and Security Issues
695. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
696. Cloud-based DDoS Attacks and Defenses
697. Cloud computing for mobile users can offloading compution save energy
698. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
699. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
700. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
701. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
702. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
703. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
704. Two tales of privacy in online social networks
705. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
706. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
707. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
708. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
709. Security and Privacy-Enhancing Multicloud Architectures
710. Security Using Colors and Armstrong Numbers
711. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
712. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
713. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
714. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
715. Privacy Preserving Data Analytics for Smart Homes
716. On Inference-Proof View Processing of XML Documents
717. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
718. Extracting Spread-Spectrum Hidden Data from Digital Media
719. Efficiently Outsourcing Multiparty Computation under Multiple Keys
720. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
721. Craigslist Scams and Community Composition: Investigating Online Fraud
722. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
723. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
724. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
725. Super-Resolution-based Inpainting
726. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
727. Image Authentication Using Stochastic Diffusion
728. Hierarchical Super-Resolution-Based Inpainting
729. Circular Reranking for Visual Search
730. Bootstrapping Visual Categorization With Relevant Negatives
731. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
732. An extended visual cryptography scheme without pixel expansion for halftone images
733. An Adaptive Cloud Downloading Service
NETWORKING
734. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
735. Topological Conditions for In-Network Stabilization of Dynamical Systems
736. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
737. Price Differentiation for Communication Networks
738. Participatory Privacy: Enabling Privacy in Participatory Sensing
739. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
740. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
741. On the Role of Mobility for Multi-message Gossip
742. Fully Anonymous Profile Matching in Mobile Social Networks
743. Fault Node Recovery Algorithm for a Wireless Sensor Network
744. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
745. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
746. Access Policy Consolidation for Event Processing Systems
747. A Fast Re-Route Method
SOFTWARE ENGINEERING
748. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
749. Vampire attacks: Draining life from wireless ad-hoc sensor networks
750. Towards a Statistical Framework for Source Anonymity in Sensor Networks
751. Search Me If You Can: Privacy-preserving Location Query Service
752. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
753. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
754. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
755. Distributed Cooperative Caching in Social Wireless Networks
756. Community-Aware Opportunistic Routing in Mobile Social Networks
757. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
758. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
759. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
760. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
761. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
762. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
763. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
764. The Target Tracking in Mobile Sensor Networks
765. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
766. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
767. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
768. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
769. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
770. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
771. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
772. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
773. SUSIE: Search Using Services and Information Extraction
774. SeDas: A Self-Destructing Data System Based on Active Storage Framework
775. Secure Mining of Association Rules in Horizontally Distributed Databases
776. Sampling Online Social Networks
777. Privacy Preserving Delegated Access Control in Public Clouds
778. Mining Order-Preserving Submatrices from Data with Repeated Measurements
779. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
780. Ginix : Generalized Inverted Index for Keyword Search
781. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
782. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
783. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
784. Dynamic Query Forms for Database Queries
785. Cost-Based Optimization of Service Compositions
786. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
787. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
788. Automatic Extraction of Top-k Lists from the Web
789. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
790. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
791. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
792. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
793. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
794. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
795. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
796. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
797. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
798. Privacy Preserving Data Sharing With Anonymous ID Assignment
799. Non-Cooperative Location Privacy
800. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
801. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
802. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
803. Cloud based emails boundaries and vulnerabilities
804. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
805. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
806. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
807. Optimal Content Downloading in Vehicular Networks
808. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
809. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Java Projects
SECURE COMPUTING
810. The Devils Behind Web Application Vulnerabilities
811. Security Architecture for Cloud Networking
812. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
813. Secure Overlay Cloud Storage with Access Control and Assured Deletion
814. Risk-Aware Mitigation for MANET Routing Attacks
815. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
816. Privacy-preserving Enforcement of Spatially Aware RBAC
817. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
818. pCloud: A Distributed System for Practical PIR
819. Packet-Hiding Methods for Preventing Selective Jamming Attacks
820. Online Modeling of Proactive Moderation System for Auction Fraud Detection
821. Fast and accurate annotation of short texts with Wikipedia pages
822. FADE: Secure Overlay Cloud Storage with File Assured Deletion
823. Ensuring Distributed Accountability for Data Sharing in the Cloud
824. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
825. Direct and Indirect Discrimination Prevention Methods
826. Detecting Spam Zombies by Monitoring Outgoing Messages
827. Detecting Anomalous Insiders in Collaborative Information Systems
828. Data-Provenance Verification For Secure Hosts
829. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
830. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
831. Payments for Outsourced Computations
832. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
833. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
834. Toward Private Joins on Outsourced Data
835. Statistical Entity Extraction from Web
836. Slicing: A New Approach to Privacy Preserving Data Publishing
837. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
838. Resilient Identity Crime Detection
839. Ranking Model Adaptation for Domain-Specific Search
840. Organizing User Search Histories
841. On the Spectral Characterization and Scalable Mining of Network Communities
842. Multiparty Access Control for Online Social Networks: Model and Mechanisms
843. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
844. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
845. How do Facebookers use Friendlists
846. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
847. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
848. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
849. Enabling Multilevel Trust in Privacy Preserving Data Mining
850. Enabling cross-site interactions in social networks
851. Efficient Similarity Search over Encrypted Data
852. Efficient Extended Boolean Retrieval
853. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
854. Efficient Anonymous Message Submission
855. Effective Pattern Discovery for Text Mining
856. DDD: A New Ensemble Approach for Dealing with Concept Drift
857. Credibility Ranking of Tweets during High Impact Events
858. Creating Evolving User Behavior Profiles Automatically
859. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
860. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
861. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
862. Anomaly Detection for Discrete Sequences: A Survey
863. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
864. Advance Mining of Temporal High Utility Itemset
865. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
866. Reliable Re-encryption in Unreliable Clouds
867. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
868. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
869. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
870. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
871. Gossip-based Resource Management for Cloud Environments
872. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
873. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
874. Cloud Data Protection for the Masses
875. Cloud Computing Security: From Single to Multi-Clouds
876. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
877. In Tags We Trust Trust modeling in social tagging of multimedia content
878. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
879. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
880. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
881. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
882. Cut Detection in Wireless Sensor Networks
883. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
884. TrickleDNS: Bootstrapping DNS Security using Social Trust
885. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
886. Policy-by-Example for Online Social Networks
887. Packet Loss Control Using Tokens at the Network Edge
888. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
889. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
890. Independent Directed Acyclic Graphs for Resilient Multipath Routing
891. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
892. Game-Theoretic Pricing for Video Streaming in Mobile Networks
893. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
894. Auditing for Network Coding Storage
895. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
896. Privacy Preserving Cloud Data Access With Multi-Authorities
897. Movie Rating and Review Summarization in Mobile Environment
898. IDSaaS: Intrusion Detection System as a Service in Public Clouds
899. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
900. BibPro: A Citation Parser Based on Sequence Alignment Techniques
901. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
902. View-invariant action recognition based on Artificial Neural Networks
903. User-aware Image Tag Refinement via Ternary Semantic Analysis
904. Separable Reversible Data Hiding in Encrypted Image
905. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
906. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
907. Robust Face-Name Graph Matching for Movie Character Identification
908. IntentSearch:Capturing User Intention for One-Click Internet Image Search
909. Improving Color Constancy by Photometric Edge Weighting
910. Exploring the design space of social network-based Sybil defenses
911. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
912. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
913. AnnoSearch: Image Auto-Annotation by Search
914. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
915. Scalable Scheduling of Updates in Streaming Data Warehouses
916. Scalable Learning of Collective Behavior
917. Ranking Model Adaptation for Domain-Specific Search
918. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
919. Outsourced Similarity Search on Metric Data Assets
920. Organizing User Search Histories
921. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
922. Mining Web Graphs for Recommendations
923. Joint Top K Spatial Keyword Query Processing
924. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
925. Identifying Content for Planned Events Across Social Media Sites
926. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
927. Generative Models for Item Adoptions Using Social Correlation
928. Efficient Data Mining for XML Queries Answering Support
929. Efficient audit service outsourcing for data integrity in clouds
930. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
931. Effective Pattern Discovery for Text Mining
932. Combined Mining: Discovering Informative Knowledge in Complex Data
933. Decentralized Probabilistic Text Clustering
934. Computing Structural Statistics by Keywords in Databases
935. Bridging Social and Data Networks
936. Answering General Time-Sensitive Queries
937. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
938. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
939. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
940. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
941. Resource-Aware Application State Monitoring
942. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
943. Query Access Assurance in Outsourced Databases
944. Linear and Differential Cryptanalysis
945. Expert Discovery and Interactions in Mixed Service-Oriented Systems
946. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
947. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
948. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
949. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
950. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
951. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
952. ROAuth: Recommendation Based Open Authorization
953. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
954. Recommendation Models for Open Authorization
955. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
956. Packet-Hiding Methods for Preventing Selective Jamming Attacks
957. On Privacy of Encrypted Speech Communications
958. OAuth Web Authorization Protocol
959. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
960. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
961. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
962. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
963. Fast Matrix Embedding by Matrix Extending
964. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
965. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
966. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
967. Access control for online social networks third party applications
SOFTWARE ENGINEERING
968. Measuring Code Quality to Improve Specification Mining
969. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
970. Towards Secure and Dependable Storage Services in Cloud Computing
971. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
972. Remote Display Solutions for Mobile Cloud Computing
973. Privacy Preserving Delegated Access Control in Public Clouds
974. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
975. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
976. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
977. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
978. Load-Balancing Multipath Switching System with Flow Slice
979. Assessing the Veracity of Identity Assertions via OSNs
980. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
981. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
982. A New Cell-Counting-Based Attack Against Tor
983. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
984. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
985. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
986. Network Assisted Mobile Computing with Optimal Uplink Query Processing
987. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
988. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
989. Fast Release Capture Sampling in Large-Scale Sensor Networks
990. Cooperative download in vehicular environments
991. Cooperative Data Dissemination via Roadside WLANs
992. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
993. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
994. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
995. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
996. Hiding Sensitive Association Rule for Privacy Preservation
997. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
998. Development of Certificate Authority Services for Web Applications
999. Detecting and Validating Sybil Groups in theWild
1000. Association Rule Extracting Knowledge Using Market Basket Analysis
1001. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1002. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1003. RITAS: Services for Randomized Intrusion Tolerance
1004. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1005. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1006. Modeling and Detection of Camouflaging Worm
1007. Coding for Cryptographic Security Enhancement using Stopping Sets
1008. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1009. Wireless Sensor Network Security model using Zero Knowledge Protocol
1010. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1011. Throughput Optimization in Mobile Backbone Networks
1012. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1013. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1014. Fast Data Collection in Tree-Based Wireless Sensor Networks
1015. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1016. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1017. SPAF: Stateless FSA-based Packet Filters
1018. Selfish Overlay Network Creation and Maintenance
1019. ProgME: Towards Programmable Network MEasurement
1020. Locating Equivalent Servants over P2P Networks
1021. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1022. Buffer Sizing for 802.11 Based Networks
1023. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1024. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1025. Improving Utilization of Infrastructure Clouds
1026. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1027. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1028. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1029. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1030. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1031. Ranking Spatial Data by Quality Preferences
1032. Making Aggregation Work in Uncertain and Probabilistic Databases
1033. Load Shedding in Mobile Systems with MobiQual
1034. Group Enclosing Queries
1035. Extended XML Tree Pattern Matching: Theories and Algorithms
1036. Effective Navigation of Query Results Based on Concept Hierarchies
1037. Discovering Conditional Functional Dependencies
1038. Decision Trees for Uncertain Data
1039. Data Leakage Detection
1040. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


IEEE 2011-2012 Dotnet Projects
NETWORKING
1041. Valuable Detours: Least-Cost Anypath Routing
1042. Self-Reconfigurable Wireless Mesh Networks
1043. Reliability in Layered Networks with Random Link Failures
1044. NABS:Novel Approaches for Biometric Systems
1045. Live Streaming with Receiver-based Peer-division Multiplexing
1046. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1047. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1048. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1049. Virtualized Screen: A Third Element for CloudMobile Convergence
1050. Steganographic Embedding in JPEG Images with Visual Criterion
1051. On the Typical Statistic Features for Image Blind Steganalysis
1052. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1053. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1054. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1055. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1056. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1057. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1058. Vulnerability Analysis in SOA-Based Business Processes
1059. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1060. Service-Centric Framework for a Digital Government Application
1061. Server-Side Streaming Processing of WS-Security
1062. OWLPath: An OWL Ontology-Guided Query Editor
1063. Monitoring Service Systems from a Language-Action Perspective
1064. Extracting Product Features and Sentiments from Chinese Customer Reviews
1065. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1066. Automated Certification for Compliant Cloud-based Business Processes
1067. Addressing Dependability throughout the SOA Life Cycle
1068. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1069. The Geometric Efficient Matching Algorithm for Firewalls
1070. Secure Service-Oriented Architecture for Mobile Transactions
1071. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1072. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1073. Privacy-Preserving Updates to Anonymous and Confidential Databases
1074. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1075. IPAS: Implicit Password Authentication System
1076. Improving Security and Performance in the Tor Network through Tunable Path Selection
1077. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1078. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1079. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1080. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1081. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1082. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1083. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1084. Data Delivery Properties of Human Contact Networks
1085. Converge-Cast: On the Capacity and Delay Tradeoffs
1086. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1087. USHER: Improving Data Quality with Dynamic Forms
1088. The World in a Nutshell: Concise Range Queries
1089. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1090. Scalable Scheduling of Updates in Streaming Data Warehouses
1091. Scalable Learning of Collective Behavior
1092. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1093. Publishing Search Logs A Comparative Study of Privacy Guarantees
1094. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1095. Optimal Service Pricing for a Cloud Cache
1096. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1097. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1098. Mining Web Graphs for Recommendations
1099. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1100. Integration of Sound Signature Authentication System
1101. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1102. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1103. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1104. Exploring Application-Level Semantics for Data Compression
1105. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1106. Data Leakage Detection
1107. Cost-aware rank join with random and sorted access
1108. Collaborative Filtering with Personalized Skylines
1109. Bridging Socially-Enhanced Virtual Communities
1110. Automatic Discovery of Personal Name Aliases from the Web
1111. A Personalized Ontology Model for Web Information Gathering
1112. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1113. A Query Formulation Language for the Data Web
1114. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1115. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1116. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1117. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1118. Towards Secure and Dependable Storage Services in Cloud Computing
1119. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1120. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1121. Data Integrity Proofs in Cloud Storage
1122. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1123. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1124. Feature-level Sentiment Analysis for Chinese Product Reviews
1125. Equal-sized Cells Mean Equal-sized Packets in Tor?
1126. Customer Relationship Management Based on Data Mining Technique
1127. Authentication Schemes for Session Passwords using Color and Images
1128. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


ANDROID APPS
ERP PROEJCT
1129. GPS Employee Tracking System
OUR MODERN SOCITY
1130. Pets Care
ONLINE CONSUMERS PROCESSING
1131. House Hold Appliancies Warranty Management
1132. GPS Transport Packers and Movers
Android Apps
1133. FACULTY RATING SYSTEM
1134. App for self organizer
1135. ONLINE DOCTOR APPOINTMENT
1136. ONLINE VEHICLE SHOWROOM SYSTEMS
1137. Conference Event Mobile Assistant
1138. Mobile Prescription
1139. Metastore Application
1140. Android SmartCampus
1141. Android Shopping Mall
1142. TOLL GATE -Barcode Billing System --ANDROID
1143. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1144. Taste Hunt For Restaurants
1145. POLICE APPS
1146. Android Blood Bank
1147. Mobile Expense Claim System Android
1148. Android Intelligent Time Tracking System TICK
1149. Android Course and Attendance Management System
1150. Android Event Reminder
1151. Android Attendance Assessment
1152. Android Advance Shopping
1153. Android CAR POOLING
1154. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1155. Android HOSPITAL
1156. ATHLETE MEET GUIDE
1157. Android Apps PARKING MANAGER
1158. Love and Care
1159. Food Waste Management System
1160. Travel Guide
1161. Android Provisional Store
1162. Best Baby Care with Vaccines Remainder
1163. Android Assist for Lecturer and Student
1164. Android Personal Assistance (PA)
1165. Android Application for College Management System
1166. Tollgate Payment system in android
1167. Intelligence Quotient (IQ) Test
1168. GPS LOCATION ALARM SYSTEM
1169. Location Based Intelligent Mobile Organizer
1170. BANK ACCOUNT TRACKER FOR ANDROID
1171. UNIT CONVERTER
1172. Tips and Tax Calculator in Android
1173. TEXT EDITOR FOR ANDROID
1174. Student Attendance Tracking System
1175. Smart Money With Daily Expenses
1176. Simple And Secure Android TO DO List Application
1177. Restaurant Table Order Management System
1178. Online Shopping
1179. Online Examination System For Android
1180. ANDROID SHOPPING LOCATION IDENTIFIER
1181. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1182. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1183. MICRO CREDIT BANKING ON SMARTPHONE
1184. LOCATION BASED ALARM
1185. Insurance in android
1186. GOOGLE PLACE FINDER
1187. Friend Mapper on Mobiles - Friend Locator
1188. EXPENSE MANAGER
1189. Employee Diractory
1190. Online job search
1191. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1192. ANDROID STUDENT RESULT ANALYZING SYSTEM
1193. CloudMoV : Cloud-based Mobile Social TV
1194. Bus Reservation
1195. Budget Planner
1196. Android SMS Systems
1197. ANDROID LEAVE MANAGEMENT SYSTEM
1198. ANDROID EVENT SCHEDULER/REMINDER
1199. Android Grocery Shopping List
1200. Android Attack Application
1201. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1202. A Mobile Phone Based Medicine In-take Reminder and Monitor


PHP Application Projects
ERP PROJECTS
1203. Employment Knowledge Database
1204. Organise Corporate Training For Client Project s
1205. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1206. Online Voting
1207. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1208. Secure Online Course Automation
1209. School Automation System
1210. Online Aquarum
1211. Web Direct Recruitment Analysis
PHP Apps
1212. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1213. TRADE / INDUSTRY WEB PORTAL
1214. Feeding the poor from the supermarket
1215. Application for recording your goals and habits
1216. VISUAL WAY TO RAISE AWARENESS
1217. Municipal Corporation
1218. Online Polling For Publishers And Brands
1219. Avoid Food Wastage
1220. Web Doctor
1221. ONLINE FOOD ORDERING SYSTEM
1222. E-Tendering
1223. Improving Rural Communities
1224. Green Planet Awarness
1225. Development of an Online Course Portal for a campus
1226. Auxon Test
1227. WEB BASED LEARNING SYSTEM
1228. Tagging in online social networks
1229. Secured file Downloading system
1230. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1231. searching a image from websites
1232. Online University
1233. Online product Opinion and Ranking System
1234. MNC LEAVE MANAGEMENT SYSTEM
1235. Home appliances online purchase
1236. Freelancer Job
1237. E-Tutor Online Jobs
1238. Statistical Entity Extraction from Web
1239. Effective Collaborative Learning
1240. Development of an e-Post Office System
1241. Question Answering System for an Effective Collaborative Learning


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1242. Online Trends Management Service in It Industry
1243. Session Management System in It Industry
1244. Tools for Non IT Expert Developer
ERP PROJECTS
1245. New Company Policy Clearance System
1246. Recommend To Friend
1247. Consultanting About the Foreign Peoples
1248. Performance System Analysis In Industry
1249. Non It People Performance
MODERN AGRICULTURE
1250. Agriculture Marketing in Generation
1251. Agriculture Assist
1252. Sponsor For Agriculture
SPORTS
1253. Play Ground Booking
OUR MODERN SOCITY
1254. Railway Management Service
1255. It Park Media
1256. Automation Transport Maintance
1257. Yell Help For Children
1258. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1259. Apartment Maintenance
1260. Power Consumption Monitoring House Hold Electronic Device
1261. Direct Q Less Reservation System in train
Advance Health Care System
1262. MAC Sensing Protocol
1263. World Wide Cloud Inter Hospital Acess Health Care System
1264. Live Doctor
Dotnet Apps
1265. TELEVISION CHANNEL PROGRAM MANAGEMENT
1266. WIN THE TRUST OF AN INDIAN CONSUMER
1267. ONLINE ACCOUNT MANAGEMENT
1268. SMART CAB BOOKING SYSTEM
1269. ONLINE FAST FOOD ORDER
1270. Travel Mate Add Module
1271. Work Order System Call Centre
1272. SPORTS MANAGEMENT SYSTEM
1273. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1274. Pick-It Courier Service
1275. Online Taxi Booking
1276. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1277. INCOMETAX MAINTAINANCE SYSTEM
1278. Hotel Reservation
1279. ERP System
1280. Bug Tracking System
1281. Vendor Information System For Shiping
1282. Top-K ranking System
1283. Secure Medical Image Archive System
1284. Business Activity Coordination Using Web Services
1285. Management Portal
1286. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1287. Secure Data Filtering Recommendation System
1288. Online Resources Sharing via Social Networks
1289. Secure self-destructing in Cloud Computing
1290. Web Resourecs File Authorization Management
1291. Click based image re-ranking system
1292. Tree Structure Data Analiysis Mining
1293. Web Resource Allocation for CorPerate
1294. Web Vulnerabilities and Security
1295. Fuzzy Cloud Search Using XML
1296. Cloud Data Supporting Secure Query Search
1297. Tour Recommender Systems on Web
1298. Distributed Interactive Web Applications
1299. Secure Query Processing for Cloud
1300. Online Data Storage with less pricing
1301. Cost Based Web Content Managemnts
1302. Web Hospital Management
1303. Online Data storage with low price
1304. Secure Online Data Block Authorization
1305. Profitable Onlin web Server System
1306. Online Economies File Manager for Multi Keying
1307. Online Community Management
1308. Key based Online Data Managements
1309. Critical Workflow Management for Web Documents
1310. Secure Online Documents Managements for Group Sharing
1311. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1312. Online Marketing Automation System
1313. Internal organization change management System
1314. Secure confirmation of sensitive transaction data in modern Internet banking services
1315. Privacy security with TPA in cloud computing
1316. Company Information Tracking System
1317. Online Virtualized screen Processing
1318. Web Service for Airline Management
1319. Web Social Club
1320. Quantum Key Cryptography
1321. Patient Data Management Based On Hospital Location
1322. Online Software Developer Community
1323. Online Developed Software sales
1324. Avoid repeated measurements On Genetics Dataset
1325. College Lab Maintenance System
1326. Industrial Manpower Resource Organizer
1327. Web Query Construction and Search on Complex Data
1328. Hospital Emergency Data Management
1329. Data confidentiality On Health-care Information System
1330. Secure Online Trading
1331. Fast Real-Time Event Alert Using social Network
1332. Secure E-Mail Organizer
1333. Web User Service Management System
1334. Easy SQL Query for Non-IT Manager
1335. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1336. Customer Relationship Management (CRM) on Banking
1337. Online Company ERP System
1338. Constructing E-Tourism
1339. Web based Multi Service Ranking System
1340. Dynamic Customer Data Hiding in Banking
1341. Online Distributed Social Clubs
1342. Virtual Shopping with Negative Feedback Reputation Systems
1343. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1344. Web Service Oriented Query Authentication Technique
1345. Web Based Customer Favorite vehicle Search Engine
1346. Web Based Book Publishing System
1347. Virtual Energy- Based Encryption and Keying
1348. Video Fraud Detecting On social Network
1349. Video Compression with Data hiding & Data Extraction
1350. Vendor Information System for Shipping
1351. VALUE ADDED TAX (VAT)
1352. Universal Smart Card
1353. Ultimate Location Information Systems
1354. Top K Ranking System
1355. Techno Task Manager
1356. Supply Chain Management
1357. Substitution-Permutation cryptanalysis System
1358. Streaming Data Warehouse Updations
1359. Step by Step Monitoring for Product Purchasing System
1360. Steganography for Data Reading and Writing AVI files
1361. SQL TUNER
1362. SMS Transaction Security
1363. Session Authentication Passwords using Color
1364. Service Availability Guarantees on Virtual Economy
1365. Server Fraud Detection on Cloud
1366. Sentence Based Search on Cloud
1367. Semantic Web Search Engines
1368. Secured Image communicator
1369. Secure smart application on web application
1370. Secure Service-Oriented Smartcard systems
1371. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1372. Secure Location Identification System
1373. Secure and Cloud Based Patient Information Systems
1374. Reduce the Password Guessing Attacks using Click Point
1375. Recommendation System Based on Graph
1376. Quantum Key Cryptography
1377. Quality Controller
1378. Public Web Status Monitoring System
1379. Project Trade Pool
1380. Product Marketing Analysis On Public Opinion
1381. Predicting Users Behaviors Using Web Mining
1382. Personal Health Information on M-Healthcare Emergency
1383. Optimum Online Knowledge Base
1384. Online Training Program
1385. Online Time sensitive queries
1386. Online Tag Based Image Retrieval and Effective Management
1387. Online Social networks controls using cloud
1388. Online Rental System
1389. Online product Opinion and Ranking System
1390. Online Dynamic form creation for Non-IT Peoples
1391. Online Digital Contract Signing in Mistrusted Parities
1392. Online Aventure
1393. Online Shopping
1394. News Ticker Project
1395. Net Bank in Recharge
1396. Multi User Public Auditing System of Data Storage Security
1397. Multi Location Networked Mobile Auto Intimates
1398. Modern Distributed Business Applications for Supply Chain Management
1399. Market Intelligence Based Public Sentiment Analysis
1400. Leave Management System
1401. Joint processing of spatial keyword queries
1402. Intelligence Missing Items in Shopping Cart
1403. Information Leak Detection and Prevention
1404. Industrial Manpower Resource Organizer
1405. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1406. Human Expertise Search Engine
1407. Home appliances online Purchase
1408. High Secure Corporate Web Search Engine
1409. High Degree Patient Privacy on Secure Data Outsourcing
1410. Group Movement Pattern Discovery
1411. Graph Based Share Market Data Updating
1412. Generic Business Portal
1413. Flight Booking Portal
1414. Firewall using Packet Filtering
1415. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1416. Ethical and Social issues in File sharing system
1417. Enterprener Sales Report Management
1418. Encyclopedia for Computer Science
1419. Employee Based Performance Monitoring and Action Systems
1420. Emerging Patient Health Information Exchange System On Cloud
1421. Efficient Search on Outsourced data using Cloud
1422. Efficient and Secure Data Processing on Queries Similarity
1423. Distributed Database Optimization on HealthCare
1424. Digital Asset Management Systems (DAMS) Using Watermarking
1425. Detecting Fraud on Vehicle Insurance System
1426. Defeating Lazy Servers Database Vs Query Access Assurance
1427. Data Processing for Disease-Treatment Relations
1428. Data Mining Analysis on EB bill system
1429. Data confidential against untrusted servers using attribute-based encryption (ABE)
1430. Data Aggregation using SQL clustering
1431. Customer Sales Analysis System Based On Purchasing
1432. Cryptography on Personal confidential information
1433. Cost Based Secure Cloud Data Systems
1434. Market Based Analysis for consumer correct decision
1435. Construction Company Work Order System
1436. Complete Medical Transcription System(Mts)
1437. Company Security Reporting System(CSRS)
1438. College Result Analysis
1439. Cloud Economic Benefit On Scientific Computing
1440. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1441. Centralized Event Planer across Social Media Sites
1442. Call Center Management
1443. A Reservation-Based Coordination Protocol for Web Services
1444. Building construction and cost estimation
1445. Budget Planner
1446. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1447. Automatically identifying query groups on Web Search Engine
1448. Auditing Data integrity and data storage using cloud
1449. Application layer blocker for preventing on cyber security
1450. Advanced One-Click User Web Search Engine
1451. Advance Patient Management System


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1452. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1453. International Plant Import and Export
OUR MODERN SOCITY
1454. Finger thump Based Shopping Cart
1455. Finger Print E-Voting Systems
1456. Create a Successful Anti- Nuclear Campaign
1457. Crowding Funding Mobilization
1458. People Power of India
1459. Modern Finger Print Voting System
1460. Election Commission Management
1461. Online Painting Auction
1462. Reality Show Ticket Booking System
1463. Online Broadway Motel Food Ordering System
1464. Fashion Studio Model Management
1465. Women's Selfhelp Group
Advance Health Care System
1466. Homeopathy Health Record
1467. Consumer Legal Advicer
1468. Raw Requried Online Medicine
1469. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1470. I School
1471. Job fair section process
1472. Advertising in E-Book
1473. Students Skills With Modern Industries
1474. College Placement And College Event
1475. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1476. Cloud Storage Public Digital Certificate
ERP PROJECTS
1477. Corporate Trouble Shooter
1478. Corporate Event Organisation
1479. Engnering Lab Maintenance
1480. Select Your Age(Business Motivation all age group)
1481. Software Requirements Analysis for Client Side
1482. ERP System (Enterprint Resource Plan
LATEST BANKING
1483. User Opinion For Indian Banking Service And Cashless Economy
1484. Advanced Banking System
1485. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1486. Economic Usage of Solar Energy
1487. Gps Consumers Complients
1488. Online Softskills Tracks
1489. Online Buy And Sale Software
1490. Budget Home Design
1491. Online Product Exchange
1492. Jewellery Management
1493. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1494. Moderate Robatics System with Public Opinion
Java Apps
1495. Online overview of skills really used in jobs
1496. Land Bank for Nursery
1497. Developing Rural Economy
1498. ECOPS - Electronics Police Record Management System
1499. Website Evaluation Using Opinion Mining
1500. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1501. INSURANCE MANAGEMENT SYSTEM
1502. e-Fraud Prevention based on the Self- Authentication of e-Documents
1503. Hope Center
1504. Exam crazy
1505. BUGS REPORTING SYSTEM
1506. LOCATION BASED CONSUMER COMPLAINT
1507. Speed Racing
1508. ROADSTER
1509. META CAFE
1510. ONLINE VIDEO LOCKER
1511. Management System in Metro Train
1512. Plant Shopping on Web
1513. Reporting Online Media News Systems
1514. Informative Content Extraction
1515. E-commerce Complaint Management System
1516. Modern Agriculture Development System
1517. Loan Online Application
1518. Rural Community Developement
1519. LOVE AND CARE
1520. GREEN PLANT
1521. Advance Couier Service
1522. Community Awarness
1523. E_Music
1524. Staff Management System
1525. E-TENDERING
1526. Hotel Management
1527. Crime File Management System
1528. Cloud Cyber Attack
1529. Cloud Cost Management for Customer Sensitive Data
1530. Advance Web based Multimedia Answer Generation
1531. Commaunity Awareness
1532. E-Commerce Complaints
1533. Modern Agriculture Development System
1534. Plant Shopping on Web
1535. ONLINE VIDEO LOCKER
1536. ONLINE VIDEO LOCKER
1537. Reporting Online Media News Systems
1538. Online Plant Shopping
1539. Community Awareness
1540. Loan Online Application
1541. Modern Agriculture Development System
1542. Online Digital Library
1543. Geo Base Services
1544. Civil Supplies and Consumer Protection Department
1545. Citizen Opinions vs Government Policies
1546. Protecting Used Data Privacy for Attackers
1547. Web Hospital Management
1548. Easy SQL Query for Non-IT Manager
1549. Online Shopping with Fraud detection
1550. Efficient Spatial Query Processing
1551. Cryptographic Key Exchange Authentication
1552. Online Global Information Service Center
1553. Contracts Business Events Management
1554. Online Secure image Social Networks
1555. Outsourcing of Online Image Reconstruction
1556. Trust based Profile Matching Secure Social Network
1557. Secure and Distance based Online Social Network (OSN)
1558. Efficient Online Image Retrieval System
1559. Data Sharing In Cloud Storage by Using Key-Aggregate
1560. Multicast Key Management for Cloud
1561. Face-to-face contact on Mobile Social Networks
1562. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1563. Dynamically Growing Online Survey for Behavioral Outcomes
1564. Advance Web based Multimedia Answer Generation
1565. College Result Analysis with Horizontally Distributed Databases
1566. Feedback Decision Support for mHealth monitoring
1567. Exchange Secrete Key for Data Producers and Consumers
1568. Efficient Information Retrieval Using Ranked Query (EIRQ)
1569. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1570. Web Hosting On Cloud
1571. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1572. Web Server Security with Web Client Management System
1573. Web Parser on Sequence Alignment Techniques
1574. Web Page re-Ranking System for Library
1575. Web Eye
1576. Voting System for Web Library
1577. VIRTUAL CLASSROOM SYSTEM
1578. Unique Web Resources Utilization Monitoring System
1579. Transport Management System
1580. Pre-paid Recharging System on Banking
1581. Tollgate Management
1582. Time To Time Stock Market Updater and Monitoring System
1583. Sql Tuner
1584. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1585. SMS Based Mobile Banking with Security
1586. Sms Topup
1587. Vendor Information System For Shipping
1588. Sequential Anomaly Detection from User Behaviour
1589. Secure SMS Transaction System on banking
1590. Secure Online Documents Management System in Cloud
1591. Secure File Uploading Server with Advance Protecting System
1592. Secure File Monitoring System on Cloud
1593. Relational Logic Search Engine On Healthcare
1594. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1595. Quick Customer decision support on Web Sales Portal
1596. Query Response System for File Management
1597. Quality Visualization on Web TV
1598. Project Work Tracking System
1599. Product Market Manipulations on Asian stock market
1600. Predicting Top Company Share Based on High Utility Data
1601. Automation of Analysis and Development Management
1602. Pharmacy Information System
1603. Personalize Your News on Web
1604. Online University
1605. Online tagging for multimedia content
1606. Online Search Ranking On Multiple Domain
1607. Online Rental House Web Portal
1608. Online Recruitment System
1609. Online Real Estate Property Management
1610. Online Multi Type Documents Search Engine
1611. ONLINE MOBILE BILLING SYSTEM
1612. Online Jewelry Management
1613. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1614. Online Examination System
1615. Online Ensemble Learning Approach
1616. Online Banking With Fraud Detecting
1617. Online Auction Bit
1618. ONLINE ADVERTISING SYSTEM
1619. Nutraceuticals Management System
1620. Nearest Shopping Location Identification Systems
1621. Multilevel Images Authentication Systems
1622. Multi New Product Survey Management
1623. Movie Recommender Systems via User- Item Subgroups
1624. Movie Rating and Recommendation on Mobile
1625. Modern Municipal Corporation
1626. Mobile TV Quality Management
1627. Mobile Banking WAP
1628. Manifold Entrust Scheme
1629. Management System in Train
1630. Secure Mailing System
1631. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1632. LEAVE MANAGEMENT SYSTEM FOR MNC
1633. Knowledge Based Decision Support System(KMS)
1634. Key Management for Content Integration
1635. Inter Bank Fund Transfer in Distributed Network
1636. Information and Knowledge Extracting from a large amount of data
1637. Industry Standard Authorization For Sensitive Resources
1638. Implementation and Validating Environmental and Health
1639. iKnoweb Extracting and Integrating Entity Information System
1640. HUMAN ASSURANCE ADMINISTRATION
1641. High_level network Security Using Packet Filtering
1642. High and Low Level SQL Query Executor
1643. GLOBAL COUNSELLING SYSTEM
1644. A Game Theory for Online Security
1645. Distributed Transaction Proxy
1646. Freelancer Job
1647. File Security With Multi Database System
1648. FILE SEARCH ENGINE
1649. Fertilizer Management System
1650. Fast Web Information Gathering with Alias Detection
1651. E-Tutor Online Jobs
1652. Enterprise Stock and Accounting System
1653. Ensuring Data Storage Security in Cloud Computing
1654. Encrypted IT Auditing on Cloud Computing
1655. Encrypted Data Storage Vs Data Against illegal Access
1656. Enabling Site Interaction In Social Community
1657. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1658. E-Music world
1659. Employee Resource Management
1660. Employee Management System
1661. E-Learning
1662. E Fraud Prevention based on the Self Authentication of e Documents
1663. Distribution System for Discount Sales
1664. Distributed Data Integration on Electricity Board
1665. Disease Information Hiding on Publishing Healthcare Data
1666. Digital Documents Attestation Systems
1667. Defending Against Web Application Vulnerabilities
1668. Defects Analysis Systems
1669. Data theft detection mobile cloud computing
1670. Data Base Fraud Detection Systems
1671. Customer Information Hiding for Data Mismanagement in Banking
1672. Company Security Reporting System(CSRS)
1673. E -Crime File Management System
1674. Credit Card Management System
1675. Corporate Requirement System
1676. Consumer Sales Online Fake Product Detection and Deletion
1677. Company Information Tracking System
1678. Cloud Policy-Based File Assure Deletion
1679. Cloud Data Theft Attacks
1680. Cloud Cyber Attacks against Social Networks
1681. Cloud Cost Management for Customer Sensitive Data
1682. Client Favorite Photo Search Engine on Web
1683. Citizen Card System
1684. Card Management System
1685. Design &Development of Car Parking and Automation Billing Systems
1686. Customer Care Service
1687. BPO Call Center
1688. Automation of IT Process Management
1689. Modeling and Automated Containment of Worms
1690. Attribute Key Based Data Security System
1691. As Needed Basis Accountability for Cloud Data Sharing
1692. Annotation of short texts With Wikipedia pages
1693. AIRLINE RESERVATION SYSTEM
1694. Advance User Management on Social Website
1695. A Semantic Web Based Scientific News Aggregator


Struts Application Projects
Struts Apps
1696. Public Sentiment Analysis with Online Shopping Using Struts
1697. Modern distributed business for supply-chain management
1698. High Confidential Personal Disease Reporting System
1699. Distributor Sensitive Data Management Using Struts
1700. Development of Certificate Authority Services for Web Applications
1701. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1702. Website Tracking System
1703. Website Ranking System
1704. Treasure Warehouse
1705. Student Information System
1706. Storage security
1707. PRISON MANAGEMENT SYSTEM
1708. E-Licence Investigation System
1709. Online Secure File Transfer System
1710. Online Medicine Purchase
1711. ONLINE EDUCATION
1712. Online Agriculture System
1713. Mobile Survey
1714. ISSUE TRACKING SYSYTEM
1715. HOSPITAL MANAGEMENT SYSYTEMS
1716. HealthCare Management System
1717. Global Employee Acclaimer
1718. E-VOTING FOR ASSOCIATION
1719. Encrypted Register Form
1720. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1721. E INSURANCE
1722. Courier Tracking Systems
1723. corporate Transportation
1724. Collectorate Communication Systems
1725. Budget Approval System
1726. BLOOD BANK MANAGEMENT SYSTEMS
1727. ATTENDANCE MANAGEMENT SYSTEM
1728. Activity management


Dotnet Mini Projects
Mini Projects
1729. VALUE ADDED TAX (VAT)
1730. User Oriented Network Attacks
1731. Secure Back Up
1732. Screen Capture And Mouse I/O
1733. Sales Bill Printing System using Excel
1734. Password Security
1735. Online User Mobile Rating
1736. Online Sensex Graph System
1737. Online Book Publishing
1738. NEWS TICKER PROJECT
1739. Multi Storage file
1740. Message Chating
1741. Medical Equipment in WAP
1742. Login Authentication Scheme
1743. Information Alert System
1744. Image Encryption And Decryption
1745. Generic Business Portal
1746. Flight Booking Portal
1747. File Transfer using Cryptography Techniques
1748. File Splitting
1749. Excel Format in Report
1750. EB Management System
1751. Dynamic Web Form Creation
1752. Android Image Search


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1753. Sponsor For Agriculture
1754. Agriculture Assist
1755. Agriculture Marketing in Generation
1756. International Plant Import and Export
MODERN EDUCATION SYSTEM
1757. Old In Gold
1758. I School
1759. College Placement And College Event
1760. Rural Area Educational Trouble Shooter
1761. Web Direct Recruitment Analysis
1762. Online Aquarum
1763. School Automation System
1764. Secure Online Course Automation
1765. Session Management System in It Industry
1766. Tools for Non IT Expert Developer
1767. Students Skills With Modern Industries
MODERN TECHNOLOGY
1768. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1769. Customer Favarate Greeting Card Design
1770. GPS Transport Packers and Movers
1771. House Hold Appliancies Warranty Management
1772. Direct Q Less Reservation System in train
1773. Power Consumption Monitoring House Hold Electronic Device
1774. Apartment Maintenance
1775. Budget Home Design
1776. Online Buy And Sale Software
1777. Online Softskills Tracks
1778. Gps Consumers Complients
1779. Economic Usage of Solar Energy
Advance Health Care System
1780. Live Doctor
1781. World Wide Cloud Inter Hospital Acess Health Care System
1782. MAC Sensing Protocol
1783. Medical Record Authentication
1784. Raw Requried Online Medicine
1785. Consumer Legal Advicer
1786. Homeopathy Health Record
SPORTS
1787. Play Ground Booking
1788. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1789. Cloud Storage Public Digital Certificate
ERP PROJECTS
1790. Corporate Trouble Shooter
1791. Entrepreneur Fault Analysis
1792. Organise Corporate Training For Client Projects
1793. Employment Knowledge Database
1794. GPS Employee Tracking System
1795. Non It People Performance
1796. Performance System Analysis In Industry
1797. Consultanting About the Foreign Peoples
1798. Recommend To Friend
1799. New Company Policy Clearance System
1800. ERP System (Enterprint Resource Plan
1801. Software Requirements Analysis for Client Side
1802. Select Your Age(Business Motivation all age group)
1803. Engnering Lab Maintenance
1804. Corporate Event Organisation
LATEST BANKING
1805. EyeBank Management System
1806. Advanced Banking System
OUR MODERN SOCIETY
1807. Finger thump Based Shopping Cart
1808. Railway Management Service
1809. Create a Successful Anti- Nuclear Campaign
1810. Crowding Funding Mobilization
1811. People Power of India
1812. Pets Care
1813. Feature in Best Potitical Leader in India
1814. Yell Help For Children
1815. Automation Transport Maintance
1816. It Park Media
1817. Online Painting Auction
1818. Election Commission Management
1819. Modern Finger Print Voting System


Call us : 09566137117 / 8144137117
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved