Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) PYTHON APPLICATION PROJECTS JAVA IEEE LATEST
LATEST PROJECTS UPDATES Internet of things (IoT) -BLOCKCHAIN BLOCK CHAIN TECH - BITCOIN Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PhD Guidance JAVA SPRING AND HIBERNATE JAVA IEEE 2016-17 IEEE 2014-2015 Java Projects
Latest IEEE 2015-2016 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project
Java Application Projects Java Mini Projects NEW TECHNOLOGY-HELP VIDEO R - DATA SCIENCE - ML
WEKA-Machine Learning BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB
ANDROID APPS IEEE ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP
ANDROID APPS COLLEGE MINI PROJECTS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework Dot Net IEEE 2017-18 ANGULAR JS ,
RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects SOFT IDEA FOR DIGITAL SOCIETY
INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS
RESTful Web services
 
PYTHON PROJECT - IEEE
MORE PYTHON IEEE
1. Leveraging Unlabelled Data for Emotion Recognition with Enhanced Collaborative Semi-Supervised
2. Education data Analysis and Predict of Performance using Machine Learning
3. Design of QR Code based Mall Shopping Guide System
4. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
5. Sentiment Lexicon
6. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
7. Personalized Recommendation of Social Images by Constructing a User Interest
8. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
9. Opinion Mining using Ontological Spam Detection
10. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
11. Phishing Web Sites Features Classification
12. using data mining to predict hospital admissions from the emergency department
13. Correlated Matrix Factorization for Recommendation with Implicit Feedback
14. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
15. Blue Eyes Technology-identifies human emotions (sad, happy, Angry or surprised
16. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
17. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
18. Iris Recognition
19. Currency Recognition System
PYTHON TRAINING WITH PROJECT
20. Privacy Characterization and Quantification in Data Publishing
21. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
22. Opinion Mining using Ontological Spam Detection
23. Predicting the top-N popular videos via cross-domain hybrid model
24. Fraquent itemsets mining with differential privacy over large scale data
25. Phishing Web Sites Features Classification
26. Dynamic Facet Ordering for Faceted Product Search Engines
27. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
28. Machine Learning and Deep Learning Methods for Cybersecurity
29. Linear Regression Algorithm Predict the volution of Community in Future
30. A User-Centric Machine Learning Framework for Cyber Security Operations Center
31. Linear Regression Algorithm
32. A Machine Learning Approach to Routing
33. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
34. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
35. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
36. CYBER SECURITY
37. Automatic Sentiment Detection in Naturalistic Audio
38. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
39. Student Performance Analysis - PYTHON
40. E-assessment using image processing in ∞Exams
41. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
42. NLP - NATURAL LANGUAGE PROCESSING
43. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
44. Image Based Appraisal of Real Estate Properties-IEEE 2017
45. FOOD WASTE ORGANIZER
46. PYTHON PROJECT FLOW
47. PYTHON PROGRAM EXECUTION
48. PYTHON INSTALLATION
PYTHON APPLICATION
49. Fake News Analysis using Machine Learning - ML
50. Brain Tumor Detection Image Segmentation Using OpenCV
51. Road Accident Analysis Using Machine Learning
52. Inferring Salient Objects from Human Fixations
53. ROTOSCOPING APPEARANCE MODELS
54. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
55. Consumer Attitudes towards Insurance Products
56. Organic Food
57. BOOK RECOMMENDATION SYSTEM PYTHON
58. Web Scraping Using PYTHON
59. MULTIMEDIA CONTENT PROTECTION
60. Student Performance Analysis - PYTHON
61. HOTEL MANAGEMENT
62. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Reinforcement Learning
Unsupervised Learning
63. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
64. Event Management With Analysis - Python
Supervised Learning
65. Leveraging Unlabelled Data for Emotion Recognition with Enhanced Collaborative Semi-Supervised
66. Education data Analysis and Predict of Performance using Machine Learning
67. Design of QR Code based Mall Shopping Guide System
68. Blue Eyes Technology -identifies human emotions (sad, happy, Angry or surprised
69. Fake News Analysis using Machine Learning - ML
70. Road Accident Analysis Using Machine Learning
71. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
72. ROTOSCOPING APPEARANCE MODELS
73. Inferring Salient Objects from Human Fixations
74. Privacy Data Mess-apps
75. Speech Recognition in Social Care - NLP
76. Text-to-Speech (TTS)- NLP
77. Voice Scheduler - NLP
78. VOICE SEARCH ENGINE - NLP
79. LINEAR REGRESSION - PYTHON
80. LATENT DIRICHLET ALLOCATION
81. DIGITAL IMAGE PROCESSING - PYTHON
82. DECISION TREE LEARNING - ALGORITHM
83. NAIVE BAYES CLASSIFIER
84. K - MEANS CLUSTERING
85. Dengu Data Analysis Using R-program
86. Shopping Data set Analyse Using R Machine Learning
87. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
88. Polynomial Time Algorithm-PTA
89. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
90. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
91. K-Means For Clustering


PYTHON APPLICATION PROJECTS
PYTHON-AI APPLICATION
92. Heart Disease Prediction System
93. Web Scraping Using
94. BOOK RECOMMENDATION SYSTEM PYTHON
95. Road Accident Analysis Using Machine Learning
96. Organic Food
97. Consumer Attitudes towards Insurance Products
98. Brain Tumor Detection Image Segmentation Using OpenCV
99. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
100. ROTOSCOPING APPEARANCE MODELS
101. Inferring Salient Objects from Human Fixations
102. Fake News Analysis using Machine Learning


JAVA IEEE LATEST
IEEE Transactions on Big Data
103. Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective
104. Patient Oriented Framework Using Bigdata
105. Improving Instance Selection Methods for Big Data Classification
106. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
107. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
108. AIR5: Five Pillars of Artificial Intelligence Research
109. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
110. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
111. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
112. Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
113. A Fog-centric Secure Cloud Storage Scheme
114. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
115. Performance Enhancement of Information Retrieval via Artificial Intelligence
116. Crime Pattern Analysis, Visualization And Prediction Using Data Mining
117. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
118. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
119. A Web Service Discovery Approach Based on Common Topic Groups Extraction
120. Dynamic Facet Ordering for Faceted Product Search Engines
121. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
122. Flexible Wildcard Searchable Encryption System
123. QoS Recommendation in Cloud Services
124. Securing Aggregate Queries for DNA Databases
125. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
126. A robust reputation management mechanism in the federated cloud
127. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
128. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
129. A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding
130. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
131. FraudFind Financial Fraud Detection by Analyzing Human Behavior
132. Cancer Disease Prediction Survey Analysis
133. RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope
134. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
135. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
136. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
137. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
138. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
139. Energy-efficient Query Processing in Web Search Engines
140. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
141. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
142. BiRank: Towards Ranking on Bipartite Graphs
143. QoS Recommendation in Cloud Services
144. Public Interest Analysis Based on Implicit Feedback of IPTV Users
145. Search Rank Fraud and Malware Detection in Google Play
146. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
147. Influence Maximization in Trajectory Databases
148. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
149. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
150. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
151. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
152. Computing Semantic Similarity of Concepts in Knowledge Graphs
153. QDA: A Query-Driven Approach to Entity Resolution
154. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
155. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
156. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
157. CONTENT BASED IMAGE RETRIEVAL
158. Identifying At Risk Students for Early Interventions A Time Series Clustering
159. Two Layer Clustering model for Mobile Customer Analysis
160. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
161. Consumer oriented web services ranking and classification
162. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
163. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
164. Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems
165. Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data
166. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
167. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
168. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
169. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
170. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
171. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
172. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
173. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
174. Blockchain for AI
PYTHON - AI
175. Education data Analysis and Predict of Performance using Machine Learning
176. Design of QR Code based Mall Shopping Guide System
177. Blue Eyes Technology which identifies human emotions (sad, happy, Angry or surprised)
178. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
179. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
180. Inferring Salient Objects from Human Fixations
181. ROTOSCOPING APPEARANCE MODELS
182. Event Management With Analysis - Python
183. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
184. Iris Recognition
185. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
186. Object Detection
187. Rainfall Rate Prediction
188. Drug Usage in Social Media
189. SUBWAY PASSENGER FLOW FORECASTING


Internet of things (IoT) -BLOCKCHAIN
IOT Under Developing - Topic
190. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
191. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
192. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
193. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
194. Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality
195. Review of Standard Ontologies for the Web of Things
IoT Projects
196. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
197. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
198. Who Moved My Data? Privacy Protection in Smartphones
199. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
200. IOT Projects
201. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
202. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
203. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
204. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
205. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
206. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
207. Blockchain for AI
208. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PYTHON PROJECT WITH PLACEMENT TRAINING
209. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
210. Fake News Analysis using Machine Learning - ML
211. Brain Tumor Detection Image Segmentation Using OpenCV
212. Blockchain for AI: Review and Open Research Challenges
213. Road Accident Analysis Using Machine Learning
214. E-assessment using image processing in ∞Exams
215. NLP - NATURAL LANGUAGE PROCESSING
216. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
217. Dengu Data Analysis Using R-program
218. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
219. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
220. Big Scholarly Data: A Survey
221. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
222. Big Data, Big Knowledge Big Data for Personalized Healthcare
223. Deduplication on Encrypted Big Data in Cloud
224. Secure Sensitive Data Sharing on a Big Data Platform
225. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
226. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
227. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
228. Self-Healing in Mobile Networks with Big Data
229. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
230. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
231. Child Monitoring - ANDROID APPS
232. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
233. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
234. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
235. Developing Apps for visually imapired people: Lessons learned from social network
236. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
237. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
238. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
239. Design of secure location and message sharing system for android platform
240. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
241. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
242. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
243. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
244. Privacy Protection based Access Control Scheme in Cloud-based Services
245. Privacy-Preserving Selective Aggregation of Online User Behavior Data
246. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
247. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


PhD Guidance
Cyber Security and Privacy
248. Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment
249. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
250. Blockchain for AI
Developing PhD proposal
251. Inferring Salient Objects from Human Fixations
252. ROTOSCOPING APPEARANCE MODELS
253. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
254. Review of Standard Ontologies for the Web of Things
255. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
256. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
257. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
258. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
259. Approximate Data Aggregation in Sensor Equipped IoT Networks
260. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
261. Diabetics Dataset
262. MEDICAL DATA ANALYSES
263. R IEEE PROJECTS
264. PhD Project Guidance
265. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
266. FISHING DISASTER MANAGEMENT SYSTEM
267. SPRING AND HIBERNATE


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
268. Two-Factor Data Security Protection Mechanism for Cloud Storage System
269. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
270. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
271. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
272. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
273. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
274. Where You Are Is Who You Are User Identification by Matching Statistics
275. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
276. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
277. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
278. Online Subgraph Skyline Analysis Over Knowledge Graphs
279. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
280. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
281. ID2S Password-Authenticated Key Exchange Protocols
282. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
283. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
284. Classification model to predict the learners' academic performance using big data
285. Electronic Commerce Meets the Semantic Web
286. Mining High Utility Patterns in One Phase without Generating Candidates
287. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
288. Automatic Generation of Social Event Storyboard from Image Click-through Data
289. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
290. Understanding Deep Representations Learned in Modeling Users Likes
291. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
292. Topic-Oriented Exploratory Search Based on an Indexing Network
293. Relevance Feedback Algorithms Inspired By Quantum Detection
294. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
295. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
296. Efficiently Estimating Statistics of Points of Interests on Maps
297. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
298. Aspect-level Influence Discovery from Graphs
299. Sentiment Embeddings with Applications to Sentiment Analysis
300. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
301. Resolving Multi-party Privacy Conflicts in Social Media
302. Encrypted Data Management with Deduplication in Cloud Computing
303. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
304. Crawling Hidden Objects with kNN Queries
305. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
306. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
307. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
308. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
309. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
310. Nearest Keyword Set Search in Multi-dimensional Datasets
311. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
312. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
313. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
314. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
315. Immutable Authentication and Integrity Schemes for Outsourced Databases
316. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
317. Server-Aided Public Key Encryption with Keyword Search
318. Online Learning in Large-Scale Contextual Recommender Systems
319. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
320. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
321. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
322. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
323. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
324. Multi-Modal Event Topic Model for Social Event Analysis
325. Social friend recommendation on multiple network correlation
326. Tag Based Image Search by Social Re-ranking
327. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
328. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
329. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
330. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
331. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
332. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
333. Packet-Scale Congestion Control Paradigm


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
334. Leveraging the Tail Time for Saving Energy in Cellular Networks
335. Keylogging-resistant Visual Authentication Protocols
336. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
337. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
338. Preserving Location Privacy in Geo-Social Applications
339. Efficient Authentication for Mobile and Pervasive Computing
340. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
341. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
342. Typicality-Based Collaborative Filtering Recommendation
343. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
344. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
345. Keyword Search Over Probabilistic RDF Graphs
346. Efficient Prediction of Difficult Keyword Queries over Databases
347. Interpreting the Public Sentiment Variations on Twitter
348. An Efficient Recommendation Method for Improving Business Process Modeling
349. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
350. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
351. On the use of Side Information for Mining Text Data
352. Privacy Preserving and Content Protecting Location based Queries
353. Fast Nearest Neighbor Search with Keywords
354. Towards Differential Query Services in Cost-Efficient Clouds
355. Facilitating Document Annotation using Content and Querying Value
356. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
357. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
358. Secure Outsourced Attribute-Based Signatures
359. Supporting Privacy Protection in Personalized Web Search
360. Dealing With Concept Drifts in Process Mining
361. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
362. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
363. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
364. Active Learning of Constraints for Semi-Supervised Clustering
365. Best Keyword Cover Search
366. Personalized Recommendation Combining User Interest and Social Circle
367. Online Feature Selection and Its Applications
368. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
369. Incremental Affinity Propagation Clustering Based on Message Passing
370. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
371. Secure kNN Query Processing in Untrusted Cloud Environments
372. Malware Propagation in Large-Scale Networks
373. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
374. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
375. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
376. Efficient Ranking on Entity Graphs with Personalized Relationships
377. Task Trail: An Effective Segmentation of User Search Behavior
378. Privacy-Preserving Enhanced Collaborative Tagging
379. XSPath Navigation on XML Schemas Made Easy
380. Security Evaluation of Pattern Classifiers under Attack
381. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
382. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
383. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
384. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
385. Nothing is for Free: Security in Searching Shared and Encrypted Data
386. SocialTube: P2P-assisted Video Sharing in Online Social Networks
387. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
388. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
389. Behavioral Malware Detection in Delay Tolerant Networks
390. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
391. Private Searching on Streaming Data Based on Keyword Frequency
392. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
393. On the Security of Trustee-Based Social Authentications
394. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
395. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
396. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
397. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
398. A Two-stage Deanonymization Attack Against Anonymized Social Networks
399. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
400. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
401. Scalable architecture for multi-user encrypted SQL operations on cloud database services
402. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
403. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
404. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
405. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
406. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
407. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
408. Secure kNN Query Processing in Untrusted Cloud Environments
409. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
410. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
411. A Hybrid Cloud Approach for Secure Authorized Deduplication
412. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
413. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
414. A Novel Model for Competition and Cooperation Among Cloud Providers
415. CLOUDQUAL: A Quality Model for Cloud Services
416. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
417. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
418. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
419. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
420. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
421. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
422. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
423. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
424. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
425. Enhanced Security for Association Rule Mining to secure Transactional Databases
426. Operational Pattern Revealing Technique in Text Mining
427. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
428. Personalized web search using Browsing history and domain Knowledge
429. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
430. Data Security the Challenge of Cloud Computing
431. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
432. A Cloud Enviroment for Backup and Data Storage


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
433. Rank-Based Similarity Search: Reducing the Dimensional Dependence
434. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
435. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
436. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
437. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
438. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
439. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
440. On the Security of data access control for multiauthority cloud storage system
441. Trust-based Service Management for Social Internet of Things Systems
442. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
443. Formalization and Verification of Group Behavior Interactions
444. Group Key Agreement with Local Connectivity
445. Data Lineage in Malicious Environments
446. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
447. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
448. Enabling Cloud Storage Auditing with Key-Exposure Resistance
449. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
450. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
451. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
452. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
453. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
454. Quantitative Reasoning About Cloud Security Using Service Level Agreements
455. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
456. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
457. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
458. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
459. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
460. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
461. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
462. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
463. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
464. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
465. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
466. Enabling Cloud Storage Auditing with Key-Exposure Resistance
467. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
468. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
469. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
470. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
471. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
472. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
473. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
474. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
475. Secure Auditing and Deduplicating Data in Cloud
476. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
477. Towards reproducibility in online social network Research
478. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
479. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
480. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
481. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
482. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
483. Making Digital Artifacts on the Web Verifiable and Reliable
484. Anonymizing Collections of Tree-Structured Data
485. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
486. FOCS: Fast Overlapped Community Search
487. Sparsity Learning Formulations for Mining Time-Varying Data
488. The Impact of View Histories on Edit Recommendations
489. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
490. Discovery of Ranking Fraud for Mobile Apps
491. Towards Effective Bug Triage with Software Data Reduction Techniques
492. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
493. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
494. Auditing for Distributed Storage Systems
495. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
496. Uploader Intent for Online Video: Typology, Inference and Applications
497. YouTube Video Promotion by Cross-network
498. Semantic-Improved Color Imaging Applications: It Is All About Context
499. Geolocalized Modeling for Dish Recognition
500. Learning to Rank Image Tags with Limited Training Examples
501. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
502. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
503. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
504. Tracking Temporal Community Strength in Dynamic Networks
505. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
506. Towards Information Diffusion in Mobile Social Networks
507. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
508. An Efficient Privacy-Preserving Ranked Keyword Search Method
509. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
510. Dispersing Instant Social Video Service Across Multiple Clouds
511. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
512. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
513. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
514. A Computational Dynamic Trust Model for User Authorization
515. Secure Distributed Deduplication Systems with Improved Reliability
516. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
517. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
518. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
519. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
520. User Action Interpretation for Online Content Optimization
521. Spatial Query Integrity with Voronoi Neighbors
522. Spatial Approximate String Search
523. Sensitive Label Privacy Protection on Social Network Data
524. Secure Mining of Association Rules in Horizontally Distributed Databases
525. Secure Logging As a Service Delegating Log Management to the Cloud
526. Robust Module-based Data Management
527. Ranking on Data Manifold with Sink Points
528. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
529. Privacy-Enhanced Web Service Composition
530. Privacy against Aggregate Knowledge Attacks
531. Preventing Private Information Inference Attacks on Social Networks
532. PMSE: A Personalized Mobile Search Engine
533. Personalized QoS-Aware Web Service Recommendation and Visualization
534. Optimal Client-Server Assignment for Internet Distributed Systems
535. Online Search and Buying Behaviour in Consumer Markets
536. M-Privacy for Collaborative Data Publishing
537. Mining User Queries with Markov Chains: Application to Online Image Retrieval
538. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
539. Incentive Compatible Privacy-Preserving Data Analysis
540. Improving Security and Efficiency in Attribute-Based Data Sharing
541. FoCUS: Learning to Crawl Web Forums
542. Fast Nearest Neighbor Search with Keywords
543. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
544. Facilitating Effective User Navigation through Website Structure Improvement
545. Facilitating Document Annotation using Content and Querying Value
546. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
547. Efficient Evaluation of SUM Queries over Probabilistic Data*
548. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
549. Dynamic Query Forms for Database Queries
550. Dynamic Personalized Recommendation on Sparse Data
551. Distributed Strategies for Mining Outliers in Large Data Sets
552. Crowdsourcing Predictors of Behavioral Outcomes
553. Co-Occurrence-Based Diffusion for Expert Search on the Web
554. Comparable Entity Mining from Comparative Questions
555. CloudMoV: Cloud-based Mobile Social TV
556. Anomaly Detection via Online Oversampling Principal Component Analysis
557. Anomaly Detection Approach Using Hidden Markov Model
558. Annotating Search Results from Web Databases
559. A System to Filter Unwanted Messages from OSN User Walls
560. A Survey of XML Tree Patterns
561. A Probabilistic Approach to String Transformation
562. A New Algorithm for Inferring User Search Goals with Feedback Sessions
563. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
564. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
565. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
566. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
567. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
568. Towards Differential Query Services in Cost-Efficient Clouds
569. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
570. SocialTube: P2P-assisted Video Sharing in Online Social Networks
571. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
572. QoS Ranking Prediction for Cloud Services
573. Priority-Based Consolidation of Parallel Workloads in the Cloud
574. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
575. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
576. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
577. Load Rebalancing for Distributed File Systems in Clouds
578. Label-Embedding for Attribute-Based Classification
579. IP-Geolocation Mapping for Moderately Connected Internet Regions
580. Identity-Based Secure Distributed Data Storage Schemes
581. Hint-based Execution of Workloads in Clouds with Nefeli
582. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
583. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
584. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
585. Efficient Two-Server Password-Only Authenticated Key Exchange
586. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
587. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
588. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
589. Winds of Change: From Vendor Lock-In to the Meta Cloud
590. Supporting the Migration of Applications to the Cloud through a Decision Support System
591. Storing Shared Data on the Cloud via Security-Mediator
592. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
593. Privacy-Preserving Public Auditing for Secure Cloud Storage
594. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
595. Outsourcing Privacy-Preserving Social Networks to a Cloud
596. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
597. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
598. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
599. Efficient Security Solution for Privacy-Preserving Cloud Services
600. Collaboration in Multicloud Computing Environments: Framework and Security Issues
601. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
602. Cloud-based DDoS Attacks and Defenses
603. Cloud computing for mobile users can offloading compution save energy
604. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
605. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
606. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
607. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
608. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
609. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
610. Two tales of privacy in online social networks
611. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
612. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
613. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
614. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
615. Security and Privacy-Enhancing Multicloud Architectures
616. Security Using Colors and Armstrong Numbers
617. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
618. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
619. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
620. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
621. Privacy Preserving Data Analytics for Smart Homes
622. On Inference-Proof View Processing of XML Documents
623. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
624. Extracting Spread-Spectrum Hidden Data from Digital Media
625. Efficiently Outsourcing Multiparty Computation under Multiple Keys
626. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
627. Craigslist Scams and Community Composition: Investigating Online Fraud
628. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
629. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
630. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
631. Super-Resolution-based Inpainting
632. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
633. Image Authentication Using Stochastic Diffusion
634. Hierarchical Super-Resolution-Based Inpainting
635. Circular Reranking for Visual Search
636. Bootstrapping Visual Categorization With Relevant Negatives
637. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
638. An extended visual cryptography scheme without pixel expansion for halftone images
639. An Adaptive Cloud Downloading Service
NETWORKING
640. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
641. Topological Conditions for In-Network Stabilization of Dynamical Systems
642. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
643. Price Differentiation for Communication Networks
644. Participatory Privacy: Enabling Privacy in Participatory Sensing
645. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
646. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
647. On the Role of Mobility for Multi-message Gossip
648. Fully Anonymous Profile Matching in Mobile Social Networks
649. Fault Node Recovery Algorithm for a Wireless Sensor Network
650. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
651. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
652. Access Policy Consolidation for Event Processing Systems
653. A Fast Re-Route Method
SOFTWARE ENGINEERING
654. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
655. Vampire attacks: Draining life from wireless ad-hoc sensor networks
656. Towards a Statistical Framework for Source Anonymity in Sensor Networks
657. Search Me If You Can: Privacy-preserving Location Query Service
658. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
659. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
660. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
661. Distributed Cooperative Caching in Social Wireless Networks
662. Community-Aware Opportunistic Routing in Mobile Social Networks
663. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
664. The Devils Behind Web Application Vulnerabilities
665. Security Architecture for Cloud Networking
666. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
667. Secure Overlay Cloud Storage with Access Control and Assured Deletion
668. Risk-Aware Mitigation for MANET Routing Attacks
669. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
670. Privacy-preserving Enforcement of Spatially Aware RBAC
671. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
672. pCloud: A Distributed System for Practical PIR
673. Packet-Hiding Methods for Preventing Selective Jamming Attacks
674. Online Modeling of Proactive Moderation System for Auction Fraud Detection
675. Fast and accurate annotation of short texts with Wikipedia pages
676. FADE: Secure Overlay Cloud Storage with File Assured Deletion
677. Ensuring Distributed Accountability for Data Sharing in the Cloud
678. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
679. Direct and Indirect Discrimination Prevention Methods
680. Detecting Spam Zombies by Monitoring Outgoing Messages
681. Detecting Anomalous Insiders in Collaborative Information Systems
682. Data-Provenance Verification For Secure Hosts
683. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
684. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
685. Payments for Outsourced Computations
686. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
687. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
688. Toward Private Joins on Outsourced Data
689. Statistical Entity Extraction from Web
690. Slicing: A New Approach to Privacy Preserving Data Publishing
691. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
692. Resilient Identity Crime Detection
693. Ranking Model Adaptation for Domain-Specific Search
694. Organizing User Search Histories
695. On the Spectral Characterization and Scalable Mining of Network Communities
696. Multiparty Access Control for Online Social Networks: Model and Mechanisms
697. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
698. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
699. How do Facebookers use Friendlists
700. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
701. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
702. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
703. Enabling Multilevel Trust in Privacy Preserving Data Mining
704. Enabling cross-site interactions in social networks
705. Efficient Similarity Search over Encrypted Data
706. Efficient Extended Boolean Retrieval
707. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
708. Efficient Anonymous Message Submission
709. Effective Pattern Discovery for Text Mining
710. DDD: A New Ensemble Approach for Dealing with Concept Drift
711. Credibility Ranking of Tweets during High Impact Events
712. Creating Evolving User Behavior Profiles Automatically
713. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
714. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
715. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
716. Anomaly Detection for Discrete Sequences: A Survey
717. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
718. Advance Mining of Temporal High Utility Itemset
719. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
720. Reliable Re-encryption in Unreliable Clouds
721. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
722. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
723. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
724. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
725. Gossip-based Resource Management for Cloud Environments
726. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
727. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
728. Cloud Data Protection for the Masses
729. Cloud Computing Security: From Single to Multi-Clouds
730. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
731. In Tags We Trust Trust modeling in social tagging of multimedia content
732. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
733. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
734. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
735. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
736. Cut Detection in Wireless Sensor Networks
737. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
738. TrickleDNS: Bootstrapping DNS Security using Social Trust
739. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
740. Policy-by-Example for Online Social Networks
741. Packet Loss Control Using Tokens at the Network Edge
742. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
743. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
744. Independent Directed Acyclic Graphs for Resilient Multipath Routing
745. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
746. Game-Theoretic Pricing for Video Streaming in Mobile Networks
747. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
748. Auditing for Network Coding Storage
749. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
750. Privacy Preserving Cloud Data Access With Multi-Authorities
751. Movie Rating and Review Summarization in Mobile Environment
752. IDSaaS: Intrusion Detection System as a Service in Public Clouds
753. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
754. BibPro: A Citation Parser Based on Sequence Alignment Techniques
755. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
756. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
757. RITAS: Services for Randomized Intrusion Tolerance
758. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
759. Nymble: Blocking Misbehaving Users in Anonymizing Networks
760. Modeling and Detection of Camouflaging Worm
761. Coding for Cryptographic Security Enhancement using Stopping Sets
762. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
763. Wireless Sensor Network Security model using Zero Knowledge Protocol
764. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
765. Throughput Optimization in Mobile Backbone Networks
766. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
767. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
768. Fast Data Collection in Tree-Based Wireless Sensor Networks
769. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
770. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
771. SPAF: Stateless FSA-based Packet Filters
772. Selfish Overlay Network Creation and Maintenance
773. ProgME: Towards Programmable Network MEasurement
774. Locating Equivalent Servants over P2P Networks
775. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
776. Buffer Sizing for 802.11 Based Networks
777. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
778. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
779. Improving Utilization of Infrastructure Clouds
780. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
781. CloudTPS: Scalable Transactions for Web Applications in the Cloud
782. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
783. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
784. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
785. Ranking Spatial Data by Quality Preferences
786. Making Aggregation Work in Uncertain and Probabilistic Databases
787. Load Shedding in Mobile Systems with MobiQual
788. Group Enclosing Queries
789. Extended XML Tree Pattern Matching: Theories and Algorithms
790. Effective Navigation of Query Results Based on Concept Hierarchies
791. Discovering Conditional Functional Dependencies
792. Decision Trees for Uncertain Data
793. Data Leakage Detection
794. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
795. Young Talent Tracker
796. Cricket Stadium Seat Booking
MODERN AGRICULTRE
797. i VILLAGE
798. International Plant Import and Export
OUR MODERN SOCITY
799. Helping Hands
800. SMART TAXI BOOKING
801. Metro Rail Corporation
802. Trained Volunteers Create A Successful Social Campaign
803. Finger thump Based Shopping Cart
804. Finger Print E-Voting Systems
805. Create a Successful Anti- Nuclear Campaign
806. Crowding Funding Mobilization
807. People Power of India
808. Modern Finger Print Voting System
809. Election Commission Management
810. Online Painting Auction
811. Reality Show Ticket Booking System
812. Online Broadway Motel Food Ordering System
813. Fashion Studio Model Management
814. Women's Selfhelp Group
Advance Health Care System
815. Gracelife - Charity one click away
816. Medical Reporting System
817. Organizing medical camp for public health development
818. Homeopathy Health Record
819. Consumer Legal Advicer
820. Raw Requried Online Medicine
821. Medical Record Authentication
MORDERN EDUCATION SYSTEM
822. I School
823. Job fair section process
824. Advertising in E-Book
825. Students Skills With Modern Industries
826. College Placement And College Event
827. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
828. Cloud Storage Public Digital Certificate
ERP PROJECTS
829. Customer Relationship Management
830. Corporate Trouble Shooter
831. Corporate Event Organisation
832. Engnering Lab Maintenance
833. Select Your Age(Business Motivation all age group)
834. Software Requirements Analysis for Client Side
835. ERP System (Enterprint Resource Plan
LATEST BANKING
836. User Opinion For Indian Banking Service And Cashless Economy
837. Advanced Banking System
838. EyeBank Management System
ONLINE CONSUMERS PROCESSING
839. Economic Usage of Solar Energy
840. Gps Consumers Complients
841. Online Softskills Tracks
842. Online Buy And Sale Software
843. Budget Home Design
844. Online Product Exchange
845. Jewellery Management
846. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
847. E TENDERING -JAVA
848. Moderate Robatics System with Public Opinion
Java Apps
849. Online overview of skills really used in jobs
850. Land Bank for Nursery
851. Developing Rural Economy
852. ECOPS - Electronics Police Record Management System
853. Website Evaluation Using Opinion Mining
854. Monitoring Suspicious Discussions on Online Forums Using Data Mining
855. INSURANCE MANAGEMENT SYSTEM
856. e-Fraud Prevention based on the Self- Authentication of e-Documents
857. Hope Center
858. Exam crazy
859. BUGS REPORTING SYSTEM
860. LOCATION BASED CONSUMER COMPLAINT
861. Speed Racing
862. ROADSTER
863. META CAFE
864. ONLINE VIDEO LOCKER
865. Management System in Metro Train
866. Plant Shopping on Web
867. Reporting Online Media News Systems
868. Informative Content Extraction
869. E-commerce Complaint Management System
870. Modern Agriculture Development System
871. Loan Online Application
872. Rural Community Developement
873. LOVE AND CARE
874. GREEN PLANT
875. Advance Couier Service
876. Community Awarness
877. E_Music
878. Staff Management System
879. E-TENDERING
880. Hotel Management
881. Crime File Management System
882. Cloud Cyber Attack
883. Cloud Cost Management for Customer Sensitive Data
884. Advance Web based Multimedia Answer Generation
885. Commaunity Awareness
886. E-Commerce Complaints
887. Modern Agriculture Development System
888. Plant Shopping on Web
889. ONLINE VIDEO LOCKER
890. ONLINE VIDEO LOCKER
891. Reporting Online Media News Systems
892. Online Plant Shopping
893. Community Awareness
894. Loan Online Application
895. Modern Agriculture Development System
896. Online Digital Library
897. Geo Base Services
898. Civil Supplies and Consumer Protection Department
899. Citizen Opinions vs Government Policies
900. Protecting Used Data Privacy for Attackers
901. Web Hospital Management
902. Easy SQL Query for Non-IT Manager
903. Online Shopping with Fraud detection
904. Efficient Spatial Query Processing
905. Cryptographic Key Exchange Authentication
906. Online Global Information Service Center
907. Contracts Business Events Management
908. Online Secure image Social Networks
909. Outsourcing of Online Image Reconstruction
910. Trust based Profile Matching Secure Social Network
911. Secure and Distance based Online Social Network (OSN)
912. Efficient Online Image Retrieval System
913. Data Sharing In Cloud Storage by Using Key-Aggregate
914. Multicast Key Management for Cloud
915. Face-to-face contact on Mobile Social Networks
916. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
917. Dynamically Growing Online Survey for Behavioral Outcomes
918. Advance Web based Multimedia Answer Generation
919. College Result Analysis with Horizontally Distributed Databases
920. Feedback Decision Support for mHealth monitoring
921. Exchange Secrete Key for Data Producers and Consumers
922. Efficient Information Retrieval Using Ranked Query (EIRQ)
923. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
924. Web Hosting On Cloud
925. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
926. Web Server Security with Web Client Management System
927. Web Parser on Sequence Alignment Techniques
928. Web Page re-Ranking System for Library
929. Web Eye
930. Voting System for Web Library
931. VIRTUAL CLASSROOM SYSTEM
932. Unique Web Resources Utilization Monitoring System
933. Transport Management System
934. Pre-paid Recharging System on Banking
935. Tollgate Management
936. Time To Time Stock Market Updater and Monitoring System
937. Sql Tuner
938. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
939. SMS Based Mobile Banking with Security
940. Sms Topup
941. Vendor Information System For Shipping
942. Sequential Anomaly Detection from User Behaviour
943. Secure SMS Transaction System on banking
944. Secure Online Documents Management System in Cloud
945. Secure File Uploading Server with Advance Protecting System
946. Secure File Monitoring System on Cloud
947. Relational Logic Search Engine On Healthcare
948. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
949. Quick Customer decision support on Web Sales Portal
950. Query Response System for File Management
951. Quality Visualization on Web TV
952. Project Work Tracking System
953. Product Market Manipulations on Asian stock market
954. Predicting Top Company Share Based on High Utility Data
955. Automation of Analysis and Development Management
956. Pharmacy Information System
957. Personalize Your News on Web
958. Online University
959. Online tagging for multimedia content
960. Online Search Ranking On Multiple Domain
961. Online Rental House Web Portal
962. Online Recruitment System
963. Online Real Estate Property Management
964. Online Multi Type Documents Search Engine
965. ONLINE MOBILE BILLING SYSTEM
966. Online Jewelry Management
967. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
968. Online Examination System
969. Online Ensemble Learning Approach
970. Online Banking With Fraud Detecting
971. Online Auction Bit
972. ONLINE ADVERTISING SYSTEM
973. Nutraceuticals Management System
974. Nearest Shopping Location Identification Systems
975. Multilevel Images Authentication Systems
976. Multi New Product Survey Management
977. Movie Recommender Systems via User- Item Subgroups
978. Movie Rating and Recommendation on Mobile
979. Modern Municipal Corporation
980. Mobile TV Quality Management
981. Mobile Banking WAP
982. Manifold Entrust Scheme
983. Management System in Train
984. Secure Mailing System
985. Location-Based Spatial Query Processing in Wireless Broadcast Environments
986. LEAVE MANAGEMENT SYSTEM FOR MNC
987. Knowledge Based Decision Support System(KMS)
988. Key Management for Content Integration
989. Inter Bank Fund Transfer in Distributed Network
990. Information and Knowledge Extracting from a large amount of data
991. Industry Standard Authorization For Sensitive Resources
992. Implementation and Validating Environmental and Health
993. iKnoweb Extracting and Integrating Entity Information System
994. HUMAN ASSURANCE ADMINISTRATION
995. High_level network Security Using Packet Filtering
996. High and Low Level SQL Query Executor
997. GLOBAL COUNSELLING SYSTEM
998. A Game Theory for Online Security
999. Distributed Transaction Proxy
1000. Freelancer Job
1001. File Security With Multi Database System
1002. FILE SEARCH ENGINE
1003. Fertilizer Management System
1004. Fast Web Information Gathering with Alias Detection
1005. E-Tutor Online Jobs
1006. Enterprise Stock and Accounting System
1007. Ensuring Data Storage Security in Cloud Computing
1008. Encrypted IT Auditing on Cloud Computing
1009. Encrypted Data Storage Vs Data Against illegal Access
1010. Enabling Site Interaction In Social Community
1011. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1012. E-Music world
1013. Employee Resource Management
1014. Employee Management System
1015. E-Learning
1016. E Fraud Prevention based on the Self Authentication of e Documents
1017. Distribution System for Discount Sales
1018. Distributed Data Integration on Electricity Board
1019. Disease Information Hiding on Publishing Healthcare Data
1020. Digital Documents Attestation Systems
1021. Defending Against Web Application Vulnerabilities
1022. Defects Analysis Systems
1023. Data theft detection mobile cloud computing
1024. Data Base Fraud Detection Systems
1025. Customer Information Hiding for Data Mismanagement in Banking
1026. Company Security Reporting System(CSRS)
1027. E -Crime File Management System
1028. Credit Card Management System
1029. Corporate Requirement System
1030. Consumer Sales Online Fake Product Detection and Deletion
1031. Company Information Tracking System
1032. Cloud Policy-Based File Assure Deletion
1033. Cloud Data Theft Attacks
1034. Cloud Cyber Attacks against Social Networks
1035. Cloud Cost Management for Customer Sensitive Data
1036. Client Favorite Photo Search Engine on Web
1037. Citizen Card System
1038. Card Management System
1039. Design &Development of Car Parking and Automation Billing Systems
1040. Customer Care Service
1041. BPO Call Center
1042. Automation of IT Process Management
1043. Modeling and Automated Containment of Worms
1044. Attribute Key Based Data Security System
1045. As Needed Basis Accountability for Cloud Data Sharing
1046. Annotation of short texts With Wikipedia pages
1047. AIRLINE RESERVATION SYSTEM
1048. Advance User Management on Social Website
1049. A Semantic Web Based Scientific News Aggregator


Java Mini Projects
Mini Projects
1050. Website Tracking System
1051. Website Ranking System
1052. Treasure Warehouse
1053. Student Information System
1054. Storage security
1055. PRISON MANAGEMENT SYSTEM
1056. E-Licence Investigation System
1057. Online Secure File Transfer System
1058. Online Medicine Purchase
1059. ONLINE EDUCATION
1060. Online Agriculture System
1061. Mobile Survey
1062. ISSUE TRACKING SYSYTEM
1063. HOSPITAL MANAGEMENT SYSYTEMS
1064. HealthCare Management System
1065. Global Employee Acclaimer
1066. E-VOTING FOR ASSOCIATION
1067. Encrypted Register Form
1068. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1069. E INSURANCE
1070. Courier Tracking Systems
1071. corporate Transportation
1072. Collectorate Communication Systems
1073. Budget Approval System
1074. BLOOD BANK MANAGEMENT SYSTEMS
1075. ATTENDANCE MANAGEMENT SYSTEM
1076. Activity management


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
1077. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
1078. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
1079. NAIVE BAYES CLASSIFIER
1080. K - MEANS CLUSTERING
1081. LINEAR REGRESSION - PYTHON
1082. LATENT DIRICHLET ALLOCATION
1083. DIGITAL IMAGE PROCESSING - PYTHON
1084. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
1085. MACHINE LEARNING-ML ALGORITHM
1086. WHAT IS MACHINE LEARNING - AI
1087. NATURAL LANGAUAGE PROCESSING - NLP
1088. VISION - Visual Data


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
1089. R - ADVANCE IMAGE PROCESSING
1090. Dengu Data Analysis Using R-program
1091. Shopping Data set Analysis Using R Machine Learning
1092. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
1093. R PROGRAM TRAINING
1094. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
1095. COMAPRISON OF VARIOUS DOCKING SCORES
1096. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
1097. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
1098. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
1099. MICRO ARRAY GENE EXPRESSION ANALYSIS
1100. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
1101. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
1102. Diabetics Dataset
1103. Excercise Dataset
1104. MEDICAL DATA ANALYSES
1105. WEKA PRIVACY DATA SET ANALYSES


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
1106. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
1107. MRSIM: Mitigating Reducer Skew In MapReduce
1108. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
1109. HADOOP WITH HEALTHCARE DATA ANALYSYS
1110. HADOOP WEBLOG DATA ANALYSES
1111. BANK DATA ANALYTIC WITH HADOOP
1112. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1113. Bucket Based Data Deduplication Technique for Big Data Storage System
1114. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
1115. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1116. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
1117. Efficient Recommendation of De-identification Policies using MapReduce
1118. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
1119. Big Scholarly Data: A Survey
1120. SocialQ&A: An Online Social Network Based Question and Answer System
1121. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1122. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1123. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
1124. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1125. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1126. User-Centric Similarity Search
1127. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1128. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
1129. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
1130. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
1131. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
1132. Processing Incomplete k Nearest Neighbor Search
1133. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
1134. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
1135. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
1136. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1137. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1138. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1139. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
1140. Deduplication on Encrypted Big Data in Cloud
1141. Dynamic Resource Allocation for MapReduce with Partitioning Skew
1142. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
1143. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1144. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1145. Self-Healing in Mobile Networks with Big Data
1146. Secure Sensitive Data Sharing on a Big Data Platform
1147. Big Data, Big Knowledge: Big Data for Personalized Healthcare
1148. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
1149. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
1150. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1151. Differentially Private Frequent Itemset Mining via Transaction Splitting
1152. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
1153. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
1154. Fast Best-Effort Pattern Matching in Large Attributed Graphs


ANDROID APPS IEEE
IEEE TRANSACTIONS ON BIG DATA
1155. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
1156. BusTracking
1157. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
1158. Who Moved My Data? Privacy Protection in Smartphones
1159. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
1160. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
1161. Android User Privacy Preserving through Crowdsourcing
1162. DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection
1163. Verbal Authentication for Personal Digital Assistants
1164. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
1165. Privacy-Preserving Aggregate Queries for Optimal Location Selection
1166. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
1167. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds
1168. Mobile Attendance using Near Field Communication And One-Time Password
1169. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
1170. Efficient Clue-based Route Search on Road Networks
1171. Privacy-Preserving Location-Proximity for Mobile Apps
1172. Cooperative Query Answer Authentication
1173. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1174. Blood Bank APPS
1175. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
1176. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
1177. ZapDroid: Managing Infrequently Used Applications on Smartphones
1178. Searching Trajectories by Regions of Interest
1179. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
1180. A Classroom Scheduling Service for Smart Classes
1181. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1182. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1183. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1184. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
1185. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1186. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
1187. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1188. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
1189. Authentication of Smartphone Users Using Behavioral Biometrics
1190. An Exploration of Geographic Authentication Schemes
1191. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
1192. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
1193. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
1194. Distributed secret sharing approach with cheater prevention
1195. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
1196. Efficient privacy preserving location based query over outsourced encrypted data
1197. Utilizing the Cloud to Store Hijacked Camera Images
1198. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
1199. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
1200. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
1201. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1202. Enabling privacy preserving location proof for mobile users.
1203. Optimizing User Experience in Choosing Android Applications
1204. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1205. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1206. FoodForCare: An Android Application for Self-Care with Healthy Food
1207. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
1208. Silence is Golden: Enhancing Privacy of Location-Based Services
1209. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
1210. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
1211. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
1212. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
1213. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
1214. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
1215. Adapting to User Interest Drift for POI Recommendation
1216. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
1217. Developing Apps for visually imapired people: Lessons learned from social network
1218. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1219. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1220. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
1221. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
1222. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
1223. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1224. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
1225. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1226. Mobile cloud support for semantic enriched speech recognition in social care
1227. Distributing secret sharing approach with cheater prevention based on QR code
1228. Design of Secure Location and Message Sharing System for Android Platform
1229. The impact of cloud technology on the automation of businesses
1230. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
1231. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
1232. Rescue Management System
1233. Android Army - Military Apps
1234. Android Beauty Parlor
1235. Android E Municipality
1236. ANDROID NURSE AID
1237. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
1238. Human Resource (HR)- APPS
1239. GPS Employee Tracking System
OUR MODERN SOCITY
1240. GENERIC MEDICINE
1241. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
1242. RECYCLE APP WASTE COLLECTION REUSE
1243. Bikes Rental - APPS
1244. Location Based Alarm - GPS
1245. ANDROID APPS FOR INSURANCE SYSTEM
1246. BUDGET HOME DESIGN -ANDROID APPS
1247. Former To Former Apps
1248. Pets Care
ONLINE CONSUMERS PROCESSING
1249. House Hold Appliancies Warranty Management
1250. GPS Transport Packers and Movers
Android Apps
1251. MY LIBRARY
1252. FACULTY RATING SYSTEM
1253. App for self organizer
1254. ONLINE DOCTOR APPOINTMENT
1255. Conference Event Mobile Assistant
1256. Mobile Prescription
1257. Metastore Application
1258. Android SmartCampus
1259. Android Shopping Mall
1260. TOLL GATE -Barcode Billing System --ANDROID
1261. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1262. Taste Hunt For Restaurants
1263. POLICE APPS
1264. Android Blood Bank
1265. Mobile Expense Claim System – Android
1266. Android Intelligent Time Tracking System TICK
1267. Android Course and Attendance Management System
1268. Android Event Reminder
1269. Android Attendance Assessment
1270. Android Advance Shopping
1271. Android CAR POOLING
1272. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1273. Android HOSPITAL
1274. ATHLETE MEET GUIDE
1275. Android Apps PARKING MANAGER
1276. Love and Care
1277. Food Waste Management System
1278. Travel Guide
1279. Android Provisional Store
1280. Best Baby Care with Vaccines Remainder
1281. Android Assist for Lecturer and Student
1282. Android Personal Assistance (PA)
1283. Android Application for College Management System
1284. Tollgate Payment system in android
1285. Intelligence Quotient (IQ) Test
1286. GPS LOCATION ALARM SYSTEM
1287. Location Based Intelligent Mobile Organizer
1288. BANK ACCOUNT TRACKER FOR ANDROID
1289. UNIT CONVERTER
1290. Tips and Tax Calculator in Android
1291. TEXT EDITOR FOR ANDROID
1292. Student Attendance Tracking System
1293. Smart Money With Daily Expenses
1294. Simple And Secure Android TO DO List Application
1295. Restaurant Table Order Management System
1296. Online Shopping
1297. Online Examination System For Android
1298. ANDROID SHOPPING LOCATION IDENTIFIER
1299. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1300. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1301. MICRO CREDIT BANKING ON SMARTPHONE
1302. LOCATION BASED ALARM
1303. Insurance in android
1304. GOOGLE PLACE FINDER
1305. Friend Mapper on Mobiles - Friend Locator
1306. EXPENSE MANAGER
1307. Employee Diractory
1308. Online job search
1309. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1310. ANDROID STUDENT RESULT ANALYZING SYSTEM
1311. CloudMoV : Cloud-based Mobile Social TV
1312. Bus Reservation
1313. Budget Planner
1314. Android SMS Systems
1315. ANDROID LEAVE MANAGEMENT SYSTEM
1316. ANDROID EVENT SCHEDULER/REMINDER
1317. Android Grocery Shopping List
1318. Android Attack Application
1319. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1320. A Mobile Phone Based Medicine In-take Reminder and Monitor


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
1321. HOTEL MANAGEMENT
1322. GYM MANAGEMENT APPLICATION
1323. ONLINE BOOK STORE


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1324. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1325. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
1326. Optimizing Display Advertising Markets
1327. Using Knowledge Libraries to Transfer Expert Knowledge
1328. Semantic Retrieval of Trademarks Based on Conceptual Similarity
1329. Understanding and Predicting Question Subjectivity in Social Question and Answering
1330. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
1331. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
1332. Fast Top-K Path-based Relevance Query on Massive Graphs
1333. Web Image Search Re-ranking with Click-based Similarity and Typicality
1334. Automatically Mining Facets for Queries from Their Search Results
1335. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
1336. Statistical Entity Extraction from Web
1337. Question Answering System for an Effective Collaborative Learning
1338. Lost in Translation: Improving Decoy Documents via Automated Translation
1339. Learn to Personalized Image Search from the Photo Sharing Websites
1340. In Tags We Trust Trust modeling in social tagging of multimedia content
1341. Efficient Anonymous Message Submission
1342. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
1343. Employment Knowledge Database
1344. Organise Corporate Training For Client Project s
1345. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1346. ONLINE VEHICLE SHOWROOM SYSTEMS
1347. Online Voting
1348. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1349. School Management System
1350. Secure Online Course Automation
1351. School Automation System
1352. Online Aquarum
1353. Web Direct Recruitment Analysis
PHP Apps
1354. Project Approval System
1355. Movie Ticket Booking
1356. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1357. TRADE / INDUSTRY WEB PORTAL
1358. Feeding the poor from the supermarket
1359. Application for recording your goals and habits
1360. VISUAL WAY TO RAISE AWARENESS
1361. Municipal Corporation
1362. Online Polling For Publishers And Brands
1363. Avoid Food Wastage
1364. Web Doctor
1365. ONLINE FOOD ORDERING SYSTEM
1366. E-Tendering
1367. Improving Rural Communities
1368. Green Planet Awarness
1369. Development of an Online Course Portal for a campus
1370. Auxon Test
1371. WEB BASED LEARNING SYSTEM
1372. Tagging in online social networks
1373. Secured file Downloading system
1374. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1375. searching a image from websites
1376. Online University
1377. Online product Opinion and Ranking System
1378. MNC LEAVE MANAGEMENT SYSTEM
1379. Home appliances online purchase
1380. Freelancer Job
1381. E-Tutor Online Jobs
1382. Statistical Entity Extraction from Web
1383. Effective Collaborative Learning
1384. Development of an e-Post Office System
1385. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
1386. Towards Effective Bug Triage with Software Data Reduction Techniques
1387. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
1388. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1389. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
1390. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
1391. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
1392. Proof of retrievability with public verifiability resilient against related-key attacks
1393. Secure Anonymous Key Distribution Scheme for Smart Grid
1394. Converses For Secret Key Agreement and Secure Computing
1395. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1396. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1397. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1398. Privacy Protection based Access Control Scheme in Cloud-based Services
1399. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1400. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1401. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1402. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1403. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1404. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1405. Explaining Missing Answers to Top-k SQL Queries
1406. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1407. Continuous Top-k Monitoring on Document Streams
1408. Generating Query Facets using Knowledge Bases
1409. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1410. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1411. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1412. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1413. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1414. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1415. Generating Query Facets using Knowledge Bases
1416. Private Over-threshold Aggregation Protocols over Distributed Datasets
1417. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1418. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1419. Privacy Protection based Access Control Scheme in Cloud-based Services
1420. Dynamic Facet Ordering for Faceted Product Search Engines
1421. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1422. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1423. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1424. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1425. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1426. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1427. A Recommendation System to Facilitate Business Process Modeling
1428. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1429. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1430. User Differentiated Verifiable File Search on the Cloud
1431. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1432. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1433. Incremental Consolidation of Data-Intensive Multi-flows
1434. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1435. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1436. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1437. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1438. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1439. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1440. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1441. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1442. TagBook: A Semantic Video Representation without Supervision for Event Detection
1443. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1444. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1445. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1446. The Impact of Review Environment on Review Credibility
1447. Private Over-threshold Aggregation Protocols over Distributed Datasets
1448. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1449. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1450. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1451. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1452. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1453. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1454. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1455. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1456. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1457. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1458. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1459. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1460. What Is Happening in The Video Annotate Video by Sentence
1461. Two level QR code for private message sharing and document authentication.
1462. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1463. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1464. Mining Health Examination Records A Graph-based Approach
1465. A Credibility Analysis System for Assessing Information on Twitter
1466. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1467. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1468. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1469. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1470. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1471. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1472. Predicting Personalized Image Emotion Perceptions in Social Networks
1473. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1474. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1475. Explaining Missing Answers to Top-k SQL Queries
1476. Bilevel Feature Extraction Based Text Mining
1477. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1478. Privacy-Preserving Outsourced Media Search
1479. Modeling and Verification of Online Shopping Business Processes
1480. User Preference Learning for Online Social Recommendation
1481. Steganalysis Features for Content-Adaptive JPEG Steganography
1482. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1483. PiCode: a New Picture-Embedding 2D Barcode
1484. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1485. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1486. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1487. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1488. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1489. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1490. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1491. Cloud workflow scheduling with deadlines and time slot availability
1492. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1493. Path-Based Epidemic Spreading in Networks
1494. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1495. On the Resiliency of Static Forwarding Tables
1496. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1497. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1498. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1499. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1500. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1501. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1502. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1503. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1504. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1505. Hacking is not random: a case-control study of webser ver-compromise risk
1506. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1507. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1508. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1509. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1510. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1511. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1512. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1513. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1514. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1515. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1516. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1517. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1518. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1519. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1520. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1521. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1522. Cross-Domain Feature Learning in Multimedia
1523. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1524. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1525. Saliency-based color accessibility
1526. Contextual Online Learning for Multimedia Content Aggregation
1527. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1528. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1529. An Attribute-assisted Reranking Model for Web Image Search
1530. RRW - A Robust and Reversible Watermarking
1531. Steganography Using Reversible Texture Synthesis
1532. Single Image Super-Resolution Based on Gradient Profile Sharpness
1533. Detection and Rectification of Distorted Fingerprints
1534. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1535. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1536. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1537. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1538. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1539. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1540. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1541. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1542. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1543. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1544. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1545. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1546. Authenticated Key Exchange Protocols for Parallel Network File Systems
1547. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1548. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1549. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1550. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1551. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1552. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1553. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1554. Context-based Diversification for Keyword Queries over XML Data
1555. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1556. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1557. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1558. Tweet Segmentation and Its Application to Named Entity Recognition
1559. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1560. Automatic Group Happiness Intensity Analysis
1561. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1562. Query Aware Determinization of Uncertain Objects
1563. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1564. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1565. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1566. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1567. Efficient Community Formation for Web Services
1568. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1569. Secure Mining of Association Rules in Hor izontally Distributed Databases
1570. Dynamic Query Forms for Database Queries
1571. Secure kNN Query Processing in Untrusted Cloud Environments
1572. An Empirical Performance Evaluation of Relational Keyword Search Systems
1573. Keyword Query Routing
1574. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1575. Demand Bidding Program and Its Application in Hotel Energy Management
1576. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1577. Incremental Detection of Inconsistencies in Distributed Data
1578. A Cocktail Approach for Travel Package Recommendation
1579. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1580. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1581. Analysis of Field Data on Web Security Vulnerabilities
1582. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1583. A Reliability Improvement Method for SOA-Based Applications
1584. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1585. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1586. Web Service Recommendation via Exploiting Location and QoS Information
1587. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1588. Exploiting Rateless Codes in Cloud Storage Systems
1589. COMIC:Cost Optimization for Internet Content Multihoming
1590. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1591. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1592. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1593. Uniform Embedding for Efficient JPEG Steganography
1594. Secure Deduplication with Efficient and Reliable Convergent Key Management
1595. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1596. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1597. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1598. Location Aware Keyword Query Suggestion Based on Document Proximity
1599. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1600. A secure data self-destructing scheme in cloud computing
1601. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1602. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1603. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1604. Secure kNN Query Processing in Untrusted Cloud Environments
1605. Exploiting Rateless Codes in Cloud Storage Systems
1606. Fuzzy Authorization for Cloud Storage
1607. Planning vs. dynamic control Resource allocation in corporate clouds
1608. Automatic Scaling of Internet Applications for Cloud Computing Services
1609. Strategy-proof Pricing for Cloud Service Composition
1610. Privacy Preserving Delegated Access Control in Public Clouds
1611. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1612. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1613. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1614. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1615. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1616. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1617. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1618. A Scientometric Analysis of Cloud Computing Literature
1619. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1620. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1621. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1622. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1623. FeatureMatch: A General ANNF Estimation Technique and its Applications
1624. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1625. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1626. As-Projective-As-Possible Image Stitching with Moving DLT
1627. Sharing Visual Secrets in Single Image Random Dot Stereograms
1628. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1629. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1630. A New Iterative Triclass Thresholding Technique in Image Segmentation
1631. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1632. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1633. An Iranian License Plate Recognition System Based on Color Features
1634. Learning Layouts for Single-Page Graphic Designs
1635. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1636. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1637. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1638. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1639. Fingerprint Compression Based on Sparse Representation
1640. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1641. LBP-Based Edge-Texture Features for Object Recoginition
1642. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1643. Toward Experiential Mobile Media Processing
1644. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1645. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1646. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1647. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1648. Designing Truthful Spectrum Double Auctions with Local Markets
1649. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1650. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1651. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1652. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1653. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1654. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1655. A Study on Clinical Prediction Using Data Mining Techniques
1656. Online Payment System using Steganography and Visual Cryptography
1657. Efficient Instant-Fuzzy Search with Proximity Ranking
1658. Attribute Based Encryption with Privacy Preserving In Clouds
1659. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1660. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1661. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1662. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1663. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1664. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1665. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1666. The Target Tracking in Mobile Sensor Networks
1667. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1668. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1669. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1670. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1671. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1672. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1673. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1674. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1675. SUSIE: Search Using Services and Information Extraction
1676. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1677. Secure Mining of Association Rules in Horizontally Distributed Databases
1678. Sampling Online Social Networks
1679. Privacy Preserving Delegated Access Control in Public Clouds
1680. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1681. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1682. Ginix : Generalized Inverted Index for Keyword Search
1683. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1684. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1685. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1686. Dynamic Query Forms for Database Queries
1687. Cost-Based Optimization of Service Compositions
1688. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1689. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1690. Automatic Extraction of Top-k Lists from the Web
1691. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1692. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1693. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1694. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1695. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1696. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1697. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1698. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1699. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1700. Privacy Preserving Data Sharing With Anonymous ID Assignment
1701. Non-Cooperative Location Privacy
1702. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1703. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1704. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1705. Cloud based emails boundaries and vulnerabilities
1706. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1707. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1708. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1709. Optimal Content Downloading in Vehicular Networks
1710. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1711. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1712. View-invariant action recognition based on Artificial Neural Networks
1713. User-aware Image Tag Refinement via Ternary Semantic Analysis
1714. Separable Reversible Data Hiding in Encrypted Image
1715. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1716. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1717. Robust Face-Name Graph Matching for Movie Character Identification
1718. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1719. Improving Color Constancy by Photometric Edge Weighting
1720. Exploring the design space of social network-based Sybil defenses
1721. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1722. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1723. AnnoSearch: Image Auto-Annotation by Search
1724. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1725. Scalable Scheduling of Updates in Streaming Data Warehouses
1726. Scalable Learning of Collective Behavior
1727. Ranking Model Adaptation for Domain-Specific Search
1728. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1729. Outsourced Similarity Search on Metric Data Assets
1730. Organizing User Search Histories
1731. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1732. Mining Web Graphs for Recommendations
1733. Joint Top K Spatial Keyword Query Processing
1734. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1735. Identifying Content for Planned Events Across Social Media Sites
1736. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1737. Generative Models for Item Adoptions Using Social Correlation
1738. Efficient Data Mining for XML Queries Answering Support
1739. Efficient audit service outsourcing for data integrity in clouds
1740. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1741. Effective Pattern Discovery for Text Mining
1742. Combined Mining: Discovering Informative Knowledge in Complex Data
1743. Decentralized Probabilistic Text Clustering
1744. Computing Structural Statistics by Keywords in Databases
1745. Bridging Social and Data Networks
1746. Answering General Time-Sensitive Queries
1747. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1748. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1749. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1750. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1751. Resource-Aware Application State Monitoring
1752. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1753. Query Access Assurance in Outsourced Databases
1754. Linear and Differential Cryptanalysis
1755. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1756. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1757. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1758. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1759. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1760. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1761. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1762. ROAuth: Recommendation Based Open Authorization
1763. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1764. Recommendation Models for Open Authorization
1765. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1766. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1767. On Privacy of Encrypted Speech Communications
1768. OAuth Web Authorization Protocol
1769. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1770. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1771. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1772. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1773. Fast Matrix Embedding by Matrix Extending
1774. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1775. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1776. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1777. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1778. Measuring Code Quality to Improve Specification Mining
1779. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1780. Towards Secure and Dependable Storage Services in Cloud Computing
1781. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1782. Remote Display Solutions for Mobile Cloud Computing
1783. Privacy Preserving Delegated Access Control in Public Clouds
1784. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1785. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1786. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1787. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1788. Load-Balancing Multipath Switching System with Flow Slice
1789. Assessing the Veracity of Identity Assertions via OSNs
1790. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1791. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1792. A New Cell-Counting-Based Attack Against Tor
1793. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1794. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1795. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1796. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1797. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1798. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1799. Fast Release Capture Sampling in Large-Scale Sensor Networks
1800. Cooperative download in vehicular environments
1801. Cooperative Data Dissemination via Roadside WLANs
1802. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1803. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1804. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1805. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1806. Hiding Sensitive Association Rule for Privacy Preservation
1807. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1808. Development of Certificate Authority Services for Web Applications
1809. Detecting and Validating Sybil Groups in theWild
1810. Association Rule Extracting Knowledge Using Market Basket Analysis
1811. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1812. Valuable Detours: Least-Cost Anypath Routing
1813. Self-Reconfigurable Wireless Mesh Networks
1814. Reliability in Layered Networks with Random Link Failures
1815. NABS:Novel Approaches for Biometric Systems
1816. Live Streaming with Receiver-based Peer-division Multiplexing
1817. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1818. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1819. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1820. Virtualized Screen: A Third Element for CloudMobile Convergence
1821. Steganographic Embedding in JPEG Images with Visual Criterion
1822. On the Typical Statistic Features for Image Blind Steganalysis
1823. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1824. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1825. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1826. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1827. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1828. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1829. Vulnerability Analysis in SOA-Based Business Processes
1830. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1831. Service-Centric Framework for a Digital Government Application
1832. Server-Side Streaming Processing of WS-Security
1833. OWLPath: An OWL Ontology-Guided Query Editor
1834. Monitoring Service Systems from a Language-Action Perspective
1835. Extracting Product Features and Sentiments from Chinese Customer Reviews
1836. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1837. Automated Certification for Compliant Cloud-based Business Processes
1838. Addressing Dependability throughout the SOA Life Cycle
1839. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1840. The Geometric Efficient Matching Algorithm for Firewalls
1841. Secure Service-Oriented Architecture for Mobile Transactions
1842. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1843. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1844. Privacy-Preserving Updates to Anonymous and Confidential Databases
1845. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1846. IPAS: Implicit Password Authentication System
1847. Improving Security and Performance in the Tor Network through Tunable Path Selection
1848. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1849. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1850. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1851. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1852. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1853. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1854. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1855. Data Delivery Properties of Human Contact Networks
1856. Converge-Cast: On the Capacity and Delay Tradeoffs
1857. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1858. USHER: Improving Data Quality with Dynamic Forms
1859. The World in a Nutshell: Concise Range Queries
1860. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1861. Scalable Scheduling of Updates in Streaming Data Warehouses
1862. Scalable Learning of Collective Behavior
1863. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1864. Publishing Search Logs A Comparative Study of Privacy Guarantees
1865. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1866. Optimal Service Pricing for a Cloud Cache
1867. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1868. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1869. Mining Web Graphs for Recommendations
1870. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1871. Integration of Sound Signature Authentication System
1872. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1873. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1874. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1875. Exploring Application-Level Semantics for Data Compression
1876. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1877. Data Leakage Detection
1878. Cost-aware rank join with random and sorted access
1879. Collaborative Filtering with Personalized Skylines
1880. Bridging Socially-Enhanced Virtual Communities
1881. Automatic Discovery of Personal Name Aliases from the Web
1882. A Personalized Ontology Model for Web Information Gathering
1883. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1884. A Query Formulation Language for the Data Web
1885. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1886. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1887. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1888. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1889. Towards Secure and Dependable Storage Services in Cloud Computing
1890. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1891. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1892. Data Integrity Proofs in Cloud Storage
1893. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1894. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1895. Feature-level Sentiment Analysis for Chinese Product Reviews
1896. Equal-sized Cells Mean Equal-sized Packets in Tor?
1897. Customer Relationship Management Based on Data Mining Technique
1898. Authentication Schemes for Session Passwords using Color and Images
1899. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1900. Online Trends Management Service in It Industry
1901. Session Management System in It Industry
1902. Tools for Non IT Expert Developer
ERP PROJECTS
1903. New Company Policy Clearance System
1904. Recommend To Friend
1905. Consultanting About the Foreign Peoples
1906. Performance System Analysis In Industry
1907. Non It People Performance
MODERN AGRICULTURE
1908. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1909. Agriculture Marketing in Generation
1910. Agriculture Assist
1911. Sponsor For Agriculture
SPORTS
1912. Play Ground Booking
OUR MODERN SOCITY
1913. ADHAR VOTING SYSTEM
1914. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1915. RAILWAY SEAT RESERVATION SYSTEM
1916. Railway Management Service
1917. It Park Media
1918. Automation Transport Maintance
1919. Yell Help For Children
1920. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1921. Apartment Maintenance
1922. Power Consumption Monitoring House Hold Electronic Device
1923. Direct Q Less Reservation System in train
Advance Health Care System
1924. MAC Sensing Protocol
1925. World Wide Cloud Inter Hospital Acess Health Care System
1926. Live Doctor
Dotnet Apps
1927. TELEVISION CHANNEL PROGRAM MANAGEMENT
1928. WIN THE TRUST OF AN INDIAN CONSUMER
1929. ONLINE ACCOUNT MANAGEMENT
1930. SMART CAB BOOKING SYSTEM
1931. ONLINE FAST FOOD ORDER
1932. Travel Mate Add Module
1933. Work Order System Call Centre
1934. SPORTS MANAGEMENT SYSTEM
1935. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1936. Pick-It Courier Service
1937. Online Taxi Booking
1938. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1939. INCOMETAX MAINTAINANCE SYSTEM
1940. Hotel Reservation
1941. ERP System
1942. Bug Tracking System
1943. Vendor Information System For Shiping
1944. Top-K ranking System
1945. Secure Medical Image Archive System
1946. Business Activity Coordination Using Web Services
1947. Management Portal
1948. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1949. Secure Data Filtering Recommendation System
1950. Online Resources Sharing via Social Networks
1951. Secure self-destructing in Cloud Computing
1952. Web Resourecs File Authorization Management
1953. Click based image re-ranking system
1954. Tree Structure Data Analiysis Mining
1955. Web Resource Allocation for CorPerate
1956. Web Vulnerabilities and Security
1957. Fuzzy Cloud Search Using XML
1958. Cloud Data Supporting Secure Query Search
1959. Tour Recommender Systems on Web
1960. Distributed Interactive Web Applications
1961. Secure Query Processing for Cloud
1962. Online Data Storage with less pricing
1963. Cost Based Web Content Managemnts
1964. Web Hospital Management
1965. Online Data storage with low price
1966. Secure Online Data Block Authorization
1967. Profitable Onlin web Server System
1968. Online Economies File Manager for Multi Keying
1969. Online Community Management
1970. Key based Online Data Managements
1971. Critical Workflow Management for Web Documents
1972. Secure Online Documents Managements for Group Sharing
1973. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1974. Online Marketing Automation System
1975. Internal organization change management System
1976. Secure confirmation of sensitive transaction data in modern Internet banking services
1977. Privacy security with TPA in cloud computing
1978. Company Information Tracking System
1979. Online Virtualized screen Processing
1980. Web Service for Airline Management
1981. Web Social Club
1982. Quantum Key Cryptography
1983. Patient Data Management Based On Hospital Location
1984. Online Software Developer Community
1985. Online Developed Software sales
1986. Avoid repeated measurements On Genetics Dataset
1987. College Lab Maintenance System
1988. Industrial Manpower Resource Organizer
1989. Web Query Construction and Search on Complex Data
1990. Hospital Emergency Data Management
1991. Data confidentiality On Health-care Information System
1992. Secure Online Trading
1993. Fast Real-Time Event Alert Using social Network
1994. Secure E-Mail Organizer
1995. Web User Service Management System
1996. Easy SQL Query for Non-IT Manager
1997. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1998. Customer Relationship Management (CRM) on Banking
1999. Online Company ERP System
2000. Constructing E-Tourism
2001. Web based Multi Service Ranking System
2002. Dynamic Customer Data Hiding in Banking
2003. Online Distributed Social Clubs
2004. Virtual Shopping with Negative Feedback Reputation Systems
2005. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
2006. Web Service Oriented Query Authentication Technique
2007. Web Based Customer Favorite vehicle Search Engine
2008. Web Based Book Publishing System
2009. Virtual Energy- Based Encryption and Keying
2010. Video Fraud Detecting On social Network
2011. Video Compression with Data hiding & Data Extraction
2012. Vendor Information System for Shipping
2013. VALUE ADDED TAX (VAT)
2014. Universal Smart Card
2015. Ultimate Location Information Systems
2016. Top K Ranking System
2017. Techno Task Manager
2018. Supply Chain Management
2019. Substitution-Permutation cryptanalysis System
2020. Streaming Data Warehouse Updations
2021. Step by Step Monitoring for Product Purchasing System
2022. Steganography for Data Reading and Writing AVI files
2023. SQL TUNER
2024. SMS Transaction Security
2025. Session Authentication Passwords using Color
2026. Service Availability Guarantees on Virtual Economy
2027. Server Fraud Detection on Cloud
2028. Sentence Based Search on Cloud
2029. Semantic Web Search Engines
2030. Secured Image communicator
2031. Secure smart application on web application
2032. Secure Service-Oriented Smartcard systems
2033. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
2034. Secure Location Identification System
2035. Secure and Cloud Based Patient Information Systems
2036. Reduce the Password Guessing Attacks using Click Point
2037. Recommendation System Based on Graph
2038. Quantum Key Cryptography
2039. Quality Controller
2040. Public Web Status Monitoring System
2041. Project Trade Pool
2042. Product Marketing Analysis On Public Opinion
2043. Predicting Users Behaviors Using Web Mining
2044. Personal Health Information on M-Healthcare Emergency
2045. Optimum Online Knowledge Base
2046. Online Training Program
2047. Online Time sensitive queries
2048. Online Tag Based Image Retrieval and Effective Management
2049. Online Social networks controls using cloud
2050. Online Rental System
2051. Online product Opinion and Ranking System
2052. Online Dynamic form creation for Non-IT Peoples
2053. Online Digital Contract Signing in Mistrusted Parities
2054. Online Aventure
2055. Online Shopping
2056. News Ticker Project
2057. Net Bank in Recharge
2058. Multi User Public Auditing System of Data Storage Security
2059. Multi Location Networked Mobile Auto Intimates
2060. Modern Distributed Business Applications for Supply Chain Management
2061. Market Intelligence Based Public Sentiment Analysis
2062. Leave Management System
2063. Joint processing of spatial keyword queries
2064. Intelligence Missing Items in Shopping Cart
2065. Information Leak Detection and Prevention
2066. Industrial Manpower Resource Organizer
2067. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
2068. Human Expertise Search Engine
2069. Home appliances online Purchase
2070. High Secure Corporate Web Search Engine
2071. High Degree Patient Privacy on Secure Data Outsourcing
2072. Group Movement Pattern Discovery
2073. Graph Based Share Market Data Updating
2074. Generic Business Portal
2075. Flight Booking Portal
2076. Firewall using Packet Filtering
2077. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
2078. Ethical and Social issues in File sharing system
2079. Enterprener Sales Report Management
2080. Encyclopedia for Computer Science
2081. Employee Based Performance Monitoring and Action Systems
2082. Emerging Patient Health Information Exchange System On Cloud
2083. Efficient Search on Outsourced data using Cloud
2084. Efficient and Secure Data Processing on Queries Similarity
2085. Distributed Database Optimization on HealthCare
2086. Digital Asset Management Systems (DAMS) Using Watermarking
2087. Detecting Fraud on Vehicle Insurance System
2088. Defeating Lazy Servers Database Vs Query Access Assurance
2089. Data Processing for Disease-Treatment Relations
2090. Data Mining Analysis on EB bill system
2091. Data confidential against untrusted servers using attribute-based encryption (ABE)
2092. Data Aggregation using SQL clustering
2093. Customer Sales Analysis System Based On Purchasing
2094. Cryptography on Personal confidential information
2095. Cost Based Secure Cloud Data Systems
2096. Market Based Analysis for consumer correct decision
2097. Construction Company Work Order System
2098. Complete Medical Transcription System(Mts)
2099. Company Security Reporting System(CSRS)
2100. College Result Analysis
2101. Cloud Economic Benefit On Scientific Computing
2102. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
2103. Centralized Event Planer across Social Media Sites
2104. Call Center Management
2105. A Reservation-Based Coordination Protocol for Web Services
2106. Building construction and cost estimation
2107. Budget Planner
2108. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
2109. Automatically identifying query groups on Web Search Engine
2110. Auditing Data integrity and data storage using cloud
2111. Application layer blocker for preventing on cyber security
2112. Advanced One-Click User Web Search Engine
2113. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
2114. VALUE ADDED TAX (VAT)
2115. User Oriented Network Attacks
2116. Secure Back Up
2117. Screen Capture And Mouse I/O
2118. Sales Bill Printing System using Excel
2119. Password Security
2120. Online User Mobile Rating
2121. Online Sensex Graph System
2122. Online Book Publishing
2123. NEWS TICKER PROJECT
2124. Multi Storage file
2125. Message Chating
2126. Medical Equipment in WAP
2127. Login Authentication Scheme
2128. Information Alert System
2129. Image Encryption And Decryption
2130. Generic Business Portal
2131. Flight Booking Portal
2132. File Transfer using Cryptography Techniques
2133. File Splitting
2134. Excel Format in Report
2135. EB Management System
2136. Dynamic Web Form Creation
2137. Android Image Search


Struts Application Projects
Struts Apps
2138. Public Sentiment Analysis with Online Shopping Using Struts
2139. Modern distributed business for supply-chain management
2140. High Confidential Personal Disease Reporting System
2141. Distributor Sensitive Data Management Using Struts
2142. Development of Certificate Authority Services for Web Applications
2143. Access Control on User-To-User Interactions in Social Networks


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2144. Sponsor For Agriculture
2145. Agriculture Assist
2146. Agriculture Marketing in Generation
2147. International Plant Import and Export
MODERN EDUCATION SYSTEM
2148. Old In Gold
2149. I School
2150. College Placement And Events
2151. Rural Area Educational Trouble Shooter
2152. Web Direct Recruitment Analysis
2153. Online Aquarum
2154. School Automation System
2155. Secure Online Course Automation
2156. Session Management System in It Industry
2157. Tools for Non IT Expert Developer
2158. Students Skills With Modern Industries
MODERN TECHNOLOGY
2159. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2160. Customer Favarate Greeting Card Design
2161. GPS Transport Packers and Movers
2162. House Hold Appliancies Warranty Management
2163. Direct Q Less Reservation System in train
2164. Power Consumption Monitoring House Hold Electronic Device
2165. Apartment Maintenance
2166. Budget Home Design
2167. Online Buy And Sale Software
2168. Online Softskills Tracks
2169. Gps Consumers Complients
2170. Economic Usage of Solar Energy
Advance Health Care System
2171. Organizing medical camp for public health development
2172. LIVE WEB DOCTOR CONSULTATION
2173. World Wide Cloud Inter Hospital Acess Health Care System
2174. MAC Sensing Protocol
2175. Medical Record Authentication
2176. Raw Requried Online Medicine
2177. Consumer Legal Advicer
2178. Homeopathy Health Record
SPORTS
2179. Play Ground Booking
2180. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2181. Cloud Storage Public Digital Certificate
ERP PROJECTS
2182. Corporate Trouble Shooter
2183. Entrepreneur Fault Analysis
2184. Organise Corporate Training For Client Projects
2185. Employment Knowledge Database
2186. GPS Employee Tracking System
2187. Non It People Performance
2188. Performance System Analysis In Industry
2189. Consultanting About the Foreign Peoples
2190. Recommend To Friend
2191. New Company Policy Clearance System
2192. ERP System (Enterprint Resource Plan
2193. Software Requirements Analysis for Client Side
2194. Select Your Age(Business Motivation all age group)
2195. Engnering Lab Maintenance
2196. Corporate Event Organisation
LATEST BANKING
2197. EyeBank Management System
2198. Advanced Banking System
OUR MODERN SOCIETY
2199. Trained Volunteers Create A Successful Social Campaign
2200. Finger thump Based Shopping Cart
2201. Railway Management Service
2202. Create a Successful Anti- Nuclear Campaign
2203. Crowding Funding Mobilization
2204. People Power of India
2205. Pets Care
2206. Feature in Best Potitical Leader in India
2207. Yell Help For Children
2208. Automation Transport Maintance
2209. It Park Media
2210. Online Painting Auction
2211. Election Commission Management
2212. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2213. ANDROID APPS FOR INSURANCE SYSTEM
2214. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2215. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2216. ANDROID APPS FOR DOCTOR APPOINTMENT
2217. LIVE WEB DOCTOR CONSULTATION
2218. ANDROID APPS ON DOCTOR WITH NURSE
2219. HOSPITAL ANDROID APPS
2220. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2221. Fertilizer Management System -Java, JSP, MySQL
2222. Land Bank for Nursery -Java, JSP, MySQL
2223. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2224. FORMER APPS - ANDROID
2225. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2226. Online Banking with Fraud Detecting- Java JSP, MySQL
2227. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2228. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2229. Big Scholarly Data: A Survey
2230. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Whatsapp : 09566137117
Support : 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved
o