Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) NEW TECHNOLOGY-HELP VIDEO BLOCK CHAIN TECH - BITCOIN
R - DATA SCIENCE - ML WEKA-Machine Learning Internet of things (IoT) BIG DATA - HADOOP PROJECTS
BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB PhD Projects JOBS CONSULTANCY - SOFT SKILLS
JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID
ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework JAVA IEEE LATEST JAVA IEEE 2016-17
Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Dot Net IEEE 2017-18 ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18
RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects
IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Java Application Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects Java Mini Projects
SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS
BANKING PROJECTS RESTful Web services
 
PYTHON PROJECT - IEEE
PYTHON APPLICATION
1. BOOK RECOMMENDATION SYSTEM PYTHON
2. Web Scraping Using PYTHON
3. MULTIMEDIA CONTENT PROTECTION
4. Student Performance Analysis - PYTHON
5. HOTEL MANAGEMENT
6. DATA MINING ON SOCIAL MEDIA SENTIMENT
IMAGE PROCESSING
7. Currency Recognition System
PYTHON TRAINING WITH PROJECT
8. Linear Regression Algorithm Predict the volution of Community in Future
9. A User-Centric Machine Learning Framework for Cyber Security Operations Center
10. Linear Regression Algorithm
11. A Machine Learning Approach to Routing
12. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
13. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
14. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
15. CYBER SECURITY
16. Automatic Sentiment Detection in Naturalistic Audio
17. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
18. Student Performance Analysis - PYTHON
19. E-assessment using image processing in ∞Exams
20. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
21. NLP - NATURAL LANGUAGE PROCESSING
22. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
23. Image Based Appraisal of Real Estate Properties-IEEE 2017
24. FOOD WASTE ORGANIZER
25. PYTHON PROJECT FLOW
26. PYTHON PROGRAM EXECUTION
27. PYTHON INSTALLATION


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
28. Speech Recognition in Social Care - NLP
29. Text-to-Speech (TTS)- NLP
30. Voice Scheduler - NLP
31. VOICE SEARCH ENGINE - NLP
32. LINEAR REGRESSION - PYTHON
33. LATENT DIRICHLET ALLOCATION
34. DIGITAL IMAGE PROCESSING - PYTHON
35. DECISION TREE LEARNING - ALGORITHM
36. NAIVE BAYES CLASSIFIER
37. K - MEANS CLUSTERING
38. Dengu Data Analysis Using R-program
39. Shopping Data set Analyse Using R Machine Learning
40. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
41. Polynomial Time Algorithm-PTA
42. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
43. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
44. K-Means For Clustering


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
45. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
46. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
47. NAIVE BAYES CLASSIFIER
48. K - MEANS CLUSTERING
49. LINEAR REGRESSION - PYTHON
50. LATENT DIRICHLET ALLOCATION
51. DIGITAL IMAGE PROCESSING - PYTHON
52. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
53. MACHINE LEARNING-ML ALGORITHM
54. WHAT IS MACHINE LEARNING - AI
55. NATURAL LANGAUAGE PROCESSING - NLP
56. VISION - Visual Data


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
57. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
58. R - ADVANCE IMAGE PROCESSING
59. Dengu Data Analysis Using R-program
60. Shopping Data set Analysis Using R Machine Learning
61. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
62. R PROGRAM TRAINING
63. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
64. COMAPRISON OF VARIOUS DOCKING SCORES
65. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
66. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
67. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
68. MICRO ARRAY GENE EXPRESSION ANALYSIS
69. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
70. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
71. Diabetics Dataset
72. Excercise Dataset
73. MEDICAL DATA ANALYSES
74. WEKA PRIVACY DATA SET ANALYSES


Internet of things (IoT)
IoT Projects
75. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
76. Who Moved My Data? Privacy Protection in Smartphones
77. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
78. IOT Projects
79. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
80. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
81. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
82. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
83. MRSIM: Mitigating Reducer Skew In MapReduce
84. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
85. HADOOP WITH HEALTHCARE DATA ANALYSYS
86. HADOOP WEBLOG DATA ANALYSES
87. BANK DATA ANALYTIC WITH HADOOP
88. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
89. Bucket Based Data Deduplication Technique for Big Data Storage System
90. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
91. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
92. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
93. Efficient Recommendation of De-identification Policies using MapReduce
94. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
95. Big Scholarly Data: A Survey
96. SocialQ&A: An Online Social Network Based Question and Answer System
97. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
98. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
99. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
100. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
101. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
102. User-Centric Similarity Search
103. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
104. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
105. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
106. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
107. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
108. Processing Incomplete k Nearest Neighbor Search
109. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
110. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
111. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
112. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
113. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
114. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
115. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
116. Deduplication on Encrypted Big Data in Cloud
117. Dynamic Resource Allocation for MapReduce with Partitioning Skew
118. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
119. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
120. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
121. Self-Healing in Mobile Networks with Big Data
122. Secure Sensitive Data Sharing on a Big Data Platform
123. Big Data, Big Knowledge: Big Data for Personalized Healthcare
124. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
125. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
126. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
127. Differentially Private Frequent Itemset Mining via Transaction Splitting
128. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
129. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
130. Fast Best-Effort Pattern Matching in Large Attributed Graphs


PhD Projects
Developing PhD proposal
131. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
132. Diabetics Dataset
133. MEDICAL DATA ANALYSES
134. R IEEE PROJECTS
135. PhD Project Guidance
136. PhD Projects


JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
137. E-assessment using image processing in ∞Exams
138. NLP - NATURAL LANGUAGE PROCESSING
139. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
140. Dengu Data Analysis Using R-program
141. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
142. Big Scholarly Data: A Survey
143. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
144. Big Data, Big Knowledge Big Data for Personalized Healthcare
145. Deduplication on Encrypted Big Data in Cloud
146. Secure Sensitive Data Sharing on a Big Data Platform
147. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
148. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
149. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
150. Self-Healing in Mobile Networks with Big Data
151. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
152. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
153. Child Monitoring - ANDROID APPS
154. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
155. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
156. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
157. Developing Apps for visually imapired people: Lessons learned from social network
158. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
159. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
160. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
161. Design of secure location and message sharing system for android platform
162. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
163. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
164. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
165. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
166. Privacy Protection based Access Control Scheme in Cloud-based Services
167. Privacy-Preserving Selective Aggregation of Online User Behavior Data
168. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
169. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
170. FISHING DISASTER MANAGEMENT SYSTEM
171. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
172. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
173. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
174. Who Moved My Data? Privacy Protection in Smartphones
175. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
176. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
177. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
178. Privacy-Preserving Aggregate Queries for Optimal Location Selection
179. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
180. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
181. Efficient Clue-based Route Search on Road Networks
182. Privacy-Preserving Location-Proximity for Mobile Apps
183. Cooperative Query Answer Authentication
184. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
185. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
186. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
187. ZapDroid: Managing Infrequently Used Applications on Smartphones
188. Searching Trajectories by Regions of Interest
189. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
190. A Classroom Scheduling Service for Smart Classes
191. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
192. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
193. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
194. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
195. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
196. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
197. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
198. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
199. Authentication of Smartphone Users Using Behavioral Biometrics
200. An Exploration of Geographic Authentication Schemes
201. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
202. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
203. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
204. Distributed secret sharing approach with cheater prevention
205. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
206. Efficient privacy preserving location based query over outsourced encrypted data
207. Utilizing the Cloud to Store Hijacked Camera Images
208. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
209. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
210. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
211. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
212. Enabling privacy preserving location proof for mobile users.
213. Optimizing User Experience in Choosing Android Applications
214. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
215. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
216. FoodForCare: An Android Application for Self-Care with Healthy Food
217. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
218. Silence is Golden: Enhancing Privacy of Location-Based Services
219. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
220. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
221. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
222. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
223. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
224. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
225. Adapting to User Interest Drift for POI Recommendation
226. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
227. Developing Apps for visually imapired people: Lessons learned from social network
228. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
229. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
230. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
231. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
232. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
233. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
234. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
235. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
236. Mobile cloud support for semantic enriched speech recognition in social care
237. Distributing secret sharing approach with cheater prevention based on QR code
238. Design of Secure Location and Message Sharing System for Android Platform
239. The impact of cloud technology on the automation of businesses
240. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
241. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
242. Rescue Management System
243. Android Army - Military Apps
244. Android Beauty Parlor
245. Android E Municipality
246. ANDROID NURSE AID
247. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
248. Human Resource (HR)- APPS
249. GPS Employee Tracking System
OUR MODERN SOCITY
250. GENERIC MEDICINE
251. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
252. RECYCLE APP WASTE COLLECTION REUSE
253. Bikes Rental - APPS
254. Location Based Alarm - GPS
255. ANDROID APPS FOR INSURANCE SYSTEM
256. BUDGET HOME DESIGN -ANDROID APPS
257. Former To Former Apps
258. Pets Care
ONLINE CONSUMERS PROCESSING
259. House Hold Appliancies Warranty Management
260. GPS Transport Packers and Movers
Android Apps
261. MY LIBRARY
262. FACULTY RATING SYSTEM
263. App for self organizer
264. ONLINE DOCTOR APPOINTMENT
265. Conference Event Mobile Assistant
266. Mobile Prescription
267. Metastore Application
268. Android SmartCampus
269. Android Shopping Mall
270. TOLL GATE -Barcode Billing System --ANDROID
271. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
272. Taste Hunt For Restaurants
273. POLICE APPS
274. Android Blood Bank
275. Mobile Expense Claim System Android
276. Android Intelligent Time Tracking System TICK
277. Android Course and Attendance Management System
278. Android Event Reminder
279. Android Attendance Assessment
280. Android Advance Shopping
281. Android CAR POOLING
282. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
283. Android HOSPITAL
284. ATHLETE MEET GUIDE
285. Android Apps PARKING MANAGER
286. Love and Care
287. Food Waste Management System
288. Travel Guide
289. Android Provisional Store
290. Best Baby Care with Vaccines Remainder
291. Android Assist for Lecturer and Student
292. Android Personal Assistance (PA)
293. Android Application for College Management System
294. Tollgate Payment system in android
295. Intelligence Quotient (IQ) Test
296. GPS LOCATION ALARM SYSTEM
297. Location Based Intelligent Mobile Organizer
298. BANK ACCOUNT TRACKER FOR ANDROID
299. UNIT CONVERTER
300. Tips and Tax Calculator in Android
301. TEXT EDITOR FOR ANDROID
302. Student Attendance Tracking System
303. Smart Money With Daily Expenses
304. Simple And Secure Android TO DO List Application
305. Restaurant Table Order Management System
306. Online Shopping
307. Online Examination System For Android
308. ANDROID SHOPPING LOCATION IDENTIFIER
309. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
310. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
311. MICRO CREDIT BANKING ON SMARTPHONE
312. LOCATION BASED ALARM
313. Insurance in android
314. GOOGLE PLACE FINDER
315. Friend Mapper on Mobiles - Friend Locator
316. EXPENSE MANAGER
317. Employee Diractory
318. Online job search
319. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
320. ANDROID STUDENT RESULT ANALYZING SYSTEM
321. CloudMoV : Cloud-based Mobile Social TV
322. Bus Reservation
323. Budget Planner
324. Android SMS Systems
325. ANDROID LEAVE MANAGEMENT SYSTEM
326. ANDROID EVENT SCHEDULER/REMINDER
327. Android Grocery Shopping List
328. Android Attack Application
329. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
330. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
331. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
332. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
333. Optimizing Display Advertising Markets
334. Using Knowledge Libraries to Transfer Expert Knowledge
335. Semantic Retrieval of Trademarks Based on Conceptual Similarity
336. Understanding and Predicting Question Subjectivity in Social Question and Answering
337. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
338. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
339. Fast Top-K Path-based Relevance Query on Massive Graphs
340. Web Image Search Re-ranking with Click-based Similarity and Typicality
341. Automatically Mining Facets for Queries from Their Search Results
342. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
343. Statistical Entity Extraction from Web
344. Question Answering System for an Effective Collaborative Learning
345. Lost in Translation: Improving Decoy Documents via Automated Translation
346. Learn to Personalized Image Search from the Photo Sharing Websites
347. In Tags We Trust Trust modeling in social tagging of multimedia content
348. Efficient Anonymous Message Submission
349. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
350. Employment Knowledge Database
351. Organise Corporate Training For Client Project s
352. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
353. ONLINE VEHICLE SHOWROOM SYSTEMS
354. Online Voting
355. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
356. School Management System
357. Secure Online Course Automation
358. School Automation System
359. Online Aquarum
360. Web Direct Recruitment Analysis
PHP Apps
361. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
362. TRADE / INDUSTRY WEB PORTAL
363. Feeding the poor from the supermarket
364. Application for recording your goals and habits
365. VISUAL WAY TO RAISE AWARENESS
366. Municipal Corporation
367. Online Polling For Publishers And Brands
368. Avoid Food Wastage
369. Web Doctor
370. ONLINE FOOD ORDERING SYSTEM
371. E-Tendering
372. Improving Rural Communities
373. Green Planet Awarness
374. Development of an Online Course Portal for a campus
375. Auxon Test
376. WEB BASED LEARNING SYSTEM
377. Tagging in online social networks
378. Secured file Downloading system
379. Cryptonite : A Secure and Performant Data Repository on Public Clouds
380. searching a image from websites
381. Online University
382. Online product Opinion and Ranking System
383. MNC LEAVE MANAGEMENT SYSTEM
384. Home appliances online purchase
385. Freelancer Job
386. E-Tutor Online Jobs
387. Statistical Entity Extraction from Web
388. Effective Collaborative Learning
389. Development of an e-Post Office System
390. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
391. Towards Effective Bug Triage with Software Data Reduction Techniques
392. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
393. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
394. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
395. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
396. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
397. Proof of retrievability with public verifiability resilient against related-key attacks
398. Secure Anonymous Key Distribution Scheme for Smart Grid
399. Converses For Secret Key Agreement and Secure Computing
400. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE LATEST
IEEE Transactions on Big Data
401. Improving Instance Selection Methods for Big Data Classification
402. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
403. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
404. A Web Service Discovery Approach Based on Common Topic Groups Extraction
405. Dynamic Facet Ordering for Faceted Product Search Engines
406. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
407. Flexible Wildcard Searchable Encryption System
408. QoS Recommendation in Cloud Services
409. Securing Aggregate Queries for DNA Databases
410. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
411. A robust reputation management mechanism in the federated cloud
412. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
413. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
414. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
415. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
416. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
417. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
418. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
419. Energy-efficient Query Processing in Web Search Engines
420. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
421. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
422. BiRank: Towards Ranking on Bipartite Graphs
423. QoS Recommendation in Cloud Services
424. Public Interest Analysis Based on Implicit Feedback of IPTV Users
425. Search Rank Fraud and Malware Detection in Google Play
426. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
427. Influence Maximization in Trajectory Databases
428. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
429. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
430. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
431. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
432. Computing Semantic Similarity of Concepts in Knowledge Graphs
433. QDA: A Query-Driven Approach to Entity Resolution
434. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
435. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
436. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
437. CONTENT BASED IMAGE RETRIEVAL
438. Identifying At Risk Students for Early Interventions A Time Series Clustering
439. Two Layer Clustering model for Mobile Customer Analysis
440. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
441. Consumer oriented web services ranking and classification
442. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
443. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
444. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
445. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
446. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
447. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
448. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
449. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
450. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
451. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
452. Two-Factor Data Security Protection Mechanism for Cloud Storage System
453. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
454. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
455. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
456. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
457. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
458. Where You Are Is Who You Are User Identification by Matching Statistics
459. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
460. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
461. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
462. Online Subgraph Skyline Analysis Over Knowledge Graphs
463. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
464. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
465. ID2S Password-Authenticated Key Exchange Protocols
466. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
467. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
468. Classification model to predict the learners' academic performance using big data
469. Electronic Commerce Meets the Semantic Web
470. Mining High Utility Patterns in One Phase without Generating Candidates
471. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
472. Automatic Generation of Social Event Storyboard from Image Click-through Data
473. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
474. Understanding Deep Representations Learned in Modeling Users Likes
475. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
476. Topic-Oriented Exploratory Search Based on an Indexing Network
477. Relevance Feedback Algorithms Inspired By Quantum Detection
478. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
479. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
480. Efficiently Estimating Statistics of Points of Interests on Maps
481. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
482. Aspect-level Influence Discovery from Graphs
483. Sentiment Embeddings with Applications to Sentiment Analysis
484. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
485. Resolving Multi-party Privacy Conflicts in Social Media
486. Encrypted Data Management with Deduplication in Cloud Computing
487. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
488. Crawling Hidden Objects with kNN Queries
489. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
490. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
491. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
492. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
493. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
494. Nearest Keyword Set Search in Multi-dimensional Datasets
495. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
496. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
497. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
498. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
499. Immutable Authentication and Integrity Schemes for Outsourced Databases
500. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
501. Server-Aided Public Key Encryption with Keyword Search
502. Online Learning in Large-Scale Contextual Recommender Systems
503. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
504. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
505. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
506. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
507. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
508. Multi-Modal Event Topic Model for Social Event Analysis
509. Social friend recommendation on multiple network correlation
510. Tag Based Image Search by Social Re-ranking
511. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
512. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
513. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
514. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
515. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
516. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
517. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
518. Rank-Based Similarity Search: Reducing the Dimensional Dependence
519. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
520. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
521. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
522. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
523. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
524. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
525. On the Security of data access control for multiauthority cloud storage system
526. Trust-based Service Management for Social Internet of Things Systems
527. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
528. Formalization and Verification of Group Behavior Interactions
529. Group Key Agreement with Local Connectivity
530. Data Lineage in Malicious Environments
531. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
532. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
533. Enabling Cloud Storage Auditing with Key-Exposure Resistance
534. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
535. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
536. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
537. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
538. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
539. Quantitative Reasoning About Cloud Security Using Service Level Agreements
540. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
541. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
542. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
543. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
544. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
545. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
546. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
547. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
548. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
549. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
550. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
551. Enabling Cloud Storage Auditing with Key-Exposure Resistance
552. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
553. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
554. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
555. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
556. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
557. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
558. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
559. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
560. Secure Auditing and Deduplicating Data in Cloud
561. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
562. Towards reproducibility in online social network Research
563. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
564. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
565. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
566. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
567. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
568. Making Digital Artifacts on the Web Verifiable and Reliable
569. Anonymizing Collections of Tree-Structured Data
570. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
571. FOCS: Fast Overlapped Community Search
572. Sparsity Learning Formulations for Mining Time-Varying Data
573. The Impact of View Histories on Edit Recommendations
574. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
575. Discovery of Ranking Fraud for Mobile Apps
576. Towards Effective Bug Triage with Software Data Reduction Techniques
577. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
578. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
579. Auditing for Distributed Storage Systems
580. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
581. Uploader Intent for Online Video: Typology, Inference and Applications
582. YouTube Video Promotion by Cross-network
583. Semantic-Improved Color Imaging Applications: It Is All About Context
584. Geolocalized Modeling for Dish Recognition
585. Learning to Rank Image Tags with Limited Training Examples
586. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
587. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
588. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
589. Tracking Temporal Community Strength in Dynamic Networks
590. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
591. Towards Information Diffusion in Mobile Social Networks
592. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
593. An Efficient Privacy-Preserving Ranked Keyword Search Method
594. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
595. Dispersing Instant Social Video Service Across Multiple Clouds
596. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
597. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
598. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
599. A Computational Dynamic Trust Model for User Authorization
600. Secure Distributed Deduplication Systems with Improved Reliability
601. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
602. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
603. Leveraging the Tail Time for Saving Energy in Cellular Networks
604. Keylogging-resistant Visual Authentication Protocols
605. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
606. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
607. Preserving Location Privacy in Geo-Social Applications
608. Efficient Authentication for Mobile and Pervasive Computing
609. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
610. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
611. Typicality-Based Collaborative Filtering Recommendation
612. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
613. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
614. Keyword Search Over Probabilistic RDF Graphs
615. Efficient Prediction of Difficult Keyword Queries over Databases
616. Interpreting the Public Sentiment Variations on Twitter
617. An Efficient Recommendation Method for Improving Business Process Modeling
618. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
619. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
620. On the use of Side Information for Mining Text Data
621. Privacy Preserving and Content Protecting Location based Queries
622. Fast Nearest Neighbor Search with Keywords
623. Towards Differential Query Services in Cost-Efficient Clouds
624. Facilitating Document Annotation using Content and Querying Value
625. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
626. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
627. Secure Outsourced Attribute-Based Signatures
628. Supporting Privacy Protection in Personalized Web Search
629. Dealing With Concept Drifts in Process Mining
630. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
631. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
632. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
633. Active Learning of Constraints for Semi-Supervised Clustering
634. Best Keyword Cover Search
635. Personalized Recommendation Combining User Interest and Social Circle
636. Online Feature Selection and Its Applications
637. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
638. Incremental Affinity Propagation Clustering Based on Message Passing
639. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
640. Secure kNN Query Processing in Untrusted Cloud Environments
641. Malware Propagation in Large-Scale Networks
642. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
643. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
644. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
645. Efficient Ranking on Entity Graphs with Personalized Relationships
646. Task Trail: An Effective Segmentation of User Search Behavior
647. Privacy-Preserving Enhanced Collaborative Tagging
648. XSPath Navigation on XML Schemas Made Easy
649. Security Evaluation of Pattern Classifiers under Attack
650. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
651. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
652. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
653. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
654. Nothing is for Free: Security in Searching Shared and Encrypted Data
655. SocialTube: P2P-assisted Video Sharing in Online Social Networks
656. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
657. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
658. Behavioral Malware Detection in Delay Tolerant Networks
659. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
660. Private Searching on Streaming Data Based on Keyword Frequency
661. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
662. On the Security of Trustee-Based Social Authentications
663. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
664. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
665. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
666. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
667. A Two-stage Deanonymization Attack Against Anonymized Social Networks
668. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
669. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
670. Scalable architecture for multi-user encrypted SQL operations on cloud database services
671. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
672. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
673. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
674. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
675. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
676. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
677. Secure kNN Query Processing in Untrusted Cloud Environments
678. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
679. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
680. A Hybrid Cloud Approach for Secure Authorized Deduplication
681. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
682. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
683. A Novel Model for Competition and Cooperation Among Cloud Providers
684. CLOUDQUAL: A Quality Model for Cloud Services
685. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
686. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
687. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
688. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
689. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
690. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
691. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
692. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
693. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
694. Enhanced Security for Association Rule Mining to secure Transactional Databases
695. Operational Pattern Revealing Technique in Text Mining
696. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
697. Personalized web search using Browsing history and domain Knowledge
698. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
699. Data Security the Challenge of Cloud Computing
700. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
701. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
702. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
703. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
704. User Action Interpretation for Online Content Optimization
705. Spatial Query Integrity with Voronoi Neighbors
706. Spatial Approximate String Search
707. Sensitive Label Privacy Protection on Social Network Data
708. Secure Mining of Association Rules in Horizontally Distributed Databases
709. Secure Logging As a Service Delegating Log Management to the Cloud
710. Robust Module-based Data Management
711. Ranking on Data Manifold with Sink Points
712. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
713. Privacy-Enhanced Web Service Composition
714. Privacy against Aggregate Knowledge Attacks
715. Preventing Private Information Inference Attacks on Social Networks
716. PMSE: A Personalized Mobile Search Engine
717. Personalized QoS-Aware Web Service Recommendation and Visualization
718. Optimal Client-Server Assignment for Internet Distributed Systems
719. Online Search and Buying Behaviour in Consumer Markets
720. M-Privacy for Collaborative Data Publishing
721. Mining User Queries with Markov Chains: Application to Online Image Retrieval
722. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
723. Incentive Compatible Privacy-Preserving Data Analysis
724. Improving Security and Efficiency in Attribute-Based Data Sharing
725. FoCUS: Learning to Crawl Web Forums
726. Fast Nearest Neighbor Search with Keywords
727. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
728. Facilitating Effective User Navigation through Website Structure Improvement
729. Facilitating Document Annotation using Content and Querying Value
730. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
731. Efficient Evaluation of SUM Queries over Probabilistic Data*
732. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
733. Dynamic Query Forms for Database Queries
734. Dynamic Personalized Recommendation on Sparse Data
735. Distributed Strategies for Mining Outliers in Large Data Sets
736. Crowdsourcing Predictors of Behavioral Outcomes
737. Co-Occurrence-Based Diffusion for Expert Search on the Web
738. Comparable Entity Mining from Comparative Questions
739. CloudMoV: Cloud-based Mobile Social TV
740. Anomaly Detection via Online Oversampling Principal Component Analysis
741. Anomaly Detection Approach Using Hidden Markov Model
742. Annotating Search Results from Web Databases
743. A System to Filter Unwanted Messages from OSN User Walls
744. A Survey of XML Tree Patterns
745. A Probabilistic Approach to String Transformation
746. A New Algorithm for Inferring User Search Goals with Feedback Sessions
747. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
748. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
749. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
750. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
751. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
752. Towards Differential Query Services in Cost-Efficient Clouds
753. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
754. SocialTube: P2P-assisted Video Sharing in Online Social Networks
755. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
756. QoS Ranking Prediction for Cloud Services
757. Priority-Based Consolidation of Parallel Workloads in the Cloud
758. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
759. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
760. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
761. Load Rebalancing for Distributed File Systems in Clouds
762. Label-Embedding for Attribute-Based Classification
763. IP-Geolocation Mapping for Moderately Connected Internet Regions
764. Identity-Based Secure Distributed Data Storage Schemes
765. Hint-based Execution of Workloads in Clouds with Nefeli
766. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
767. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
768. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
769. Efficient Two-Server Password-Only Authenticated Key Exchange
770. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
771. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
772. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
773. Winds of Change: From Vendor Lock-In to the Meta Cloud
774. Supporting the Migration of Applications to the Cloud through a Decision Support System
775. Storing Shared Data on the Cloud via Security-Mediator
776. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
777. Privacy-Preserving Public Auditing for Secure Cloud Storage
778. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
779. Outsourcing Privacy-Preserving Social Networks to a Cloud
780. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
781. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
782. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
783. Efficient Security Solution for Privacy-Preserving Cloud Services
784. Collaboration in Multicloud Computing Environments: Framework and Security Issues
785. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
786. Cloud-based DDoS Attacks and Defenses
787. Cloud computing for mobile users can offloading compution save energy
788. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
789. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
790. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
791. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
792. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
793. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
794. Two tales of privacy in online social networks
795. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
796. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
797. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
798. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
799. Security and Privacy-Enhancing Multicloud Architectures
800. Security Using Colors and Armstrong Numbers
801. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
802. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
803. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
804. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
805. Privacy Preserving Data Analytics for Smart Homes
806. On Inference-Proof View Processing of XML Documents
807. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
808. Extracting Spread-Spectrum Hidden Data from Digital Media
809. Efficiently Outsourcing Multiparty Computation under Multiple Keys
810. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
811. Craigslist Scams and Community Composition: Investigating Online Fraud
812. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
813. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
814. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
815. Super-Resolution-based Inpainting
816. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
817. Image Authentication Using Stochastic Diffusion
818. Hierarchical Super-Resolution-Based Inpainting
819. Circular Reranking for Visual Search
820. Bootstrapping Visual Categorization With Relevant Negatives
821. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
822. An extended visual cryptography scheme without pixel expansion for halftone images
823. An Adaptive Cloud Downloading Service
NETWORKING
824. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
825. Topological Conditions for In-Network Stabilization of Dynamical Systems
826. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
827. Price Differentiation for Communication Networks
828. Participatory Privacy: Enabling Privacy in Participatory Sensing
829. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
830. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
831. On the Role of Mobility for Multi-message Gossip
832. Fully Anonymous Profile Matching in Mobile Social Networks
833. Fault Node Recovery Algorithm for a Wireless Sensor Network
834. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
835. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
836. Access Policy Consolidation for Event Processing Systems
837. A Fast Re-Route Method
SOFTWARE ENGINEERING
838. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
839. Vampire attacks: Draining life from wireless ad-hoc sensor networks
840. Towards a Statistical Framework for Source Anonymity in Sensor Networks
841. Search Me If You Can: Privacy-preserving Location Query Service
842. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
843. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
844. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
845. Distributed Cooperative Caching in Social Wireless Networks
846. Community-Aware Opportunistic Routing in Mobile Social Networks
847. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
848. The Devils Behind Web Application Vulnerabilities
849. Security Architecture for Cloud Networking
850. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
851. Secure Overlay Cloud Storage with Access Control and Assured Deletion
852. Risk-Aware Mitigation for MANET Routing Attacks
853. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
854. Privacy-preserving Enforcement of Spatially Aware RBAC
855. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
856. pCloud: A Distributed System for Practical PIR
857. Packet-Hiding Methods for Preventing Selective Jamming Attacks
858. Online Modeling of Proactive Moderation System for Auction Fraud Detection
859. Fast and accurate annotation of short texts with Wikipedia pages
860. FADE: Secure Overlay Cloud Storage with File Assured Deletion
861. Ensuring Distributed Accountability for Data Sharing in the Cloud
862. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
863. Direct and Indirect Discrimination Prevention Methods
864. Detecting Spam Zombies by Monitoring Outgoing Messages
865. Detecting Anomalous Insiders in Collaborative Information Systems
866. Data-Provenance Verification For Secure Hosts
867. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
868. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
869. Payments for Outsourced Computations
870. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
871. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
872. Toward Private Joins on Outsourced Data
873. Statistical Entity Extraction from Web
874. Slicing: A New Approach to Privacy Preserving Data Publishing
875. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
876. Resilient Identity Crime Detection
877. Ranking Model Adaptation for Domain-Specific Search
878. Organizing User Search Histories
879. On the Spectral Characterization and Scalable Mining of Network Communities
880. Multiparty Access Control for Online Social Networks: Model and Mechanisms
881. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
882. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
883. How do Facebookers use Friendlists
884. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
885. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
886. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
887. Enabling Multilevel Trust in Privacy Preserving Data Mining
888. Enabling cross-site interactions in social networks
889. Efficient Similarity Search over Encrypted Data
890. Efficient Extended Boolean Retrieval
891. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
892. Efficient Anonymous Message Submission
893. Effective Pattern Discovery for Text Mining
894. DDD: A New Ensemble Approach for Dealing with Concept Drift
895. Credibility Ranking of Tweets during High Impact Events
896. Creating Evolving User Behavior Profiles Automatically
897. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
898. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
899. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
900. Anomaly Detection for Discrete Sequences: A Survey
901. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
902. Advance Mining of Temporal High Utility Itemset
903. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
904. Reliable Re-encryption in Unreliable Clouds
905. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
906. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
907. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
908. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
909. Gossip-based Resource Management for Cloud Environments
910. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
911. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
912. Cloud Data Protection for the Masses
913. Cloud Computing Security: From Single to Multi-Clouds
914. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
915. In Tags We Trust Trust modeling in social tagging of multimedia content
916. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
917. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
918. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
919. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
920. Cut Detection in Wireless Sensor Networks
921. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
922. TrickleDNS: Bootstrapping DNS Security using Social Trust
923. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
924. Policy-by-Example for Online Social Networks
925. Packet Loss Control Using Tokens at the Network Edge
926. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
927. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
928. Independent Directed Acyclic Graphs for Resilient Multipath Routing
929. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
930. Game-Theoretic Pricing for Video Streaming in Mobile Networks
931. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
932. Auditing for Network Coding Storage
933. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
934. Privacy Preserving Cloud Data Access With Multi-Authorities
935. Movie Rating and Review Summarization in Mobile Environment
936. IDSaaS: Intrusion Detection System as a Service in Public Clouds
937. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
938. BibPro: A Citation Parser Based on Sequence Alignment Techniques
939. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
940. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
941. RITAS: Services for Randomized Intrusion Tolerance
942. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
943. Nymble: Blocking Misbehaving Users in Anonymizing Networks
944. Modeling and Detection of Camouflaging Worm
945. Coding for Cryptographic Security Enhancement using Stopping Sets
946. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
947. Wireless Sensor Network Security model using Zero Knowledge Protocol
948. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
949. Throughput Optimization in Mobile Backbone Networks
950. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
951. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
952. Fast Data Collection in Tree-Based Wireless Sensor Networks
953. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
954. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
955. SPAF: Stateless FSA-based Packet Filters
956. Selfish Overlay Network Creation and Maintenance
957. ProgME: Towards Programmable Network MEasurement
958. Locating Equivalent Servants over P2P Networks
959. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
960. Buffer Sizing for 802.11 Based Networks
961. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
962. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
963. Improving Utilization of Infrastructure Clouds
964. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
965. CloudTPS: Scalable Transactions for Web Applications in the Cloud
966. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
967. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
968. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
969. Ranking Spatial Data by Quality Preferences
970. Making Aggregation Work in Uncertain and Probabilistic Databases
971. Load Shedding in Mobile Systems with MobiQual
972. Group Enclosing Queries
973. Extended XML Tree Pattern Matching: Theories and Algorithms
974. Effective Navigation of Query Results Based on Concept Hierarchies
975. Discovering Conditional Functional Dependencies
976. Decision Trees for Uncertain Data
977. Data Leakage Detection
978. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
979. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
980. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
981. Privacy Protection based Access Control Scheme in Cloud-based Services
982. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
983. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
984. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
985. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
986. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
987. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
988. Explaining Missing Answers to Top-k SQL Queries
989. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
990. Continuous Top-k Monitoring on Document Streams
991. Generating Query Facets using Knowledge Bases
992. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
993. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
994. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
995. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
996. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
997. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
998. Generating Query Facets using Knowledge Bases
999. Private Over-threshold Aggregation Protocols over Distributed Datasets
1000. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1001. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1002. Privacy Protection based Access Control Scheme in Cloud-based Services
1003. Dynamic Facet Ordering for Faceted Product Search Engines
1004. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1005. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1006. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1007. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1008. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1009. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1010. A Recommendation System to Facilitate Business Process Modeling
1011. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1012. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1013. User Differentiated Verifiable File Search on the Cloud
1014. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1015. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1016. Incremental Consolidation of Data-Intensive Multi-flows
1017. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1018. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1019. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1020. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1021. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1022. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1023. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1024. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1025. TagBook: A Semantic Video Representation without Supervision for Event Detection
1026. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1027. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1028. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1029. The Impact of Review Environment on Review Credibility
1030. Private Over-threshold Aggregation Protocols over Distributed Datasets
1031. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1032. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1033. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1034. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1035. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1036. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1037. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1038. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1039. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1040. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1041. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1042. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1043. What Is Happening in The Video Annotate Video by Sentence
1044. Two level QR code for private message sharing and document authentication.
1045. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1046. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1047. Mining Health Examination Records A Graph-based Approach
1048. A Credibility Analysis System for Assessing Information on Twitter
1049. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1050. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1051. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1052. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1053. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1054. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1055. Predicting Personalized Image Emotion Perceptions in Social Networks
1056. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1057. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1058. Explaining Missing Answers to Top-k SQL Queries
1059. Bilevel Feature Extraction Based Text Mining
1060. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1061. Privacy-Preserving Outsourced Media Search
1062. Modeling and Verification of Online Shopping Business Processes
1063. User Preference Learning for Online Social Recommendation
1064. Steganalysis Features for Content-Adaptive JPEG Steganography
1065. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1066. PiCode: a New Picture-Embedding 2D Barcode
1067. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1068. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1069. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1070. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1071. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1072. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1073. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1074. Cloud workflow scheduling with deadlines and time slot availability
1075. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1076. Path-Based Epidemic Spreading in Networks
1077. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1078. On the Resiliency of Static Forwarding Tables
1079. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1080. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1081. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1082. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1083. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1084. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1085. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1086. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1087. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1088. Hacking is not random: a case-control study of webser ver-compromise risk
1089. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1090. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1091. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1092. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1093. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1094. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1095. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1096. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1097. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1098. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1099. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1100. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1101. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1102. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1103. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1104. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1105. Cross-Domain Feature Learning in Multimedia
1106. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1107. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1108. Saliency-based color accessibility
1109. Contextual Online Learning for Multimedia Content Aggregation
1110. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1111. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1112. An Attribute-assisted Reranking Model for Web Image Search
1113. RRW - A Robust and Reversible Watermarking
1114. Steganography Using Reversible Texture Synthesis
1115. Single Image Super-Resolution Based on Gradient Profile Sharpness
1116. Detection and Rectification of Distorted Fingerprints
1117. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1118. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1119. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1120. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1121. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1122. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1123. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1124. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1125. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1126. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1127. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1128. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1129. Authenticated Key Exchange Protocols for Parallel Network File Systems
1130. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1131. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1132. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1133. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1134. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1135. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1136. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1137. Context-based Diversification for Keyword Queries over XML Data
1138. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1139. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1140. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1141. Tweet Segmentation and Its Application to Named Entity Recognition
1142. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1143. Automatic Group Happiness Intensity Analysis
1144. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1145. Query Aware Determinization of Uncertain Objects
1146. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1147. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1148. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1149. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1150. Efficient Community Formation for Web Services
1151. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1152. Secure Mining of Association Rules in Hor izontally Distributed Databases
1153. Dynamic Query Forms for Database Queries
1154. Secure kNN Query Processing in Untrusted Cloud Environments
1155. An Empirical Performance Evaluation of Relational Keyword Search Systems
1156. Keyword Query Routing
1157. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1158. Demand Bidding Program and Its Application in Hotel Energy Management
1159. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1160. Incremental Detection of Inconsistencies in Distributed Data
1161. A Cocktail Approach for Travel Package Recommendation
1162. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1163. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1164. Analysis of Field Data on Web Security Vulnerabilities
1165. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1166. A Reliability Improvement Method for SOA-Based Applications
1167. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1168. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1169. Web Service Recommendation via Exploiting Location and QoS Information
1170. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1171. Exploiting Rateless Codes in Cloud Storage Systems
1172. COMIC:Cost Optimization for Internet Content Multihoming
1173. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1174. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1175. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1176. Uniform Embedding for Efficient JPEG Steganography
1177. Secure Deduplication with Efficient and Reliable Convergent Key Management
1178. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1179. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1180. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1181. Location Aware Keyword Query Suggestion Based on Document Proximity
1182. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1183. A secure data self-destructing scheme in cloud computing
1184. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1185. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1186. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1187. Secure kNN Query Processing in Untrusted Cloud Environments
1188. Exploiting Rateless Codes in Cloud Storage Systems
1189. Fuzzy Authorization for Cloud Storage
1190. Planning vs. dynamic control Resource allocation in corporate clouds
1191. Automatic Scaling of Internet Applications for Cloud Computing Services
1192. Strategy-proof Pricing for Cloud Service Composition
1193. Privacy Preserving Delegated Access Control in Public Clouds
1194. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1195. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1196. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1197. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1198. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1199. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1200. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1201. A Scientometric Analysis of Cloud Computing Literature
1202. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1203. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1204. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1205. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1206. FeatureMatch: A General ANNF Estimation Technique and its Applications
1207. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1208. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1209. As-Projective-As-Possible Image Stitching with Moving DLT
1210. Sharing Visual Secrets in Single Image Random Dot Stereograms
1211. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1212. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1213. A New Iterative Triclass Thresholding Technique in Image Segmentation
1214. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1215. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1216. An Iranian License Plate Recognition System Based on Color Features
1217. Learning Layouts for Single-Page Graphic Designs
1218. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1219. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1220. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1221. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1222. Fingerprint Compression Based on Sparse Representation
1223. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1224. LBP-Based Edge-Texture Features for Object Recoginition
1225. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1226. Toward Experiential Mobile Media Processing
1227. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1228. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1229. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1230. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1231. Designing Truthful Spectrum Double Auctions with Local Markets
1232. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1233. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1234. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1235. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1236. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1237. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1238. A Study on Clinical Prediction Using Data Mining Techniques
1239. Online Payment System using Steganography and Visual Cryptography
1240. Efficient Instant-Fuzzy Search with Proximity Ranking
1241. Attribute Based Encryption with Privacy Preserving In Clouds
1242. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1243. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1244. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1245. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1246. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1247. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1248. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1249. The Target Tracking in Mobile Sensor Networks
1250. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1251. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1252. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1253. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1254. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1255. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1256. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1257. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1258. SUSIE: Search Using Services and Information Extraction
1259. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1260. Secure Mining of Association Rules in Horizontally Distributed Databases
1261. Sampling Online Social Networks
1262. Privacy Preserving Delegated Access Control in Public Clouds
1263. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1264. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1265. Ginix : Generalized Inverted Index for Keyword Search
1266. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1267. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1268. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1269. Dynamic Query Forms for Database Queries
1270. Cost-Based Optimization of Service Compositions
1271. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1272. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1273. Automatic Extraction of Top-k Lists from the Web
1274. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1275. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1276. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1277. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1278. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1279. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1280. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1281. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1282. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1283. Privacy Preserving Data Sharing With Anonymous ID Assignment
1284. Non-Cooperative Location Privacy
1285. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1286. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1287. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1288. Cloud based emails boundaries and vulnerabilities
1289. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1290. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1291. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1292. Optimal Content Downloading in Vehicular Networks
1293. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1294. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1295. View-invariant action recognition based on Artificial Neural Networks
1296. User-aware Image Tag Refinement via Ternary Semantic Analysis
1297. Separable Reversible Data Hiding in Encrypted Image
1298. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1299. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1300. Robust Face-Name Graph Matching for Movie Character Identification
1301. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1302. Improving Color Constancy by Photometric Edge Weighting
1303. Exploring the design space of social network-based Sybil defenses
1304. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1305. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1306. AnnoSearch: Image Auto-Annotation by Search
1307. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1308. Scalable Scheduling of Updates in Streaming Data Warehouses
1309. Scalable Learning of Collective Behavior
1310. Ranking Model Adaptation for Domain-Specific Search
1311. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1312. Outsourced Similarity Search on Metric Data Assets
1313. Organizing User Search Histories
1314. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1315. Mining Web Graphs for Recommendations
1316. Joint Top K Spatial Keyword Query Processing
1317. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1318. Identifying Content for Planned Events Across Social Media Sites
1319. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1320. Generative Models for Item Adoptions Using Social Correlation
1321. Efficient Data Mining for XML Queries Answering Support
1322. Efficient audit service outsourcing for data integrity in clouds
1323. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1324. Effective Pattern Discovery for Text Mining
1325. Combined Mining: Discovering Informative Knowledge in Complex Data
1326. Decentralized Probabilistic Text Clustering
1327. Computing Structural Statistics by Keywords in Databases
1328. Bridging Social and Data Networks
1329. Answering General Time-Sensitive Queries
1330. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1331. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1332. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1333. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1334. Resource-Aware Application State Monitoring
1335. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1336. Query Access Assurance in Outsourced Databases
1337. Linear and Differential Cryptanalysis
1338. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1339. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1340. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1341. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1342. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1343. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1344. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1345. ROAuth: Recommendation Based Open Authorization
1346. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1347. Recommendation Models for Open Authorization
1348. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1349. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1350. On Privacy of Encrypted Speech Communications
1351. OAuth Web Authorization Protocol
1352. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1353. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1354. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1355. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1356. Fast Matrix Embedding by Matrix Extending
1357. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1358. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1359. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1360. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1361. Measuring Code Quality to Improve Specification Mining
1362. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1363. Towards Secure and Dependable Storage Services in Cloud Computing
1364. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1365. Remote Display Solutions for Mobile Cloud Computing
1366. Privacy Preserving Delegated Access Control in Public Clouds
1367. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1368. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1369. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1370. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1371. Load-Balancing Multipath Switching System with Flow Slice
1372. Assessing the Veracity of Identity Assertions via OSNs
1373. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1374. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1375. A New Cell-Counting-Based Attack Against Tor
1376. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1377. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1378. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1379. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1380. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1381. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1382. Fast Release Capture Sampling in Large-Scale Sensor Networks
1383. Cooperative download in vehicular environments
1384. Cooperative Data Dissemination via Roadside WLANs
1385. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1386. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1387. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1388. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1389. Hiding Sensitive Association Rule for Privacy Preservation
1390. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1391. Development of Certificate Authority Services for Web Applications
1392. Detecting and Validating Sybil Groups in theWild
1393. Association Rule Extracting Knowledge Using Market Basket Analysis
1394. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1395. Valuable Detours: Least-Cost Anypath Routing
1396. Self-Reconfigurable Wireless Mesh Networks
1397. Reliability in Layered Networks with Random Link Failures
1398. NABS:Novel Approaches for Biometric Systems
1399. Live Streaming with Receiver-based Peer-division Multiplexing
1400. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1401. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1402. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1403. Virtualized Screen: A Third Element for CloudMobile Convergence
1404. Steganographic Embedding in JPEG Images with Visual Criterion
1405. On the Typical Statistic Features for Image Blind Steganalysis
1406. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1407. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1408. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1409. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1410. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1411. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1412. Vulnerability Analysis in SOA-Based Business Processes
1413. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1414. Service-Centric Framework for a Digital Government Application
1415. Server-Side Streaming Processing of WS-Security
1416. OWLPath: An OWL Ontology-Guided Query Editor
1417. Monitoring Service Systems from a Language-Action Perspective
1418. Extracting Product Features and Sentiments from Chinese Customer Reviews
1419. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1420. Automated Certification for Compliant Cloud-based Business Processes
1421. Addressing Dependability throughout the SOA Life Cycle
1422. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1423. The Geometric Efficient Matching Algorithm for Firewalls
1424. Secure Service-Oriented Architecture for Mobile Transactions
1425. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1426. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1427. Privacy-Preserving Updates to Anonymous and Confidential Databases
1428. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1429. IPAS: Implicit Password Authentication System
1430. Improving Security and Performance in the Tor Network through Tunable Path Selection
1431. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1432. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1433. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1434. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1435. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1436. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1437. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1438. Data Delivery Properties of Human Contact Networks
1439. Converge-Cast: On the Capacity and Delay Tradeoffs
1440. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1441. USHER: Improving Data Quality with Dynamic Forms
1442. The World in a Nutshell: Concise Range Queries
1443. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1444. Scalable Scheduling of Updates in Streaming Data Warehouses
1445. Scalable Learning of Collective Behavior
1446. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1447. Publishing Search Logs A Comparative Study of Privacy Guarantees
1448. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1449. Optimal Service Pricing for a Cloud Cache
1450. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1451. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1452. Mining Web Graphs for Recommendations
1453. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1454. Integration of Sound Signature Authentication System
1455. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1456. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1457. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1458. Exploring Application-Level Semantics for Data Compression
1459. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1460. Data Leakage Detection
1461. Cost-aware rank join with random and sorted access
1462. Collaborative Filtering with Personalized Skylines
1463. Bridging Socially-Enhanced Virtual Communities
1464. Automatic Discovery of Personal Name Aliases from the Web
1465. A Personalized Ontology Model for Web Information Gathering
1466. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1467. A Query Formulation Language for the Data Web
1468. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1469. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1470. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1471. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1472. Towards Secure and Dependable Storage Services in Cloud Computing
1473. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1474. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1475. Data Integrity Proofs in Cloud Storage
1476. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1477. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1478. Feature-level Sentiment Analysis for Chinese Product Reviews
1479. Equal-sized Cells Mean Equal-sized Packets in Tor?
1480. Customer Relationship Management Based on Data Mining Technique
1481. Authentication Schemes for Session Passwords using Color and Images
1482. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1483. Young Talent Tracker
1484. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1485. International Plant Import and Export
OUR MODERN SOCITY
1486. Trained Volunteers Create A Successful Social Campaign
1487. Finger thump Based Shopping Cart
1488. Finger Print E-Voting Systems
1489. Create a Successful Anti- Nuclear Campaign
1490. Crowding Funding Mobilization
1491. People Power of India
1492. Modern Finger Print Voting System
1493. Election Commission Management
1494. Online Painting Auction
1495. Reality Show Ticket Booking System
1496. Online Broadway Motel Food Ordering System
1497. Fashion Studio Model Management
1498. Women's Selfhelp Group
Advance Health Care System
1499. Organizing medical camp for public health development
1500. Homeopathy Health Record
1501. Consumer Legal Advicer
1502. Raw Requried Online Medicine
1503. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1504. I School
1505. Job fair section process
1506. Advertising in E-Book
1507. Students Skills With Modern Industries
1508. College Placement And College Event
1509. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1510. Cloud Storage Public Digital Certificate
ERP PROJECTS
1511. Customer Relationship Management
1512. Corporate Trouble Shooter
1513. Corporate Event Organisation
1514. Engnering Lab Maintenance
1515. Select Your Age(Business Motivation all age group)
1516. Software Requirements Analysis for Client Side
1517. ERP System (Enterprint Resource Plan
LATEST BANKING
1518. User Opinion For Indian Banking Service And Cashless Economy
1519. Advanced Banking System
1520. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1521. Economic Usage of Solar Energy
1522. Gps Consumers Complients
1523. Online Softskills Tracks
1524. Online Buy And Sale Software
1525. Budget Home Design
1526. Online Product Exchange
1527. Jewellery Management
1528. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1529. E TENDERING -JAVA
1530. Moderate Robatics System with Public Opinion
Java Apps
1531. Online overview of skills really used in jobs
1532. Land Bank for Nursery
1533. Developing Rural Economy
1534. ECOPS - Electronics Police Record Management System
1535. Website Evaluation Using Opinion Mining
1536. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1537. INSURANCE MANAGEMENT SYSTEM
1538. e-Fraud Prevention based on the Self- Authentication of e-Documents
1539. Hope Center
1540. Exam crazy
1541. BUGS REPORTING SYSTEM
1542. LOCATION BASED CONSUMER COMPLAINT
1543. Speed Racing
1544. ROADSTER
1545. META CAFE
1546. ONLINE VIDEO LOCKER
1547. Management System in Metro Train
1548. Plant Shopping on Web
1549. Reporting Online Media News Systems
1550. Informative Content Extraction
1551. E-commerce Complaint Management System
1552. Modern Agriculture Development System
1553. Loan Online Application
1554. Rural Community Developement
1555. LOVE AND CARE
1556. GREEN PLANT
1557. Advance Couier Service
1558. Community Awarness
1559. E_Music
1560. Staff Management System
1561. E-TENDERING
1562. Hotel Management
1563. Crime File Management System
1564. Cloud Cyber Attack
1565. Cloud Cost Management for Customer Sensitive Data
1566. Advance Web based Multimedia Answer Generation
1567. Commaunity Awareness
1568. E-Commerce Complaints
1569. Modern Agriculture Development System
1570. Plant Shopping on Web
1571. ONLINE VIDEO LOCKER
1572. ONLINE VIDEO LOCKER
1573. Reporting Online Media News Systems
1574. Online Plant Shopping
1575. Community Awareness
1576. Loan Online Application
1577. Modern Agriculture Development System
1578. Online Digital Library
1579. Geo Base Services
1580. Civil Supplies and Consumer Protection Department
1581. Citizen Opinions vs Government Policies
1582. Protecting Used Data Privacy for Attackers
1583. Web Hospital Management
1584. Easy SQL Query for Non-IT Manager
1585. Online Shopping with Fraud detection
1586. Efficient Spatial Query Processing
1587. Cryptographic Key Exchange Authentication
1588. Online Global Information Service Center
1589. Contracts Business Events Management
1590. Online Secure image Social Networks
1591. Outsourcing of Online Image Reconstruction
1592. Trust based Profile Matching Secure Social Network
1593. Secure and Distance based Online Social Network (OSN)
1594. Efficient Online Image Retrieval System
1595. Data Sharing In Cloud Storage by Using Key-Aggregate
1596. Multicast Key Management for Cloud
1597. Face-to-face contact on Mobile Social Networks
1598. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1599. Dynamically Growing Online Survey for Behavioral Outcomes
1600. Advance Web based Multimedia Answer Generation
1601. College Result Analysis with Horizontally Distributed Databases
1602. Feedback Decision Support for mHealth monitoring
1603. Exchange Secrete Key for Data Producers and Consumers
1604. Efficient Information Retrieval Using Ranked Query (EIRQ)
1605. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1606. Web Hosting On Cloud
1607. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1608. Web Server Security with Web Client Management System
1609. Web Parser on Sequence Alignment Techniques
1610. Web Page re-Ranking System for Library
1611. Web Eye
1612. Voting System for Web Library
1613. VIRTUAL CLASSROOM SYSTEM
1614. Unique Web Resources Utilization Monitoring System
1615. Transport Management System
1616. Pre-paid Recharging System on Banking
1617. Tollgate Management
1618. Time To Time Stock Market Updater and Monitoring System
1619. Sql Tuner
1620. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1621. SMS Based Mobile Banking with Security
1622. Sms Topup
1623. Vendor Information System For Shipping
1624. Sequential Anomaly Detection from User Behaviour
1625. Secure SMS Transaction System on banking
1626. Secure Online Documents Management System in Cloud
1627. Secure File Uploading Server with Advance Protecting System
1628. Secure File Monitoring System on Cloud
1629. Relational Logic Search Engine On Healthcare
1630. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1631. Quick Customer decision support on Web Sales Portal
1632. Query Response System for File Management
1633. Quality Visualization on Web TV
1634. Project Work Tracking System
1635. Product Market Manipulations on Asian stock market
1636. Predicting Top Company Share Based on High Utility Data
1637. Automation of Analysis and Development Management
1638. Pharmacy Information System
1639. Personalize Your News on Web
1640. Online University
1641. Online tagging for multimedia content
1642. Online Search Ranking On Multiple Domain
1643. Online Rental House Web Portal
1644. Online Recruitment System
1645. Online Real Estate Property Management
1646. Online Multi Type Documents Search Engine
1647. ONLINE MOBILE BILLING SYSTEM
1648. Online Jewelry Management
1649. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1650. Online Examination System
1651. Online Ensemble Learning Approach
1652. Online Banking With Fraud Detecting
1653. Online Auction Bit
1654. ONLINE ADVERTISING SYSTEM
1655. Nutraceuticals Management System
1656. Nearest Shopping Location Identification Systems
1657. Multilevel Images Authentication Systems
1658. Multi New Product Survey Management
1659. Movie Recommender Systems via User- Item Subgroups
1660. Movie Rating and Recommendation on Mobile
1661. Modern Municipal Corporation
1662. Mobile TV Quality Management
1663. Mobile Banking WAP
1664. Manifold Entrust Scheme
1665. Management System in Train
1666. Secure Mailing System
1667. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1668. LEAVE MANAGEMENT SYSTEM FOR MNC
1669. Knowledge Based Decision Support System(KMS)
1670. Key Management for Content Integration
1671. Inter Bank Fund Transfer in Distributed Network
1672. Information and Knowledge Extracting from a large amount of data
1673. Industry Standard Authorization For Sensitive Resources
1674. Implementation and Validating Environmental and Health
1675. iKnoweb Extracting and Integrating Entity Information System
1676. HUMAN ASSURANCE ADMINISTRATION
1677. High_level network Security Using Packet Filtering
1678. High and Low Level SQL Query Executor
1679. GLOBAL COUNSELLING SYSTEM
1680. A Game Theory for Online Security
1681. Distributed Transaction Proxy
1682. Freelancer Job
1683. File Security With Multi Database System
1684. FILE SEARCH ENGINE
1685. Fertilizer Management System
1686. Fast Web Information Gathering with Alias Detection
1687. E-Tutor Online Jobs
1688. Enterprise Stock and Accounting System
1689. Ensuring Data Storage Security in Cloud Computing
1690. Encrypted IT Auditing on Cloud Computing
1691. Encrypted Data Storage Vs Data Against illegal Access
1692. Enabling Site Interaction In Social Community
1693. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1694. E-Music world
1695. Employee Resource Management
1696. Employee Management System
1697. E-Learning
1698. E Fraud Prevention based on the Self Authentication of e Documents
1699. Distribution System for Discount Sales
1700. Distributed Data Integration on Electricity Board
1701. Disease Information Hiding on Publishing Healthcare Data
1702. Digital Documents Attestation Systems
1703. Defending Against Web Application Vulnerabilities
1704. Defects Analysis Systems
1705. Data theft detection mobile cloud computing
1706. Data Base Fraud Detection Systems
1707. Customer Information Hiding for Data Mismanagement in Banking
1708. Company Security Reporting System(CSRS)
1709. E -Crime File Management System
1710. Credit Card Management System
1711. Corporate Requirement System
1712. Consumer Sales Online Fake Product Detection and Deletion
1713. Company Information Tracking System
1714. Cloud Policy-Based File Assure Deletion
1715. Cloud Data Theft Attacks
1716. Cloud Cyber Attacks against Social Networks
1717. Cloud Cost Management for Customer Sensitive Data
1718. Client Favorite Photo Search Engine on Web
1719. Citizen Card System
1720. Card Management System
1721. Design &Development of Car Parking and Automation Billing Systems
1722. Customer Care Service
1723. BPO Call Center
1724. Automation of IT Process Management
1725. Modeling and Automated Containment of Worms
1726. Attribute Key Based Data Security System
1727. As Needed Basis Accountability for Cloud Data Sharing
1728. Annotation of short texts With Wikipedia pages
1729. AIRLINE RESERVATION SYSTEM
1730. Advance User Management on Social Website
1731. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1732. Online Trends Management Service in It Industry
1733. Session Management System in It Industry
1734. Tools for Non IT Expert Developer
ERP PROJECTS
1735. New Company Policy Clearance System
1736. Recommend To Friend
1737. Consultanting About the Foreign Peoples
1738. Performance System Analysis In Industry
1739. Non It People Performance
MODERN AGRICULTURE
1740. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1741. Agriculture Marketing in Generation
1742. Agriculture Assist
1743. Sponsor For Agriculture
SPORTS
1744. Play Ground Booking
OUR MODERN SOCITY
1745. ADHAR VOTING SYSTEM
1746. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1747. RAILWAY SEAT RESERVATION SYSTEM
1748. Railway Management Service
1749. It Park Media
1750. Automation Transport Maintance
1751. Yell Help For Children
1752. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1753. Apartment Maintenance
1754. Power Consumption Monitoring House Hold Electronic Device
1755. Direct Q Less Reservation System in train
Advance Health Care System
1756. MAC Sensing Protocol
1757. World Wide Cloud Inter Hospital Acess Health Care System
1758. Live Doctor
Dotnet Apps
1759. TELEVISION CHANNEL PROGRAM MANAGEMENT
1760. WIN THE TRUST OF AN INDIAN CONSUMER
1761. ONLINE ACCOUNT MANAGEMENT
1762. SMART CAB BOOKING SYSTEM
1763. ONLINE FAST FOOD ORDER
1764. Travel Mate Add Module
1765. Work Order System Call Centre
1766. SPORTS MANAGEMENT SYSTEM
1767. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1768. Pick-It Courier Service
1769. Online Taxi Booking
1770. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1771. INCOMETAX MAINTAINANCE SYSTEM
1772. Hotel Reservation
1773. ERP System
1774. Bug Tracking System
1775. Vendor Information System For Shiping
1776. Top-K ranking System
1777. Secure Medical Image Archive System
1778. Business Activity Coordination Using Web Services
1779. Management Portal
1780. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1781. Secure Data Filtering Recommendation System
1782. Online Resources Sharing via Social Networks
1783. Secure self-destructing in Cloud Computing
1784. Web Resourecs File Authorization Management
1785. Click based image re-ranking system
1786. Tree Structure Data Analiysis Mining
1787. Web Resource Allocation for CorPerate
1788. Web Vulnerabilities and Security
1789. Fuzzy Cloud Search Using XML
1790. Cloud Data Supporting Secure Query Search
1791. Tour Recommender Systems on Web
1792. Distributed Interactive Web Applications
1793. Secure Query Processing for Cloud
1794. Online Data Storage with less pricing
1795. Cost Based Web Content Managemnts
1796. Web Hospital Management
1797. Online Data storage with low price
1798. Secure Online Data Block Authorization
1799. Profitable Onlin web Server System
1800. Online Economies File Manager for Multi Keying
1801. Online Community Management
1802. Key based Online Data Managements
1803. Critical Workflow Management for Web Documents
1804. Secure Online Documents Managements for Group Sharing
1805. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1806. Online Marketing Automation System
1807. Internal organization change management System
1808. Secure confirmation of sensitive transaction data in modern Internet banking services
1809. Privacy security with TPA in cloud computing
1810. Company Information Tracking System
1811. Online Virtualized screen Processing
1812. Web Service for Airline Management
1813. Web Social Club
1814. Quantum Key Cryptography
1815. Patient Data Management Based On Hospital Location
1816. Online Software Developer Community
1817. Online Developed Software sales
1818. Avoid repeated measurements On Genetics Dataset
1819. College Lab Maintenance System
1820. Industrial Manpower Resource Organizer
1821. Web Query Construction and Search on Complex Data
1822. Hospital Emergency Data Management
1823. Data confidentiality On Health-care Information System
1824. Secure Online Trading
1825. Fast Real-Time Event Alert Using social Network
1826. Secure E-Mail Organizer
1827. Web User Service Management System
1828. Easy SQL Query for Non-IT Manager
1829. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1830. Customer Relationship Management (CRM) on Banking
1831. Online Company ERP System
1832. Constructing E-Tourism
1833. Web based Multi Service Ranking System
1834. Dynamic Customer Data Hiding in Banking
1835. Online Distributed Social Clubs
1836. Virtual Shopping with Negative Feedback Reputation Systems
1837. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1838. Web Service Oriented Query Authentication Technique
1839. Web Based Customer Favorite vehicle Search Engine
1840. Web Based Book Publishing System
1841. Virtual Energy- Based Encryption and Keying
1842. Video Fraud Detecting On social Network
1843. Video Compression with Data hiding & Data Extraction
1844. Vendor Information System for Shipping
1845. VALUE ADDED TAX (VAT)
1846. Universal Smart Card
1847. Ultimate Location Information Systems
1848. Top K Ranking System
1849. Techno Task Manager
1850. Supply Chain Management
1851. Substitution-Permutation cryptanalysis System
1852. Streaming Data Warehouse Updations
1853. Step by Step Monitoring for Product Purchasing System
1854. Steganography for Data Reading and Writing AVI files
1855. SQL TUNER
1856. SMS Transaction Security
1857. Session Authentication Passwords using Color
1858. Service Availability Guarantees on Virtual Economy
1859. Server Fraud Detection on Cloud
1860. Sentence Based Search on Cloud
1861. Semantic Web Search Engines
1862. Secured Image communicator
1863. Secure smart application on web application
1864. Secure Service-Oriented Smartcard systems
1865. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1866. Secure Location Identification System
1867. Secure and Cloud Based Patient Information Systems
1868. Reduce the Password Guessing Attacks using Click Point
1869. Recommendation System Based on Graph
1870. Quantum Key Cryptography
1871. Quality Controller
1872. Public Web Status Monitoring System
1873. Project Trade Pool
1874. Product Marketing Analysis On Public Opinion
1875. Predicting Users Behaviors Using Web Mining
1876. Personal Health Information on M-Healthcare Emergency
1877. Optimum Online Knowledge Base
1878. Online Training Program
1879. Online Time sensitive queries
1880. Online Tag Based Image Retrieval and Effective Management
1881. Online Social networks controls using cloud
1882. Online Rental System
1883. Online product Opinion and Ranking System
1884. Online Dynamic form creation for Non-IT Peoples
1885. Online Digital Contract Signing in Mistrusted Parities
1886. Online Aventure
1887. Online Shopping
1888. News Ticker Project
1889. Net Bank in Recharge
1890. Multi User Public Auditing System of Data Storage Security
1891. Multi Location Networked Mobile Auto Intimates
1892. Modern Distributed Business Applications for Supply Chain Management
1893. Market Intelligence Based Public Sentiment Analysis
1894. Leave Management System
1895. Joint processing of spatial keyword queries
1896. Intelligence Missing Items in Shopping Cart
1897. Information Leak Detection and Prevention
1898. Industrial Manpower Resource Organizer
1899. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1900. Human Expertise Search Engine
1901. Home appliances online Purchase
1902. High Secure Corporate Web Search Engine
1903. High Degree Patient Privacy on Secure Data Outsourcing
1904. Group Movement Pattern Discovery
1905. Graph Based Share Market Data Updating
1906. Generic Business Portal
1907. Flight Booking Portal
1908. Firewall using Packet Filtering
1909. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1910. Ethical and Social issues in File sharing system
1911. Enterprener Sales Report Management
1912. Encyclopedia for Computer Science
1913. Employee Based Performance Monitoring and Action Systems
1914. Emerging Patient Health Information Exchange System On Cloud
1915. Efficient Search on Outsourced data using Cloud
1916. Efficient and Secure Data Processing on Queries Similarity
1917. Distributed Database Optimization on HealthCare
1918. Digital Asset Management Systems (DAMS) Using Watermarking
1919. Detecting Fraud on Vehicle Insurance System
1920. Defeating Lazy Servers Database Vs Query Access Assurance
1921. Data Processing for Disease-Treatment Relations
1922. Data Mining Analysis on EB bill system
1923. Data confidential against untrusted servers using attribute-based encryption (ABE)
1924. Data Aggregation using SQL clustering
1925. Customer Sales Analysis System Based On Purchasing
1926. Cryptography on Personal confidential information
1927. Cost Based Secure Cloud Data Systems
1928. Market Based Analysis for consumer correct decision
1929. Construction Company Work Order System
1930. Complete Medical Transcription System(Mts)
1931. Company Security Reporting System(CSRS)
1932. College Result Analysis
1933. Cloud Economic Benefit On Scientific Computing
1934. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1935. Centralized Event Planer across Social Media Sites
1936. Call Center Management
1937. A Reservation-Based Coordination Protocol for Web Services
1938. Building construction and cost estimation
1939. Budget Planner
1940. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1941. Automatically identifying query groups on Web Search Engine
1942. Auditing Data integrity and data storage using cloud
1943. Application layer blocker for preventing on cyber security
1944. Advanced One-Click User Web Search Engine
1945. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1946. VALUE ADDED TAX (VAT)
1947. User Oriented Network Attacks
1948. Secure Back Up
1949. Screen Capture And Mouse I/O
1950. Sales Bill Printing System using Excel
1951. Password Security
1952. Online User Mobile Rating
1953. Online Sensex Graph System
1954. Online Book Publishing
1955. NEWS TICKER PROJECT
1956. Multi Storage file
1957. Message Chating
1958. Medical Equipment in WAP
1959. Login Authentication Scheme
1960. Information Alert System
1961. Image Encryption And Decryption
1962. Generic Business Portal
1963. Flight Booking Portal
1964. File Transfer using Cryptography Techniques
1965. File Splitting
1966. Excel Format in Report
1967. EB Management System
1968. Dynamic Web Form Creation
1969. Android Image Search


Struts Application Projects
Struts Apps
1970. Public Sentiment Analysis with Online Shopping Using Struts
1971. Modern distributed business for supply-chain management
1972. High Confidential Personal Disease Reporting System
1973. Distributor Sensitive Data Management Using Struts
1974. Development of Certificate Authority Services for Web Applications
1975. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1976. Website Tracking System
1977. Website Ranking System
1978. Treasure Warehouse
1979. Student Information System
1980. Storage security
1981. PRISON MANAGEMENT SYSTEM
1982. E-Licence Investigation System
1983. Online Secure File Transfer System
1984. Online Medicine Purchase
1985. ONLINE EDUCATION
1986. Online Agriculture System
1987. Mobile Survey
1988. ISSUE TRACKING SYSYTEM
1989. HOSPITAL MANAGEMENT SYSYTEMS
1990. HealthCare Management System
1991. Global Employee Acclaimer
1992. E-VOTING FOR ASSOCIATION
1993. Encrypted Register Form
1994. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1995. E INSURANCE
1996. Courier Tracking Systems
1997. corporate Transportation
1998. Collectorate Communication Systems
1999. Budget Approval System
2000. BLOOD BANK MANAGEMENT SYSTEMS
2001. ATTENDANCE MANAGEMENT SYSTEM
2002. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2003. Sponsor For Agriculture
2004. Agriculture Assist
2005. Agriculture Marketing in Generation
2006. International Plant Import and Export
MODERN EDUCATION SYSTEM
2007. Old In Gold
2008. I School
2009. College Placement And Events
2010. Rural Area Educational Trouble Shooter
2011. Web Direct Recruitment Analysis
2012. Online Aquarum
2013. School Automation System
2014. Secure Online Course Automation
2015. Session Management System in It Industry
2016. Tools for Non IT Expert Developer
2017. Students Skills With Modern Industries
MODERN TECHNOLOGY
2018. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2019. Customer Favarate Greeting Card Design
2020. GPS Transport Packers and Movers
2021. House Hold Appliancies Warranty Management
2022. Direct Q Less Reservation System in train
2023. Power Consumption Monitoring House Hold Electronic Device
2024. Apartment Maintenance
2025. Budget Home Design
2026. Online Buy And Sale Software
2027. Online Softskills Tracks
2028. Gps Consumers Complients
2029. Economic Usage of Solar Energy
Advance Health Care System
2030. Organizing medical camp for public health development
2031. LIVE WEB DOCTOR CONSULTATION
2032. World Wide Cloud Inter Hospital Acess Health Care System
2033. MAC Sensing Protocol
2034. Medical Record Authentication
2035. Raw Requried Online Medicine
2036. Consumer Legal Advicer
2037. Homeopathy Health Record
SPORTS
2038. Play Ground Booking
2039. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2040. Cloud Storage Public Digital Certificate
ERP PROJECTS
2041. Corporate Trouble Shooter
2042. Entrepreneur Fault Analysis
2043. Organise Corporate Training For Client Projects
2044. Employment Knowledge Database
2045. GPS Employee Tracking System
2046. Non It People Performance
2047. Performance System Analysis In Industry
2048. Consultanting About the Foreign Peoples
2049. Recommend To Friend
2050. New Company Policy Clearance System
2051. ERP System (Enterprint Resource Plan
2052. Software Requirements Analysis for Client Side
2053. Select Your Age(Business Motivation all age group)
2054. Engnering Lab Maintenance
2055. Corporate Event Organisation
LATEST BANKING
2056. EyeBank Management System
2057. Advanced Banking System
OUR MODERN SOCIETY
2058. Trained Volunteers Create A Successful Social Campaign
2059. Finger thump Based Shopping Cart
2060. Railway Management Service
2061. Create a Successful Anti- Nuclear Campaign
2062. Crowding Funding Mobilization
2063. People Power of India
2064. Pets Care
2065. Feature in Best Potitical Leader in India
2066. Yell Help For Children
2067. Automation Transport Maintance
2068. It Park Media
2069. Online Painting Auction
2070. Election Commission Management
2071. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2072. ANDROID APPS FOR INSURANCE SYSTEM
2073. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2074. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2075. ANDROID APPS FOR DOCTOR APPOINTMENT
2076. LIVE WEB DOCTOR CONSULTATION
2077. ANDROID APPS ON DOCTOR WITH NURSE
2078. HOSPITAL ANDROID APPS
2079. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2080. Fertilizer Management System -Java, JSP, MySQL
2081. Land Bank for Nursery -Java, JSP, MySQL
2082. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2083. FORMER APPS - ANDROID
2084. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2085. Online Banking with Fraud Detecting- Java JSP, MySQL
2086. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2087. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2088. Big Scholarly Data: A Survey
2089. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved