Final Year IEEE Project 2013-2014 - VLSI Project Title and Abstract
2014 Project Title
description
Transcript of 2014 Project Title
2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
2. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases
4. Dynamic Query Forms for Database Queries
5. Secure kNN Query Processing in Untrusted Cloud Environments
6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
7. An Empirical Performance Evaluation of Relational Keyword Search Systems
8. Keyword Query Routing
9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
10. Demand Bidding Program and Its Application in Hotel Energy Management
11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
12. Incremental Detection of Inconsistencies in Distributed Data
13. A Cocktail Approach for Travel Package Recommendation
14. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
15. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
16. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
17. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
18. Uniform Embedding for Efficient JPEG Steganography
19. Secure Deduplication with Efficient and Reliable Convergent Key Management
20. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
21. Link Quality Aware Code Dissemination in Wireless Sensor Networks
22. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
23. Privacy Preserving Delegated Access Control in Public Clouds
24. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks25. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query26. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
27. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
28. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
29. A Mechanism Design Approach to Resource Procurement in Cloud Computing
30. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
31. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
32. A Scientometric Analysis of Cloud Computing Literature
33. Consistency as a Service Auditing Cloud Consistency
SECURE COMPUTING
IMAGE PROCESSING - MULTIMEDIA
34. FeatureMatch: A General ANNF Estimation Technique and its Applications
35. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion36. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
37. As-Projective-As-Possible Image Stitching with Moving DLT
38. Sharing Visual Secrets in Single Image Random Dot Stereograms
39. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
40. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
41. A New Iterative Triclass Thresholding Technique in Image Segmentation
42. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?43. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
44. An Iranian License Plate Recognition System Based on Color Features
45. Learning Layouts for Single-Page Graphic Designs
46. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image47. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
48. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
49. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
50. Fingerprint Compression Based on Sparse Representation
51. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
52. LBP-Based Edge-Texture Features for Object Recoginition
53. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
54. Toward Experiential Mobile Media Processing
55. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
56. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
57. Designing Truthful Spectrum Double Auctions with Local Markets
58. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
59. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
60. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
61. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
62. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
63. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
64. Online Payment System using Steganography and Visual Cryptography
65. Efficient Instant-Fuzzy Search with Proximity Ranking
66. Attribute Based Encryption with Privacy Preserving In Clouds
67. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
143. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
144. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
145. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
146. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
147. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
148. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
149. The Target Tracking in Mobile Sensor Networks
150. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
151. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
152. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
153. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
154. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
155. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
156. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
157. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
158. SUSIE: Search Using Services and Information Extraction
159. SeDas: A Self-Destructing Data System Based on Active Storage Framework
160. Secure Mining of Association Rules in Horizontally Distributed Databases
161. Sampling Online Social Networks
162. Privacy Preserving Delegated Access Control in Public Clouds
163. Mining Order-Preserving Submatrices from Data with Repeated Measurements
164. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
165. Ginix : Generalized Inverted Index for Keyword Search
166. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department167. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
168. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
169. Dynamic Query Forms for Database Queries
170. Cost-Based Optimization of Service Compositions
171. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
172. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
173. Automatic Extraction of Top-k Lists from the Web
174. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
175. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
176. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data177. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
178. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
179. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
180. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
181. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
182. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
183. Privacy Preserving Data Sharing With Anonymous ID Assignment
184. Non-Cooperative Location Privacy
185. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
186. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
187. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
188. Cloud based emails boundaries and vulnerabilities
189. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
190. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
191. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
192. Optimal Content Downloading in Vehicular Networks
193. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
194. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
341. View-invariant action recognition based on Artificial Neural Networks
342. User-aware Image Tag Refinement via Ternary Semantic Analysis
343. Separable Reversible Data Hiding in Encrypted Image
344. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
345. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
346. Robust Face-Name Graph Matching for Movie Character Identification
347. IntentSearch:Capturing User Intention for One-Click Internet Image Search
348. Improving Color Constancy by Photometric Edge Weighting
349. Exploring the design space of social network-based Sybil defenses
350. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
351. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
352. AnnoSearch: Image Auto-Annotation by Search
353. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
354. Scalable Scheduling of Updates in Streaming Data Warehouses
355. Scalable Learning of Collective Behavior
356. Ranking Model Adaptation for Domain-Specific Search
357. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
358. Outsourced Similarity Search on Metric Data Assets
359. Organizing User Search Histories
360. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
361. Mining Web Graphs for Recommendations
362. Joint Top K Spatial Keyword Query Processing
363. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
364. Identifying Content for Planned Events Across Social Media Sites
365. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
366. Generative Models for Item Adoptions Using Social Correlation
367. Efficient Data Mining for XML Queries Answering Support
368. Efficient audit service outsourcing for data integrity in clouds
369. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
370. Effective Pattern Discovery for Text Mining
371. Combined Mining: Discovering Informative Knowledge in Complex Data
372. Decentralized Probabilistic Text Clustering
373. Computing Structural Statistics by Keywords in Databases
374. Bridging Social and Data Networks
375. Answering General Time-Sensitive Queries
376. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
377. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
378. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
379. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
380. Resource-Aware Application State Monitoring
381. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
382. Query Access Assurance in Outsourced Databases
383. Linear and Differential Cryptanalysis
384. Expert Discovery and Interactions in Mixed Service-Oriented Systems
385. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
386. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
387. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
388. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
389. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
390. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
391. ROAuth: Recommendation Based Open Authorization
392. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
393. Recommendation Models for Open Authorization
394. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
395. Packet-Hiding Methods for Preventing Selective Jamming Attacks
396. On Privacy of Encrypted Speech Communications
397. OAuth Web Authorization Protocol
398. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
399. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
400. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
401. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
402. Fast Matrix Embedding by Matrix Extending
403. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
404. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
405. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
406. Access control for online social networks third party applications
SOFTWARE ENGINEERING
407. Measuring Code Quality to Improve Specification Mining
408. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
409. Towards Secure and Dependable Storage Services in Cloud Computing
410. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
411. Remote Display Solutions for Mobile Cloud Computing
412. Privacy Preserving Delegated Access Control in Public Clouds
413. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
414. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
415. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
416. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
417. Load-Balancing Multipath Switching System with Flow Slice
418. Assessing the Veracity of Identity Assertions via OSNs
419. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
420. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
421. A New Cell-Counting-Based Attack Against Tor
422. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
423. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
424. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
425. Network Assisted Mobile Computing with Optimal Uplink Query Processing
426. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
427. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
428. Fast Release Capture Sampling in Large-Scale Sensor Networks
429. Cooperative download in vehicular environments
430. Cooperative Data Dissemination via Roadside WLANs
431. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
432. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
433. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
434. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
435. Hiding Sensitive Association Rule for Privacy Preservation
436. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
437. Development of Certificate Authority Services for Web Applications
438. Detecting and Validating Sybil Groups in theWild
439. Association Rule Extracting Knowledge Using Market Basket Analysis
440. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
195. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
196. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
197. User Action Interpretation for Online Content Optimization
198. Spatial Query Integrity with Voronoi Neighbors
199. Spatial Approximate String Search
200. Sensitive Label Privacy Protection on Social Network Data
201. Secure Mining of Association Rules in Horizontally Distributed Databases
202. Secure Logging As a Service Delegating Log Management to the Cloud
203. Robust Module-based Data Management
204. Ranking on Data Manifold with Sink Points
205. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
206. Privacy-Enhanced Web Service Composition
207. Privacy against Aggregate Knowledge Attacks
208. Preventing Private Information Inference Attacks on Social Networks
209. PMSE: A Personalized Mobile Search Engine
210. Personalized QoS-Aware Web Service Recommendation and Visualization
211. Optimal Client-Server Assignment for Internet Distributed Systems
212. Online Search and Buying Behaviour in Consumer Markets
213. M-Privacy for Collaborative Data Publishing
214. Mining User Queries with Markov Chains: Application to Online Image Retrieval
215. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
216. Incentive Compatible Privacy-Preserving Data Analysis
217. Improving Security and Efficiency in Attribute-Based Data Sharing
218. FoCUS: Learning to Crawl Web Forums
219. Fast Nearest Neighbor Search with Keywords
220. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
221. Facilitating Effective User Navigation through Website Structure Improvement
222. Facilitating Document Annotation using Content and Querying Value
223. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
224. Efficient Evaluation of SUM Queries over Probabilistic Data*
225. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
226. Dynamic Query Forms for Database Queries
227. Dynamic Personalized Recommendation on Sparse Data
228. Distributed Strategies for Mining Outliers in Large Data Sets
229. Crowdsourcing Predictors of Behavioral Outcomes
230. Co-Occurrence-Based Diffusion for Expert Search on the Web
231. Comparable Entity Mining from Comparative Questions
232. CloudMoV: Cloud-based Mobile Social TV
233. Anomaly Detection via Online Oversampling Principal Component Analysis
234. Anomaly Detection Approach Using Hidden Markov Model
235. Annotating Search Results from Web Databases
236. A System to Filter Unwanted Messages from OSN User Walls
237. A Survey of XML Tree Patterns
238. A Probabilistic Approach to String Transformation
239. A New Algorithm for Inferring User Search Goals with Feedback Sessions
240. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
241. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
242. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
243. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
244. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
245. Towards Differential Query Services in Cost-Efficient Clouds
246. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
247. SocialTube: P2P-assisted Video Sharing in Online Social Networks
248. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
249. QoS Ranking Prediction for Cloud Services
250. Priority-Based Consolidation of Parallel Workloads in the Cloud
251. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
252. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
253. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
254. Load Rebalancing for Distributed File Systems in Clouds
255. Label-Embedding for Attribute-Based Classification
256. IP-Geolocation Mapping for Moderately Connected Internet Regions
257. Identity-Based Secure Distributed Data Storage Schemes
258. Hint-based Execution of Workloads in Clouds with Nefeli
259. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
260. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
261. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
262. Efficient Two-Server Password-Only Authenticated Key Exchange
263. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
264. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
265. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
266. Winds of Change: From Vendor Lock-In to the Meta Cloud
267. Supporting the Migration of Applications to the Cloud through a Decision Support System
268. Storing Shared Data on the Cloud via Security-Mediator
269. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
270. Privacy-Preserving Public Auditing for Secure Cloud Storage
271. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
272. Outsourcing Privacy-Preserving Social Networks to a Cloud
273. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
274. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
275. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
276. Efficient Security Solution for Privacy-Preserving Cloud Services
277. Collaboration in Multicloud Computing Environments: Framework and Security Issues
278. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
279. Cloud-based DDoS Attacks and Defenses
280. Cloud computing for mobile users can offloading compution save energy
281. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing282. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds283. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
284. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
285. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
286. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
287. Two tales of privacy in online social networks
288. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
289. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
290. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
291. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
292. Security and Privacy-Enhancing Multicloud Architectures
293. Security Using Colors and Armstrong Numbers
294. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
295. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
296. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
297. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
298. Privacy Preserving Data Analytics for Smart Homes
299. On Inference-Proof View Processing of XML Documents
300. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
301. Extracting Spread-Spectrum Hidden Data from Digital Media
302. Efficiently Outsourcing Multiparty Computation under Multiple Keys
303. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
304. Craigslist Scams and Community Composition: Investigating Online Fraud
305. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
306. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
307. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
308. Super-Resolution-based Inpainting
309. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
310. Image Authentication Using Stochastic Diffusion
311. Hierarchical Super-Resolution-Based Inpainting
312. Circular Reranking for Visual Search
313. Bootstrapping Visual Categorization With Relevant Negatives
314. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
315. An extended visual cryptography scheme without pixel expansion for halftone images
316. An Adaptive Cloud Downloading Service
NETWORKING
317. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
318. Topological Conditions for In-Network Stabilization of Dynamical Systems
319. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
320. Price Differentiation for Communication Networks
321. Participatory Privacy: Enabling Privacy in Participatory Sensing
322. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
323. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
324. On the Role of Mobility for Multi-message Gossip
325. Fully Anonymous Profile Matching in Mobile Social Networks
326. Fault Node Recovery Algorithm for a Wireless Sensor Network
327. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
328. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
329. Access Policy Consolidation for Event Processing Systems
330. A Fast Re-Route Method
SOFTWARE ENGINEERING
331. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
332. Vampire attacks: Draining life from wireless ad-hoc sensor networks
333. Towards a Statistical Framework for Source Anonymity in Sensor Networks
334. Search Me If You Can: Privacy-preserving Location Query Service
335. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
336. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
337. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
338. Distributed Cooperative Caching in Social Wireless Networks
339. Community-Aware Opportunistic Routing in Mobile Social Networks
340. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
68. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
69. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
70. Preserving Location Privacy in Geo-Social Applications
71. Efficient Authentication for Mobile and Pervasive Computing
72. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
73. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
74. Fast Nearest Neighbor Search with Keywords
75. Towards Differential Quer y Ser vices in Cost-Efficient Clouds
76. Facilitating Document Annotation using Content and Querying Value
77. Dynamic Query Forms for Database Queries
78. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
79. Secure Outsourced Attribute-Based Signatures
80. Supporting Privacy Protection in Personalized Web Search
81. Dealing With Concept Drifts in Process Mining
82. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
83. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
84. Capturing Telic/Atelic Temporal Data Semantics: Generalizing Conventional Conceptual Models
85. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
86. Active Learning of Constraints for Semi-Supervised Clustering
87. Best Keyword Cover Search
88. Personalized Recommendation Combining User Interest and Social Circle
89. Online Feature Selection and Its Applications
90. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
91. Incremental Affinity Propagation Clustering Based on Message Passing
92. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
93. Secure kNN Query Processing in Untrusted Cloud Environments
94. Malware Propagation in Large-Scale Networks
95. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
96. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
97. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
98. Efficient Ranking on Entity Graphs with Personalized Relationships
99. Task Trail: An Effective Segmentation of User Search Behavior
100. Privacy-Preserving Enhanced Collaborative Tagging
101. XSPath Navigation on XML Schemas Made Easy
102. Security Evaluation of Pattern Classifiers under Attack
103. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
104. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
105. SocialTube: P2P-assisted Video Shar ing in Online Social Networ
106. Behavioral Malware Detection in Delay Tolerant Networks
107. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
108. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
109. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
110. Private Searching on Streaming Data Based on Keyword Frequency
111. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
112. On the Security of Trustee-Based Social Authentications
113. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
114. Community-home-based Multi-copy Routing in Mobile Social Networks
115. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
116. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
117. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
118. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
119. A Two-stage Deanonymization Attack Against Anonymized Social Networks
120. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
121. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
122. A Hybrid Cloud Approach for Secure Authorized Deduplication
123. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
124. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
125. A Novel Model for Competition and Cooperation Among Cloud Providers
126. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
127. CLOUDQUAL: A Quality Model for Cloud Services
128. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
SECURE COMPUTING
IMAGE PROCESSING - MULTIMEDIA
129. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
130. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
131. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
132. Scaling Laws for Throughput Capacity and Delay in Wireless Networks
133. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
134. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
135. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
136. Operational Pattern Revealing Technique in Text Mining
137. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
138. Personalized web search using Browsing history and domain Knowledge
139. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
140. Data Security the Challenge of Cloud Computing
141. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
142. A Cloud Enviroment for Backup and Data Storage
2012-2013 Java Projects
SECURE COMPUTING
441. The Devils Behind Web Application Vulnerabilities
442. Security Architecture for Cloud Networking
443. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
444. Secure Overlay Cloud Storage with Access Control and Assured Deletion
445. Risk-Aware Mitigation for MANET Routing Attacks
446. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
447. Privacy-preserving Enforcement of Spatially Aware RBAC
448. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
449. pCloud: A Distributed System for Practical PIR
450. Packet-Hiding Methods for Preventing Selective Jamming Attacks
451. Online Modeling of Proactive Moderation System for Auction Fraud Detection
452. Fast and accurate annotation of short texts with Wikipedia pages
453. FADE: Secure Overlay Cloud Storage with File Assured Deletion
454. Ensuring Distributed Accountability for Data Sharing in the Cloud
455. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
456. Direct and Indirect Discrimination Prevention Methods
457. Detecting Spam Zombies by Monitoring Outgoing Messages
458. Detecting Anomalous Insiders in Collaborative Information Systems
459. Data-Provenance Verification For Secure Hosts
460. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
461. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
462. Payments for Outsourced Computations
463. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
464. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
465. Toward Private Joins on Outsourced Data
466. Statistical Entity Extraction from Web
467. Slicing: A New Approach to Privacy Preserving Data Publishing
468. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
469. Resilient Identity Crime Detection
470. Ranking Model Adaptation for Domain-Specific Search
471. Organizing User Search Histories
472. On the Spectral Characterization and Scalable Mining of Network Communities
473. Multiparty Access Control for Online Social Networks: Model and Mechanisms
474. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
475. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
476. How do Facebookers use Friendlists
477. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
478. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
479. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
480. Enabling Multilevel Trust in Privacy Preserving Data Mining
481. Enabling cross-site interactions in social networks
482. Efficient Similarity Search over Encrypted Data
483. Efficient Extended Boolean Retrieval
484. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
485. Efficient Anonymous Message Submission
486. Effective Pattern Discovery for Text Mining
487. DDD: A New Ensemble Approach for Dealing with Concept Drift
488. Credibility Ranking of Tweets during High Impact Events
489. Creating Evolving User Behavior Profiles Automatically
490. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
491. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
492. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
493. Anomaly Detection for Discrete Sequences: A Survey
494. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
495. Advance Mining of Temporal High Utility Itemset
496. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
497. Reliable Re-encryption in Unreliable Clouds
498. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
499. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
500. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
501. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
502. Gossip-based Resource Management for Cloud Environments
503. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
504. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
505. Cloud Data Protection for the Masses
506. Cloud Computing Security: From Single to Multi-Clouds
507. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
508. In Tags We Trust Trust modeling in social tagging of multimedia content
509. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
510. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
511. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
512. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
513. Cut Detection in Wireless Sensor Networks
514. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
515. TrickleDNS: Bootstrapping DNS Security using Social Trust
516. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
517. Policy-by-Example for Online Social Networks
518. Packet Loss Control Using Tokens at the Network Edge
519. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
520. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
521. Independent Directed Acyclic Graphs for Resilient Multipath Routing
522. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
523. Game-Theoretic Pricing for Video Streaming in Mobile Networks
524. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
525. Auditing for Network Coding Storage
526. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
527. Privacy Preserving Cloud Data Access With Multi-Authorities
528. Movie Rating and Review Summarization in Mobile Environment
529. IDSaaS: Intrusion Detection System as a Service in Public Clouds
530. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
531. BibPro: A Citation Parser Based on Sequence Alignment Techniques
532. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
2011-2012 Dotnet Projects
NETWORKING
533. Valuable Detours: Least-Cost Anypath Routing
534. Self-Reconfigurable Wireless Mesh Networks
535. Reliability in Layered Networks with Random Link Failures
536. NABS:Novel Approaches for Biometric Systems
537. Live Streaming with Receiver-based Peer-division Multiplexing
538. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
539. Continuous Neighbor Discovery in Asynchronous Sensor Networks
540. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
541. Virtualized Screen: A Third Element for CloudMobile Convergence
542. Steganographic Embedding in JPEG Images with Visual Criterion
543. On the Typical Statistic Features for Image Blind Steganalysis
544. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
545. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
546. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
547. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
548. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
549. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
550. Vulnerability Analysis in SOA-Based Business Processes
551. Service-Oriented Architecture for High-Dimensional Private Data Mashup
552. Service-Centric Framework for a Digital Government Application
553. Server-Side Streaming Processing of WS-Security
554. OWLPath: An OWL Ontology-Guided Query Editor
555. Monitoring Service Systems from a Language-Action Perspective
556. Extracting Product Features and Sentiments from Chinese Customer Reviews
557. Expert Discovery and Interactions in Mixed Service-Oriented Systems
558. Automated Certification for Compliant Cloud-based Business Processes
559. Addressing Dependability throughout the SOA Life Cycle
560. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
561. The Geometric Efficient Matching Algorithm for Firewalls
562. Secure Service-Oriented Architecture for Mobile Transactions
563. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
564. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
565. Privacy-Preserving Updates to Anonymous and Confidential Databases
566. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
567. IPAS: Implicit Password Authentication System
568. Improving Security and Performance in the Tor Network through Tunable Path Selection
569. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error570. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
571. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
572. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
573. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
574. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
575. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
576. Data Delivery Properties of Human Contact Networks
577. Converge-Cast: On the Capacity and Delay Tradeoffs
578. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
579. USHER: Improving Data Quality with Dynamic Forms
580. The World in a Nutshell: Concise Range Queries
581. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
582. Scalable Scheduling of Updates in Streaming Data Warehouses
583. Scalable Learning of Collective Behavior
584. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
585. Publishing Search Logs A Comparative Study of Privacy Guarantees
586. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
587. Optimal Service Pricing for a Cloud Cache
588. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases589. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
590. Mining Web Graphs for Recommendations
591. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
592. Integration of Sound Signature Authentication System
593. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
594. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
595. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
596. Exploring Application-Level Semantics for Data Compression
597. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
598. Data Leakage Detection
599. Cost-aware rank join with random and sorted access
600. Collaborative Filtering with Personalized Skylines
601. Bridging Socially-Enhanced Virtual Communities
602. Automatic Discovery of Personal Name Aliases from the Web
603. A Personalized Ontology Model for Web Information Gathering by Domain Specific Search
604. Adaptive Provisioning of Human Expertise in Service-oriented Systems
605. A Query Formulation Language for the Data Web
606. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
607. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
608. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
609. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
610. Towards Secure and Dependable Storage Services in Cloud Computing
611. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
612. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
613. Data Integrity Proofs in Cloud Storage
614. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
615. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
616. Feature-level Sentiment Analysis for Chinese Product Reviews
617. Equal-sized Cells Mean Equal-sized Packets in Tor?
618. Customer Relationship Management Based on Data Mining Technique
619. Authentication Schemes for Session Passwords using Color and Images
620. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
2011-2012 Java Project
SECURE COMPUTING
621. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
622. RITAS: Services for Randomized Intrusion Tolerance
623. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
624. Nymble: Blocking Misbehaving Users in Anonymizing Networks
625. Modeling and Detection of Camouflaging Worm
626. Coding for Cryptographic Security Enhancement using Stopping Sets
627. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
628. Wireless Sensor Network Security model using Zero Knowledge Protocol
629. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
630. Throughput Optimization in Mobile Backbone Networks
631. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
632. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
633. Fast Data Collection in Tree-Based Wireless Sensor Networks
634. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
635. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
636. SPAF: Stateless FSA-based Packet Filters
637. Selfish Overlay Network Creation and Maintenance
638. ProgME: Towards Programmable Network MEasurement
639. Locating Equivalent Servants over P2P Networks
640. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
641. Buffer Sizing for 802.11 Based Networks
642. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
643. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
644. Improving Utilization of Infrastructure Clouds
645. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
646. CloudTPS: Scalable Transactions for Web Applications in the Cloud
647. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
648. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
649. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
650. Ranking Spatial Data by Quality Preferences
651. Making Aggregation Work in Uncertain and Probabilistic Databases
652. Load Shedding in Mobile Systems with MobiQual
653. Group Enclosing Queries
654. Extended XML Tree Pattern Matching: Theories and Algorithms
655. Effective Navigation of Query Results Based on Concept Hierarchies
656. Discovering Conditional Functional Dependencies
657. Decision Trees for Uncertain Data
658. Data Leakage Detection
659. Adaptive Cluster Distance Bounding for High Dimensional Indexing+
PHP Projects
PHP Projects
660. Statistical Entity Extraction from Web
661. Question Answering System for an Effective Collaborative Learning
662. Lost in Translation: Improving Decoy Documents via Automated Translation
663. Learn to Personalized Image Search from the Photo Sharing Websites
664. In Tags We Trust Trust modeling in social tagging of multimedia content
665. Efficient Anonymous Message Submission
666. Cryptonite: A Secure and Performant Data Repository on Public Clouds
Dotnet Application Projects
Dotnet Apps
667. Online Virtualized screen Processing
668. Web Service for Airline Management
669. Web Social Club
670. Quantum Key Cryptography
671. Patient Data Management Based On Hospital Location
672. Online Software Developer Community
673. Online Developed Software sales
674. Avoid repeated measurements On Genetics Dataset
675. College Lab Maintenance System
676. Industrial Manpower Resource Organizer
677. Web Query Construction and Search on Complex Data
678. Hospital Emergency Data Management
679. Data confidentiality On Health-care Information System
680. Secure Online Trading
681. Fast Real-Time Event Alert Using social Network
682. Secure E-Mail Organizer
683. Web User Service Management System
684. Easy SQL Query for Non-IT Manager
685. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
686. Customer Relationship Management (CRM) on Banking
687. Online Company ERP System
688. Constructing E-Tourism
689. Web based Multi Service Ranking System
690. Dynamic Customer Data Hiding in Banking
691. Online Distributed Social Clubs
692. Virtual Shopping with Negative Feedback Reputation Systems
693. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
694. Web Service Oriented Query Authentication Technique
695. Web Based Customer Favorite vehicle Search Engine
696. Web Based Book Publishing System
697. Virtual Energy- Based Encryption and Keying
698. Video Fraud Detecting On social Network
699. Video Compression with Data hiding & Data Extraction
700. Vendor Information System for Shipping
701. VALUE ADDED TAX (VAT)
702. Universal Smart Card
703. Ultimate Location Information Systems
704. Top K Ranking System
705. Techno Task Manager
706. Supply Chain Management
707. Substitution-Permutation cryptanalysis System
708. Streaming Data Warehouse Updations
709. Step by Step Monitoring for Product Purchasing System
710. Steganography for Data Reading and Writing AVI files
711. SQL TUNER
712. SMS Transaction Security
713. Session Authentication Passwords using Color
714. Service Availability Guarantees on Virtual Economy
715. Server Fraud Detection on Cloud
716. Sentence Based Search on Cloud
717. Semantic Web Search Engines
718. Secured Image communicator
719. Secure smart application on web application
720. Secure Service-Oriented Smartcard systems
721. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
722. Secure Location Identification System
723. Secure and Cloud Based Patient Information Systems
724. Reduce the Password Guessing Attacks using Click Point
725. Recommendation System Based on Graph
726. Quantum Key Cryptography
727. Quality Controller
728. Public Web Status Monitoring System
729. Project Trade Pool
730. Product Marketing Analysis On Public Opinion
731. Predicting Users Behaviors Using Web Mining
732. Personal Health Information on M-Healthcare Emergency
733. Optimum Online Knowledge Base
734. Online Training Program
735. Online Time sensitive queries
736. Online Tag Based Image Retrieval and Effective Management
737. Online Social networks controls using cloud
738. Online Rental System
739. Online product Opinion and Ranking System
740. Online Dynamic form creation for Non-IT Peoples
741. Online Digital Contract Signing in Mistrusted Parities
742. Online Aventure
743. Online Shopping
744. News Ticker Project
745. Net Bank in Recharge
746. Multi User Public Auditing System of Data Storage Security
747. Multi Location Networked Mobile Auto Intimates
748. Modern Distributed Business Applications for Supply Chain Management
749. Market Intelligence Based Public Sentiment Analysis
750. Leave Management System
751. Joint processing of spatial keyword queries
752. Intelligence Missing Items in Shopping Cart
753. Information Leak Detection and Prevention
754. Industrial Manpower Resource Organizer
755. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
756. Human Expertise Search Engine
757. Home appliances online Purchase
758. High Secure Corporate Web Search Engine
759. High Degree Patient Privacy on Secure Data Outsourcing
760. Group Movement Pattern Discovery
761. Graph Based Share Market Data Updating
762. Generic Business Portal
763. Flight Booking Portal
764. Firewall using Packet Filtering
765. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
766. Ethical and Social issues in File sharing system
767. Enterprener Sales Report Management
768. Encyclopedia for Computer Science
769. Employee Based Performance Monitoring and Action Systems
770. Emerging Patient Health Information Exchange System On Cloud
771. Efficient Search on Outsourced data using Cloud
772. Efficient and Secure Data Processing on Queries Similarity
773. Distributed Database Optimization on HealthCare
774. Digital Asset Management Systems (DAMS) Using Watermarking
775. Detecting Fraud on Vehicle Insurance System
776. Defeating Lazy Servers Database Vs Query Access Assurance
777. Data Processing for Disease-Treatment Relations
778. Data Mining Analysis on EB bill system
779. Data confidential against untrusted servers using attribute-based encryption (ABE)
780. Data Aggregation using SQL clustering
781. Customer Sales Analysis System Based On Purchasing
782. Cryptography on Personal confidential information
783. Cost Based Secure Cloud Data Systems
784. Market Based Analysis for consumer correct decision
785. Construction Company Work Order System
786. Complete Medical Transcription System(Mts)
787. Company Security Reporting System(CSRS)
788. College Result Analysis
789. Cloud Economic Benefit On Scientific Computing
790. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
791. Centralized Event Planer across Social Media Sites
792. Call Center Management
793. A Reservation-Based Coordination Protocol for Web Services
794. Building construction and cost estimation
795. Budget Planner
796. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
797. Automatically identifying query groups on Web Search Engine
798. Auditing Data integrity and data storage using cloud
799. Application layer blocker for preventing on cyber security
800. Advanced One-Click User Web Search Engine
801. Advance Patient Management System
Java Application Projects
Java Apps
802. Protecting Used Data Privacy for Attackers
803. Web Hospital Management
804. Easy SQL Query for Non-IT Manager
805. Online Shopping with Fraud detection
806. Efficient Spatial Query Processing
807. Cryptographic Key Exchange Authentication
808. Online Global Information Service Center
809. Contracts Business Events Management
810. Online Secure image Social Networks
811. Outsourcing of Online Image Reconstruction
812. Trust based Profile Matching Secure Social Network
813. Secure and Distance based Online Social Network (OSN)
814. Efficient Online Image Retrieval System
815. Data Sharing In Cloud Storage by Using Key-Aggregate
816. Multicast Key Management for Cloud
817. Face-to-face contact on Mobile Social Networks
818. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
819. Dynamically Growing Online Survey for Behavioral Outcomes
820. Advance Web based Multimedia Answer Generation
821. College Result Analysis with Horizontally Distributed Databases
822. Feedback Decision Support for mHealth monitoring
823. Exchange Secrete Key for Data Producers and Consumers
824. Efficient Information Retrieval Using Ranked Query (EIRQ)
825. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
826. Web Hosting On Cloud
827. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
828. Web Server Security with Web Client Management System
829. Web Parser on Sequence Alignment Techniques
830. Web Page re-Ranking System for Library
831. Web Eye
832. Voting System for Web Library
833. VIRTUAL CLASSROOM SYSTEM
834. Unique Web Resources Utilization Monitoring System
835. Transport Management System
836. Pre-paid Recharging System on Banking
837. Tollgate Management
838. Time To Time Stock Market Updater and Monitoring System
839. Sql Tuner
840. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
841. SMS Based Mobile Banking with Security
842. Sms Topup
843. Vendor Information System For Shipping
844. Sequential Anomaly Detection from User Behaviour
845. Secure SMS Transaction System on banking
846. Secure Online Documents Management System in Cloud
847. Secure File Uploading Server with Advance Protecting System
848. Secure File Monitoring System on Cloud
849. Relational Logic Search Engine On Healthcare
850. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
851. Quick Customer decision support on Web Sales Portal
852. Query Response System for File Management
853. Quality Visualization on Web TV
854. Project Work Tracking System
855. Product Market Manipulations on Asian stock market
856. Predicting Top Company Share Based on High Utility Data
857. Automation of Analysis and Development Management
858. Pharmacy Information System
859. Personalize Your News on Web
860. Online University
861. Online tagging for multimedia content
862. Online Search Ranking On Multiple Domain
863. Online Rental House Web Portal
864. Online Recruitment System
865. Online Real Estate Property Management
866. Online Multi Type Documents Search Engine
867. ONLINE MOBILE BILLING SYSTEM
868. Online Jewelry Management
869. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
870. Online Examination System
871. Online Ensemble Learning Approach
872. Online Banking With Fraud Detecting
873. Online Auction Bit
874. ONLINE ADVERTISING SYSTEM
875. Nutraceuticals Management System
876. Nearest Shopping Location Identification Systems
877. Multilevel Images Authentication Systems
878. Multi New Product Survey Management
879. Movie Recommender Systems via User- Item Subgroups
880. Movie Rating and Recommendation on Mobile
881. Modern Municipal Corporation
882. Mobile TV Quality Management
883. Mobile Banking WAP
884. Manifold Entrust Scheme
885. Management System in Train
886. Secure Mailing System
887. Location-Based Spatial Query Processing in Wireless Broadcast Environments
888. LEAVE MANAGEMENT SYSTEM FOR MNC
889. Knowledge Based Decision Support System(KMS)
890. Key Management for Content Integration
891. Inter Bank Fund Transfer in Distributed Network
892. Information and Knowledge Extracting from a large amount of data
893. Industry Standard Authorization For Sensitive Resources
894. Implementation and Validating Environmental and Health
895. iKnoweb Extracting and Integrating Entity Information System
896. HUMAN ASSURANCE ADMINISTRATION
897. High_level network Security Using Packet Filtering
898. High and Low Level SQL Query Executor
899. GLOBAL COUNSELLING SYSTEM
900. A Game Theory for Online Security
901. Distributed Transaction Proxy
902. Freelancer Job
903. File Security With Multi Database System
904. FILE SEARCH ENGINE
905. Fertilizer Management System
906. Fast Web Information Gathering with Alias Detection
907. E-Tutor Online Jobs
908. Enterprise Stock and Accounting System
909. Ensuring Data Storage Security in Cloud Computing
910. Encrypted IT Auditing on Cloud Computing
911. Encrypted Data Storage Vs Data Against illegal Access
912. Enabling Site Interaction In Social Community
913. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
914. E-Music world
915. Employee Resource Management
916. Employee Management System
917. E-Learning
918. E Fraud Prevention based on the Self Authentication of e Documents
919. Distribution System for Discount Sales
920. Distributed Data Integration on Electricity Board
921. Disease Information Hiding on Publishing Healthcare Data
922. Digital Documents Attestation Systems
923. Defending Against Web Application Vulnerabilities
924. Defects Analysis Systems
925. Data theft detection mobile cloud computing
926. Data Base Fraud Detection Systems
927. Customer Information Hiding for Data Mismanagement in Banking
928. Company Security Reporting System(CSRS)
929. E -Crime File Management System
930. Credit Card Management System
931. Corporate Requirement System
932. Consumer Sales Online Fake Product Detection and Deletion
933. Company Information Tracking System
934. Cloud Policy-Based File Assure Deletion
935. Cloud Data Theft Attacks
936. Cloud Cyber Attacks against Social Networks
937. Cloud Cost Management for Customer Sensitive Data
938. Client Favorite Photo Search Engine on Web
939. Citizen Card System
940. Card Management System
941. Design &Development of Car Parking and Automation Billing Systems
942. Customer Care Service
943. BPO Call Center
944. Automation of IT Process Management
945. Modeling and Automated Containment of Worms
946. Attribute Key Based Data Security System
947. As Needed Basis Accountability for Cloud Data Sharing
948. Annotation of short texts With Wikipedia pages
949. AIRLINE RESERVATION SYSTEM
950. Advance User Management on Social Website
951. A Semantic Web Based Scientific News Aggregator
Android Application Projects
Android Apps
952. GPS LOCATION ALARM SYSTEM
953. Location Based Intelligent Mobile Organizer
954. BANK ACCOUNT TRACKER FOR ANDROID
955. UNIT CONVERTER
956. Tollgate payment System
957. Tips and Tax Calculator in Android
958. TEXT EDITOR FOR ANDROID
959. Student Attendance Tracking System
960. Smart Money With Daily Expenses
961. Simple And Secure Android TO DO List Application
962. Restaurant Table Order Management System
963. Online Shopping
964. Online Examination System For Android
965. ANDROID SHOPPING LOCATION IDENTIFIER
966. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
967. MOBILE TRAVEL GUIDE SMART WAY TO TRAVE
968. MICRO CREDIT BANKING ON SMARTPHONE
969. LOCATION BASED ALARM
970. Insurance in android
971. GOOGLE PLACE FINDER
972. Friend Mapper on Mobiles - Friend Locator
973. EXPENSE MANAGER
974. Employee Diractory
975. Online job search
976. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
977. ANDROID STUDENT RESULT ANALYZING SYSTEM
978. CloudMoV : Cloud-based Mobile Social TV
979. Bus Reservation
980. Budget Planner
981. Android SMS Systems
982. ANDROID LEAVE MANAGEMENT SYSTEM
983. ANDROID EVENT SCHEDULER/REMINDER
984. Android Grocery Shopping List
985. Android Attack Application
986. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
987. A Mobile Phone Based Medicine In-take Reminder and Monitor
PHP Application Projects
PHP Apps
988. WEB BASED LEARNING SYSTEM
989. Vendor Information System for Shipping
990. Tagging in online social networks
991. Step by Step Monitoring for Product Purchasing System
992. Secured file Downloading system
993. Cryptonite : A Secure and Performant Data Repository on Public Clouds
994. Secured data Collection method
995. searching a image from websites
996. System Purchasing Based Sales Analysis
997. Online University
998. Online product Opinion and Ranking System
999. MNC LEAVE MANAGEMENT SYSTEM
1000. HUMAN INSURANCE ADMINISTRATION
1001. Home appliances online purchase
1002. Freelancer Job
1003. E-Tutor Online Jobs
1004. Statistical Entity Extraction from Web
1005. Effective Collaborative Learning
1006. ONLINE AUCTION BIT
1007. Document Fraud Detecting System
1008. Development of an e-Post Office System
1009. Development of a feature-rich, Employee Transfer Application
1010. Question Answering System for an Effective Collaborative Learning
1011. Advance Company Account System
Struts Application Projects
Struts Apps
1012. Public Sentiment Analysis with Online Shopping Using Struts
1013. Modern distributed business for supply-chain management
1014. High Confidential Personal Disease Reporting System
1015. Distributor Sensitive Data Management Using Struts
1016. Development of Certificate Authority Services for Web Applications
1017. Access Control on User-To-User Interactions in Social Networks
Java Mini Projects
Mini Projects
1018. Website Tracking System
1019. Website Ranking System
1020. Treasure Warehouse
1021. Student Information System
1022. Storage security
1023. PRISON MANAGEMENT SYSTEM
1024. E-Licence Investigation System
1025. Online Secure File Transfer System
1026. Online Medicine Purchase
1027. ONLINE EDUCATION
1028. Online Agriculture System
1029. Mobile Survey
1030. ISSUE TRACKING SYSYTEM
1031. HOSPITAL MANAGEMENT SYSYTEMS
1032. HealthCare Management System
1033. Global Employee Acclaimer
1034. E-VOTING FOR ASSOCIATION
1035. Encrypted Register Form
1036. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1037. E INSURANCE
1038. Courier Tracking Systems
1039. corporate Transportation
1040. Collectorate Communication Systems
1041. Budget Approval System
1042. BLOOD BANK MANAGEMENT STSTEMS
1043. ATTENDANCE MANAGEMENT SYSTEM
1044. Activity management
Dotnet Mini Projects
Mini Projects
1045. VALUE ADDED TAX (VAT)
1046. User Oriented Network Attacks
1047. Secure Back Up
1048. Screen Capture And Mouse I/O
1049. Sales Bill Printing System using Excel
1050. Password Security
1051. Online User Mobile Rating
1052. Online Sensex Graph System
1053. Online Book Publishing
1054. NEWS TICKER PROJECT
1055. Multi Storage file
1056. Message Chating
1057. Medical Equipment in WAP
1058. Login Authentication Scheme
1059. Information Alert System
1060. Image Encryption And Decryption
1061. Generic Business Portal
1062. Flight Booking Portal
1063. File Transfer using Cryptography Techniques
1064. File Splitting
1065. Excel Format in Report
1066. EB Management System
1067. Dynamic Web Form Creation
1068. Android Image Search