Top Banner
2014-2015 Dotnet Projects MOBILE COMPUTING - WIRELESS COMMUNICATION 1. Keylogging-resistant Visual Authentication Protocols SOFTWARE ENGINEERING 2. Governing Software Process Improvements in Globally Distributed Product Development KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) 3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases 4. Dynamic Query Forms for Database Queries 5. Secure kNN Query Processing in Untrusted Cloud Environments 6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query 7. An Empirical Performance Evaluation of Relational Keyword Search Systems 8. Keyword Query Routing 9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures 10. Demand Bidding Program and Its Application in Hotel Energy Management 11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds 12. Incremental Detection of Inconsistencies in Distributed Data 13. A Cocktail Approach for Travel Package Recommendation 14. The Role of Hubness in Clustering High-Dimensional Data PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING 15. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems 16. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
62

2014 Project Title

Jan 18, 2016

Download

Documents

reena0307

Project Titles 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
2. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases
4. Dynamic Query Forms for Database Queries
5. Secure kNN Query Processing in Untrusted Cloud Environments
6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
7. An Empirical Performance Evaluation of Relational Keyword Search Systems
8. Keyword Query Routing
9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2014 Project Title

2014-2015 Dotnet Projects

MOBILE COMPUTING - WIRELESS COMMUNICATION

1. Keylogging-resistant Visual Authentication Protocols

SOFTWARE ENGINEERING

2. Governing Software Process Improvements in Globally Distributed Product Development

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases

4. Dynamic Query Forms for Database Queries

5. Secure kNN Query Processing in Untrusted Cloud Environments

6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query

7. An Empirical Performance Evaluation of Relational Keyword Search Systems

8. Keyword Query Routing

9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures

10. Demand Bidding Program and Its Application in Hotel Energy Management

11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds

12. Incremental Detection of Inconsistencies in Distributed Data

13. A Cocktail Approach for Travel Package Recommendation

14. The Role of Hubness in Clustering High-Dimensional Data

PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING

15. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

16. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

17. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes

Page 2: 2014 Project Title

18. Uniform Embedding for Efficient JPEG Steganography

19. Secure Deduplication with Efficient and Reliable Convergent Key Management

20. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks

21. Link Quality Aware Code Dissemination in Wireless Sensor Networks

22. Exploiting Service Similarity for Privacy in Location Based Search Queries

CLOUD COMPUTING

23. Privacy Preserving Delegated Access Control in Public Clouds

24. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks25. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query26. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor

27. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users

28. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query

29. A Mechanism Design Approach to Resource Procurement in Cloud Computing

30. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud

31. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage

32. A Scientometric Analysis of Cloud Computing Literature

33. Consistency as a Service Auditing Cloud Consistency

SECURE COMPUTING

IMAGE PROCESSING - MULTIMEDIA

34. FeatureMatch: A General ANNF Estimation Technique and its Applications

35. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion36. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics

37. As-Projective-As-Possible Image Stitching with Moving DLT

Page 3: 2014 Project Title

38. Sharing Visual Secrets in Single Image Random Dot Stereograms

39. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces

40. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering

41. A New Iterative Triclass Thresholding Technique in Image Segmentation

42. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?43. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms

44. An Iranian License Plate Recognition System Based on Color Features

45. Learning Layouts for Single-Page Graphic Designs

46. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image47. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion

48. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks

49. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform

50. Fingerprint Compression Based on Sparse Representation

51. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application

52. LBP-Based Edge-Texture Features for Object Recoginition

53. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework

54. Toward Experiential Mobile Media Processing

55. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors

56. Corruptive Artifacts Suppression for Example-Based Color Transfer

NETWORKING

57. Designing Truthful Spectrum Double Auctions with Local Markets

58. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

59. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail

Page 4: 2014 Project Title

60. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks

61. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey

62. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management

63. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks

INTERNATIONAL CONFERENCE

64. Online Payment System using Steganography and Visual Cryptography

65. Efficient Instant-Fuzzy Search with Proximity Ranking

66. Attribute Based Encryption with Privacy Preserving In Clouds

67. A Secure Client Side Deduplication Scheme in Cloud Storage Environments

Page 5: 2014 Project Title

2013-2014 Dotnet Projects

IMAGE PROCESSING - MULTIMEDIA

143. Visual Object Tracking Based on Local Steering Kernels and Color Histograms

144. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores

145. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization

146. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition

147. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering

NETWORKING

148. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey

149. The Target Tracking in Mobile Sensor Networks

150. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay

151. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

152. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking

153. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks

154. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks

155. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks

SOFTWARE ENGINEERING

156. Analyzing the Friendliness of Exchanges in an Online Software Developer Community

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

157. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development

158. SUSIE: Search Using Services and Information Extraction

159. SeDas: A Self-Destructing Data System Based on Active Storage Framework

Page 6: 2014 Project Title

160. Secure Mining of Association Rules in Horizontally Distributed Databases

161. Sampling Online Social Networks

162. Privacy Preserving Delegated Access Control in Public Clouds

163. Mining Order-Preserving Submatrices from Data with Repeated Measurements

164. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks

165. Ginix : Generalized Inverted Index for Keyword Search

166. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department167. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)

168. ELCA : Evaluation for Keyword Search on Probabilistic XML Data

169. Dynamic Query Forms for Database Queries

170. Cost-Based Optimization of Service Compositions

171. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective

172. Constructing a Global Social Service Network for Better Quality of Web Service Discovery

173. Automatic Extraction of Top-k Lists from the Web

174. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

175. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates

176. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data177. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model

PARALLEL AND DISTRIBUTED SYSTEMS

178. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

179. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

180. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data

181. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks

Page 7: 2014 Project Title

SECURE COMPUTING

182. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

183. Privacy Preserving Data Sharing With Anonymous ID Assignment

184. Non-Cooperative Location Privacy

185. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

186. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol

CLOUD COMPUTING

187. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

188. Cloud based emails boundaries and vulnerabilities

189. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks

MOBILE COMPUTING - WIRELESS COMMUNICATION

190. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

191. Optimal Multicast Capacity and Delay Tradeoffs in MANETs

192. Optimal Content Downloading in Vehicular Networks

193. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks

194. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

Page 8: 2014 Project Title

2012-2013 Dotnet Projects

IMAGE PROCESSING - MULTIMEDIA

341. View-invariant action recognition based on Artificial Neural Networks

342. User-aware Image Tag Refinement via Ternary Semantic Analysis

343. Separable Reversible Data Hiding in Encrypted Image

344. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval

345. Robust Watermarking of Compressed and Encrypted JPEG2000 Images

346. Robust Face-Name Graph Matching for Movie Character Identification

347. IntentSearch:Capturing User Intention for One-Click Internet Image Search

348. Improving Color Constancy by Photometric Edge Weighting

349. Exploring the design space of social network-based Sybil defenses

350. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

351. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

352. AnnoSearch: Image Auto-Annotation by Search

353. Altered Fingerprints: Analysis and Detection

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

354. Scalable Scheduling of Updates in Streaming Data Warehouses

355. Scalable Learning of Collective Behavior

356. Ranking Model Adaptation for Domain-Specific Search

357. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

358. Outsourced Similarity Search on Metric Data Assets

Page 9: 2014 Project Title

359. Organizing User Search Histories

360. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering

361. Mining Web Graphs for Recommendations

362. Joint Top K Spatial Keyword Query Processing

363. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

364. Identifying Content for Planned Events Across Social Media Sites

365. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing

366. Generative Models for Item Adoptions Using Social Correlation

367. Efficient Data Mining for XML Queries Answering Support

368. Efficient audit service outsourcing for data integrity in clouds

369. Efficient and Accurate Discovery of Patterns in Sequence Data Sets

370. Effective Pattern Discovery for Text Mining

371. Combined Mining: Discovering Informative Knowledge in Complex Data

372. Decentralized Probabilistic Text Clustering

373. Computing Structural Statistics by Keywords in Databases

374. Bridging Social and Data Networks

375. Answering General Time-Sensitive Queries

376. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication

377. A Query Formulation Language for the Data Web

PARALLEL AND DISTRIBUTED SYSTEMS

378. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

379. Dynamic Authentication for Cross-Realm SOA-Based Business Processes

380. Resource-Aware Application State Monitoring

Page 10: 2014 Project Title

381. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection

382. Query Access Assurance in Outsourced Databases

383. Linear and Differential Cryptanalysis

384. Expert Discovery and Interactions in Mixed Service-Oriented Systems

385. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

386. In Cloud, Can Scientific Communities Benefit from the Economies of Scale

387. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks

388. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

389. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs

390. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

SECURE COMPUTING

391. ROAuth: Recommendation Based Open Authorization

392. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique

393. Recommendation Models for Open Authorization

394. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group

395. Packet-Hiding Methods for Preventing Selective Jamming Attacks

396. On Privacy of Encrypted Speech Communications

397. OAuth Web Authorization Protocol

398. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

399. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion

400. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

401. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

402. Fast Matrix Embedding by Matrix Extending

Page 11: 2014 Project Title

403. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

404. Automatic Reconfiguration for Large-Scale Reliable Storage Systems

405. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service

406. Access control for online social networks third party applications

SOFTWARE ENGINEERING

407. Measuring Code Quality to Improve Specification Mining

408. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development

CLOUD COMPUTING

409. Towards Secure and Dependable Storage Services in Cloud Computing

410. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

411. Remote Display Solutions for Mobile Cloud Computing

412. Privacy Preserving Delegated Access Control in Public Clouds

413. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing

414. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing

NETWORKING

415. SPREAD: Improving network security by multipath routing in mobile ad hoc networks

416. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms

417. Load-Balancing Multipath Switching System with Flow Slice

418. Assessing the Veracity of Identity Assertions via OSNs

419. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform

420. A Reliable Multi-Grid Routing Protocol for Tactical MANETs

421. A New Cell-Counting-Based Attack Against Tor

422. A Keyless Approach to Image Encryption

Page 12: 2014 Project Title

MOBILE COMPUTING - WIRELESS COMMUNICATION

423. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

424. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

425. Network Assisted Mobile Computing with Optimal Uplink Query Processing

426. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions

427. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees

428. Fast Release Capture Sampling in Large-Scale Sensor Networks

429. Cooperative download in vehicular environments

430. Cooperative Data Dissemination via Roadside WLANs

431. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

INTERNATIONAL CONFERENCE

432. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks

433. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines

434. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors

435. Hiding Sensitive Association Rule for Privacy Preservation

436. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks

437. Development of Certificate Authority Services for Web Applications

438. Detecting and Validating Sybil Groups in theWild

439. Association Rule Extracting Knowledge Using Market Basket Analysis

440. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

Page 13: 2014 Project Title

2013-2014 Java Projects

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

195. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)

196. Vickrey-Clarke-Groves for privacy-preserving collaborative classification

197. User Action Interpretation for Online Content Optimization

198. Spatial Query Integrity with Voronoi Neighbors

199. Spatial Approximate String Search

200. Sensitive Label Privacy Protection on Social Network Data

201. Secure Mining of Association Rules in Horizontally Distributed Databases

202. Secure Logging As a Service Delegating Log Management to the Cloud

203. Robust Module-based Data Management

204. Ranking on Data Manifold with Sink Points

205. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases

206. Privacy-Enhanced Web Service Composition

207. Privacy against Aggregate Knowledge Attacks

208. Preventing Private Information Inference Attacks on Social Networks

209. PMSE: A Personalized Mobile Search Engine

210. Personalized QoS-Aware Web Service Recommendation and Visualization

211. Optimal Client-Server Assignment for Internet Distributed Systems

Page 14: 2014 Project Title

212. Online Search and Buying Behaviour in Consumer Markets

213. M-Privacy for Collaborative Data Publishing

214. Mining User Queries with Markov Chains: Application to Online Image Retrieval

215. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval

216. Incentive Compatible Privacy-Preserving Data Analysis

217. Improving Security and Efficiency in Attribute-Based Data Sharing

218. FoCUS: Learning to Crawl Web Forums

219. Fast Nearest Neighbor Search with Keywords

220. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks

221. Facilitating Effective User Navigation through Website Structure Improvement

222. Facilitating Document Annotation using Content and Querying Value

223. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)

224. Efficient Evaluation of SUM Queries over Probabilistic Data*

225. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases

226. Dynamic Query Forms for Database Queries

227. Dynamic Personalized Recommendation on Sparse Data

228. Distributed Strategies for Mining Outliers in Large Data Sets

229. Crowdsourcing Predictors of Behavioral Outcomes

230. Co-Occurrence-Based Diffusion for Expert Search on the Web

231. Comparable Entity Mining from Comparative Questions

232. CloudMoV: Cloud-based Mobile Social TV

233. Anomaly Detection via Online Oversampling Principal Component Analysis

234. Anomaly Detection Approach Using Hidden Markov Model

Page 15: 2014 Project Title

235. Annotating Search Results from Web Databases

236. A System to Filter Unwanted Messages from OSN User Walls

237. A Survey of XML Tree Patterns

238. A Probabilistic Approach to String Transformation

239. A New Algorithm for Inferring User Search Goals with Feedback Sessions

240. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining

241. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior

242. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

243. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

244. A Data-Mining Model for Protection of FACTS-Based Transmission Line

PARALLEL AND DISTRIBUTED SYSTEMS

245. Towards Differential Query Services in Cost-Efficient Clouds

246. SybilDefender: Defend Against Sybil Attacks in Large Social Networks

247. SocialTube: P2P-assisted Video Sharing in Online Social Networks

248. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

249. QoS Ranking Prediction for Cloud Services

250. Priority-Based Consolidation of Parallel Workloads in the Cloud

251. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

252. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

253. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks

254. Load Rebalancing for Distributed File Systems in Clouds

255. Label-Embedding for Attribute-Based Classification

256. IP-Geolocation Mapping for Moderately Connected Internet Regions

Page 16: 2014 Project Title

257. Identity-Based Secure Distributed Data Storage Schemes

258. Hint-based Execution of Workloads in Clouds with Nefeli

259. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks

260. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System

261. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems

262. Efficient Two-Server Password-Only Authenticated Key Exchange

263. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

264. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

265. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud

CLOUD COMPUTING

266. Winds of Change: From Vendor Lock-In to the Meta Cloud

267. Supporting the Migration of Applications to the Cloud through a Decision Support System

268. Storing Shared Data on the Cloud via Security-Mediator

269. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing

270. Privacy-Preserving Public Auditing for Secure Cloud Storage

271. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud

272. Outsourcing Privacy-Preserving Social Networks to a Cloud

273. Mining Contracts for Business Events and Temporal Constraints in Service Engagements

274. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme

275. Fault Tolerance Management in Cloud Computing: A System-Level Perspective

276. Efficient Security Solution for Privacy-Preserving Cloud Services

277. Collaboration in Multicloud Computing Environments: Framework and Security Issues

278. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud

Page 17: 2014 Project Title

279. Cloud-based DDoS Attacks and Defenses

280. Cloud computing for mobile users can offloading compution save energy

281. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing282. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds283. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT

284. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing

285. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

SECURE COMPUTING

286. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach

287. Two tales of privacy in online social networks

288. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing

289. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

290. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment

291. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

292. Security and Privacy-Enhancing Multicloud Architectures

293. Security Using Colors and Armstrong Numbers

294. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

295. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis

296. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model

297. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

298. Privacy Preserving Data Analytics for Smart Homes

299. On Inference-Proof View Processing of XML Documents

300. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Page 18: 2014 Project Title

301. Extracting Spread-Spectrum Hidden Data from Digital Media

302. Efficiently Outsourcing Multiparty Computation under Multiple Keys

303. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection

304. Craigslist Scams and Community Composition: Investigating Online Fraud

305. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

306. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme

IMAGE PROCESSING - MULTIMEDIA

307. Understanding the External Links of Video Sharing Sites: Measurement and Analysis

308. Super-Resolution-based Inpainting

309. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

310. Image Authentication Using Stochastic Diffusion

311. Hierarchical Super-Resolution-Based Inpainting

312. Circular Reranking for Visual Search

313. Bootstrapping Visual Categorization With Relevant Negatives

314. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information

315. An extended visual cryptography scheme without pixel expansion for halftone images

316. An Adaptive Cloud Downloading Service

NETWORKING

317. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks

318. Topological Conditions for In-Network Stabilization of Dynamical Systems

319. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility

320. Price Differentiation for Communication Networks

321. Participatory Privacy: Enabling Privacy in Participatory Sensing

Page 19: 2014 Project Title

322. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks

323. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

324. On the Role of Mobility for Multi-message Gossip

325. Fully Anonymous Profile Matching in Mobile Social Networks

326. Fault Node Recovery Algorithm for a Wireless Sensor Network

327. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

328. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks

329. Access Policy Consolidation for Event Processing Systems

330. A Fast Re-Route Method

SOFTWARE ENGINEERING

331. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud

MOBILE COMPUTING - WIRELESS COMMUNICATION

332. Vampire attacks: Draining life from wireless ad-hoc sensor networks

333. Towards a Statistical Framework for Source Anonymity in Sensor Networks

334. Search Me If You Can: Privacy-preserving Location Query Service

335. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks

336. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks

337. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users

338. Distributed Cooperative Caching in Social Wireless Networks

339. Community-Aware Opportunistic Routing in Mobile Social Networks

340. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

Page 20: 2014 Project Title

2014-2015 Java Projects

MOBILE COMPUTING - WIRELESS COMMUNICATION

68. Video Dissemination over Hybrid Cellular and Ad Hoc Networks

69. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

70. Preserving Location Privacy in Geo-Social Applications

71. Efficient Authentication for Mobile and Pervasive Computing

72. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability

73. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

74. Fast Nearest Neighbor Search with Keywords

75. Towards Differential Quer y Ser vices in Cost-Efficient Clouds

76. Facilitating Document Annotation using Content and Querying Value

77. Dynamic Query Forms for Database Queries

78. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation

79. Secure Outsourced Attribute-Based Signatures

80. Supporting Privacy Protection in Personalized Web Search

81. Dealing With Concept Drifts in Process Mining

82. Building Confidential and Efficient Query Services in the Cloud with RASP Data

Page 21: 2014 Project Title

Perturbation

83. A Meta-Top-Down Method for Large-Scale Hierarchical Classification

84. Capturing Telic/Atelic Temporal Data Semantics: Generalizing Conventional Conceptual Models

85. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme

86. Active Learning of Constraints for Semi-Supervised Clustering

87. Best Keyword Cover Search

88. Personalized Recommendation Combining User Interest and Social Circle

89. Online Feature Selection and Its Applications

90. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization

91. Incremental Affinity Propagation Clustering Based on Message Passing

92. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data

93. Secure kNN Query Processing in Untrusted Cloud Environments

94. Malware Propagation in Large-Scale Networks

95. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth

96. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance

97. Discovering Emerging Topics in Social Streams via Link Anomaly Detection

98. Efficient Ranking on Entity Graphs with Personalized Relationships

99. Task Trail: An Effective Segmentation of User Search Behavior

100. Privacy-Preserving Enhanced Collaborative Tagging

101. XSPath Navigation on XML Schemas Made Easy

102. Security Evaluation of Pattern Classifiers under Attack

103. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery

104. On Skyline Groups

Page 22: 2014 Project Title

PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING

105. SocialTube: P2P-assisted Video Shar ing in Online Social Networ

106. Behavioral Malware Detection in Delay Tolerant Networks

107. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

108. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service

109. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption

110. Private Searching on Streaming Data Based on Keyword Frequency

111. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage

112. On the Security of Trustee-Based Social Authentications

113. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

114. Community-home-based Multi-copy Routing in Mobile Social Networks

115. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

116. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact

117. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

118. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

119. A Two-stage Deanonymization Attack Against Anonymized Social Networks

120. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

CLOUD COMPUTING

121. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

122. A Hybrid Cloud Approach for Secure Authorized Deduplication

123. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

124. Performance and cost evaluation of an adaptive encryption architecture for cloud databases

125. A Novel Model for Competition and Cooperation Among Cloud Providers

Page 23: 2014 Project Title

126. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept

127. CLOUDQUAL: A Quality Model for Cloud Services

128. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud

SECURE COMPUTING

IMAGE PROCESSING - MULTIMEDIA

129. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites

130. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems

NETWORKING

131. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept

132. Scaling Laws for Throughput Capacity and Delay in Wireless Networks

133. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact

134. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs

135. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing

INTERNATIONAL CONFERENCE

136. Operational Pattern Revealing Technique in Text Mining

137. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data

138. Personalized web search using Browsing history and domain Knowledge

139. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption

140. Data Security the Challenge of Cloud Computing

141. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance

142. A Cloud Enviroment for Backup and Data Storage

Page 24: 2014 Project Title

2012-2013 Java Projects

SECURE COMPUTING

441. The Devils Behind Web Application Vulnerabilities

442. Security Architecture for Cloud Networking

443. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems

444. Secure Overlay Cloud Storage with Access Control and Assured Deletion

445. Risk-Aware Mitigation for MANET Routing Attacks

Page 25: 2014 Project Title

446. Remote Attestation with Domain-Based Integrity Model and Policy Analysis

447. Privacy-preserving Enforcement of Spatially Aware RBAC

448. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

449. pCloud: A Distributed System for Practical PIR

450. Packet-Hiding Methods for Preventing Selective Jamming Attacks

451. Online Modeling of Proactive Moderation System for Auction Fraud Detection

452. Fast and accurate annotation of short texts with Wikipedia pages

453. FADE: Secure Overlay Cloud Storage with File Assured Deletion

454. Ensuring Distributed Accountability for Data Sharing in the Cloud

455. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications

456. Direct and Indirect Discrimination Prevention Methods

457. Detecting Spam Zombies by Monitoring Outgoing Messages

458. Detecting Anomalous Insiders in Collaborative Information Systems

459. Data-Provenance Verification For Secure Hosts

460. A Learning-Based Approach to Reactive Security

PARALLEL AND DISTRIBUTED SYSTEMS

461. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

462. Payments for Outsourced Computations

463. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations

464. Capacity of Data Collection in Arbitrary Wireless Sensor Networks

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

465. Toward Private Joins on Outsourced Data

466. Statistical Entity Extraction from Web

Page 26: 2014 Project Title

467. Slicing: A New Approach to Privacy Preserving Data Publishing

468. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback

469. Resilient Identity Crime Detection

470. Ranking Model Adaptation for Domain-Specific Search

471. Organizing User Search Histories

472. On the Spectral Characterization and Scalable Mining of Network Communities

473. Multiparty Access Control for Online Social Networks: Model and Mechanisms

474. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems

475. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines

476. How do Facebookers use Friendlists

477. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining

478. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection

479. A Framework for Personal Mobile Commerce Pattern Mining and Prediction

480. Enabling Multilevel Trust in Privacy Preserving Data Mining

481. Enabling cross-site interactions in social networks

482. Efficient Similarity Search over Encrypted Data

483. Efficient Extended Boolean Retrieval

484. Efficient Computation of Range Aggregates against Uncertain Location Based Queries

485. Efficient Anonymous Message Submission

486. Effective Pattern Discovery for Text Mining

487. DDD: A New Ensemble Approach for Dealing with Concept Drift

488. Credibility Ranking of Tweets during High Impact Events

489. Creating Evolving User Behavior Profiles Automatically

Page 27: 2014 Project Title

490. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations

491. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition

492. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences

493. Anomaly Detection for Discrete Sequences: A Survey

494. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups

495. Advance Mining of Temporal High Utility Itemset

496. A Temporal Pattern Search Algorithm for Personal History Event Visualization

CLOUD COMPUTING

497. Reliable Re-encryption in Unreliable Clouds

498. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud

499. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure

500. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks

501. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage

502. Gossip-based Resource Management for Cloud Environments

503. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

504. Costing of Cloud Computing Services: A Total Cost of Ownership Approach

505. Cloud Data Protection for the Masses

506. Cloud Computing Security: From Single to Multi-Clouds

507. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage

MULTIMEDIA

508. In Tags We Trust Trust modeling in social tagging of multimedia content

509. Learn to Personalized Image Search from the Photo Sharing Websites

MOBILE COMPUTING

Page 28: 2014 Project Title

510. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

511. Fast Data Collection in Tree-Based Wireless Sensor Networks

SOFTWARE ENGINEERING

512. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems

WIRELESS COMMUNICATIONS

513. Cut Detection in Wireless Sensor Networks

514. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

NETWORKING

515. TrickleDNS: Bootstrapping DNS Security using Social Trust

516. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

517. Policy-by-Example for Online Social Networks

518. Packet Loss Control Using Tokens at the Network Edge

519. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

520. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring

521. Independent Directed Acyclic Graphs for Resilient Multipath Routing

522. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing

523. Game-Theoretic Pricing for Video Streaming in Mobile Networks

524. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

525. Auditing for Network Coding Storage

526. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System

INTERNATIONAL CONFERENCE

527. Privacy Preserving Cloud Data Access With Multi-Authorities

528. Movie Rating and Review Summarization in Mobile Environment

Page 29: 2014 Project Title

529. IDSaaS: Intrusion Detection System as a Service in Public Clouds

530. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems

531. BibPro: A Citation Parser Based on Sequence Alignment Techniques

532. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

2011-2012 Dotnet Projects

NETWORKING

533. Valuable Detours: Least-Cost Anypath Routing

534. Self-Reconfigurable Wireless Mesh Networks

535. Reliability in Layered Networks with Random Link Failures

536. NABS:Novel Approaches for Biometric Systems

537. Live Streaming with Receiver-based Peer-division Multiplexing

Page 30: 2014 Project Title

538. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

539. Continuous Neighbor Discovery in Asynchronous Sensor Networks

540. Congestion Detection for Video Traffic in Wireless Sensor Networks

IMAGE PROCESSING - MULTIMEDIA

541. Virtualized Screen: A Third Element for CloudMobile Convergence

542. Steganographic Embedding in JPEG Images with Visual Criterion

543. On the Typical Statistic Features for Image Blind Steganalysis

544. A Novel Video Steganography based on Non-uniform Rectangular Partition

PARALLEL AND DISTRIBUTED SYSTEMS

545. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks

546. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems

547. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud

548. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

549. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks

SERVICE COMPUTING

550. Vulnerability Analysis in SOA-Based Business Processes

551. Service-Oriented Architecture for High-Dimensional Private Data Mashup

552. Service-Centric Framework for a Digital Government Application

553. Server-Side Streaming Processing of WS-Security

554. OWLPath: An OWL Ontology-Guided Query Editor

555. Monitoring Service Systems from a Language-Action Perspective

556. Extracting Product Features and Sentiments from Chinese Customer Reviews

557. Expert Discovery and Interactions in Mixed Service-Oriented Systems

Page 31: 2014 Project Title

558. Automated Certification for Compliant Cloud-based Business Processes

559. Addressing Dependability throughout the SOA Life Cycle

560. A Loosely Coupled Integration Environment for Collaborative Applications

SECURE COMPUTING

561. The Geometric Efficient Matching Algorithm for Firewalls

562. Secure Service-Oriented Architecture for Mobile Transactions

563. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking

564. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables

565. Privacy-Preserving Updates to Anonymous and Confidential Databases

566. Online Intrusion Alert Aggregation with Generative Data Stream Modeling

567. IPAS: Implicit Password Authentication System

568. Improving Security and Performance in the Tor Network through Tunable Path Selection

569. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error570. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks

571. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks

MOBILE COMPUTING - WIRELESS COMMUNICATION

572. Throughput Optimization in High Speed Downlink Packet Access (HSDPA

573. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure

574. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems

575. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

576. Data Delivery Properties of Human Contact Networks

577. Converge-Cast: On the Capacity and Delay Tradeoffs

578. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks

Page 32: 2014 Project Title

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

579. USHER: Improving Data Quality with Dynamic Forms

580. The World in a Nutshell: Concise Range Queries

581. Selecting Attributes for Sentiment Classification Using Feature Relation Networks

582. Scalable Scheduling of Updates in Streaming Data Warehouses

583. Scalable Learning of Collective Behavior

584. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

585. Publishing Search Logs A Comparative Study of Privacy Guarantees

586. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks

587. Optimal Service Pricing for a Cloud Cache

588. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases589. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks

590. Mining Web Graphs for Recommendations

591. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies

592. Integration of Sound Signature Authentication System

593. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

594. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

595. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing

596. Exploring Application-Level Semantics for Data Compression

597. Efficient and Accurate Discovery of Patterns in Sequence Data Sets

598. Data Leakage Detection

599. Cost-aware rank join with random and sorted access

600. Collaborative Filtering with Personalized Skylines

Page 33: 2014 Project Title

601. Bridging Socially-Enhanced Virtual Communities

602. Automatic Discovery of Personal Name Aliases from the Web

603. A Personalized Ontology Model for Web Information Gathering by Domain Specific Search

604. Adaptive Provisioning of Human Expertise in Service-oriented Systems

605. A Query Formulation Language for the Data Web

606. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

607. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts

608. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases

609. A Dual Framework and Algorithms for Targeted Data Delivery

CLOUD COMPUTING

610. Towards Secure and Dependable Storage Services in Cloud Computing

611. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

612. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds

613. Data Integrity Proofs in Cloud Storage

614. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing

615. A Medical Image Archive Solution in the Cloud

INTERNATIONAL CONFERENCE

616. Feature-level Sentiment Analysis for Chinese Product Reviews

617. Equal-sized Cells Mean Equal-sized Packets in Tor?

618. Customer Relationship Management Based on Data Mining Technique

619. Authentication Schemes for Session Passwords using Color and Images

620. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service

Page 34: 2014 Project Title

2011-2012 Java Project

SECURE COMPUTING

621. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

622. RITAS: Services for Randomized Intrusion Tolerance

623. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance

624. Nymble: Blocking Misbehaving Users in Anonymizing Networks

625. Modeling and Detection of Camouflaging Worm

Page 35: 2014 Project Title

626. Coding for Cryptographic Security Enhancement using Stopping Sets

627. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree

SOFTWARE ENGINEERING

MOBILE COMPUTING - WIRELESS COMMUNICATION

628. Wireless Sensor Network Security model using Zero Knowledge Protocol

629. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks

630. Throughput Optimization in Mobile Backbone Networks

631. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks

632. Secure High-Throughput Multicast Routing in Wireless Mesh Networks

633. Fast Data Collection in Tree-Based Wireless Sensor Networks

634. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs

635. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

NETWORKING

636. SPAF: Stateless FSA-based Packet Filters

637. Selfish Overlay Network Creation and Maintenance

638. ProgME: Towards Programmable Network MEasurement

639. Locating Equivalent Servants over P2P Networks

640. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

641. Buffer Sizing for 802.11 Based Networks

642. A New Multi-path Routing Methodology Based on Logit Type Assignment

CLOUD COMPUTING

643. Secure and Practical Outsourcing of Linear Programming in Cloud Computing

644. Improving Utilization of Infrastructure Clouds

Page 36: 2014 Project Title

645. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds

646. CloudTPS: Scalable Transactions for Web Applications in the Cloud

647. Cloud Computing for Agent-Based Urban Transportation Systems

KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)

648. The CoQUOS Approach to Continuous Queries in Unstructured Overlays

649. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support

650. Ranking Spatial Data by Quality Preferences

651. Making Aggregation Work in Uncertain and Probabilistic Databases

652. Load Shedding in Mobile Systems with MobiQual

653. Group Enclosing Queries

654. Extended XML Tree Pattern Matching: Theories and Algorithms

655. Effective Navigation of Query Results Based on Concept Hierarchies

656. Discovering Conditional Functional Dependencies

657. Decision Trees for Uncertain Data

658. Data Leakage Detection

659. Adaptive Cluster Distance Bounding for High Dimensional Indexing+

PHP Projects

PHP Projects

660. Statistical Entity Extraction from Web

661. Question Answering System for an Effective Collaborative Learning

662. Lost in Translation: Improving Decoy Documents via Automated Translation

663. Learn to Personalized Image Search from the Photo Sharing Websites

664. In Tags We Trust Trust modeling in social tagging of multimedia content

Page 37: 2014 Project Title

665. Efficient Anonymous Message Submission

666. Cryptonite: A Secure and Performant Data Repository on Public Clouds

Dotnet Application Projects

Dotnet Apps

667. Online Virtualized screen Processing

668. Web Service for Airline Management

669. Web Social Club

670. Quantum Key Cryptography

671. Patient Data Management Based On Hospital Location

Page 38: 2014 Project Title

672. Online Software Developer Community

673. Online Developed Software sales

674. Avoid repeated measurements On Genetics Dataset

675. College Lab Maintenance System

676. Industrial Manpower Resource Organizer

677. Web Query Construction and Search on Complex Data

678. Hospital Emergency Data Management

679. Data confidentiality On Health-care Information System

680. Secure Online Trading

681. Fast Real-Time Event Alert Using social Network

682. Secure E-Mail Organizer

683. Web User Service Management System

684. Easy SQL Query for Non-IT Manager

685. Hotels Ranking on Web Personal Evaluation Tool (Web PET)

686. Customer Relationship Management (CRM) on Banking

687. Online Company ERP System

688. Constructing E-Tourism

689. Web based Multi Service Ranking System

690. Dynamic Customer Data Hiding in Banking

691. Online Distributed Social Clubs

692. Virtual Shopping with Negative Feedback Reputation Systems

693. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity

694. Web Service Oriented Query Authentication Technique

Page 39: 2014 Project Title

695. Web Based Customer Favorite vehicle Search Engine

696. Web Based Book Publishing System

697. Virtual Energy- Based Encryption and Keying

698. Video Fraud Detecting On social Network

699. Video Compression with Data hiding & Data Extraction

700. Vendor Information System for Shipping

701. VALUE ADDED TAX (VAT)

702. Universal Smart Card

703. Ultimate Location Information Systems

704. Top K Ranking System

705. Techno Task Manager

706. Supply Chain Management

707. Substitution-Permutation cryptanalysis System

708. Streaming Data Warehouse Updations

709. Step by Step Monitoring for Product Purchasing System

710. Steganography for Data Reading and Writing AVI files

711. SQL TUNER

712. SMS Transaction Security

713. Session Authentication Passwords using Color

714. Service Availability Guarantees on Virtual Economy

715. Server Fraud Detection on Cloud

716. Sentence Based Search on Cloud

717. Semantic Web Search Engines

Page 40: 2014 Project Title

718. Secured Image communicator

719. Secure smart application on web application

720. Secure Service-Oriented Smartcard systems

721. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).

722. Secure Location Identification System

723. Secure and Cloud Based Patient Information Systems

724. Reduce the Password Guessing Attacks using Click Point

725. Recommendation System Based on Graph

726. Quantum Key Cryptography

727. Quality Controller

728. Public Web Status Monitoring System

729. Project Trade Pool

730. Product Marketing Analysis On Public Opinion

731. Predicting Users Behaviors Using Web Mining

732. Personal Health Information on M-Healthcare Emergency

733. Optimum Online Knowledge Base

734. Online Training Program

735. Online Time sensitive queries

736. Online Tag Based Image Retrieval and Effective Management

737. Online Social networks controls using cloud

738. Online Rental System

739. Online product Opinion and Ranking System

740. Online Dynamic form creation for Non-IT Peoples

Page 41: 2014 Project Title

741. Online Digital Contract Signing in Mistrusted Parities

742. Online Aventure

743. Online Shopping

744. News Ticker Project

745. Net Bank in Recharge

746. Multi User Public Auditing System of Data Storage Security

747. Multi Location Networked Mobile Auto Intimates

748. Modern Distributed Business Applications for Supply Chain Management

749. Market Intelligence Based Public Sentiment Analysis

750. Leave Management System

751. Joint processing of spatial keyword queries

752. Intelligence Missing Items in Shopping Cart

753. Information Leak Detection and Prevention

754. Industrial Manpower Resource Organizer

755. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine

756. Human Expertise Search Engine

757. Home appliances online Purchase

758. High Secure Corporate Web Search Engine

759. High Degree Patient Privacy on Secure Data Outsourcing

760. Group Movement Pattern Discovery

761. Graph Based Share Market Data Updating

762. Generic Business Portal

763. Flight Booking Portal

Page 42: 2014 Project Title

764. Firewall using Packet Filtering

765. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers

766. Ethical and Social issues in File sharing system

767. Enterprener Sales Report Management

768. Encyclopedia for Computer Science

769. Employee Based Performance Monitoring and Action Systems

770. Emerging Patient Health Information Exchange System On Cloud

771. Efficient Search on Outsourced data using Cloud

772. Efficient and Secure Data Processing on Queries Similarity

773. Distributed Database Optimization on HealthCare

774. Digital Asset Management Systems (DAMS) Using Watermarking

775. Detecting Fraud on Vehicle Insurance System

776. Defeating Lazy Servers Database Vs Query Access Assurance

777. Data Processing for Disease-Treatment Relations

778. Data Mining Analysis on EB bill system

779. Data confidential against untrusted servers using attribute-based encryption (ABE)

780. Data Aggregation using SQL clustering

781. Customer Sales Analysis System Based On Purchasing

782. Cryptography on Personal confidential information

783. Cost Based Secure Cloud Data Systems

784. Market Based Analysis for consumer correct decision

785. Construction Company Work Order System

786. Complete Medical Transcription System(Mts)

Page 43: 2014 Project Title

787. Company Security Reporting System(CSRS)

788. College Result Analysis

789. Cloud Economic Benefit On Scientific Computing

790. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent

791. Centralized Event Planer across Social Media Sites

792. Call Center Management

793. A Reservation-Based Coordination Protocol for Web Services

794. Building construction and cost estimation

795. Budget Planner

796. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

797. Automatically identifying query groups on Web Search Engine

798. Auditing Data integrity and data storage using cloud

799. Application layer blocker for preventing on cyber security

800. Advanced One-Click User Web Search Engine

801. Advance Patient Management System

Java Application Projects

Java Apps

802. Protecting Used Data Privacy for Attackers

803. Web Hospital Management

804. Easy SQL Query for Non-IT Manager

805. Online Shopping with Fraud detection

806. Efficient Spatial Query Processing

Page 44: 2014 Project Title

807. Cryptographic Key Exchange Authentication

808. Online Global Information Service Center

809. Contracts Business Events Management

810. Online Secure image Social Networks

811. Outsourcing of Online Image Reconstruction

812. Trust based Profile Matching Secure Social Network

813. Secure and Distance based Online Social Network (OSN)

814. Efficient Online Image Retrieval System

815. Data Sharing In Cloud Storage by Using Key-Aggregate

816. Multicast Key Management for Cloud

817. Face-to-face contact on Mobile Social Networks

818. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior

819. Dynamically Growing Online Survey for Behavioral Outcomes

820. Advance Web based Multimedia Answer Generation

821. College Result Analysis with Horizontally Distributed Databases

822. Feedback Decision Support for mHealth monitoring

823. Exchange Secrete Key for Data Producers and Consumers

824. Efficient Information Retrieval Using Ranked Query (EIRQ)

825. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM

826. Web Hosting On Cloud

827. Web Usage Mining : A Survey on Pattern Extraction from Web Logs

828. Web Server Security with Web Client Management System

829. Web Parser on Sequence Alignment Techniques

Page 45: 2014 Project Title

830. Web Page re-Ranking System for Library

831. Web Eye

832. Voting System for Web Library

833. VIRTUAL CLASSROOM SYSTEM

834. Unique Web Resources Utilization Monitoring System

835. Transport Management System

836. Pre-paid Recharging System on Banking

837. Tollgate Management

838. Time To Time Stock Market Updater and Monitoring System

839. Sql Tuner

840. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT

841. SMS Based Mobile Banking with Security

842. Sms Topup

843. Vendor Information System For Shipping

844. Sequential Anomaly Detection from User Behaviour

845. Secure SMS Transaction System on banking

846. Secure Online Documents Management System in Cloud

847. Secure File Uploading Server with Advance Protecting System

848. Secure File Monitoring System on Cloud

849. Relational Logic Search Engine On Healthcare

850. Recommendation System Based On Web Usage Mining and Semantic Web A Survey

851. Quick Customer decision support on Web Sales Portal

852. Query Response System for File Management

Page 46: 2014 Project Title

853. Quality Visualization on Web TV

854. Project Work Tracking System

855. Product Market Manipulations on Asian stock market

856. Predicting Top Company Share Based on High Utility Data

857. Automation of Analysis and Development Management

858. Pharmacy Information System

859. Personalize Your News on Web

860. Online University

861. Online tagging for multimedia content

862. Online Search Ranking On Multiple Domain

863. Online Rental House Web Portal

864. Online Recruitment System

865. Online Real Estate Property Management

866. Online Multi Type Documents Search Engine

867. ONLINE MOBILE BILLING SYSTEM

868. Online Jewelry Management

869. Online Index Recommendations For High-Dimensional Databases Using Query Workloads

870. Online Examination System

871. Online Ensemble Learning Approach

872. Online Banking With Fraud Detecting

873. Online Auction Bit

874. ONLINE ADVERTISING SYSTEM

875. Nutraceuticals Management System

Page 47: 2014 Project Title

876. Nearest Shopping Location Identification Systems

877. Multilevel Images Authentication Systems

878. Multi New Product Survey Management

879. Movie Recommender Systems via User- Item Subgroups

880. Movie Rating and Recommendation on Mobile

881. Modern Municipal Corporation

882. Mobile TV Quality Management

883. Mobile Banking WAP

884. Manifold Entrust Scheme

885. Management System in Train

886. Secure Mailing System

887. Location-Based Spatial Query Processing in Wireless Broadcast Environments

888. LEAVE MANAGEMENT SYSTEM FOR MNC

889. Knowledge Based Decision Support System(KMS)

890. Key Management for Content Integration

891. Inter Bank Fund Transfer in Distributed Network

892. Information and Knowledge Extracting from a large amount of data

893. Industry Standard Authorization For Sensitive Resources

894. Implementation and Validating Environmental and Health

895. iKnoweb Extracting and Integrating Entity Information System

896. HUMAN ASSURANCE ADMINISTRATION

897. High_level network Security Using Packet Filtering

898. High and Low Level SQL Query Executor

Page 48: 2014 Project Title

899. GLOBAL COUNSELLING SYSTEM

900. A Game Theory for Online Security

901. Distributed Transaction Proxy

902. Freelancer Job

903. File Security With Multi Database System

904. FILE SEARCH ENGINE

905. Fertilizer Management System

906. Fast Web Information Gathering with Alias Detection

907. E-Tutor Online Jobs

908. Enterprise Stock and Accounting System

909. Ensuring Data Storage Security in Cloud Computing

910. Encrypted IT Auditing on Cloud Computing

911. Encrypted Data Storage Vs Data Against illegal Access

912. Enabling Site Interaction In Social Community

913. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing

914. E-Music world

915. Employee Resource Management

916. Employee Management System

917. E-Learning

918. E Fraud Prevention based on the Self Authentication of e Documents

919. Distribution System for Discount Sales

920. Distributed Data Integration on Electricity Board

921. Disease Information Hiding on Publishing Healthcare Data

Page 49: 2014 Project Title

922. Digital Documents Attestation Systems

923. Defending Against Web Application Vulnerabilities

924. Defects Analysis Systems

925. Data theft detection mobile cloud computing

926. Data Base Fraud Detection Systems

927. Customer Information Hiding for Data Mismanagement in Banking

928. Company Security Reporting System(CSRS)

929. E -Crime File Management System

930. Credit Card Management System

931. Corporate Requirement System

932. Consumer Sales Online Fake Product Detection and Deletion

933. Company Information Tracking System

934. Cloud Policy-Based File Assure Deletion

935. Cloud Data Theft Attacks

936. Cloud Cyber Attacks against Social Networks

937. Cloud Cost Management for Customer Sensitive Data

938. Client Favorite Photo Search Engine on Web

939. Citizen Card System

940. Card Management System

941. Design &Development of Car Parking and Automation Billing Systems

942. Customer Care Service

943. BPO Call Center

944. Automation of IT Process Management

Page 50: 2014 Project Title

945. Modeling and Automated Containment of Worms

946. Attribute Key Based Data Security System

947. As Needed Basis Accountability for Cloud Data Sharing

948. Annotation of short texts With Wikipedia pages

949. AIRLINE RESERVATION SYSTEM

950. Advance User Management on Social Website

951. A Semantic Web Based Scientific News Aggregator

Android Application Projects

Android Apps

952. GPS LOCATION ALARM SYSTEM

953. Location Based Intelligent Mobile Organizer

954. BANK ACCOUNT TRACKER FOR ANDROID

955. UNIT CONVERTER

956. Tollgate payment System

Page 51: 2014 Project Title

957. Tips and Tax Calculator in Android

958. TEXT EDITOR FOR ANDROID

959. Student Attendance Tracking System

960. Smart Money With Daily Expenses

961. Simple And Secure Android TO DO List Application

962. Restaurant Table Order Management System

963. Online Shopping

964. Online Examination System For Android

965. ANDROID SHOPPING LOCATION IDENTIFIER

966. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT

967. MOBILE TRAVEL GUIDE SMART WAY TO TRAVE

968. MICRO CREDIT BANKING ON SMARTPHONE

969. LOCATION BASED ALARM

970. Insurance in android

971. GOOGLE PLACE FINDER

972. Friend Mapper on Mobiles - Friend Locator

973. EXPENSE MANAGER

974. Employee Diractory

975. Online job search

976. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE

977. ANDROID STUDENT RESULT ANALYZING SYSTEM

978. CloudMoV : Cloud-based Mobile Social TV

979. Bus Reservation

Page 52: 2014 Project Title

980. Budget Planner

981. Android SMS Systems

982. ANDROID LEAVE MANAGEMENT SYSTEM

983. ANDROID EVENT SCHEDULER/REMINDER

984. Android Grocery Shopping List

985. Android Attack Application

986. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION

987. A Mobile Phone Based Medicine In-take Reminder and Monitor

PHP Application Projects

PHP Apps

988. WEB BASED LEARNING SYSTEM

989. Vendor Information System for Shipping

990. Tagging in online social networks

991. Step by Step Monitoring for Product Purchasing System

992. Secured file Downloading system

Page 53: 2014 Project Title

993. Cryptonite : A Secure and Performant Data Repository on Public Clouds

994. Secured data Collection method

995. searching a image from websites

996. System Purchasing Based Sales Analysis

997. Online University

998. Online product Opinion and Ranking System

999. MNC LEAVE MANAGEMENT SYSTEM

1000. HUMAN INSURANCE ADMINISTRATION

1001. Home appliances online purchase

1002. Freelancer Job

1003. E-Tutor Online Jobs

1004. Statistical Entity Extraction from Web

1005. Effective Collaborative Learning

1006. ONLINE AUCTION BIT

1007. Document Fraud Detecting System

1008. Development of an e-Post Office System

1009. Development of a feature-rich, Employee Transfer Application

1010. Question Answering System for an Effective Collaborative Learning

1011. Advance Company Account System

Struts Application Projects

Struts Apps

1012. Public Sentiment Analysis with Online Shopping Using Struts

Page 54: 2014 Project Title

1013. Modern distributed business for supply-chain management

1014. High Confidential Personal Disease Reporting System

1015. Distributor Sensitive Data Management Using Struts

1016. Development of Certificate Authority Services for Web Applications

1017. Access Control on User-To-User Interactions in Social Networks

Java Mini Projects

Mini Projects

1018. Website Tracking System

1019. Website Ranking System

1020. Treasure Warehouse

1021. Student Information System

1022. Storage security

Page 55: 2014 Project Title

1023. PRISON MANAGEMENT SYSTEM

1024. E-Licence Investigation System

1025. Online Secure File Transfer System

1026. Online Medicine Purchase

1027. ONLINE EDUCATION

1028. Online Agriculture System

1029. Mobile Survey

1030. ISSUE TRACKING SYSYTEM

1031. HOSPITAL MANAGEMENT SYSYTEMS

1032. HealthCare Management System

1033. Global Employee Acclaimer

1034. E-VOTING FOR ASSOCIATION

1035. Encrypted Register Form

1036. GLOBAL EMPLOYEE MANAGEMENT SYSTEM

1037. E INSURANCE

1038. Courier Tracking Systems

1039. corporate Transportation

1040. Collectorate Communication Systems

1041. Budget Approval System

1042. BLOOD BANK MANAGEMENT STSTEMS

1043. ATTENDANCE MANAGEMENT SYSTEM

1044. Activity management

Page 56: 2014 Project Title

Dotnet Mini Projects

Mini Projects

1045. VALUE ADDED TAX (VAT)

1046. User Oriented Network Attacks

1047. Secure Back Up

1048. Screen Capture And Mouse I/O

1049. Sales Bill Printing System using Excel

Page 57: 2014 Project Title

1050. Password Security

1051. Online User Mobile Rating

1052. Online Sensex Graph System

1053. Online Book Publishing

1054. NEWS TICKER PROJECT

1055. Multi Storage file

1056. Message Chating

1057. Medical Equipment in WAP

1058. Login Authentication Scheme

1059. Information Alert System

1060. Image Encryption And Decryption

1061. Generic Business Portal

1062. Flight Booking Portal

1063. File Transfer using Cryptography Techniques

1064. File Splitting

1065. Excel Format in Report

1066. EB Management System

1067. Dynamic Web Form Creation

1068. Android Image Search