CE / IT PROJECT TOPICS

JAVA PROJECTS

      NETWORKING:

  • AN ADAPTIVE OPPORTUNISTIC ROUTING SCHEME FOR WIRELESS AD-HOC NETWORKS

  • FIRECOL A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDOS ATTACKS

  • GAME-THEORETIC PRICING FOR VIDEO STREAMING IN MOBILE NETWORKS

  • OPTIMIZING CLOUD RESOURCES FOR DELIVERING IPTV SERVICES THROUGH VIRTUALIZATION

  • PACKET LOSS CONTROL USING TOKENS

  • SECURITY ARCHITECTURE FOR CLOUD NETWORKING

  • POLICY-BY-EXAMPLE FOR ONLINE SOCIAL NETWORKS

  • PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS

  • DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS FOR DYNAMIC PEER GROUPS.

  • AVMON.

  • P2PPROXY.

  • BIDIRECTIONAL ROUTING ALGORITHUM.

  • CREDIT CARD FRAUD DETECTION USING HIDDEM M,ARKOV MODEL.

  • EFFICIENT BROADVASTING WITH GURENTEED COVERAGE IN MOBILE ADHOC NETWORK.

  • ONLINE HANDWRITTEN SCRIPT RECOGNITION.

  • A FULLY DISTRIBUTED PROACTIVELY SECURE THRESHOLD MULTISIGNATURE SCHEME.

  • NETWORK MONITORING MANAGEMENT.

  • A BIDIRECTIONAL ROUTING ABSTRACTION FOR ASYMMETRIC MOBILE AD HOC NETWORKS.

  • AN ACKNOWLEDGEMENT APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS.

 

    ADHOC  NETWORKS:

  • PACKET SNIFFER IN AD-HOC NETWORKS

  • TAM A TIERED AUTHENTICATION OF MULTICAST PROTOCOL FOR AD-HOC NETWORKS

  • THROUGHPUT AND ENERGY EFFICIENCY IN WIRELESS AD HOC NETWORKS WITH GAUSSIAN CHANNELS

 

   CLOUD COMPUTING:

  • SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD COMPUTING

  • CLOUD COMPUTING SECURITY FROM SINGLE TO MULTI-CLOUDS

  • FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING.

  • DYNAMIC LOAD-BALANCED MULTICAST FOR DATA INTENSIVE APPLICATION ON CLOUDS.

  • CLOUD DATA PRODUCTION FOR MASSES

  • COSTING OF CLOUD COMPUTING SERVICES A TOTAL COST OF OWNERSHIP APPROACH

  • ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD

  • PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS

  • RELIABLE RE-ENCRYPTION IN UNRELIABLE CLOUDS

  • FOG COMPUTING MITIGATING INSIDER DATA THEFT ATTACKS IN THE CLOUD

  • GOSSIP-BASED RESOURCE MANAGEMENT FOR CLOUD ENVIRONMENTS

 

DATA MINING

  • ADVANCE MINING OF TEMPORAL HIGH UTILITY ITEMSE

  • AN EXPLORATION OF IMPROVING COLLABORATIVE RECOMMENDER SYSTEMS VIA USER-ITEM SUBGROUPS

  • AUTOMATIC DISCOVERY OF ASSOCIATION ORDERS BETWEEN NAME AND ALIASES FROM THE WEB USING ANCHOR TEXTS-BASED CO-OCCURRENCES

  • CONFUCIUS A TOOL SUPPORTING COLLABORATIVE SCIENTIFIC WORKFLOW COMPOSITION

  • EFFICIENT COMPUTATION OF RANGE AGGREGATES AGAINST UNCERTAIN LOCATION BASED QUERIES

  • EFFICIENT EXTENDED BOOLEAN RETRIEVAL

  • FRAMEWORK FOR PERSONAL MOBILE COMMERCE PATTERN MINING AND PREDICTION

  • MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS MODEL AND MECHANISMS

  • ON THE SPECTRAL CHARACTERIZATION AND SCALABLE MINING OF NETWORK COMMUNITIES

  • ORGANIZING USER SEARCH HISTORIES

  • RANKING MODEL ADAPTATION FOR DOMAIN-SPECIFIC SEARCH

  • SLICING A NEW APPROACH TO PRIVACY PRESERVING DATA PUBLISHING

  • STATISTICAL ENTITY EXTRACTION FROM WEB

  • A RELATION-BASED PAGE RANK ALGORITHM FOR SEMANTIC WEB SEARCH ENGINES

  • FAST DATA RETRIEVAL FROM DATABASES BEYOND THE DATABASE DIMENSIONS

  • C-TREND: TEMPORAL CLUSTER GRAPHS FOR IDENTIFYING AND VISUALIZING TRENDS IN MULTI ATTRIBUTE        TRANSACTIONAL DATA

  • A SIGNATURE-BASED INDEXING METHOD FOR EFFICIENT CONTENTBASED RETRIEVAL OF RELATIVETEMPORAL PATTERNS

  • HIDING SENSITIVE ASSOCIATION RULES WITH LIMITED SIDE EFFECTS         

  • EVENTUAL CLUSTERER: A MODULAR APPROACH TO DESIGNING HIERARCHICAL CONSENSUS. 

 

 

 MOBILE  COMPUTING:

  • FAST DATA COLLECTION IN TREE-BASED WIRELESS SENSOR NETWORKS

 

MULTIMEDIA:

  • LEARN TO PERSONALIZED IMAGE SEARCH FROM THE PHOTO SHARING  WEBSITES

  • TRUST MODELING IN SOCIAL TAGGING OF MULTIMEDIA CONTENT

 

SECURE COMPUTING:

  • DOUBLEGUARD DETECTING INTRUSIONS IN MULTI-TIER WEB APPLICATIONS

  • ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD

  • ONLINE MODELING OF PROACTIVE MODERATION SYSTEM FOR AUCTION FRAUD DETECTION

  • PACKET-HIDING METHODS FOR PREVENTING SELECTIVE

  • RISK-AWARE MITIGATION

 

WIRELESS  COMMUNICATION:

  • AN ADAPTIVE OPPORTUNISTIC ROUTING SCHEME FOR WIRELESS AD-HOC NETWORKS

  • CUT DETECTION IN WIRELESS SENSOR NETWORKS

 

IMAGE PROCESSING

  • 2D IMAGE MORPHING

  • NOISE REDUCTION BY FUZZY IMAGE FILTERING

  • FACE RECOGNITION USING EIGEN VALUES

  • NOISE REDUCTION BY USING FUZZY IMAGE FILTERING. 

 

 

ANDROID PROJECTS

  • PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA

  • ANDROID MEETS LED BULBS IN SMART-HOME AUTOMATION.

  • BLUETOOTH CHATING ON ANDROID.

  • DEVELOPMENT OF ANDROID ROBOT CAR USING ACCELEROMETER SENSORS.

  • MODEL AND IMPLEMENTATION OF ROBOTIC ARM USING ANDROID.

  • OFFICE AUTOMATION BASED ON ANDROID.

  • DEVELOPMENT OF ANDROID ROBOT HELICOPTER USING ACCELEROMETER SENSORS.

  • PLANNING AND DEVELOPMENT OF AN ELECTRONIC HEALTH RECORD CLIENT BASEDDON THE ANDROID PLATFORM.

  • LOCATION TRACKING USING SMS BASED ON ANDRODID MOBILE.

  • ANDROID ON MOBILE DEVICES:AN ENERGY PERSPECTIVE.

  • DEVELOPMENT OF HUMAN ANDRO SYSTEM.

  • ANDROID PHONE BASED DRUNK AND DRIVE DETECTION.

  • PEDOMETER AN ANDROID APPLICATION.

 

 

DOTNET PROJECTS

 

     CLOUD COMPUTING:

  • AUTOMATIC PROTOCOL BLOCKER FOR PRIVACY PRESERVING PUBLIC AUDITING IN CLOUD COMPUTING

  • EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS

  • HEURISTICS BASED QUERY PROCESSING FOR LARGE RDF GRAPHS USING CLOUD COMPUTING

  • SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

  • SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

  • TOWARDS SECURE AND DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING

   

    DATA  MINING:

  • A QUERY FORMULATION LANGUAGE FOR THE DATA WEB

  • BRIDGING SOCIAL AND DATA NETWORKS

  • DISCOVERING CHARACTERIZATIONS OF THE BEHAVIOR OF ANOMALOUS SUB-POPULATIONS

  • EFFICIENT AND DISCOVERY OF PATTERNS IN SEQUENCE DATA SETS

  • HEURISTICS BASED QUERY PROCESSING FOR LARGE RDF GRAPHS USING CLOUD COMPUTING

  • IDENTIFYING CONTENT FOR PLANNED EVENTS ACROSS SOCIAL MEDIAL SITES

  • MINING WEB GRAPHS FOR RECOMMENDATIONS

  • OPTIMIZATION OF HORIZONTAL AGGREGATION IN SQL BY USING K-MEANS CLUSTERING

  • ORGANIZING USER SEARCH HISTORIES

  • OUTSOURCED SIMILARITY SEARCH ON METRIC DATA ASSETS

  • QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES OVER A NETWORK OF DATA AGGREGATORS

  • SCALABLE LEARNING OF COLLECTIVE BEHAVIOR PDF

 

IMAGE  PROCESSING:

  • COMPRESSED-SENSING-ENABLED VIDEO STREAMING FOR WIRELESS MULTIMEDIA SENSOR NETWORKS

  • DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

  • EXPLORING THE DESIGN SPACE OF SOCIAL NETWORK-BASED SYBIL DEFENSES

  • ROBUST FACE-NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION

  • SEMISUPERVISED BIASED MAXIMUM MARGIN ANALYSIS FOR INTERACTIVE IMAGE RETRIEVAL

 

MOBILE  COMPUTING:

  • COOPERATIVE DOWNLOAD IN VEHICULAR ENVIRONMENTS

  • DISTRIBUTED THROUGHPUT MAXIMIZATION IN WIRELESS NETWORKS VIA RANDOM POWER ALLOCATION

  • NETWORK ASSISTED MOBILE COMPUTING WITH OPTIMAL UPLINK QUERY PROCESSING

  • PROTECTING LOCATION PRIVACY IN SENSOR NETWORKS AGAINST A GLOBAL EAVESDROPPER

  • TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

  • TOWARDS ACCURATE MOBILE SENSOR NETWORK LOCALIZATION IN NOISY ENVIRONMENTS

 

NETWORKING:

  • A NEW CELL COUNTING BASED ATTACK AGAINST TOR

  • LOAD BALANCING MULTIPATH SWITCHING SYSTEM WITH FLOW SLICE

  • OPTIMAL POWER ALLOCATION IN MULTI OPTIMAL POWER ALLOCATION IN MULTI-RELAY MIMO

  • VIEW-INVARIANT ACTION RECOGNITION BASED ON ARTIFICIAL NEURAL NETWORKS

 

PARALLEL  & DIST SYSTEM:

  • BALANCING THE TRADEOFFS BETWEEN QUERY DELAY AND DATA AVAILABILITY IN MANETS

  • BECAN A BANDWIDTH-EFFICIENT COOPERATIVE AUTHENTICATION SCHEME FOR FILTERING INJECTED FALSE DATA IN WIRELESS SENSOR NETWORKS

  • PARALLEL IDENTITIES FOR MANAGING OPEN GOVERNMENT DATA

  • PRECISE SCALABLE AND ONLINE REQUEST TRACING FOR MULTITIER SERVICES OF BLACK BOXES

  • RESOURCE-AWARE APPLICATION STATE MONITORING

  • SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

  • SPOC A SECURE AND PRIVACY-PRESERVING OPPORTUNISTIC COMPUTING FRAMEWORK FOR MOBILE-HEALTHCARE EMERGENCY

 

SECURE COMPUTING:

  • AUTOMATIC RECONFIGURATION FOR LARGE-SCALE RELIABLE STORAGE SYSTEMS

  • DESIGN AND IMPLEMENTATION OF TARF A TRUST-AWARE ROUTING FRAMEWORK FOR WSNS

  • FAST MATRIX EMBEDDING BY MATRIX EXTENDING

  • JOINT RELAY AND JAMMER SELECTION FOR SECURE TWO-WAY RELAY NETWORKS

 

SERVICE COMPUTING:

  • EXPERT DISCOVERY AND INTERACTIONS IN MIXED SERVICE-ORIENTED SYSTEMS

  • TOWARDS SECURE AND DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING

 

WIRELESS COMMUNICATION:

  • AMPLE AN ADAPTIVE TRAFFIC ENGINEERING SYSTEM BASED ON VIRTUAL ROUTING TOPOLOGIES

  • COOPERATIVE DATA DISSEMINATION VIA ROADSIDE WLANS

  • TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

 

PHP PROJECT

  • CAPTCHA

  • DYNAMIC IMAGE GALLERY

  • CONTENT MANAGEMENT SYSTEM FOR WEBSITE

  • PRINTING PRESS WEDDING CARD

  • E-SURVEY PORTAL

  • INVENTORY PORTAL

  • E-COPS

  • PERK POINT

  • E-COMMERCE APPLICATION PORTAL

  • BLOG/FORUM

 

 

____________________________________________________________________________________________________________________________________

Send your feedback to allljprojects@gmail.com

Quick Contact

Subscribe for Updates

© 2014-2020 by LJ Project Team