java projects in chennai

15
Phoenix Systems Software Project List ( Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android ) Phoenix Systems 2016 - 2017 Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android Software Projects Application Projects IEEE Projects Android Projects

Upload: phoenix-systems

Post on 22-Jan-2018

104 views

Category:

Education


2 download

TRANSCRIPT

Phoenix Systems Software Project List

( Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android )

Phoenix Systems

2016 - 2017

Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android

Software Projects

Application Projects

IEEE Projects

Android Projects

JAVA*J2EE Projects Knowledge and Data Engineering

Data Mining

1. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental

Analysis-2016

2. A Scalable Data Chunk Similarity based Compression Approach for Efficient Big Sensing

Data Processing on Cloud-2016

3. Answering Pattern Queries Using Views-2016

4. Guest Editorial: Special Section on the International Conference on Data Engineering-

2016

5. Mining High Utility Patterns in One Phase without Generating Candidates-2016

6. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments-2016

7. Mining User-Aware Rare Sequential Topic Patterns in Document Streams-2016

8. Nearest Keyword Set Search in Multi-dimensional Datasets-2016

9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases-

2016

10. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search-2016

11. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. -

2016

12. Progressive Duplicate Detection - 2015

13. Keyword Search Over Probabilistic RDF Graphs- 2015

14. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data-

2015

15. LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015

16. GFilter: A General Gram Filter for String Similarity Search - 2015

17. Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014

18. Range Aggregation With Set Selection-2014

19. Facilitating Document Annotation Using Content and Querying Value-2014

20. Automatic Itinerary Planning for Traveling Services-2014

21. Adaptive Preprocessing for Streaming Data-2014

22. Optimized Cartesian K-Means-2014

23. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-

2014

24. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at

Location-Based Services-2014

25. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014

26. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-

2014

27. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014

28. An Air Index for Spatial Query Processing in Road Networks-2014

29. An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014

30. Multi-Dimensional Classification with Super-Classes

31. T-Drive : Driving Directions Based on Taxi Trajectories-2013

32. A System to filter unwanted messages from OSN user walls-2013

33. A Fast Clustering Based Feature Subset Selection Algorithm for High Dimensional

Data2013

34. A fuzzy self-constructing feature clustering algorithm for text classification -2011

35. Extended XML Tree Pattern Matching: Theories and Algorithms-2011

Mobile Computing

1. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks - 2016

2. Maximizing Charging Satisfaction of Smartphone Users via Wireless Energy Transfer - 2016

3. Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a

Bounded Monitoring Area - 2016

4. Towards Maximizing Timely Content Delivery in Delay Tolerant Networks-2015

5. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing

Systems-2015

6. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015

7. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014

8. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014

9. Discovery and verification of Neighbor positions in Mobile Ad HOC networks-2013

10. EMAP - Expedite Message Authentication Protocol for Vehicular Ad-hoc Networks-2013

11. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013

Cloud Computing

1. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in

Clouds - 2016

2. OverFlow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds-

2016

3. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing-

2015

4. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015

5. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet

Data Centers- 2015

6. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds

- 2015

7. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015

8. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014

9. Security as a Service Model for Cloud Environment-2014

10. Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems

11. Privacy Preserving Delegated Access Control in public clouds-2013

12. Security and privacy-enhancing multi cloud architectures-2013

13. Toward privacy-assured and searchable cloud data storage services-2013

14. Ensuring Data Storage Security in Cloud Computing-2013

Networking & Wireless Sensor Networks

1. An Ultra-Low-Latency Guaranteed-Rate Internet for Cloud Services - 2016 2. Dynamic Network Control for Confidential Multi-Hop Communications - 2016 3. Resampling-Based Ensemble Methods for Online Class Imbalance Learning-2015

4. Directional Diagnosis for Wireless Sensor Networks -2015

5. Secure and Distributed Data Discovery and Dissemination in WSN-2015

6. Disco: Improving Packet Delivery via Deliberate Synchronized Constructive Interference -

2015

7. Trust Management for Defending On-Off Attacks -2015

8. Proportional Fair Coding for Wireless Mesh Networks-2014

9. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol

for Heterogeneous Wireless Sensor Networks-2014

10. Joint Routing and Medium Access Control in Fixed Random Access Wireless Multichip

Networks-2014

11. DTN-Metro: Forecasting the Performance of DTN Protocols Under Heterogeneous

Mobility-2014

12. Denial-of-Service Attacks in Bloom-Filter-Based Forwarding-2014

13. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014

14. Topology-Transparent Scheduling via the Chinese Remainder Theorem-2014

15. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014

16. Cross-domain privacy-preserving protocol for cooperative firewall optimization-2013

17. EAACK - A Secure Intrusion Detection System for MANETs-2013

18. Enhancing Voice over WLAN via Rate Adaptation and Retry Scheduling-2013

19. Network Modeling Peer to Peer Analyze using Cache-2013.

Information Forensics and Security

1. Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation - 2016

2. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion - 2016 3. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation -

2016 4. Effective Data Access Control for Multi authority Cloud Storage Systems-2015

5. Privacy-Preserving Detection of Sensitive Data Exposure-2015

6. On the Use of Client Identity Information for Face Anti spoofing -2015

7. A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor

Networks-2014

8. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks-2014

9. On the Security of Trustee-Based Social Authentications -2014

Dependable and Secure Computing

1. Mitigating Cross-Site Scripting Attacks with a Content Security Policy - 2016 2. ID2S Password-Authenticated Key Exchange Protocols - 2016 3. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage - 2016 4. A Shoulder Surfing Resistant Graphical Authentication System - 2016 5. Deleting Secret Data with Public Verifiability-2015

6. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks

-2015

7. Trust-based Service Management for Social Internet of Things Systems-2015

8. PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications-2014 9. STARS: A Statistical Traffic Pattern Discovery System for manets-2014 10. Hiding in the mobile crowd: Location privacy through collaboration-2014 11. NICE: Network Intrusion Detection and Countermeasure Selection In Virtual

Network Systems - 2013 12. A Self-Organizing Trust Model for Peer-to-Peer Systems-2013 13. Nymble: Blocking Misbehaving Users in Anonymizing Networks-2011

Software Engineering

1. The Role of Ethnographic Studies in Empirical Software Engineering -2016 2. RELAI Testing: A Technique to Assess and Improve Software Reliability -2016 3. Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs -2016

4. Composite Constant Propagation and its Application to Android Program Analysis -2016 5. Coverage-Aware Test Database Reduction -2016 6. Parallel Algorithms for Testing Finite State Machines: Generating UIO sequences. -2016 7. Dynamic and Automatic Feedback-Based Threshold Adaptation for Code Smell Detection -

2016 8. Seer: A Lightweight Online Failure Prediction Approach -2016 9. Automated Checking of Conformance to Requirements Templates using Natural Language

Processing-2015

10. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015

11. Estimating Computational Requirements in Multi-Threaded Applications -2015

12. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015

13. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-

Proneness Prediction? An Empirical Study -2015

14. Using Declarative Specification to Improve the Understanding, Extensibility, and

Comparison of Model-Inference Algorithms-2015

15. A Model-Driven Methodology for Developing Secure Data-Management Applications-2014

Parallel and Distributed Systems

1. Load Balancing at the Edge of Chaos: How Self-Organized Criticality Can Lead to Energy-

Efficient Computing - 2016

2. POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks - 2016

3. Throughput-Driven Partitioning of Stream Programs on Heterogeneous Distributed

Systems - 2016

4. TLIA: Efficient Reconfigurable Architecture for Control-Intensive Kernels with Triggered-

Long-Instructions - 2016

5. Wait Analysis of Distributed Systems Using Kernel Tracing - 2016

6. A Cloud Gaming System Based on User-Level Virtualization and Its Resource Scheduling -

2016

7. An Efficient Privacy-Preserving Ranked Keyword Search Method - 2016

8. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-

2015

9. Deleting Secret Data with Public Verifiability-2015

10. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks

-2015

11. Trust-based Service Management for Social Internet of Things Systems-2015

12. Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless

Networks-2014

Big Data

13. The Client Assignment Problem for Continuous Distributed Interactive Applications:

Analysis, Algorithms, and Evaluation-2014

14. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014

15. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-

2013

16. Covering Points of Interest with Mobile Sensors-2013

17. Detection and Localization of Multiple Spoofing Attacks-2013.

1. USTF: A Unified System of Team Formation - 2016 2. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media - 2016 3. Kvasir: Scalable Provision of Semantically Relevant Web Content on Big Data Framework -

2016 4. Service Rating Prediction by Exploring Social Mobile Users’ Geographic Locations - 2016 5. Universal Nonlinear Regression on High Dimensional Data Using Adaptive Hierarchical Tree

- 2016

Application Projects (MCA, M.Sc., Diploma Projects)

1. Pick-It Courier Service 2. Community Awareness 3. E-Music World 4. Green Planet Awareness 5. Implementation And Validating Environmental And Health 6. Loan Online Application 7. Management System In Metro Train 8. Modern Agriculture Development System 9. Modern Municipal Corporation. 10. Nearest Shopping Location Identification Systems 11. Nutraceuticals Management System 12. Plant Shopping On Web 13. Product Market Manipulations On Asian Stock Market 14. Project Work Tracking System 15. Reporting Online Media News Systems 16. Vendor Information System For Shiping 17. Social Network Multiparty Access Management 18. Time To Time Stock Market Updater And Monitoring System 19. Tollgate Management Systems

20. Transport Management System 21. Web Page Re-Ranking System For Library 22. E-Knowledge Wireless Health Care System 23. Adaptive Intrusion Detection System 24. Scheduling Operation With Facility Management For Logistic System 25. Defect Tracking For Improving Product Quality And Productivity 26. Ensuring Data Security In Cloud Computing 27. A New Algorithm For Three Party Quantum Key Distribution 28. A Fuzzy Feature Clustering For Text Classification 29. Automatic Question Paper Generation 30. Automatic End Semester Time Table Generation 31. Learn To Personalized Image Search From Photo Sharing Web Sites 32. Material Management System 33. Multi Server Communication In Distributed Management System 34. Online Task Management System 35. Online Quiz 36. Optimal Dynamic Path Restoration In Mesh Network 37. Placement Management System 38. Transfer Certificate Issuing System 39. Query Matching Process Using Xml Tree Pattern 40. Scheduled Operations Resource Facilitating System

OT. Dot Net Project Titles

(VB.NET*C#.NET*ASP.NET) Information Forensics and Security

1. Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted

Computation - 2016 2. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion - 2016 3. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation -

2016 4. Privacy-Preserving Detection of Sensitive Data Exposure-2015

5. On the Use of Client Identity Information for Face Anti spoofing -2015

6. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems -2015

7. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Non causal Side

Information-2015

8. Privacy-Preserving Authenticated Key-Exchange Over Internet-2014

9. Optimal Probabilistic Encryption for Secure Detection in WSN-2014

10. Top-k Query Result Completeness Verification in Tiered Sensor Networks-2014

11. A Probabilistic Model of Visual Cryptography-2012

Mobile Computing

1. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks - 2016

2. Maximizing Charging Satisfaction of Smartphone Users via Wireless Energy Transfer - 2016

3. Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a

4. Bounded Monitoring Area - 2016.

5. Performance Comparison of Routing Protocols for Cognitive Radio Networks-2015

6. High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks-2015

7. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing

Systems-2015

8. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015

9. A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute Mobile-2014

10. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014

11. GreenBSN: Enabling Energy-Proportional Cellular Base Station Networks-2014

12. Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular Networks-

2014

13. Rate Adaptation for 802.11 Multiuser MIMO Networks-2014

14. RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning-

2014

15. Smart cut: Mitigating 3G Radio Tail Effect on Smartphones-2014

16. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014

17. Effective Authentication of Mobile and pervasive computing-2014

18. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013

19. Toward Privacy Preserving and Collusion Resistance in a Location Proof -2013

20. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity-2013

21. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks-2009

22. On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint

Routing-2009

Cloud Computing

1. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds - 2016

2. Overflow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds - 2016

3. Performing Initiative Data Prefetching in Distributed File Systems for Cloud

Computing- 2015

4. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015

5. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social

Networks-2014

6. An Analysis of Failure-Related Energy Waste in a Large-Scale Cloud Environment-2014

7. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application-2014

8. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014

9. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud-2013

10. QOS Ranking Prediction for Cloud Services-2013

11. Tokenization And Encryption For Personal Health Record Using Cloud-2013

12. Scalable and Secure Sharing of Personal Health Records in Cloud Computing-2013

13. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud-2012

14. Exploiting Dynamic Resource Allocation-2011

Knowledge and Data Engineering

&

Data Mining

1. K Nearest Neighbour Joins for Big Data on Map Reduce: a Theoretical and Experimental

Analysis - 2016

2. A Scalable Data Chunk Similarity based Compression Approach for Efficient Big Sensing

Data Processing on Cloud - 2016

3. Answering Pattern Queries Using Views - 2016

4. Guest Editorial: Special Section on the International Conference on Data Engineering -

2016

5. Mining High Utility Patterns in One Phase without Generating Candidates - 2016

6. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments - 2016

7. Mining User-Aware Rare Sequential Topic Patterns in Document Streams - 2016

8. Nearest Keyword Set Search in Multi-dimensional Datasets- 2016

9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases -

2016

10. Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search- 2016

11. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy -

2016

12. Authentication of Moving Top-k Spatial Keyword Queries- 2015

13. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the

Word Alignment Model -2015

14. Lossless Selection Views under Conditional Domain Constraints-2015

15. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data

Through Blind Storage - 2015

16. A Query Approach for Influence Maximization on Specific Users in Social Networks -

2015

17. Progressive Duplicate Detection - 2015

18. GDCluster: A General Decentralized Clustering Algorithm- 2015

19. Range Aggregation With Set Selection-2014

20. Facilitating Document Annotation Using Content and Querying Value-2014

21. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-

2014

22. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at

Location-Based Services-2014

23. Classifier Ensembles with the Extended Space Forest-2014

24. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014

25. Privacy-Preserving and Content-Protecting Location Based Queries-2014

26. Learning Conditional Preference Networks from Inconsistent Examples-2014

27. Fast Nearest Neighbor Search with Keywords-2014

28. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-

2014

29. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs-2014

30. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014

31. LARS: An Efficient and Scalable Location-Aware Recommender System-2014

32. Highly comparative feature-based time-series classification-2014

33. Keyword Query Routing-2014

34. Secure Mining of Association Rules in Horizontally Distributed Databases-2014

35. Personalized Mobile Search Engine-2013

36. A Quick web search Engine-2013

37. Toward Secure Multi keyword Top-k-2013

38. Lineage encoding-an efficient wireless xml streaming supporting twig pattern queries-

2013

Dependable and Secure Computing

1. Mitigating Cross-Site Scripting Attacks with a Content Security Policy - 2016 2. ID2S Password-Authenticated Key Exchange Protocols - 2016 3. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage - 2016 4. A Shoulder Surfing Resistant Graphical Authentication System - 2016 5. Deleting Secret Data with Public Verifiability-2015

6. Trust-based Service Management for Social Internet of Things Systems-2015

7. STARS: A Statistical Traffic Pattern Discovery System for manets-2014

8. Abductive Analysis of Administrative Policies in Rule-based Access Control-2014

Software Engineering

1. The Role of Ethnographic Studies in Empirical Software Engineering -2016

2. RELAI Testing: A Technique to Assess and Improve Software Reliability -2016

3. Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs-2016

4. Composite Constant Propagation and its Application to Android Program Analysis-2016

5. Coverage-Aware Test Database Reduction -2016

6. Parallel Algorithms for Testing Finite State Machines: Generating UIO sequences. -2016

7. Dynamic and Automatic Feedback-Based Threshold Adaptation for Code Smell

Detection -2016

8. Seer: A Lightweight Online Failure Prediction Approach -2016

9. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-

2015

10. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-

Proneness Prediction? An Empirical Study -2015

11. Using Declarative Specification to Improve the Understanding, Extensibility, and

Comparison of Model-Inference Algorithms-2015

12. An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with

Undetermined Input Spaces-2014

13. Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013

14. Centroidal Voronoi Tessellations—A New Approach to Random Testing-2013

15. Test Case-Aware Combinatorial Interaction Testing-2013

Parallel and Distributed Systems

1. Load Balancing at the Edge of Chaos: How Self-Organized Criticality Can Lead to Energy-

Efficient Computing - 2016

2. POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks - 2016

3. Throughput-Driven Partitioning of Stream Programs on Heterogeneous Distributed

Systems - 2016

4. TLIA: Efficient Reconfigurable Architecture for Control-Intensive Kernels with Triggered-

Long-Instructions - 2016

5. Wait Analysis of Distributed Systems Using Kernel Tracing - 2016

6. A Cloud Gaming System Based on User-Level Virtualization and Its Resource Scheduling -

2016

7. An Efficient Privacy-Preserving Ranked Keyword Search Method - 2016

8. Trust-based Service Management for Social Internet of Things Systems-2015

9. COMIC: Cost Optimization for Internet Content Multihoming-2014

10. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014

11. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks-

2014

12. Learning-Based Uplink Interference Management in 4g Lte Cellular Systems-2014

13. Secure data retrieval for decentralized distribution tolerant Military Networks-2014

14. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data-2014

15. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks-2012

16. Adaptive Provisioning of Human Expertise in Service-oriented Systems-2012

17. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service-

2011

Application Projects MCA, M.Sc. & Diploma Projects

1. Building Construction And Cost Estimation 2. Constructing E-Tourism 3. Consumer Market Basket Analysis For Consumer Correct Decision 4. Data Confidentiality On Health-Care Information System 5. Data Mining Analysis On Eb Bill System 6. Easy Sql Query For Non-It Manager 7. Flight Booking Portal 8. Hospital Emergency Data Management 9. Human Expertise Search Engine

10. I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine 11. Information Leak Detection And Prevention 12. Leave Management System 13. Predicting Users Behaviors Using Web Mining 14. Product Marketing Analysis On Public Opinion 15. Public Web Status Monitoring System 16. Quality Controller 17. Step By Step Monitoring For Product Purchasing System 18. Techno Task Manager 19. Top-K Ranking System 20. Ultimate Location Information For Given Range 21. Vendor Information System For Shiping 22. Web Based Book Publishing System 23. Web User Service Management System 24. Zero-Knowledge Proof System On Outsourcing Cloud Data Integrity 25. Inventory Library Management System 26. New Generation Of Community Certificate 27. E-Crime Report System 28. Academic Trivia 29. New Generation Of Social Website 30. Automatic Question Paper Generation 31. Web Based E-Auction System 32. Exam Scheduler 33. Budget Approval System 34. Data Theft Attack 35. Metro Train And Bus Smart Card Issue And Renewal 36. Orphan Home Management 37. Vehicle Sales And Services Management Systems 38. School Management Systems 39. Monitoring Loan Application Processing System 40. Attendance Management System-Tpt 41. Data Leakage Detection 42. Graphical Password Authentication System 43. Fast Nearest Search 44. Pmse: A Personalized Mobile Search Engine 45. Inventory Management-Printing Press 46. Hostel Management System 47. Advertising Agencies 48. Hospital Medicine Supply System 49. Global Employee Management System

50. Industrial Manpower Resource Organizer 51. Task Management Systems 52. Real Estate Management Systems. 53. Pension Management System 54. Key Word Query Routing 55. Office Automation In Computer Center 56. Printing Press Management System 57. Personal Health Care Record Management System 58. Vehicle Service Management 59. Web Based Sms Application 60. Automated Transport System For Travel Agencies 61. Quotation Controlling Process Through The Web 62. Welfare Schemes For A Cross Section Of The Society From Time To Time 63. Detecting Fraud On Vehicle Insurance System 64. Auditing Data Integrity And Data Storage Using Cloud