Thursday, September 4, 2014

IEEE 2014-15 DOT NET PROJECTS FOR BE/BTECH/ME/MTECH/MCA STUDENTS

IEEE 2014-15 DOTNET PROJECT LIST

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING

1.       Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data

2.       Fast Nearest Neighbor Search with Keywords
3.       Quasi-SLCA Based Keyword Query Processing over Probabilistic XML Data
4.       Secure Mining of Association Rules in Horizontally Distributed Databases

5.       Supporting Privacy Protection in Personalized Web Search

6.       The Role of Hubness in Clustering High-Dimensional Data
7.       Authentication of k nearest Neighbor  Query on Road Networks
8.       Privacy-Preserving and Content-Protecting Location Based Queries

9.       Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases

10.   Context-based Diversification for Keyword Queries over XML Data

11.   Efficient Prediction of Difficult Keyword Queries over Databases

12.   Using Personalization to Improve XML Retrieval

13.   Range Aggregation with Set Selection

14.  Secure and Privacy Messaging in Online Social Networks
15.  A Methodology for Direct and Indirect Discrimination Prevention in Data Mining

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
16.   Trajectory Improves Data Delivery in Urban Vehicular Networks
17.   Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
18.   PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
19.   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
20.   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
21.   Peer-Assisted VoD Systems: An Efficient Modeling Framework
22.   Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
23.   Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
24.   ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks
25.   A Hybrid Cloud Approach for Secure Authorized De duplication
26.   Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

IEEE TRANSACTIONS ON CLOUD COMPUTING
27.   Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
28.   Consistency as a Service: Auditing Cloud Consistency
29.   Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
30.   Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
31.   Identity-Based Secure Distributed Data Storage Schemes
32.   Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

IEEE TRANSACTIONS ON IMAGE PROCESSING

33.   A Dynamic Appearance Descriptor Approach to Facial Actions Temporal Modeling

34.   Localization of License Plate Number Using Dynamic Image Processing Techniques

35.   A New Iterative Triclass Thresholding Technique in Image Segmentation

36.   Click Prediction for Web Image Reranking Using Multimodal Sparse Coding

37.   Robust Face Recognition with Structurally Incoherent Low-Rank Matrix Decomposition

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

38.   Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact

39.   Uniform Embedding for Efficient JPEG Steganography

40.   Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution

41.   On the Relation of Random Grid and Deterministic Visual Cryptography

42.   Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation

43.   Scalable Similarity Search with Topology Preserving Hashing

IEEE TRANSACTIONS ON MOBILE COMPUTING

44.   Autonomous Mobile Mesh Networks

45.   Opportunistic Channel Sharing in Cognitive Radio Networks
46.   Optimal Multicast Capacity and Delay Tradeoffs in MANETs
47.   Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks
48.   Friendbook: A Semantic-based Friend Recommendation System for Social Networks
49.   Class-Based Shared Resource Allocation for Cell-Edge Users in OFDMA Networks
50.   A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
51.   Secure Mobile Payment System using GSM

IEEE TRANSACTIONS ON MULTIMEDIA
52.   An adaptive mechanism for optimal content download in wireless networks
53.   Reversible Data Hiding in Encrypted JPEG Bit stream
54.   Inferring User Image-Search Goals under the Implicit Guidance of Users
55.   Exploiting Click Constraints and Multi-view Features for Image Re-ranking
56.   Prototype-Based Modeling for Facial Expression Analysis
IEEE TRANSACTIONS ON SERVICE COMPUTING
57.   Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
58.   Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
59.   Full Security of Quantum Key Distribution From No-Signaling Constraints

IEEE TRANSACTIONS ON NETWORKING
60.   An Adaptive Video Streaming Control System: Modeling, Validation, and Performance Evaluation

61.   Incentive Based Data Sharing in Delay Tolerant Mobile Networks

62.   Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach

63.   Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

64.   Secure Continuous Aggregation in Wireless Sensor Networks
65.   A Trust-Aware System for Personalized User Recommendations in Social Networks
66.   Resource Allocation in MIMO-OFDM Based Cooperative Cognitive Radio Networks
67.   An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
68.   Filtering Of Malicious Traffic Based On Markov’s Chain Method
69.   Cooperative Communication Protocol Designs Based on Optimum Power and Time Allocation

IEEE TRANSACTIONS ON WEB MINING
70.   An Ontology-Based Text Mining Method to Develop D-Matrix from Unstructured Text

Tuesday, June 17, 2014

IEEE 2013-14 DOTNET PROJECTS FOR BE/BTECH/ME/MTECH

IEEE DOTNET 2013-14 PROJECT LIST

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1. Secure Mining of Association Rules in Horizontally Distributed Databases
2. Robust Module-Based Data Management 
3. Supporting Search-As-You-Type Using SQL in Databases
4. FoCUS: Learning to Crawl Web Forums
5. M-Privacy for Collaborative Data Publishing
6. Optimal Route Queries with Arbitrary Order Constraints
7. Finding Rare Classes: Active Learning with Generative and Discriminative Models
8. K-Anonymity for Crowd sourcing Database
9. ELCA Evaluation for Keyword Search on Probabilistic XML Data
10. Edge-centric clustering scheme to extract sparse social dimensions
11. Bi-clustering for analyze network traffic and enhance IDSs

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
12. Efficient Two-Server Password-Only Authenticated Key Exchange
13. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
14. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
15. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
16. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

IEEE TRANSACTIONS ON CLOUD COMPUTING
17. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
18. Privacy Preserving Policy Based Content Sharing in Public Clouds
19. Privacy-preserving public auditing For secure cloud storage
20. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
21. Privacy Preserving Delegated Access Control in Public Clouds
22. Enhanced Data Security in Cloud Computing with Third Party Auditor
23. Towards Secure and Dependable Storage Services in Cloud Computing
24. Ensuring Data Storage Security in Cloud Computing
25. A Secure Cloud Storage System with Secure Data Forwarding

IEEE TRANSACTIONS ON IMAGE PROCESSING
26. Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search
27. Vertical-Edge-Based Car-License-Plate Detection Method
28. FLICM-A Robust Fuzzy C-Means Clustering Algorithm
29. Simultaneous Facial Expression Recognition

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
30.  Privacy Preserving Data Sharing With Anonymous ID Assignment
31. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
32. A Dynamic Appearance Descriptor Approach to Facial Actions Temporal Modeling 
33. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 
34. Latent Fingerprint Matching Using Descriptor-Based Hough Transform 
35. Extracting Spread-Spectrum Hidden Data from Digital Media

 IEEE TRANSACTIONS ON MOBILE COMPUTING
36. Video On-Demand Streaming in Cognitive Wireless Mesh Networks
37. Energy-Spectrum Efficiency Tradeoff for Video Streaming over Mobile Ad Hoc Networks
38. A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
39. A Privacy-Preserving Attribute-based Authentication System for Mobile Health Networks
40. Efficient Position-based Opportunistic Routing protocol for MANET
41. Improved Channel Aware AOMDV routing Protocol in MANETs

IEEE TRANSACTIONS ON MULTIMEDIA
42. An Adaptive Cloud Downloading Service
43. User-specific topic modeling to map the query relevance and user preference for Image Retrieval
44. A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
45. Scalable Face Image Retrieval Using Attribute-Enhanced Sparse Code words
46. One-to-Many Streaming Splicing(OMSS) for improving relay paths
47. Capturing User Intention for One-Click Internet Image Search

IEEE TRANSACTIONS ON NETWORKING
48. Localization of Wireless Sensor Networks in the Wild Networks
49. Fair data collection scheme in wireless sensor networks
50. An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
51. A System to Filter Unwanted Messages from OSN User Walls
52. Two tales of privacy in online social networks
53. Twits per: Tweeting Privately
54. Secure Data Collection in Wireless Sensor Networks
55. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
56. A New Clustering Algorithm for Wireless Sensor Networks
57. Management of security in quantum cryptography

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
58. Defenses to curb online password guessing attacks
59. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
60. Enhanced Data Security for Data sharing with C-JAR
61. Automatic License Plate Recognition
62. Anomaly Detection via online transaction of credit card by clustering technique
63. Blocking Hacking Users in Anonymizing Network

IEEE TRANSACTIONS ON SERVICE COMPUTING
64. Evolution of Social Networks Based on Tagging Practices
65. Dynamic Audit Services for Outsourced Storages in Clouds
66. Expert Discovery and Interactions in Mixed Service-Oriented Systems
67. Towards Efficient Search for Activity Trajectories
68. Secure Stream Authentication using Hash function

IEEE TRANSACTIONS ON DISTRIBUTED NETWORKING
69. Self-healing System to increase  resiliency against botnets with minimal disruption to network services
70. An Efficient Peer-to-Peer Semantic Overlay Network for Learning Query Routing 


Saturday, May 24, 2014

IEEE 2014 PROJECTS

IEEE DOTNET 2014-15 PROJECT LIST
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1.       Quasi-SLCA Based Keyword Query Processing over Probabilistic XML Data
2.       Privacy-Preserving Enhanced Collaborative Tagging

3.       Secure Mining of Association Rules in Horizontally Distributed Databases

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
4.       PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
5.       ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks

6.       Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

7.       Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

8.       Trajectory Improves Data Delivery in Urban Vehicular Networks

9.       Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

10.   Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing


IEEE TRANSACTIONS ON CLOUD COMPUTING
12.   Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

IEEE TRANSACTIONS ON IMAGE PROCESSING

13.   A Dynamic Appearance Descriptor Approach to Facial Actions Temporal Modeling

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

14.   Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact


15.   Uniform Embedding for Efficient JPEG Steganography

Wednesday, May 14, 2014

MCA/BCA/Bsc/Diploma Projects


PROJECT LIST

  1. Notepad Editor System 
  2. Speed Cash Maintenance 
  3. Electronic Cash Controller 
  4. Crime Logger 
  5. E-Post Office 
  6. Online Fast Food 
  7. Customer Query Track 
  8. World Recipe 
  9. Mailing Portal 
  10. Defect Tracking System 
  11. Career Path 
  12. E-Pricing 
  13. Client Server Based Live Meeting 
  14. Inventory Chain 
  15. Photo Competition Website with Voting 
  16. Campus Selection System 
  17. Project Scheduler 
  18. Alumni Manager 
  19. Bishop Cotton School 
  20. Examination Branch System 
  21. Cyber Automobile Shop 
  22. Biased Random Walks in Uniform Wireless Networks 
  23. Diamond Web-Hosting 
  24. Vehicle Showroom Management System 
  25. Smart Network Profile Manager 
  26. Bulga Bag Planner 
  27. Visual Learner Memory Game 
  28. Agriculture Assist 
  29. BoobTubeFlourish 
  30. International Street Racing Community Club Management System 
  31. Good Welfare Services 
  32. Enterprise Security Services 
  33. Energy Maps for Mobile Wireless Networks 
  34. Mitigation of Control Channel Jamming 
  35. Exam Experts 
  36. Promotional Portal 
  37. E-Buy 
  38. Student Records System 
  39. Diagnostic Center 
  40. Techno Task Manager 
  41. Reality Shows Organization 
  42. Project Controller 
  43. e-FASHION 
  44. Civil Registry 
  45. News Paper Proclamination Monitoring System 
  46. Flaw Tracking System 
  47. Document Manager 
  48. Information Content-Based Sensor Selection 
  49. Distributed Computing For E-Learning 
  50. Software Project Management 
  51. Movement-Assisted Connectivity Restoration 
  52. Campaign Information System 
  53. E-Gift Shoppe 
  54. Route Stability in MANETs 
  55. Secure and Policy-Compliant Source Routing 
  56. Easy Leave 
  57. Record Tracker 
  58. Blood Donation Agent System 
  59. Project Tracking 
  60. Web Based Profiling System 
  61. ISO Quality Controller 
  62. E-Bidding 
  63. Predicting Missing Items in Shopping Carts 
  64. Multi Banking System 
  65. Online Crime Report 
  66. Fleet Manager 
  67. Cyber JobMela 
  68. SMS Based Student Intimation 
  69. Digital Signature 
  70. Data Grid Management Systems 
  71. Cyber Bidding Gateway 
  72. Drive 2 Destiny 
  73. Zeppelin Reservation 
  74. BPO Solutions 
  75. Unicode OCR System 
  76. Planning of Wireless Sensor Networks 
  77. Fin Corp –Cash Controller 
  78. E2M Conference 
  79. Millennium Planning 
  80. Social Networking With Advertisement 
  81. Web Alerts 
  82. Call Center Executer 
  83. Cell Breathing Technique 
  84. Back to My Village 
  85. Movie World 
  86. Cargo Logistics 
  87. Online Issue Management 
  88. Mobile Advertisement System 
  89. Cyber Hotelier 
  90. Cool Cab Services 
  91. Health Maintenance System 
  92. Random Cast 
  93. Asian Packers and Movers 
  94. SQL-Tuner 
  95. Jobbing Portcullis 
  96. Virtual Class Room 
  97. Mail Client 
  98. Information Portal 
  99. Resource Allocation in OFDMA 
  100. Insurance Broker System 
  101. Learning Made Easy 
  102. Air Force Security Using Thumb Checker
  103. Tax Assessment Services
  104. Kims Health Card
  105. Web Traffic Analyzers
  106. Airline Reservation System
  107. OnLine Crime Report Management System
  108. Budget Analysis
  109. South India Tourism
  110. Industrial Manpower Resource Organizer
  111. Mobile Job Redistribution
  112. Share Transaction Application
  113. Benetton Travel Solutions
  114. Internal Management System
  115. SQL-Tuner
  116. System Observer and organizer in a connected network
  117. greating cards
  118. Employee Resource Management
  119. Online Tender management System
  120. Pharmacy Database Enterprise Manager
  121. MultiBanking
  122. Foray Bpo Solutions
  123. Job Potal
  124. 15 square puzzle
  125. Net Linx – A discussion Forum
  126. Rodas Hotel Management system
  127. Travel Solution Portal
  128. Drug Management Systems
  129. Universal Web Based File Sharing Portal
  130. Petrol Bunk
  131. JAIL SUPERVISION
  132. Share Market
  133. Drive2Destiny
  134. Bishop Cotton School
  135. Software Project Management
  136. insurance envoy
  137. Sales & Customer Tracking System
  138. Electronic Cash Controller
  139. Common Tracker system
  140. Track Machine Management
  141. Insurance Management System
  142. Business Efforts
  143. Cyber Bidding Gateway
  144. Customer support service operation
  145. Sudoku Abstract
  146. Asian Packers and Movers(p)LTD
  147. Satellite Information System
  148. Web Based Crime Analysis Portal
  149. Exclusive Motoring
  150. Customer Relationship Management
  151. Mobile SMS
  152. Municipal Administration System
  153. Customer Support Services Systems
  154. Web Based Purchase Requisitions
  155. Efashion
  156. Shopping Cart
  157. Client Server Administration
  158. Virtual college management system using biometric
  159. Property Search Portal
  160. Mailing Portal
  161. NGO Activity Portal
  162. Enterprise Security Services
  163. Clinical Information Portal
  164. Online Referral and OPD Booking from the Accrate Cancer Classification Portal
  165. Order processing System
  166. Library management System
  167. VSeva – Realty Website
  168. Abhyasa – A scholastic IT Solution
  169. E-banking – easy to transfer
  170. Janata Sahakari Bank
  171. Online Property Promotion Partner Portal
  172. Health Care Application
  173. John Street Pub & Gill
  174. e-Cramming – Learning Made Simple
  175. LOAN CALCI
  176. Alabama Advertising Agencies Ltd
  177. Multi Level Marketing
  178. Movie Ticket Reservation Portal
  179. Computer Resource Management System
  180. Online Shopping Cart
  181. Check Out My Trip
  182. Bug Tracker
  183. Resource planner
  184. Cool Cab services
  185. Intelligent Transportation Portal
  186. Billing Software with Customer relationship management
  187. Online Job Board
  188. Defect Analytics
  189. Abyasa – College Management System
  190. Project created using MVC design pattern
  191. Creating web application that uses customizable web parts
  192. Finding ball game
  193. Migration exchange server document to SharePoint
  194. SMS application (send SMS from app to mobile)
  195. Online mobile shop
  196. Window application in 3 tier architecture
  197. ATM card processing
  198. SMS pack
  199. Navigation controls
  200. Project for showing twitter quotes
  201. 3 tier architecture in asp.net
  202. List View project
  203. Web browser
  204. A pretty digital clock
  205. Salary project
  206. Online examination with appropriate countdown and generation report
  207. Creating an autosuggest textbox
  208. Blaster master
  209. Ip resolver
  210. Patient information system (PIS)
  211. Online examination system
  212. Software tracker
  213. The project explains how we can create captcha in easy way.
  214. Employee management system with sqlite as a backend
  215. Notepad application
  216. File compressor
  217. Sample application for learning form authentication
  218. Simple admission form
  219. E-fund management
  220. Complete project on “mp3 player”
  221. Online web application for sending SMS
  222. Children educational games applications
  223. Fee collection system
  224. Banking project
  225. Learn how to mail through web application
  226. Book rental system (c#.net windows application)
  227. Currency conversion
  228. Count with time
  229. Webcam-video capture – vb.net – windows application
  230. Simple ui to interact with database
  231. Simple web browser
  232. Applying a skin id
  233. Book store project
  234. Student tracking system
  235. Analog clock in c#.net
  236. Learn how to get the entire hardware information
  237. Web browser develop in c#.net
  238. Access the skype functionalities in .net

Friday, May 2, 2014

Android Course

  
 ANDROID COURSE                          Duration: 60 Hours

Introduction to Android                                    

v  What is Android?
v  Setting up development environment
v  Dalvik Virtual Machine & .apk file extension
v  Fundamentals : 
·         Basic Building blocks – Activities, Services, Broadcast Receivers & Content providers
·          UI Components- Views & notifications
·         Components for communication -Intents & Intent Filters
v  Android API levels(versions & version names)
Application Structure

v  AndroidManifest.xml
·         uses-permission & uses-sdk
·         Activity/services/receiver declarations
v  Resources & R.java
v  Assets
v  Values – strings.xml
v  Layouts & Drawable Resources
v  Activities and Activity lifecycle
v  First sample Application
v Deploying sample application on a real device




Emulator-Android Virtual Device
v  Launching emulator
v  Editing emulator settings
v  Emulator shortcuts
v  Logcat usage
v  Introduction to DDMS
v  File explorer
v  Second App :- (switching between activities)
·         Develop an app for demonstrating the communication between Intents

Intents
v  Explicit Intents
v  Implicit intents
UI Design
v  Text Fields
v  Layouts
·         Relative Layout, Table Layout, Frame Layout, Linear Layout
v  Nested layouts
v  Time and Date
v  Images and media
v  Composite
v  Alert Dialogs & Toast
v  Popup



Styles & Themes
v  styles.xml file
v  colors.xml file- declaring colors and drawables
v  Drawable resources for shapes, gradients(selectors)
·         Shapes drawables
·         State drawables
·         Transition drawables
v  Style attribute in layout file
v  Applying themes via code and manifest file
SQLite Programming
v  SQLiteOpenHelper
v  SQLiteDatabase
v  Cursor
v  Content providers
Linkify
v  Web URLs, Email address, text, map address, phone numbers
v  Match Filter & Transform Filter
v  Examples
Adapters and Widgets
v  Adapters
v  Example - Efficient Adapter
v  ListView and ListActivity
v  Custom listview
v  GridView using adapters
v  Gallery using adapters



Notifications
v  Broadcast Receivers
v  Services and notifications
v  Toast
v  Alarms
Custom Components
v  Custom Toast
v  Custom dialogs
v  Custom Tabs
v  Custom animated popup panels
Advanced
v  Live Folders
v  Using sdcards – Reading and writing
v  XML Parsing
v  JSON Parsing
v  Maps via intent and MapActivity
v  GPS, Location based Services
v  Accessing Phone services(Call, SMS, MMS)
v  Sensors
v  Using Wi-Fi & Bluetooth
v  Action bar tabs and custom views on Action bars
v  Fragments