SlideShare a Scribd company logo
 

 
 
 
 

Academic Projects for
CSE (2013-2014)
 
 
 

We will develop your ideas and your papers also,
For any Further information call-9603150547
e-mail visionsolutions.9@gmail.com
 
 
 
 
 

DOTNET
DATA MINING
1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data. [SMS001]
2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002]
3.A Novel Profit Maximizing Metric for Measuring Classification Performance of
Customer Churn Prediction Models. [SMS003]
4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004]
5.Dynamic Query Forms for Database Queries. [SMS005]
6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006]
7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled
Data Warehouse. [SMS007]
8. Clustering

Sentence-Level

Text

Using

a

Novel

Fuzzy

Relational

Clustering

Algorithm. [SMS008]
9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009]
10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010]

NETWORKING AND NETWORK SECURITY
11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011]
12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless
Mesh Network. [SMS012]
13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming
Systems. [SMS013]
14.Diffusion Dynamics of Network Technologies With Bounded Rational Users:
Aspiration-Based Learning. [SMS014]
15.Delay-Based Network Utility Maximization. [SMS015]
16.Answering “What-If” Deployment and Configuration Questions With WISE:
Techniques and Deployment Experience. [SMS016]
17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless
Networks. [SMS017]
 

18.A

Rank

Correlation

Based

Detection

against

Distributed

Reflection

DoS

Attacks. [SMS018]

CLOUD COMPUTING
19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019]
20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020]
21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS021]
22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems. [SMS022]
23.CloudMoV: Cloud-based Mobile Social TV. [SMS023]
24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024]
25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing
Networks. [SMS025]
MOBILE COMPUTING
26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead
in Mobile Ad Hoc Networks. [SMS026]
27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027]
28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users. [SMS028]
29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating
System. [SMS029]
30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in
Mobile Ad Hoc Networks. [SMS030]
31.On

Quality

of

Monitoring

for

Multi-channel

Wireless

Infrastructure

Networks. [SMS031]
32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032]
33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033]
34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users. [SMS034]
 

35.EMAP:

Expedite

Message

Authentication

Protocol

for

Vehicular

Ad

Hoc

Networks. [SMS035]

PARALLEL DISTRIBUTED SYSTEMS
36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036]
37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037]
38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038]
39.GKAR:

A

Novel

Geographic

K-Anycast

Routing

for

Wireless

Sensor

Networks. [SMS039]
40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment. [SMS040]
41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing
Clouds. [SMS041]
42.BAHG:

Back-Bone-Assisted

Hop

Greedy

Routing

for

VANET’s

City

Environments. [SMS042]
43.ASAP:

An

Adaptive

Sampling

Approach

to

Data

Collection

in

Sensor

Networks. [SMS043]
44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem
and Its Efficient Parallelization. [SMS044]
45.A General Framework for Efficient Continuous Multidimensional Top-k Query
Processing in Sensor Networks. [SMS045]

SERVICECOMPUTING

46.Privacy-EnhancedWebServiceComposition. [SMS046]
47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
InformationSharing. [SMS047]
48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems. [SMS048]
 

49.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection. [SMS049]
50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS050]

IMAGEPROCESSING
51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database
and a Comprehensive Evaluation. [SMS051]
 

JAVA
DATA MINING
1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data.[SMS001]
2.A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data.[SMS002]
3.A Novel Profit Maximizing Metric for Measuring Classification Performance of
Customer Churn Prediction Models.[SMS003]
4.A Survey of XML Tree Patterns.[SMS004]
5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005]
6.Dynamic Personalized Recommendation on Sparse Data.[SMS006]
7.Mining

User

Queries

with

Markov

Chains:

Application

to

Online

Image

Retrieval.[SMS007]
8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008]
9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009]
10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and RuleBased Model.[SMS010]
11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011]
12.M-Privacy for Collaborative Data Publishing.[SMS012]
13.Comparable Entity Mining from Comparative Questions.[SMS013]
14.Spatial Approximate String Search.[SMS014]
15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled
Data Warehouse.[SMS015]

NETWORKING AND NETWORK SECURITY
16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016]
17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless
Mesh Networks.[SMS017]
18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging
Quality.[SMS018]
 

19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming
Systems.[SMS019]
20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020]
21.Diffusion Dynamics of Network Technologies With Bounded Rational Users:
Aspiration-Based Learning.[SMS021]
22.Answering “What-If” Deployment and Configuration Questions With WISE:
Techniques and Deployment Experience.[SMS022]
23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless
Networks.[SMS023]
24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks.[SMS024]
25.A

Rank

Correlation

Based

Detection

Resources

for

against

Distributed

Reflection

DoS

Attacks.[SMS025]
26.Optimizing

Cloud

Delivering

IPTV

Services

through

Virtualization.[SMS026]
27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027]

CLOUD COMPUTING
28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028]
29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029]
30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030]
31.Cloud computing for mobile users can offloading compution save energy.[SMS031]
32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032]
33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS033]
34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social
Video Sharing in the Clouds.[SMS034]
35.CloudMoV: Cloud-based Mobile Social TV.[SMS035]
36.QoS Ranking Prediction for Cloud Services.[SMS036]
37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]
 

38.Collaboration

in

Multicloud

Computing

Environments:

Framework

and

Security Issues.[SMS038]
39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039]
40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040]

MOBILE COMPUTING
41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead
in Mobile Ad Hoc Networks.[SMS041]
42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042]
43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043]
44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks.[SMS044]
45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in
Mobile Ad Hoc Networks.[SMS045]
46.On

Quality

of

Monitoring

for

Multi-channel

Wireless

Infrastructure

Networks.[SMS046]
47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047]
48.A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications.[SMS048]
49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users.[SMS049]
50.EMAP:

Expedite

Message

Authentication

Protocol

for

Vehicular

Ad

Hoc

Mobile

Ad

Hoc

Networks.[SMS050]
51.Adaptive

Position

Update

for

Geographic

Routing

in

Networks.[SMS051]
52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052]
53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053]
54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference
Cancellation.[SMS054]
55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]
 

PARALLEL DISTRIBUTED SYSTEMS
56.Covering Points of Interest with Mobile Sensors.[SMS056]
57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057]
58.Analysis of Distance-Based Location Management in Wireless Communication
Networks.[SMS058]
59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks.[SMS059]
60.Error-Tolerant

Resource

Allocation

and

Payment

Minimization

for

Cloud

System.[SMS060]
61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS061]
62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment.[SMS062]
63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing
Clouds.[SMS063]
64.BAHG:

Back-Bone-Assisted

Hop

Greedy

Routing

for

VANET’s

City

Environments.[SMS064]
65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065]
66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy
Preserving of Intermediate Datasets in Cloud.[SMS066]
67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS067]
68.ASAP:

An

Adaptive

Sampling

Approach

to

Data

Collection

in

Sensor

Networks.[SMS068]
69.Detection

and

Localization

of

Multiple

Spoofing

Attackers

in

Wireless

Networks.[SMS069]

70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing.[SMS070]
 

SERVICE COMPUTING
71.Privacy-Enhanced Web Service Composition.[SMS071]
72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems.[SMS072]
73.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection.[SMS073]

SECURE COMPUTING
74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074]
75.Secure

Encounter-based

Mobile

Social

Networks

Tradeoffs.[SMS075]
76.Two tales of privacy in online social networks.[SMS076]

Requirements

Designs

and
 

ANDROID
DATA MINING
1.Finding

Rare

Classes

Active

Learning

with

Generative

and

Discriminative

Models. [SMS001]
2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia . [SMS002]
3.A Survey of XML Tree Patterns. [SMS003]
4.Anonymization of Centralized and Distributed Social Networks by Sequential
Clustering . [SMS004]
5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005]
6.Region-Based Foldings in Process Discovery. [SMS006]
7.Ranking on Data Manifold with Sink Points. [SMS007]
8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled
Data Warehouse. [SMS008]

CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009]
10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS010]
11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems. [SMS011]
12.

CloudMoV: Cloud-based Mobile Social TV. [SMS012]
 

MOBILE COMPUTING
13.

Discovery

and

Verification

of

Neighbor

Positions

in

Mobile

Ad

Hoc

Networks. [SMS013]
14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating
System. [SMS014]
15.SSD

A

Robust

RF

Location

Fingerprint

Addressing

Mobile

Devicesa

Heterogeneity. [SMS015]
16.A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications. [SMS016]
17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017]

PARALLEL DISTRIBUTED SYSTEMS
18.Distributed

Web

Systems

Performance

Forecasting

Using

Turning

Bands

Method. [SMS018]
19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS019]
20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks. [SMS020]
21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks. [SMS021]
22.Analysis of Distance-Based Location Management in Wireless Communication
Networks. [SMS022]
 

SERVICE COMPUTING
23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS023]
24.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection. [SMS024]
25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS025]

More Related Content

What's hot

2014 dotnet ieee
2014 dotnet ieee2014 dotnet ieee
2014 dotnet ieee
anandkumartakeoff
 
Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014
xtreamtechnologies
 
Android titles
Android titlesAndroid titles
Android titles
tema_solution
 
Java ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreJava ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatore
abile technologies
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
Musthafa Tema
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science students
gagnertechnologies
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Adz91 Digital Ads Pvt Ltd
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 
2014 java ieee
2014 java ieee2014 java ieee
2014 java ieee
Anand Buddarapu
 
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsCloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
Elakkiya Triplen
 

What's hot (10)

2014 dotnet ieee
2014 dotnet ieee2014 dotnet ieee
2014 dotnet ieee
 
Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014
 
Android titles
Android titlesAndroid titles
Android titles
 
Java ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreJava ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatore
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science students
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
2014 java ieee
2014 java ieee2014 java ieee
2014 java ieee
 
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsCloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
 

Similar to Cse dot net java & android

Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologies
RICHBRAINTECHNOLOGIES
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojects
RICHBRAINPROJECTS
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintech
RICHBRAINTECH
 
dotnet-projects in madurai
dotnet-projects in maduraidotnet-projects in madurai
dotnet-projects in madurai
s3tech
 
Ieee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintechIeee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintech
RICHBRAINTECH
 
Ieee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologiesIeee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologies
RICHBRAINTECHNOLOGIES
 
Ieee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojectsIeee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojects
RICHBRAINPROJECTS
 
2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies
IEEEFINALYEARPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
RICHBRAINTECHNOLOGIES
 
2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies
IEEEMCAPROJECTS
 
2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies
IEEEFINALYEARPROJECTS
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies
IEEEBEBTECHPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
IEEEBTECHMTECHPROJECTS
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies
IEEEMEMTECHPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
RICHBRAINTECH
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
IEEEFINALYEARPROJECTS
 
2013 2014 ieee finalyear btech mtech java projects richbraintechnologies
2013 2014 ieee finalyear btech mtech java projects richbraintechnologies2013 2014 ieee finalyear btech mtech java projects richbraintechnologies
2013 2014 ieee finalyear btech mtech java projects richbraintechnologies
IEEEFINALYEARPROJECTS
 
2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies
IEEEBEBTECHPROJECTS
 
2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies
IEEEBTECHMTECHPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
RICHBRAINPROJECTS
 

Similar to Cse dot net java & android (20)

Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologies
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojects
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintech
 
dotnet-projects in madurai
dotnet-projects in maduraidotnet-projects in madurai
dotnet-projects in madurai
 
Ieee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintechIeee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintech
 
Ieee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologiesIeee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologies
 
Ieee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojectsIeee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojects
 
2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies
 
2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee finalyear btech mtech java projects richbraintechnologies
2013 2014 ieee finalyear btech mtech java projects richbraintechnologies2013 2014 ieee finalyear btech mtech java projects richbraintechnologies
2013 2014 ieee finalyear btech mtech java projects richbraintechnologies
 
2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies
 
2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 

More from Vision Solutions

Cse python titles 2020
Cse python titles 2020Cse python titles 2020
Cse python titles 2020
Vision Solutions
 
Civil project tittles 2020
Civil project tittles 2020Civil project tittles 2020
Civil project tittles 2020
Vision Solutions
 
Civil project tittles 2019
Civil project tittles 2019Civil project tittles 2019
Civil project tittles 2019
Vision Solutions
 
Mechnical project list 2020
Mechnical project list 2020Mechnical project list 2020
Mechnical project list 2020
Vision Solutions
 
Cse titles 2020
Cse titles 2020Cse titles 2020
Cse titles 2020
Vision Solutions
 
Ieee 2020 matlab project list
Ieee 2020 matlab project listIeee 2020 matlab project list
Ieee 2020 matlab project list
Vision Solutions
 
Eee hardware list
Eee hardware listEee hardware list
Eee hardware list
Vision Solutions
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
Vision Solutions
 
Ieee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project listIeee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project list
Vision Solutions
 
Ieee eee embedded 2018 project list
Ieee eee embedded 2018 project listIeee eee embedded 2018 project list
Ieee eee embedded 2018 project list
Vision Solutions
 
Ieee ece embedded 2018 project list
Ieee ece embedded 2018 project listIeee ece embedded 2018 project list
Ieee ece embedded 2018 project list
Vision Solutions
 
Ieee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives listIeee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives list
Vision Solutions
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
Vision Solutions
 
IEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projectsIEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projects
Vision Solutions
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
Vision Solutions
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
Vision Solutions
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
Vision Solutions
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
Vision Solutions
 
IEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LISTIEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LIST
Vision Solutions
 
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTIEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LIST
Vision Solutions
 

More from Vision Solutions (20)

Cse python titles 2020
Cse python titles 2020Cse python titles 2020
Cse python titles 2020
 
Civil project tittles 2020
Civil project tittles 2020Civil project tittles 2020
Civil project tittles 2020
 
Civil project tittles 2019
Civil project tittles 2019Civil project tittles 2019
Civil project tittles 2019
 
Mechnical project list 2020
Mechnical project list 2020Mechnical project list 2020
Mechnical project list 2020
 
Cse titles 2020
Cse titles 2020Cse titles 2020
Cse titles 2020
 
Ieee 2020 matlab project list
Ieee 2020 matlab project listIeee 2020 matlab project list
Ieee 2020 matlab project list
 
Eee hardware list
Eee hardware listEee hardware list
Eee hardware list
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
 
Ieee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project listIeee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project list
 
Ieee eee embedded 2018 project list
Ieee eee embedded 2018 project listIeee eee embedded 2018 project list
Ieee eee embedded 2018 project list
 
Ieee ece embedded 2018 project list
Ieee ece embedded 2018 project listIeee ece embedded 2018 project list
Ieee ece embedded 2018 project list
 
Ieee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives listIeee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives list
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
 
IEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projectsIEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projects
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
 
IEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LISTIEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LIST
 
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTIEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LIST
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Cse dot net java & android

  • 1.           Academic Projects for CSE (2013-2014)       We will develop your ideas and your papers also, For any Further information call-9603150547 e-mail visionsolutions.9@gmail.com        
  • 2.   DOTNET DATA MINING 1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data. [SMS001] 2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002] 3.A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models. [SMS003] 4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004] 5.Dynamic Query Forms for Database Queries. [SMS005] 6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006] 7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse. [SMS007] 8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm. [SMS008] 9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009] 10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010] NETWORKING AND NETWORK SECURITY 11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011] 12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network. [SMS012] 13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems. [SMS013] 14.Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning. [SMS014] 15.Delay-Based Network Utility Maximization. [SMS015] 16.Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience. [SMS016] 17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks. [SMS017]
  • 3.   18.A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. [SMS018] CLOUD COMPUTING 19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019] 20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020] 21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS021] 22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. [SMS022] 23.CloudMoV: Cloud-based Mobile Social TV. [SMS023] 24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024] 25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks. [SMS025] MOBILE COMPUTING 26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks. [SMS026] 27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027] 28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users. [SMS028] 29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. [SMS029] 30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks. [SMS030] 31.On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks. [SMS031] 32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032] 33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033] 34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users. [SMS034]
  • 4.   35.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks. [SMS035] PARALLEL DISTRIBUTED SYSTEMS 36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036] 37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037] 38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038] 39.GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks. [SMS039] 40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment. [SMS040] 41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds. [SMS041] 42.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments. [SMS042] 43.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks. [SMS043] 44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization. [SMS044] 45.A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks. [SMS045] SERVICECOMPUTING 46.Privacy-EnhancedWebServiceComposition. [SMS046] 47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed InformationSharing. [SMS047] 48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. [SMS048]
  • 5.   49.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. [SMS049] 50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS050] IMAGEPROCESSING 51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation. [SMS051]
  • 6.   JAVA DATA MINING 1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.[SMS001] 2.A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.[SMS002] 3.A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models.[SMS003] 4.A Survey of XML Tree Patterns.[SMS004] 5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005] 6.Dynamic Personalized Recommendation on Sparse Data.[SMS006] 7.Mining User Queries with Markov Chains: Application to Online Image Retrieval.[SMS007] 8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008] 9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009] 10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and RuleBased Model.[SMS010] 11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011] 12.M-Privacy for Collaborative Data Publishing.[SMS012] 13.Comparable Entity Mining from Comparative Questions.[SMS013] 14.Spatial Approximate String Search.[SMS014] 15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse.[SMS015] NETWORKING AND NETWORK SECURITY 16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016] 17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks.[SMS017] 18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality.[SMS018]
  • 7.   19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems.[SMS019] 20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020] 21.Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning.[SMS021] 22.Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience.[SMS022] 23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks.[SMS023] 24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks.[SMS024] 25.A Rank Correlation Based Detection Resources for against Distributed Reflection DoS Attacks.[SMS025] 26.Optimizing Cloud Delivering IPTV Services through Virtualization.[SMS026] 27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027] CLOUD COMPUTING 28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028] 29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029] 30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030] 31.Cloud computing for mobile users can offloading compution save energy.[SMS031] 32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032] 33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS033] 34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.[SMS034] 35.CloudMoV: Cloud-based Mobile Social TV.[SMS035] 36.QoS Ranking Prediction for Cloud Services.[SMS036] 37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]
  • 8.   38.Collaboration in Multicloud Computing Environments: Framework and Security Issues.[SMS038] 39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039] 40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040] MOBILE COMPUTING 41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.[SMS041] 42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042] 43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043] 44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks.[SMS044] 45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks.[SMS045] 46.On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks.[SMS046] 47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047] 48.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications.[SMS048] 49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users.[SMS049] 50.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Mobile Ad Hoc Networks.[SMS050] 51.Adaptive Position Update for Geographic Routing in Networks.[SMS051] 52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052] 53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053] 54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation.[SMS054] 55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]
  • 9.   PARALLEL DISTRIBUTED SYSTEMS 56.Covering Points of Interest with Mobile Sensors.[SMS056] 57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057] 58.Analysis of Distance-Based Location Management in Wireless Communication Networks.[SMS058] 59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks.[SMS059] 60.Error-Tolerant Resource Allocation and Payment Minimization for Cloud System.[SMS060] 61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS061] 62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.[SMS062] 63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds.[SMS063] 64.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments.[SMS064] 65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065] 66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.[SMS066] 67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS067] 68.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.[SMS068] 69.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.[SMS069] 70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.[SMS070]
  • 10.   SERVICE COMPUTING 71.Privacy-Enhanced Web Service Composition.[SMS071] 72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.[SMS072] 73.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.[SMS073] SECURE COMPUTING 74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074] 75.Secure Encounter-based Mobile Social Networks Tradeoffs.[SMS075] 76.Two tales of privacy in online social networks.[SMS076] Requirements Designs and
  • 11.   ANDROID DATA MINING 1.Finding Rare Classes Active Learning with Generative and Discriminative Models. [SMS001] 2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia . [SMS002] 3.A Survey of XML Tree Patterns. [SMS003] 4.Anonymization of Centralized and Distributed Social Networks by Sequential Clustering . [SMS004] 5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005] 6.Region-Based Foldings in Process Discovery. [SMS006] 7.Ranking on Data Manifold with Sink Points. [SMS007] 8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse. [SMS008] CLOUD COMPUTING 9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009] 10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS010] 11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. [SMS011] 12. CloudMoV: Cloud-based Mobile Social TV. [SMS012]
  • 12.   MOBILE COMPUTING 13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. [SMS013] 14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. [SMS014] 15.SSD A Robust RF Location Fingerprint Addressing Mobile Devicesa Heterogeneity. [SMS015] 16.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. [SMS016] 17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017] PARALLEL DISTRIBUTED SYSTEMS 18.Distributed Web Systems Performance Forecasting Using Turning Bands Method. [SMS018] 19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS019] 20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. [SMS020] 21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks. [SMS021] 22.Analysis of Distance-Based Location Management in Wireless Communication Networks. [SMS022]
  • 13.   SERVICE COMPUTING 23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS023] 24.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. [SMS024] 25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS025]