SOFTWARE PROJECTS
Technofist is a well established and experienced IT consulting, Embedded solutions and application development company in Bangalore.
We have the best in class infrastructure, lab set up , Training facilities, And experienced research and development team for both educational and corporate sectors.
OUR COMPANY VALUES : Instead of Quality, commitment and success.
OUR CUSTOMERS are delighted with the business benefits of the Technofist software solutions.
IEEE JAVA / J2EE PROJECT TITLES AND SYNOPSIS
Java is world most popular language and it power billions of devices and systems world wide. A variety of suggested student term projects involving java. here we provided a IEEE java project list using latest techniques. Latest Java topics, Latest java Concepts for Diploma, Latest java Concepts for Engineering, Latest java Concepts for M-Tech, Java project centers in Bangalore with high quality Training and development, Latest J2EE Projects with recent Technology. Here is a list of project ideas for Softwere concepts. Students belonging to third year mini projects or final year projects can use these projects as mini-projects as well as mega-projects. If you have questions regarding these projects feel free to contct us. You may also ask for abstract of a project idea that you have or want to work on.The own projects idea for diploma and Engineering students can also be done here.
TEAN001 | DUMMY-BASED USER LOCATION ANONYMIZATION UNDER REAL WORLD CONSTRAINTS | SYNOPSIS |
TEAN002 | SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES | SYNOPSIS |
TEAN003 | MOBILE ATTENDANCE USING NEAR FIELD COMMUNICATION AND ONE-TIME PASSWORD | SYNOPSIS |
TEAN004 | CONTEXT-AWARE MOBILE CLOUD COMPUTING AND ITS CHALLENGES | SYNOPSIS |
TEAN005 | STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS | SYNOPSIS |
TEAN006 | PRISM: PRIVACY-AWARE INTEREST SHARING AND MATCHING IN MOBILE SOCIAL NETWORKS | SYNOPSIS |
TEAN007 | NFC BASED APPLICATIONS FOR VISUALLY IMPAIRED PEOPLE | SYNOPSIS |
TEAN008 | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | SYNOPSIS |
TEAN009 | A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM | SYNOPSIS |
TEAN010 | ALTERDROID: DIFFERENTIAL FAULT ANALYSIS OF OBFUSCATED SMARTPHONE MALWARE | SYNOPSIS |
TEAN011 | AN EXPLORATION OF GEOGRAPHIC AUTHENTICATION SCHEMES | SYNOPSIS |
TEAN012 | AUTHENTICATION OF SMARTPHONE USERS USING BEHAVIORAL BIOMETRICS | SYNOPSIS |
TEAN013 | DESIGNING A SECURE EXAM MANAGEMENT SYSTEM (SEMS) FOR M-LEARNING ENVIRONMENTS | SYNOPSIS |
TEAN014 | DROIDDETECTOR: ANDROID MALWARE CHARACTERIZATION AND DETECTION USING DEEP LEARNING | SYNOPSIS |
TEAN015 | EPLQ: EFFICIENT PRIVACY-PRESERVING LOCATION-BASED QUERY OVER OUTSOURCED ENCRYPTED DATA | SYNOPSIS |
TEAN016 | INTELLIGENT HANDS FREE SPEECH BASED SMS SYSTEM ON ANDROID | SYNOPSIS |
TEAN017 | MADAM: EFFECTIVE AND EFFICIENT BEHAVIOR-BASED ANDROID MALWARE DETECTION AND PREVENTION | SYNOPSIS |
TEAN018 | PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDS | SYNOPSIS |
TEAN019 | PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS | SYNOPSIS |
TEAN020 | SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES | SYNOPSIS |
TEAN021 | SENSPEED: SENSING DRIVING CONDITIONS TO ESTIMATE VEHICLE SPEED IN URBAN ENVIRONMENTS | SYNOPSIS |
TEAN022 | UNDERSTANDING SMARTPHONE SENSOR AND APP DATA FOR ENHANCING THE SECURITY OF SECRET QUESTIONS | SYNOPSIS |
TEAN023 | ROUTE - SAVER LEVERAGING ROUTE API’S FOR ACCURATE AND EFFICIENT QUERY PROCESSING AT LOCATION – BASED SERVICES | SYNOPSIS |
TEAN024 | RESTRO GUIDE | SYNOPSIS |
TEAN025 | E - SHARY | SYNOPSIS |
TEAN026 | A REAL-TIME ADAPTIVE ALGORITHM FOR VIDEO STREAMING OVER MULTIPLE WIRELESS ACCESS NETWORK | SYNOPSIS |
TEAN027 | SIGNATURE GENERATION FOR SENSITIVE INFORMATION LEAKAGE IN ANDROID APPLICATIONS | SYNOPSIS |
TEAN028 | PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA | SYNOPSIS |
TEAN029 | SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD COMPUTING | SYNOPSIS |
TEAN030 | ANDROID MEETS LED BULBS IN SMART-HOME AUTOMATION | SYNOPSIS |
TEAN031 | GREEN HOUSE MONITORING AND CONTROL USING SMART PHONES | SYNOPSIS |
TEAN032 | ANDROID BASED DEVICE CONTROL . | SYNOPSIS |
TEAN033 | ANDROID BASED HOME AUTOMATION | SYNOPSIS |
TEAN034 | DEVELOPMENT AND CONTROLLING OF 5 IN 1 MULTIPURPOSE AGRICULTURAL ROBOT USING SMART PHONES | SYNOPSIS |
TEAN035 | ANDROID CONTROLLED PICK AND PLACE MOBILE ROBOT | SYNOPSIS |
TEAN036 | LPG GAS MONITORING AND BOOKING USING SMART PHONE | SYNOPSIS |
TEAN037 | DEVELOPMENT OF PAITENT MONITORING SYSTEM USING SMART PHONE | SYNOPSIS |
TEAN038 | INDUSTRIAL MONITORING AND CONTROL SYSTEM USING ANDOID APPLICATION. | SYNOPSIS |
TEAN039 | SPEECH BASED CONTROL & ALERT SYSTEM FOR SENIOR CITIZENS USING ANDROID MOBILE | SYNOPSIS |
TEAN040 | AN ANDROID BASED APPLICATION FOR EMERGENCY HELPING | SYNOPSIS |
TEAN041 | SMART PHONE CONTROLLED ANDROID ROBOT WITH LIVE VIDEO TRANSMISSION | SYNOPSIS |
TEAN042 | ANDROID SPEECH RECOGNITION BASED VOICE COMMAND NOTICE BOARD | SYNOPSIS |
TEAN043 | DEVELOPMENT OF WSN BASED WATER LEVEL MONITORING AND CONTROL SYSTEM USING ANDROID | SYNOPSIS |
TEAN044 | DEVELOPMENT OF AUTOMATED IRRIGATION CONTROL SYSTEM USING SMART PHONE BASED ON SOIL MOISTURE | SYNOPSIS |
TEAN045 | ANDROID BASED ANTENNA POSITIONING SYSTEM. | SYNOPSIS |
TEW001 | CLOUD BASED WEB APPLICATION SUPPORTING VEHICLE TOLL PAYMENT SYSTEM | SYNOPSIS |
TEW002 | EFFECTIVE WAYS TO USE INTERNET OF THINGS IN THE FIELD OF MEDICAL AND SMART HEALTH CARE | SYNOPSIS |
TEW003 | THE INTERNET OF THINGS FOR SOUTH AFRICAN TOURISM | SYNOPSIS |
TEW004 | AN IOT-AWARE ARCHITECTURE FOR SMART HEALTHCARE SYSTEMS | SYNOPSIS |
TEW005 | A LOW COST WEB BASED REMOTE MONITORING SYSTEM WITH BUILT-IN SECURITY FEATURE FOR VULNERABLE ENVIRONMENTS | SYNOPSIS |
TEW006 | A RECONFIGURABLE SMART SENSOR INTERFACE FOR INDUSTRIAL WSN AND HUMAN HEALTH MONITORING IN IOT ENVIRONMENT | SYNOPSIS |
TEW007 | A RECONFIGURABLE SMART SENSOR INTERFACE FOR INDUSTRIAL WSN IN IOT ENVIRONMENT | SYNOPSIS |
TEW008 | DESIGN OF A WSN PLATFORM FOR LONG-TERM ENVIRONMENTAL MONITORING FOR IOT APPLICATIONS | SYNOPSIS |
TEW009 | IMPLEMENTATION OF A WEB OF THINGS BASED SMART GRIDTO REMOTELY MONITOR AND CONTROL RENEWABLE ENERGY SOURCES | SYNOPSIS |
TEW010 | WIFI FOR VEHICULAR COMMUNICATION SYSTEMS | SYNOPSIS |
TEW011 | A NON-INVASIVE REMOTE HEALTH MONITORING SYSTEM USING VISIBLE LIGHT COMMUNICATION | SYNOPSIS |
TEC001 | SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING | SYNOPSIS |
TEC002 | ENSURES DYNAMIC ACCESS AND SECURE E-GOVERNANCE SYSTEM IN CLOUDS SERVICES – EDSE | SYNOPSIS |
TEC003 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS | SYNOPSIS |
TEC004 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | SYNOPSIS |
TEC005 | AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD | SYNOPSIS |
TEC006 | DIFFERENTIALLY PRIVATE ONLINE LEARNING FOR CLOUD-BASED VIDEO RECOMMENDATION WITH MULTIMEDIA BIG DATA IN SOCIAL NETWORKS | SYNOPSIS |
TEC007 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES | SYNOPSIS |
TEC008 | DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE. | SYNOPSIS |
TEC009 | EYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS | SYNOPSIS |
TEC010 | KSF-OABE: OUTSOURCED ATTRIBUTE-BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE | SYNOPSIS |
TEC011 | SECRBAC: SECURE DATA IN THE CLOUDS | SYNOPSIS |
TEC012 | A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD | SYNOPSIS |
TEC013 | AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING | SYNOPSIS |
TEC014 | AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD | SYNOPSIS |
TEC015 | CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM | SYNOPSIS |
TEC016 | CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING | SYNOPSIS |
TEC017 | CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES | SYNOPSIS |
TEC018 | CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL | SYNOPSIS |
TEC019 | CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS | SYNOPSIS |
TEC020 | DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD | SYNOPSIS |
TEC021 | DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE | SYNOPSIS |
TEC022 | DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA | SYNOPSIS |
TEC023 | ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES | SYNOPSIS |
TEC024 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES | SYNOPSIS |
TEC025 | IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS | SYNOPSIS |
TEC026 | PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD | SYNOPSIS |
TEC027 | REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS | SYNOPSIS |
TEC028 | SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED ENCRYPTION | SYNOPSIS |
TEC029 | SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING | SYNOPSIS |
TEC030 | TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE | SYNOPSIS |
TEC031 | A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING | SYNOPSIS |
TEC032 | A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION | SYNOPSIS |
TEC033 | CHARM A COST EFFICIENT MULTI CLOUD DATA HOSTING SCHEME WITH HIGH AVAILABILITY | SYNOPSIS |
TEC034 | AUDITFREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE BASED ENCRYPTION | SYNOPSIS |
TEC035 | KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD STORAGE | SYNOPSIS |
TEC036 | SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD | SYNOPSIS |
TEC037 | A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION | SYNOPSIS |
TEC038 | AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION | SYNOPSIS |
TEC039 | CHARM: A COST-EFFICIENT MULTI-CLOUD DATA HOSTING SCHEME WITH HIGH AVAILABILITY | SYNOPSIS |
TEC040 | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | SYNOPSIS |
TEC041 | PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS | SYNOPSIS |
TEC042 | SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD | SYNOPSIS |
TEC043 | RELIABLE RE-ENCRYPTION IN UNRELIABLE CLOUD | SYNOPSIS |
TEC044 | A LOAD BALANCING MODEL BASED ON CLOUD PARTITIONING FOR THE PUBLIC CLOUD | SYNOPSIS |
TEC045 | AMES-CLOUD | SYNOPSIS |
TEC046 | PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE | SYNOPSIS |
TEC047 | AUTOMATIC PROTOCOL BLOCKER FOR PRIVACY PRESERVING PUBLIC AUDITING IN CLOUD COMPUTING | SYNOPSIS |
TEC048 | FOG COMPUTING:MITIGATING INSIDER DATA THEFT ATTACKS IN THE CLOUD | SYNOPSIS |
TEC049 | ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD | SYNOPSIS |
TEC050 | AN EFFICIENT SECURITY MODEL IN CLOUD COMPUTING BASED ON SOFT COMPUTING TECHNIQUES | SYNOPSIS |
TEC051 | SECURE AND PRACTICAL OUTSOURCING OF LINEARPROGRAMMING IN CLOUD COMPUTING | SYNOPSIS |
TEC052 | FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING | SYNOPSIS |
TEC053 | DYNAMIC LOAD-BALANCED MULTICAST FOR DATA INTENSIVE APPLICATION ON CLOUDS. | SYNOPSIS |
TED001 | FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING MAPREDUCE | SYNOPSIS |
TED002 | SPORE: A SEQUENTIAL PERSONALIZED SPATIAL ITEM RECOMMENDER SYSTEM | SYNOPSIS |
TED003 | INVERTED LINEAR QUADTREE: EFFICIENT TOP K SPATIAL KEYWORD SEARCH | SYNOPSIS |
TED004 | TRUTH DISCOVERY IN CROWDSOURCED DETECTION OF SPATIAL EVENTS | SYNOPSIS |
TED005 | SENTIMENT ANALYSIS OF TOP COLLEGES IN INDIA USING TWITTER DATA | SYNOPSIS |
TED006 | FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS | SYNOPSIS |
TED007 | A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS | SYNOPSIS |
TED008 | AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS | SYNOPSIS |
TED009 | BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION ALGORITHM | SYNOPSIS |
TED010 | CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION | SYNOPSIS |
TED011 | CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDINGS | SYNOPSIS |
TED012 | CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER | SYNOPSIS |
TED013 | CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA | SYNOPSIS |
TED014 | EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS | SYNOPSIS |
TED015 | DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS | SYNOPSIS |
TED016 | MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS | SYNOPSIS |
TED017 | NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS | SYNOPSIS |
TED018 | RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS | SYNOPSIS |
TED019 | LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY | SYNOPSIS |
TED020 | USING HASHTAG GRAPH-BASED TOPIC MODEL TO CONNECT SEMANTICALLY-RELATED WORDS WITHOUT CO-OCCURRENCE IN MICROBLOGS | SYNOPSIS |
TED021 | QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS | SYNOPSIS |
TED022 | PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY | SYNOPSIS |
TED023 | SURVEY ON VIGILANCE OF INSTANT MESSAGES INSOCIAL NETWORKS USING TEXT MININGTECHNIQUES AND ONTOLOGY | SYNOPSIS |
TED024 | A NOVEL PIPELINE APPROACH FOR EFFICIENT BIG DATA BROADCASTINGENTITY LINKING WITH A KNOWLEDGE BASE: ISSUES, TECHNIQUES, AND SOLUTIONS | SYNOPSIS |
TED025 | ENTITY LINKING WITH A KNOWLEDGE BASE ISSUES TECHNIQUES AND SOLUTIONS | SYNOPSIS |
TED026 | SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY | SYNOPSIS |
TED027 | LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES | SYNOPSIS |
TED028 | A META-TOP-DOWN METHOD FOR LARGE-SCALE HIERARCHICAL CLASSIFICATION | SYNOPSIS |
TED029 | SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY | SYNOPSIS |
TED030 | ADVANCE MINING OF TEMPORAL HIGH UTILITY ITEMSET | SYNOPSIS |
TED031 | SLICING A NEW APPROACH TO PRIVACY PRESERVING DATA PUBLISHING | SYNOPSIS |
TED032 | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | SYNOPSIS |
TED033 | DISEASE PREDICTION | SYNOPSIS |
TED034 | FAST DATA RETRIEVAL FROM DATABASES BEYOND THE DATABASE DIMENSIONS | SYNOPSIS |
TED035 | C-TREND: TEMPORAL CLUSTER GRAPHS FOR IDENTIFYING AND VISUALIZING TRENDS IN MULTI ATTRIBUTE TRANSACTIONAL DATA | SYNOPSIS |
TED036 | A SIGNATURE-BASED INDEXING METHOD FOR EFFICIENT CONTENTBASED RETRIEVAL OF RELATIVETEMPORAL PATTERNS | SYNOPSIS |
TED037 | HIDING SENSITIVE ASSOCIATION RULES WITH LIMITED SIDE EFFECTS EVENTUAL CLUSTERER: A MODULAR APPROACH TO DESIGNING HIERARCHICAL CONSENSUS | SYNOPSIS |
TEI001 | PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDS | SYNOPSIS |
TEI002 | SINGLE SAMPLE FACE RECOGNITION BASED ON LPP FEATURE TRANSFER | SYNOPSIS |
TEI003 | A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM | SYNOPSIS |
TEI004 | REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON PROGRESSIVE RECOVERY | SYNOPSIS |
TEI005 | REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE WITH DISTRIBUTED SOURCE ENCODING | SYNOPSIS |
TEI006 | A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION | SYNOPSIS |
TEI007 | A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS | SYNOPSIS |
TEI008 | LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH | SYNOPSIS |
TEI009 | ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL | SYNOPSIS |
TEI010 | TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING | SYNOPSIS |
TEI011 | AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES | SYNOPSIS |
TEI012 | SUPER RESOLUTION - BASED INPAINTING | SYNOPSIS |
TEI013 | 2D IMAGE MORPHING | SYNOPSIS |
TEI014 | NOISE REDUCTION BY FUZZY IMAGE FILTERING | SYNOPSIS |
TEI015 | FACE RECOGNITION USING EIGEN VALUES | SYNOPSIS |
TEI016 | NOISE REDUCTION BY USING FUZZY IMAGE FILTERING | SYNOPSIS |
TEB001 | FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING MAPREDUCE | SYNOPSIS |
TEB002 | SENTIMENT ANALYSIS OF TOP COLLEGES USING TWITTER DATA | SYNOPSIS |
TEB003 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS | SYNOPSIS |
TEB004 | THE SP THEORY OF INTELLIGENCE: DISTINCTIVE FEATURES AND ADVANTAGE | SYNOPSIS |
TEB005 | A PARALLEL PATIENT TREATMENT TIME PREDICTION ALGORITHM AND ITS APPLICATIONS IN HOSPITAL QUEUING-RECOMMENDATION IN A BIG DATA ENVIRONMENT | SYNOPSIS |
TEB006 | PROTECTION OF BIG DATA PRIVACY | SYNOPSIS |
TEB007 | TOWARDS A VIRTUAL DOMAIN BASED AUTHENTICATION ON MAPREDUCE | SYNOPSIS |
TEB008 | C MINER: OPINION EXTRACTION AND SUMMARIZATION FOR CHINESE MICRO BLOGS | SYNOPSIS |
TEW001 | AN EXPLORATION OF GEOGRAPHIC AUTHENTICATION SCHEMES | SYNOPSIS |
TEW002 | DUMMY-BASED USER LOCATION ANONYMIZATION UNDER REAL-WORLD CONSTRAINTS | SYNOPSIS |
TEW003 | PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS | SYNOPSIS |
TEW004 | STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS | SYNOPSIS |
TEW005 | PRISM: PRIVACY-AWARE INTEREST SHARING AND MATCHING IN MOBILE SOCIAL NETWORKS | SYNOPSIS |
TEW006 | A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM | SYNOPSIS |
TEW007 | REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON PROGRESSIVE RECOVERY | SYNOPSIS |
TEN001 | STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS | SYNOPSIS |
TEN002 | FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS | SYNOPSIS |
TEN003 | TOWARD OPTIMUM CROWDSENSING COVERAGE WITH GUARANTEED PERFORMANCE | SYNOPSIS |
TEN004 | PRISM: PRIVACY-AWARE INTEREST SHARING AND MATCHING IN MOBILE SOCIAL NETWORKS | SYNOPSIS |
TEN005 | JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL | SYNOPSIS |
TEN006 | SOFTWARE DEFINED NETWORKING WITH PSEUDONYM SYSTEMS FOR SECURE VEHICULAR CLOUDS | SYNOPSIS |
TEN007 | AN ENHANCED AVAILABLE BANDWIDTH ESTIMATION TECHNIQUE FOR AN END-TO-END NETWORK PATH | SYNOPSIS |
TEN008 | PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS | SYNOPSIS |
TEN009 | A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS | SYNOPSIS |
TEN010 | IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS | SYNOPSIS |
TEN011 | OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS | SYNOPSIS |
TEN012 | SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS NETWORKS | SYNOPSIS |
TEN013 | LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS | SYNOPSIS |
TEN014 | SMARTCRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB | SYNOPSIS |
TEN015 | A NOVEL AND LIGHTWEIGHT SYSTEM TO SECURE WIRELESS MEDICAL SENSOR NETWORKS | SYNOPSIS |
TEN016 | CIPHER X RAY | SYNOPSIS |
TEN017 | A TWO STAGE DEANONYMIZATION ATTACK AGAINST ANONYMIZED SOCIAL NETWORKS | SYNOPSIS |
TEN018 | AN IMPROVED CLUSTERING ALGORITHM BASED ONK-MEANS AND HARMONY SEARCH OPTIMIZATION | SYNOPSIS |
TEN019 | A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS | SYNOPSIS |
TEN020 | VAMPIRE ATTACKS | SYNOPSIS |
TEN021 | MOBILE RELAY CONFIGURATION IN DATA - INTENSIVE WIRELESS SENSOR NETWORKS | SYNOPSIS |
TEN022 | M-PRIVACY FOR COLLABRATIVE DATA PUBLISHING | SYNOPSIS |
TEN023 | AMPLE:AN ADAPTIVE TRAFFIC ENGINEERING SYSTEM BASED ON VIRTUAL ROUTING TOPOLOGIES | SYNOPSIS |
TEN024 | AUTOMATIC RECONFIGURATION FOR LARGE SCALE RELIABLE FOR STORAGE SYSTEM | SYNOPSIS |
TEN025 | AVMON | SYNOPSIS |
TEN026 | P2PPROXY | SYNOPSIS |
TEN027 | BIDIRECTIONAL ROUTING ALGORITHUM | SYNOPSIS |
TEN028 | CREDIT CARD FRAUD DETECTION USING HIDDEM M,ARKOV MODEL. | SYNOPSIS |
TEN029 | EFFICIENT BROADCASTING WITH GURENTEED COVERAGE IN MOBILE ADHOC NETWORK. | SYNOPSIS |
TEN030 | ONLINE HANDWRITTEN SCRIPT RECOGNITION. | SYNOPSIS |
TEN031 | A FULLY DISTRIBUTED PROACTIVELY SECURE THRESHOLD MULTISIGNATURE SCHEME | SYNOPSIS |
TEN032 | NETWORK MONITORING MANAGEMENT | SYNOPSIS |
TEN033 | A BIDIRECTIONAL ROUTING ABSTRACTION FOR ASYMMETRIC MOBILE AD HOC NETWORKS | SYNOPSIS |
TEN034 | AN ACKNOWLEDGEMENT APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS | SYNOPSIS |