java projects in chennai
TRANSCRIPT
Phoenix Systems Software Project List
( Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android )
Phoenix Systems
2016 - 2017
Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android
Software Projects
Application Projects
IEEE Projects
Android Projects
JAVA*J2EE Projects Knowledge and Data Engineering
Data Mining
1. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental
Analysis-2016
2. A Scalable Data Chunk Similarity based Compression Approach for Efficient Big Sensing
Data Processing on Cloud-2016
3. Answering Pattern Queries Using Views-2016
4. Guest Editorial: Special Section on the International Conference on Data Engineering-
2016
5. Mining High Utility Patterns in One Phase without Generating Candidates-2016
6. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments-2016
7. Mining User-Aware Rare Sequential Topic Patterns in Document Streams-2016
8. Nearest Keyword Set Search in Multi-dimensional Datasets-2016
9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases-
2016
10. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search-2016
11. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. -
2016
12. Progressive Duplicate Detection - 2015
13. Keyword Search Over Probabilistic RDF Graphs- 2015
14. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data-
2015
15. LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015
16. GFilter: A General Gram Filter for String Similarity Search - 2015
17. Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014
18. Range Aggregation With Set Selection-2014
19. Facilitating Document Annotation Using Content and Querying Value-2014
20. Automatic Itinerary Planning for Traveling Services-2014
21. Adaptive Preprocessing for Streaming Data-2014
22. Optimized Cartesian K-Means-2014
23. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-
2014
24. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at
Location-Based Services-2014
25. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
26. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-
2014
27. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014
28. An Air Index for Spatial Query Processing in Road Networks-2014
29. An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014
30. Multi-Dimensional Classification with Super-Classes
31. T-Drive : Driving Directions Based on Taxi Trajectories-2013
32. A System to filter unwanted messages from OSN user walls-2013
33. A Fast Clustering Based Feature Subset Selection Algorithm for High Dimensional
Data2013
34. A fuzzy self-constructing feature clustering algorithm for text classification -2011
35. Extended XML Tree Pattern Matching: Theories and Algorithms-2011
Mobile Computing
1. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks - 2016
2. Maximizing Charging Satisfaction of Smartphone Users via Wireless Energy Transfer - 2016
3. Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a
Bounded Monitoring Area - 2016
4. Towards Maximizing Timely Content Delivery in Delay Tolerant Networks-2015
5. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing
Systems-2015
6. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015
7. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014
8. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014
9. Discovery and verification of Neighbor positions in Mobile Ad HOC networks-2013
10. EMAP - Expedite Message Authentication Protocol for Vehicular Ad-hoc Networks-2013
11. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013
Cloud Computing
1. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in
Clouds - 2016
2. OverFlow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds-
2016
3. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing-
2015
4. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015
5. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet
Data Centers- 2015
6. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
- 2015
7. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
8. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014
9. Security as a Service Model for Cloud Environment-2014
10. Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems
11. Privacy Preserving Delegated Access Control in public clouds-2013
12. Security and privacy-enhancing multi cloud architectures-2013
13. Toward privacy-assured and searchable cloud data storage services-2013
14. Ensuring Data Storage Security in Cloud Computing-2013
Networking & Wireless Sensor Networks
1. An Ultra-Low-Latency Guaranteed-Rate Internet for Cloud Services - 2016 2. Dynamic Network Control for Confidential Multi-Hop Communications - 2016 3. Resampling-Based Ensemble Methods for Online Class Imbalance Learning-2015
4. Directional Diagnosis for Wireless Sensor Networks -2015
5. Secure and Distributed Data Discovery and Dissemination in WSN-2015
6. Disco: Improving Packet Delivery via Deliberate Synchronized Constructive Interference -
2015
7. Trust Management for Defending On-Off Attacks -2015
8. Proportional Fair Coding for Wireless Mesh Networks-2014
9. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol
for Heterogeneous Wireless Sensor Networks-2014
10. Joint Routing and Medium Access Control in Fixed Random Access Wireless Multichip
Networks-2014
11. DTN-Metro: Forecasting the Performance of DTN Protocols Under Heterogeneous
Mobility-2014
12. Denial-of-Service Attacks in Bloom-Filter-Based Forwarding-2014
13. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014
14. Topology-Transparent Scheduling via the Chinese Remainder Theorem-2014
15. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014
16. Cross-domain privacy-preserving protocol for cooperative firewall optimization-2013
17. EAACK - A Secure Intrusion Detection System for MANETs-2013
18. Enhancing Voice over WLAN via Rate Adaptation and Retry Scheduling-2013
19. Network Modeling Peer to Peer Analyze using Cache-2013.
Information Forensics and Security
1. Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation - 2016
2. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion - 2016 3. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation -
2016 4. Effective Data Access Control for Multi authority Cloud Storage Systems-2015
5. Privacy-Preserving Detection of Sensitive Data Exposure-2015
6. On the Use of Client Identity Information for Face Anti spoofing -2015
7. A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor
Networks-2014
8. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks-2014
9. On the Security of Trustee-Based Social Authentications -2014
Dependable and Secure Computing
1. Mitigating Cross-Site Scripting Attacks with a Content Security Policy - 2016 2. ID2S Password-Authenticated Key Exchange Protocols - 2016 3. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage - 2016 4. A Shoulder Surfing Resistant Graphical Authentication System - 2016 5. Deleting Secret Data with Public Verifiability-2015
6. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
-2015
7. Trust-based Service Management for Social Internet of Things Systems-2015
8. PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications-2014 9. STARS: A Statistical Traffic Pattern Discovery System for manets-2014 10. Hiding in the mobile crowd: Location privacy through collaboration-2014 11. NICE: Network Intrusion Detection and Countermeasure Selection In Virtual
Network Systems - 2013 12. A Self-Organizing Trust Model for Peer-to-Peer Systems-2013 13. Nymble: Blocking Misbehaving Users in Anonymizing Networks-2011
Software Engineering
1. The Role of Ethnographic Studies in Empirical Software Engineering -2016 2. RELAI Testing: A Technique to Assess and Improve Software Reliability -2016 3. Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs -2016
4. Composite Constant Propagation and its Application to Android Program Analysis -2016 5. Coverage-Aware Test Database Reduction -2016 6. Parallel Algorithms for Testing Finite State Machines: Generating UIO sequences. -2016 7. Dynamic and Automatic Feedback-Based Threshold Adaptation for Code Smell Detection -
2016 8. Seer: A Lightweight Online Failure Prediction Approach -2016 9. Automated Checking of Conformance to Requirements Templates using Natural Language
Processing-2015
10. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015
11. Estimating Computational Requirements in Multi-Threaded Applications -2015
12. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015
13. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An Empirical Study -2015
14. Using Declarative Specification to Improve the Understanding, Extensibility, and
Comparison of Model-Inference Algorithms-2015
15. A Model-Driven Methodology for Developing Secure Data-Management Applications-2014
Parallel and Distributed Systems
1. Load Balancing at the Edge of Chaos: How Self-Organized Criticality Can Lead to Energy-
Efficient Computing - 2016
2. POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks - 2016
3. Throughput-Driven Partitioning of Stream Programs on Heterogeneous Distributed
Systems - 2016
4. TLIA: Efficient Reconfigurable Architecture for Control-Intensive Kernels with Triggered-
Long-Instructions - 2016
5. Wait Analysis of Distributed Systems Using Kernel Tracing - 2016
6. A Cloud Gaming System Based on User-Level Virtualization and Its Resource Scheduling -
2016
7. An Efficient Privacy-Preserving Ranked Keyword Search Method - 2016
8. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-
2015
9. Deleting Secret Data with Public Verifiability-2015
10. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
-2015
11. Trust-based Service Management for Social Internet of Things Systems-2015
12. Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless
Networks-2014
Big Data
13. The Client Assignment Problem for Continuous Distributed Interactive Applications:
Analysis, Algorithms, and Evaluation-2014
14. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
15. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-
2013
16. Covering Points of Interest with Mobile Sensors-2013
17. Detection and Localization of Multiple Spoofing Attacks-2013.
1. USTF: A Unified System of Team Formation - 2016 2. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media - 2016 3. Kvasir: Scalable Provision of Semantically Relevant Web Content on Big Data Framework -
2016 4. Service Rating Prediction by Exploring Social Mobile Users’ Geographic Locations - 2016 5. Universal Nonlinear Regression on High Dimensional Data Using Adaptive Hierarchical Tree
- 2016
Application Projects (MCA, M.Sc., Diploma Projects)
1. Pick-It Courier Service 2. Community Awareness 3. E-Music World 4. Green Planet Awareness 5. Implementation And Validating Environmental And Health 6. Loan Online Application 7. Management System In Metro Train 8. Modern Agriculture Development System 9. Modern Municipal Corporation. 10. Nearest Shopping Location Identification Systems 11. Nutraceuticals Management System 12. Plant Shopping On Web 13. Product Market Manipulations On Asian Stock Market 14. Project Work Tracking System 15. Reporting Online Media News Systems 16. Vendor Information System For Shiping 17. Social Network Multiparty Access Management 18. Time To Time Stock Market Updater And Monitoring System 19. Tollgate Management Systems
20. Transport Management System 21. Web Page Re-Ranking System For Library 22. E-Knowledge Wireless Health Care System 23. Adaptive Intrusion Detection System 24. Scheduling Operation With Facility Management For Logistic System 25. Defect Tracking For Improving Product Quality And Productivity 26. Ensuring Data Security In Cloud Computing 27. A New Algorithm For Three Party Quantum Key Distribution 28. A Fuzzy Feature Clustering For Text Classification 29. Automatic Question Paper Generation 30. Automatic End Semester Time Table Generation 31. Learn To Personalized Image Search From Photo Sharing Web Sites 32. Material Management System 33. Multi Server Communication In Distributed Management System 34. Online Task Management System 35. Online Quiz 36. Optimal Dynamic Path Restoration In Mesh Network 37. Placement Management System 38. Transfer Certificate Issuing System 39. Query Matching Process Using Xml Tree Pattern 40. Scheduled Operations Resource Facilitating System
OT. Dot Net Project Titles
(VB.NET*C#.NET*ASP.NET) Information Forensics and Security
1. Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted
Computation - 2016 2. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion - 2016 3. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation -
2016 4. Privacy-Preserving Detection of Sensitive Data Exposure-2015
5. On the Use of Client Identity Information for Face Anti spoofing -2015
6. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems -2015
7. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Non causal Side
Information-2015
8. Privacy-Preserving Authenticated Key-Exchange Over Internet-2014
9. Optimal Probabilistic Encryption for Secure Detection in WSN-2014
10. Top-k Query Result Completeness Verification in Tiered Sensor Networks-2014
11. A Probabilistic Model of Visual Cryptography-2012
Mobile Computing
1. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks - 2016
2. Maximizing Charging Satisfaction of Smartphone Users via Wireless Energy Transfer - 2016
3. Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a
4. Bounded Monitoring Area - 2016.
5. Performance Comparison of Routing Protocols for Cognitive Radio Networks-2015
6. High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks-2015
7. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing
Systems-2015
8. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015
9. A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute Mobile-2014
10. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014
11. GreenBSN: Enabling Energy-Proportional Cellular Base Station Networks-2014
12. Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular Networks-
2014
13. Rate Adaptation for 802.11 Multiuser MIMO Networks-2014
14. RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning-
2014
15. Smart cut: Mitigating 3G Radio Tail Effect on Smartphones-2014
16. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014
17. Effective Authentication of Mobile and pervasive computing-2014
18. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013
19. Toward Privacy Preserving and Collusion Resistance in a Location Proof -2013
20. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity-2013
21. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks-2009
22. On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint
Routing-2009
Cloud Computing
1. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds - 2016
2. Overflow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds - 2016
3. Performing Initiative Data Prefetching in Distributed File Systems for Cloud
Computing- 2015
4. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
5. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social
Networks-2014
6. An Analysis of Failure-Related Energy Waste in a Large-Scale Cloud Environment-2014
7. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application-2014
8. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014
9. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud-2013
10. QOS Ranking Prediction for Cloud Services-2013
11. Tokenization And Encryption For Personal Health Record Using Cloud-2013
12. Scalable and Secure Sharing of Personal Health Records in Cloud Computing-2013
13. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud-2012
14. Exploiting Dynamic Resource Allocation-2011
Knowledge and Data Engineering
&
Data Mining
1. K Nearest Neighbour Joins for Big Data on Map Reduce: a Theoretical and Experimental
Analysis - 2016
2. A Scalable Data Chunk Similarity based Compression Approach for Efficient Big Sensing
Data Processing on Cloud - 2016
3. Answering Pattern Queries Using Views - 2016
4. Guest Editorial: Special Section on the International Conference on Data Engineering -
2016
5. Mining High Utility Patterns in One Phase without Generating Candidates - 2016
6. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments - 2016
7. Mining User-Aware Rare Sequential Topic Patterns in Document Streams - 2016
8. Nearest Keyword Set Search in Multi-dimensional Datasets- 2016
9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases -
2016
10. Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search- 2016
11. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy -
2016
12. Authentication of Moving Top-k Spatial Keyword Queries- 2015
13. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the
Word Alignment Model -2015
14. Lossless Selection Views under Conditional Domain Constraints-2015
15. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data
Through Blind Storage - 2015
16. A Query Approach for Influence Maximization on Specific Users in Social Networks -
2015
17. Progressive Duplicate Detection - 2015
18. GDCluster: A General Decentralized Clustering Algorithm- 2015
19. Range Aggregation With Set Selection-2014
20. Facilitating Document Annotation Using Content and Querying Value-2014
21. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-
2014
22. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at
Location-Based Services-2014
23. Classifier Ensembles with the Extended Space Forest-2014
24. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
25. Privacy-Preserving and Content-Protecting Location Based Queries-2014
26. Learning Conditional Preference Networks from Inconsistent Examples-2014
27. Fast Nearest Neighbor Search with Keywords-2014
28. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-
2014
29. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs-2014
30. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014
31. LARS: An Efficient and Scalable Location-Aware Recommender System-2014
32. Highly comparative feature-based time-series classification-2014
33. Keyword Query Routing-2014
34. Secure Mining of Association Rules in Horizontally Distributed Databases-2014
35. Personalized Mobile Search Engine-2013
36. A Quick web search Engine-2013
37. Toward Secure Multi keyword Top-k-2013
38. Lineage encoding-an efficient wireless xml streaming supporting twig pattern queries-
2013
Dependable and Secure Computing
1. Mitigating Cross-Site Scripting Attacks with a Content Security Policy - 2016 2. ID2S Password-Authenticated Key Exchange Protocols - 2016 3. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage - 2016 4. A Shoulder Surfing Resistant Graphical Authentication System - 2016 5. Deleting Secret Data with Public Verifiability-2015
6. Trust-based Service Management for Social Internet of Things Systems-2015
7. STARS: A Statistical Traffic Pattern Discovery System for manets-2014
8. Abductive Analysis of Administrative Policies in Rule-based Access Control-2014
Software Engineering
1. The Role of Ethnographic Studies in Empirical Software Engineering -2016
2. RELAI Testing: A Technique to Assess and Improve Software Reliability -2016
3. Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs-2016
4. Composite Constant Propagation and its Application to Android Program Analysis-2016
5. Coverage-Aware Test Database Reduction -2016
6. Parallel Algorithms for Testing Finite State Machines: Generating UIO sequences. -2016
7. Dynamic and Automatic Feedback-Based Threshold Adaptation for Code Smell
Detection -2016
8. Seer: A Lightweight Online Failure Prediction Approach -2016
9. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-
2015
10. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An Empirical Study -2015
11. Using Declarative Specification to Improve the Understanding, Extensibility, and
Comparison of Model-Inference Algorithms-2015
12. An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with
Undetermined Input Spaces-2014
13. Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013
14. Centroidal Voronoi Tessellations—A New Approach to Random Testing-2013
15. Test Case-Aware Combinatorial Interaction Testing-2013
Parallel and Distributed Systems
1. Load Balancing at the Edge of Chaos: How Self-Organized Criticality Can Lead to Energy-
Efficient Computing - 2016
2. POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks - 2016
3. Throughput-Driven Partitioning of Stream Programs on Heterogeneous Distributed
Systems - 2016
4. TLIA: Efficient Reconfigurable Architecture for Control-Intensive Kernels with Triggered-
Long-Instructions - 2016
5. Wait Analysis of Distributed Systems Using Kernel Tracing - 2016
6. A Cloud Gaming System Based on User-Level Virtualization and Its Resource Scheduling -
2016
7. An Efficient Privacy-Preserving Ranked Keyword Search Method - 2016
8. Trust-based Service Management for Social Internet of Things Systems-2015
9. COMIC: Cost Optimization for Internet Content Multihoming-2014
10. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
11. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks-
2014
12. Learning-Based Uplink Interference Management in 4g Lte Cellular Systems-2014
13. Secure data retrieval for decentralized distribution tolerant Military Networks-2014
14. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data-2014
15. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks-2012
16. Adaptive Provisioning of Human Expertise in Service-oriented Systems-2012
17. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service-
2011
Application Projects MCA, M.Sc. & Diploma Projects
1. Building Construction And Cost Estimation 2. Constructing E-Tourism 3. Consumer Market Basket Analysis For Consumer Correct Decision 4. Data Confidentiality On Health-Care Information System 5. Data Mining Analysis On Eb Bill System 6. Easy Sql Query For Non-It Manager 7. Flight Booking Portal 8. Hospital Emergency Data Management 9. Human Expertise Search Engine
10. I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine 11. Information Leak Detection And Prevention 12. Leave Management System 13. Predicting Users Behaviors Using Web Mining 14. Product Marketing Analysis On Public Opinion 15. Public Web Status Monitoring System 16. Quality Controller 17. Step By Step Monitoring For Product Purchasing System 18. Techno Task Manager 19. Top-K Ranking System 20. Ultimate Location Information For Given Range 21. Vendor Information System For Shiping 22. Web Based Book Publishing System 23. Web User Service Management System 24. Zero-Knowledge Proof System On Outsourcing Cloud Data Integrity 25. Inventory Library Management System 26. New Generation Of Community Certificate 27. E-Crime Report System 28. Academic Trivia 29. New Generation Of Social Website 30. Automatic Question Paper Generation 31. Web Based E-Auction System 32. Exam Scheduler 33. Budget Approval System 34. Data Theft Attack 35. Metro Train And Bus Smart Card Issue And Renewal 36. Orphan Home Management 37. Vehicle Sales And Services Management Systems 38. School Management Systems 39. Monitoring Loan Application Processing System 40. Attendance Management System-Tpt 41. Data Leakage Detection 42. Graphical Password Authentication System 43. Fast Nearest Search 44. Pmse: A Personalized Mobile Search Engine 45. Inventory Management-Printing Press 46. Hostel Management System 47. Advertising Agencies 48. Hospital Medicine Supply System 49. Global Employee Management System
50. Industrial Manpower Resource Organizer 51. Task Management Systems 52. Real Estate Management Systems. 53. Pension Management System 54. Key Word Query Routing 55. Office Automation In Computer Center 56. Printing Press Management System 57. Personal Health Care Record Management System 58. Vehicle Service Management 59. Web Based Sms Application 60. Automated Transport System For Travel Agencies 61. Quotation Controlling Process Through The Web 62. Welfare Schemes For A Cross Section Of The Society From Time To Time 63. Detecting Fraud On Vehicle Insurance System 64. Auditing Data Integrity And Data Storage Using Cloud