Project Solutions, now launched at Pune!

Welcome to Project Solutions !

Project Solutions is the leading final year engineering project providers for IT and Computer Science students across India

Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
java / cloud computing
Privacy-Preserving Updates to Anonymous and Confidential Databases.
java / cloud computing
A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
java / cloud computing
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
java / cloud computing
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
java / cloud computing
Reliable Re-encryption in Unreliable Clouds
java / cloud computing
Reversible Data Hiding With Optimal Value Transfer
java / cloud computing
Dynamic Bandwidth Allocation in Cloud Computing
java / cloud computing
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
java / cloud computing
Winds of Change: From Vendor Lock-In to the Meta Cloud
java / cloud computing
A New Technique of Data Integrity for Analysis of the Cloud Computing Security
java / cloud computing
Outsourcing Privacy-Preserving Social Networks to a Cloud
java / cloud computing
A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
java / cloud computing
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
java / cloud computing
A novel method to secure cloud computing through multicast key management
java / cloud computing
Collaboration in Multicloud Computing Environments: Framework and Security Issues
java / cloud computing
Cooperative Cloud Computing in Research and Academic Environment using Virtual Cloud
java / cloud computing
An IBE-Based Security Scheme on Internet of Things
java / cloud computing
Privacy Preserving Cloud Data Access With Multi-Authorities
java / cloud computing
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
java / cloud computing
MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
java / cloud computing
IDSaaS: Intrusion Detection System as a Service in Public Clouds
java / cloud computing
Distributed Accountability for Data Sharing in Cloud
java / cloud computing
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
java / cloud computing
Cloud Data Protection for the Masses
java / cloud computing
Time Based Re-Encryption In Unreliable Clouds
java / cloud computing
Fair-Share for Fair Bandwidth location in Cloud Computing
java / cloud computing
Cloud Computing security from single to multi clouds
java / cloud computing
Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
java / cloud computing
Ranking Model Adaptation for domain specific search
java / cloud computing
Gossip-based Resource Management for Cloud Environments
java / cloud computing
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
java / cloud computing
Ensuring Distributed Accountability for Data Sharing in the Cloud
java / cloud computing
Costing of Cloud Computing Services A Total Cost of Ownership Approach
java / cloud computing
Cloud Data Production for Masses
java / cloud computing
Cloud Computing Security: From Single to Multi Clouds
java / cloud computing
DAC MACS: Effective Data Access Control for Multi Authority Cloud Storage Systems
java / cloud computing
Client-side Load Balancer using Cloud
java / cloud computing
Efficient Compression of Encrypted Grayscale Images
java / cloud computing
Comparable Entity Mining from Comparative Questions
java / data mining
Resilient Identity Crime Detection
java / data mining
A Bayesian Approach to Filtering Junk E-Mail
java / data mining
Statistical Entity Extraction from Web
java / data mining
Efficient Similarity Search over Encrypted Data
java / data mining
Multiparty Access Control for Online Social Networks Model and Mechanisms
java / data mining
Organizing User Search Histories
java / data mining
An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
java / data mining
Implementation of Web Usage Mining Using APRIORI and FP Growth Algorithms
java / data mining
Adapting a Ranking Model for Domain-Specific Search
java / data mining
m-Privacy for Collaborative Data Publishing
java / data mining
Facilitating Effective User Navigation through Website Structure Improvement
java / data mining
Preventing Private Information Inference Attacks on Social Networks
java / data mining
Privacy against Aggregate Knowledge Attacks
java / data mining
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
java / data mining
FoCUS: Learning to Crawl Web Forums
java / data mining
Sensitive Label Privacy Protection on Social Network Data
java / data mining
User Action Interpretation for Online Content Optimization
java / data mining
Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
java / data mining
Dynamic Personalized Recommendation on Sparse Data
java / data mining
SybilDefender: Defend Against Sybil Attacks in Large Social Networks
java / data mining
Anomaly Detection via Online Oversampling Principal Component Analysis
java / data mining
A Probabilistic Approach to String Transformation
java / data mining
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
java / data mining
Efficient Map/Reduce-based DBSCAN Algorithm with Optimized Data Partition
java / data mining
Creating Evolving User Behavior Profiles Automatically
java / data mining
Efficient Extended Boolean Retrieval
java / data mining
A Novel Algorithm for Automatic Document Clustering
java / data mining
Clustering Methods in Data Mining with its Applications in High Education
java / data mining
Combining Tag and Value Similarity for Data Extraction and Alignment
java / data mining
How do Facebookers use Friendlists
java / data mining
Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
java / data mining
Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
java / data mining
Fast and accurate annotation of short texts with Wikipedia pages
java / data mining
Efficient Anonymous Message Submission
java / data mining
On the Spectral Characterization and Scalable Mining of Network Communities
java / data mining
A Framework for Personal Mobile Commerce Pattern Mining and Prediction
java / data mining
Efficient Computation of Range Aggregates against Uncertain Location Based Queries
java / data mining
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
java / data mining
Advance Mining of Temporal High Utility Itemset
java / data mining
Efficient Extended Boolean Retrieval
java / data mining
Slicing A New Approach to Privacy Preserving Data Publishing.
java / data mining
Enabling Multilevel Trust in Privacy Preserving Data Mining
java / data mining
Web Mining Framework for Security in E-commerce
java / data mining
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
java / data mining
An Improved Frequent Pattern Tree Based Association Rule Mining Technique.
java / data mining
A Threshold-based Similarity Measure for Duplicate Detection
java / data mining
Data Leakage Detection
java / data mining
Automatic Text Summarization
java / data mining
AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies.
java / wireless communication
PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Infor
java / wireless communication
Cut Detection in Wireless Sensor Networks.
java / wireless communication
An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks.
java / wireless communication
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
java / Mobile Computing
A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing
java / Mobile Computing
Efficient and Secure Data Storage Operations for Mobile Cloud Computing
java / Mobile Computing
text editor
java / Mobile Computing
Credit Card Fraud Detection Using Hidden Markov Model
java / Mobile Computing
Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper.
java / Mobile Computing
Network Assisted Mobile Computing with Optimal Uplink Query Processing.
java / Mobile Computing
Cooperative download in vehicular environments.
java / Mobile Computing
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions.
java / Mobile Computing
Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees.
java / Mobile Computing
Movie Rating and Review Summarization in Mobile Environment
java / Mobile Computing
Fast Data Collection in Tree-Based Wireless Sensor Networks.
java / Mobile Computing
Detecting Spam Zombies by Monitoring Outgoing Messages
java / secure computing
Detecting Imprudence of ‘Reliable’ Sellers in Online Auction Sites
java / secure computing
Automated Detection System for SQL Injection Attack
java / secure computing
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing
java / secure computing
Security Tactics for Secured Cloud Computing Resources
java / secure computing
Secure Web Referral Services for Mobile Cloud Computing
java / secure computing
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
java / secure computing
Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
java / secure computing
Extracting Spread-Spectrum Hidden Data from Digital Media
java / secure computing
Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
java / secure computing
Auditing for Network Coding Storage
java / secure computing
Detecting Anomalous Insiders in Collaborative Information Systems
java / secure computing
Enhanced Privacy Preserving Updates for Anonymous and Confidential Databases
java / secure computing
Runtime Defense against Code Injection Attacks Using Replicated Execution
java / secure computing
Anomaly Detection for Discrete Sequences:
java / secure computing
FADE: Secure Overlay Cloud Storage with File Assured Deletion.
java / secure computing
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
java / secure computing
Online Modeling of Proactive Moderation System for Auction Fraud Detection.
java / secure computing
Packet-Hiding Methods for Preventing Selective Jamming Attacks.
java / secure computing
Risk-Aware Mitigation for MANET Routing Attacks.
java / secure computing
Enhancing security and confidentiality in locationbased data encryption algorithms
java / secure computing
NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
java / secure computing
Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences
java / secure computing
SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing
java / secure computing
Secure Information Management Protocol Based on Linguistic Sharing Techniques
java / secure computing
Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet
java / secure computing
An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
java / secure computing
An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
java / secure computing
Authentication Scheme for Session Password using Color Matrix
java / secure computing
Color Steganography using Armstrong number
java / secure computing
Coding for Cryptographic Security Enhancement using Stopping Sets
java / secure computing
Data integrity proofs in cloud storage
java / secure computing
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
java / secure computing
Multi-Level Weighted Sequential Pattern Mining Based on Prime Encoding
java / secure computing
Layered Approach Using Conditional Random Fields for Intrusion Detection
java / secure computing
A Proxy-based Real-time Protection Mechanism for Social Networking Sites
java / secure computing
Multilevel weighted sequential pattern mining using prime encoding
java / secure computing
Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica
java / Multimedia
Trust modeling in social tagging of multimedia content.
java / Multimedia
Learn to Personalized Image Search from the Photo Sharing Websites.
java / Multimedia
Denial-of-Service Defense through Web Referral
java / networking
Detecting and Resolving Firewall Policy Anomalies
java / networking
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System.
java / networking
Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
java / networking
A Fast Re-Route Method
java / networking
Participatory Privacy: Enabling Privacy in Participatory Sensing
java / networking
Participatory Privacy: Enabling Privacy in Participatory Sensing
java / networking
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
java / networking
Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
java / networking
Independent Directed Acyclic Graphs for Resilient Multipath Routing
java / networking
Trustworthy Coordination of Web Services Atomic Transactions
java / networking
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
java / networking
Policy-by-Example for Online Social Networks.
java / networking
Security Architecture for Cloud Networking.
java / networking
Packet Loss Control Using Tokens at the Network Edge.
java / networking
Game-Theoretic Pricing for Video Streaming in Mobile Networks.
java / networking
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
java / networking
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
java / networking
Time Delay On-Demand Multipath Routing Protocol in Mobile Ad-hoc Networks
java / networking
Security Schemes For Wireless Sensor Networks With Mobile Sink
java / networking
A Novel Cross Layer Intrusion Detection System in MANET
java / networking
An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server
java / networking
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage.
java / Parallel and Distributed System
Color-tone similarity of digital images
java / image processing
A novel pair-wise image matching strategy with compact descriptors
java / image processing
Depth-aided Exemplar-based Hole Filling for DIBR View Synthesis
java / image processing
Circular re-ranking of visual search.
java / image processing
Image Authentication Using Stochastic Diffusion
java / image processing
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
java / image processing
Super-Resolution-based Inpainting
java / image processing
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
java / image processing
A Bayesian Approach to Digital Matting
java / image processing
Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click
java / image processing
An effective image steganalysis method based on neighborhood information of pixels
java / image processing
Automatic Plant Leaf Classification for a Mobile Field Guide
java / image processing
Secure And Authenticated Reversible Data Hiding In Encrypted Images
java / image processing
Face hallucination based on PCA dictionary pairs
java / image processing
Fast moving-object detection in H.264/AVC compressed domain for video surveillance
java / image processing
Bayesian stereoscopic image resolution enhancement
java / image processing
Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
java / image processing
An extended visual cryptography scheme without pixel expansion for halftone images
java / image processing
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG
java / image processing
Robust Face-Name Graph Matching for Movie Character Identification
java / image processing
A Novel Approach to a Dynamic Template Generation Algorithm for Multiple-Choice Forms
java / image processing
A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY
java / image processing
From Blind to Quantitative Steganalysis
java / image processing
Mitigating of fire based disaster using IP
java / image processing
Intent Search - capturing user intention for one click internet image search
java / image processing
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
java / image processing
Security Enhancement using Steganography
java / image processing
A Keyless Approach to Image Encryption
java / image processing
N-Square Approach For Lossless Image Compression And Decompression
java / image processing
"An Efficient Real Time Moving Object Detection Method for Video Surveillance System"
java / image processing
Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach
java / image processing
A Novel Exemplar based Image Inpainting Algorithm for Natural Scene Image Completion with Improved Patch Prioritizing
java / image processing
Separable bilateral nonlocal means
java / image processing
A robust skew detection method based on maximum gradient difference and R-signature
java / image processing
Image-based object detection under varying illumination in environments with specular surfaces
java / image processing
A New Block Compressive Sensing to Control the Number of Measurements
java / image processing
Lossless image compression based on data folding
java / image processing
A chaotic system based fragile watermarking scheme for image tamper detection
java / image processing
Post processing for blocking artifact reduction.
java / image processing
Linear distance coding for image classification
java / image processing
Security Enhancement Scheme for Image Steganography using S-DES Technique
java / image processing
OCR in Desktop
java / image processing

More Technologies