• Android Based Projects @ TMKS Infotech

    TMKS Infotech Provides an Android Wireless based projects which is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard (or a physical one, on older Android devices) for text input.

    Explore More
  • Cloud Computing Projects @ TMKS Infotech

    Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand.

    Explore More
  • Data Mining Projects @ TMKS Infotech

    Data mining is a term from computer science. Sometimes it is also called knowledge discovery in databases (KDD). Data mining is about finding new information in a lot ofdata. The information obtained from data mining is hopefully both new and useful.In many cases, data is stored so it can be used later. The data is saved with a goal.

    Explore More
  • Big Data Projects @ TMKS Infotech

    In TMKS INfotech,Big data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying and information privacy. The term often refers simply to the use of predictive analytics or certain other advanced methods to extract value from data, and seldom to a particular size of data set.

  • NS2 Projects @ TMKS Infotech

    In TMKS INfotech,ns (from network simulator) is a name for series of discrete event network simulators, specifically ns-1, ns-2 and ns-3. All of them are discrete-event computer network simulators, primarily used in research[4] and teaching. ns-3 is free software, publicly available under the GNU GPLv2 license for research, development, and use.

    Explore More
  • Real Time Cloud Deployement @ TMKS Infotech

    In TMKS INfotech,Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources with Rackspace cloud at TMKS Infotech and data and information are provided to computers and other devices on-demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources.

    Explore More
  • Coaching Classes for Struts,Springs & Hybernet @ TMKS Infotech

    In TMKS INfotech,"Java language" redirects here at TMKS Infotech. For the natural language from the Indonesian island of Java, see Javanese language. This article is about a programming language. For the software package downloaded from java.com, see Java SE. Not to be confused with JavaScript.

    Explore More
  • Coaching Classes for Dot Net @ TMKS Infotech

    In TMKS INfotech,.NET Framework (pronounced dot net) is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large class library known as Framework Class Library (FCL) and provides language interoperability (each language can use code written in other languages) across several programming languages.

    Explore More
  • Practical Knowledge @ TMKS Infotech

    In TMKS INfotech,Know-how is a term for practical knowledge on how to accomplish something at TMKS Infotech as opposed to “know-what” (facts), “know-why” (science), or “know-who” (communication). Know-how is often tacit knowledge, which means that it is difficult to transfer to another person by means of writing it down or verbalising it. The opposite of tacit knowledge is explicit knowledge.

    Explore More
  • Live IEEE Projects @ TMKS Infotech

    The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is an organization within IEEE that develops global standards in a broad range of industries, including: power and energy, biomedical and health care, information technology and robotics, telecommunication and home automation, transportation, nanotechnology, information assurance, and many more & TMKS is associated with such IEEE Organization for last 12 years.

  • Technologies @ TMKS Infotech

    In TMKS INfotech,Computer software also called a program or simply software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of computer programs, libraries and related non-executable data (such as online documentation or digital media). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Computer hardware and software require each other and neither can be realistically used without the other.

BE Mtech Projects provides bulk ieee projects to its regular clients and satisfies all their requirements on time, Also it provides 24/7 supports to all its clients in delivering the resources which is including source code and all

Research & Development

With its inherent experience and expertise tmksinfotech also undertakes Research & Development activities for its customers. These activities include advice as to which technology would be best suited for the project requirements, prototyping and implementing pilot/demo projects to compliment the feasibility study of smaller to larger projects.

Knowledge Development

At tmksinfotech we work towards minimizing the effort needed in re-generating existing knowledge and ensuring that the employees in contact with the customer have a complete knowledge of the organization behind them. Knowledge Management plays a key role in facilitating this, and helps develop a culture of writing, documenting, designing and sharing knowledge for mutual benefit among the employees.

IEEE Projects Solutions

Our approach to IEEE Project solutions has been designed to achieve the highest level of Total Quality Management; with our extensive experience in the design, development and management of IT- related projects, we provide a range of project management services for clients. We offer a complete turnkey service for clients from the preparation of a comprehensive project plan setting out deliverables, time-scales, task dependencies and resource scheduling through to designing and implementing appropriate project management, monitoring, reporting and review procedures and defining quality assurance methods.

PROJECT SUPPORTS &DELIVERABLES

->Project Abstract
-> IEEE Paper
-> PPT / Review Details
-> Project Report
->Working Procedure/ScreenShots
->Materials & Books in CD
->Project Certification

 

2016-2017 Java/Android List ---- View Live Demo in You Tube ---- Click Here

CLOUD COMPUTING
Sl No
Project Name
Year
1 DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments
2016
2 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
2016
3 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
2016
4 Providing User Security Guarantees in Public Infrastructure Clouds
2016
5 EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
2016
6 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
2016
7 An Efficient Privacy-Preserving Ranked Keyword Search Method
2016
8 Dynamic and Fault-Tolerant Clustering for Scientific Workflows
2016
9 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
2016
10 Malware Detection in Cloud Computing Infrastructures
2016
11 Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
2016
12 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
2016
13 Fine Grained Two Factor Access Control for Web Based Cloud Computing Services
2016
14 Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud
2016
15 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
2016
16 Diplo Cloud: Efficient and Scalable Management of RDF Data in the Cloud
2016
17 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
2016
18 Cloud workflow scheduling with deadlines and time slot availability
2016
19 Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
2016
20 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
2016
21 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
2016
22 CD Store: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal
2016
23 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
2016
24 Cloud Armor  Supporting Reputation-based Trust Management for Cloud Services
2016
25 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
2016
26 Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge
2016
27 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
2016
28 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
2016
29 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
2016
30 Dual Server Public Key Encryption With Keyword Search for Secure Cloud Storage
2016
31 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
2016
32 Geometric Range Search on Encrypted Spatial Data
2016
33 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
2016
34 SecRBAC: Secure data in the Clouds
2016
35 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
2016
36 Read2Me: A Cloud- based Reading Aid for the Visually Impaired
2016
37 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
2016
38 Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
2016
39 A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains
2016
40 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
2016
41 Two Factor Data Security Protection Mechanism for Cloud Storage System
2016
42 PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
2016
43 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
2016
44 Optimizing cost for online social networks on geo-distributed clouds
2016
45 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
2016
46  
2016
47  
2016
48  
2016
49  
2016
50  
2016
NETWORK SECURITY & SECURE COMPUTING
Sl No
Project Name
Year
1 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
2016
2 Trust Agent-Based Behavior Induction in Social Networks
2016
3 Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
2016
4 Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
2016
5 Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
2016
6 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
2016
7 Hierarchical and Shared Access Control
2016
8 Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions
2016
9 GeTrust: A guarantee-based trust model in Chord-based P2P networks
2016
10 FRoDO: Fraud Resilient Device for Off-line micro-payments
2016
11 Formal Verification of the xDAuth Protocol
2016
12 Fast Detection of Transformed Data Leaks
2016
13 Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
2016
14 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
2016
15 Data Lineage in Malicious Environments
2016
16 ID2S Password Authenticated key exchange protocol
2016
17 Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
2016
18 Profiling Online Social Behaviors for Compromised Account Detection
2016
19 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
2016
20 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
2016
 
DATA MINING
Sl No
Project Name
Year
1 Adaptive Processing for Distributed Skyline Queries over Uncertain Data
2016
2 Cold-Start Recommendation with Provable Guarantees: A Decoupled Approach
2016
3 Incremental Semi-Supervised Clustering Ensemble for High Dimensional Data Clustering
2016
4 Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters
2016
5 RSkNN: kNN Search on Road Networks by Incorporating Social Influence
2016
6 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
2016
7 A Novel Recommendation Model Regularized with User Trust and Item Ratings
2016
8 Automatically Mining Facets for Queries from Their Search Results
2016
9 Booster in High Dimensional Data Classification
2016
10 Connecting Social Media to E-Commerce  Cold-Start Product Recommendation Using Micro blogging Information
2016
11 Crowd sourcing for Top-K Query Processing over Uncertain Data
2016
12 Efficient Cache-Supported Path Planning on Roads
2016
13 Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System
2016
14 Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search
2016
15 kNNVWC An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering
2016
16 Location Aware Keyword Query Suggestion Based on Document Proximity
2016
17 Mining User-Aware Rare Sequential Topic Patterns in Document Streams
2016
18 Nearest Keyword Set Search in Multi-Dimensional Datasets
2016
19 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
2016
20 Sentiment Embeddings with Applications to Sentiment Analysis
2016
21 Top-Down XML Keyword Query Processing
2016
22 Topic Sketch Real-time Bursty Topic Detection from Twitter 2016
23 Top-k Dominating Queries on Incomplete Data 2016
24 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Item set Mining in Data-mining-as-a-service Paradigm 2016
25 Quality-Aware Sub graph Matching Over Inconsistent Probabilistic Graph Databases 2016
26 Understanding Short Texts through Semantic Enrichment and Hashing 2016
27 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks 2016
28 Explicit Minimum Storage Regenerating Codes 2016
29 Private Over-threshold Aggregation Protocols over Distributed Datasets 2016
30 MAVE: Multilevel wrApper Verification systEm 2016
31 Personalized travel sequence recommendation on multi score Big social media 2016
32 A Mixed Generative-Discriminative Based Hashing Method 2016
33 Text mining to the contributors to rail accidents 2016
34 User-Service Rating Prediction by Exploring Social Users' Rating Behaviors 2016
35 Building an intrusion detection system using a filter-based feature selection algorithm 2016
36 Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2016
37 Efficient Algorithms for Mining Top-K High Utility Item sets 2016
38 Using Hash tag Graph-Based Topic Model to Connect Semantically-Related Words Without Co-Occurrence in Micro blogs 2016
39 Relevance Feedback Algorithms Inspired By Quantum Detection 2016
40 A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee 2016
41 A Review of Relational Machine Learning for Knowledge Graphs 2016
42 Resolving Multi-party Privacy Conflicts in Social Media
2016
 
MOBILE COMPUTING
Sl No
Project Name
Year
1 Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
2016
2 Mitigating Denial of Service Attacks in OLSR
2016
3 Distributed and Fair Beaconing Congestion Control Schemes for Vehicular Networks
2016
4 Secure Overlay Routing Using Key Pre-Distribution  A Linear Distance Optimization Approach
2016
5 Towards Information Diffusion in Mobile Social Networks
2016
6 Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
2016
7 A joint time synchronization and localization design for mobile under water  sensor networks
2016
8 DaGCM A Current Data Uploading framework for mobile data gathering in wireless sensor networks 2016
9 Traffic De correlation Techniques for Countering a Global Eavesdropper in WSNs 2016
10 WORAL A Witness Oriented Secure Location Provenance Framework for Mobile Devices 2016
11 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016
12 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
2016
 
WIRELESS SENSOR NETWORKS
Sl No
Project Name
Year
1 Active Trust Secure and Trustable Routing in Wireless Sensor Networks
2016
2 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
2016
3 Toward Proper Guard Zones for Link Signature
2016
4  
2016
5  
2016
6  
2016
7  
2016
8
Updating More Titles !!!
2016
9  
2016
10  
2016
11  
2016
12  
2016
13  
2016
 
ANDROID PROJECTS
Sl No
Project Name
Year
1 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
2016
2 WORAL A Witness Oriented Secure Location Provenance Framework for Mobile Devices.
2016
3 MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
2016
4 Authentication of Smartphone Users Using Behavioral Biometrics
2016
5 Droid Detector: Android malware characterization and detection using deep learning
2016
6 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
2016
7 A Shoulder Surfing Resistant Graphical Authentication System
2016
8 Pass BY OP Bring Your Own Picture for Securing Graphical Passwords
2016
9 Privacy Preserving Location Sharing Services for Social Networks
2016
10 SBVLC: Secure barcode-based visible light communication for smart phones
2016
11 SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments
2016
12 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware
2016
13 Towards Information Diffusion in Mobile Social Networks
2016
14 Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
2016
15 Designing a Secure Exam Management System (SEMS) for M-Learning Environments
2016
     
ADHOC NETWORKS & VANET & MANTE
Sl No
Project Name
Year
1 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
2016
2  
2016
3  
2016
4
Updating More Titles !!!
2016
5  
2016
6  
2016
 
NETWORKING AND SERVICE COMPUTING,SECURE COMPUTING
Sl No
Project Name
Year
1 A Shoulder Surfing Resistant Graphical Authentication System
2016
2 Achieving Flatness: Selecting the Honey words from Existing User Passwords
2016
3 A Stable Approach for Routing Queries in Unstructured P2P Networks
2016
4 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
2016
5 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
2016
6 FRoDO Fraud Resilient Device for Off-Line Micro-Payments
2016
7 Profiling Online Social Behaviors for Compromised Account Detection
2016
8 Data Lineage in Malicious Environments
2016
9 Group Key Agreement with Local Connectivity
2016
10 ID2S Password-Authenticated Key Exchange Protocols
2016
11 Mitigating Cross-Site Scripting Attacks with a Content Security Policy 2016
12 Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing 2016
13 Graph Regularized Feature Selection with Data Reconstruction 2016
14 Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce 2016
15 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage 2016
16 Efficient Certificate less Access Control for Wireless Body Area networks 2016
17 Finding non equivalent  classifiers in Boolean space to reduce TCAM Usage 2016
18 Geographic and opportunistic routing for underwater sensor networks 2016
19 Optimizing cost for online social networks on geo-distributed clouds 2016
20 Secure and Efficient Data Communication Protocol for Wireless Body Area Networks 2016
21 iPath: Path Inference in Wireless Sensor Networks 2016
   
 
IMAGE PROCESSING AND MULTIMEDIA
Sl No
Project Name
Year
1 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
2016
2 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
2016
3 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
2016
4 Social Friend Recommendation Based on Multiple Network Correlation
2016
5 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
2016
6 A Locality Sensitive Low-Rank Model  for Image Tag Completion
2016
7 Pass BY OP Bring Your Own Picture for Securing Graphical Passwords
2016
8 Reversible Data Hiding in Encrypted Images by Reversible Image Transformation
2016
9 Tag Based Image Search by Social Re-ranking
2016
10 Semantic Discriminative Metric Learning for Image Similarity Measurement 2016
11 Semantic Concept Co-occurrence Patterns for Image Annotation and Retrieval 2016
12 Multi-Modal Event Topic Model for Social Event Analysis 2016
13 Learning from Weak and Noisy Labels for Semantic Segmentation 2016
14 Content Adaptive Steganography by Minimizing Statistical Detectability 2016
15 Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data 2016
16 Learning of Multimodal Representations With Random Walks on the Click Graph
2016
 
PARALLEL AND DISTRIBUTED SYSTEM
Sl No
Project Name
Year
1 A Hop-by-Hop Routing Mechanism for Green Internet
2016
2 POST Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks
2016
3 The Server Provisioning Problem for Continuous Distributed Interactive Applications
2016
4 Authenticated Key Exchange Protocols for Parallel Network File Systems
2016
5 Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
2016
6 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
2016
7 An Efficient Privacy-Preserving Ranked Keyword Search Method
2016
8 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
2016
9 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
2016
10 The Server Provisioning Problem for Continuous Distributed Interactive Applications
2016
11 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts
2016
 
SERVICE COMPUTING
Sl No
Project Name
Year
1 Privacy Preserving Location Sharing Services for Social Networks
2016
2 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts
2016
3 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
2016
4 Mitigating Cross Site Scripting Attacks with a Content Security Policy
2016
   
 
SOFTWARE ENGINEERING
   
1 Mapping Bug Reports to Relevant Files A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation 2016
2 Metamorphic Testing for Software Quality Assessment A Study of Search Engines 2016
3 SITAR GUI Test Script Repair 2016
4 Answering Approximate queries Over XML Data 2016