• Android Based Projects @ TMKS Infotech

    TMKS Infotech Provides an Android Wireless based projects which is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard (or a physical one, on older Android devices) for text input.

    Explore More
  • Cloud Computing Projects @ TMKS Infotech

    Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand.

    Explore More
  • Data Mining Projects @ TMKS Infotech

    Data mining is a term from computer science. Sometimes it is also called knowledge discovery in databases (KDD). Data mining is about finding new information in a lot ofdata. The information obtained from data mining is hopefully both new and useful.In many cases, data is stored so it can be used later. The data is saved with a goal.

    Explore More
  • Big Data Projects @ TMKS Infotech

    In TMKS INfotech,Big data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying and information privacy. The term often refers simply to the use of predictive analytics or certain other advanced methods to extract value from data, and seldom to a particular size of data set.

  • NS2 Projects @ TMKS Infotech

    In TMKS INfotech,ns (from network simulator) is a name for series of discrete event network simulators, specifically ns-1, ns-2 and ns-3. All of them are discrete-event computer network simulators, primarily used in research[4] and teaching. ns-3 is free software, publicly available under the GNU GPLv2 license for research, development, and use.

    Explore More
  • Real Time Cloud Deployement @ TMKS Infotech

    In TMKS INfotech,Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources with Rackspace cloud at TMKS Infotech and data and information are provided to computers and other devices on-demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources.

    Explore More
  • Coaching Classes for Struts,Springs & Hybernet @ TMKS Infotech

    In TMKS INfotech,"Java language" redirects here at TMKS Infotech. For the natural language from the Indonesian island of Java, see Javanese language. This article is about a programming language. For the software package downloaded from java.com, see Java SE. Not to be confused with JavaScript.

    Explore More
  • Coaching Classes for Dot Net @ TMKS Infotech

    In TMKS INfotech,.NET Framework (pronounced dot net) is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large class library known as Framework Class Library (FCL) and provides language interoperability (each language can use code written in other languages) across several programming languages.

    Explore More
  • Practical Knowledge @ TMKS Infotech

    In TMKS INfotech,Know-how is a term for practical knowledge on how to accomplish something at TMKS Infotech as opposed to “know-what” (facts), “know-why” (science), or “know-who” (communication). Know-how is often tacit knowledge, which means that it is difficult to transfer to another person by means of writing it down or verbalising it. The opposite of tacit knowledge is explicit knowledge.

    Explore More
  • Live IEEE Projects @ TMKS Infotech

    The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is an organization within IEEE that develops global standards in a broad range of industries, including: power and energy, biomedical and health care, information technology and robotics, telecommunication and home automation, transportation, nanotechnology, information assurance, and many more & TMKS is associated with such IEEE Organization for last 12 years.

  • Technologies @ TMKS Infotech

    In TMKS INfotech,Computer software also called a program or simply software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of computer programs, libraries and related non-executable data (such as online documentation or digital media). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Computer hardware and software require each other and neither can be realistically used without the other.

BE Mtech Projects provides bulk ieee projects to its regular clients and satisfies all their requirements on time, Also it provides 24/7 supports to all its clients in delivering the resources which is including source code and all

Research & Development

With its inherent experience and expertise tmksinfotech also undertakes Research & Development activities for its customers. These activities include advice as to which technology would be best suited for the project requirements, prototyping and implementing pilot/demo projects to compliment the feasibility study of smaller to larger projects.

Knowledge Development

At tmksinfotech we work towards minimizing the effort needed in re-generating existing knowledge and ensuring that the employees in contact with the customer have a complete knowledge of the organization behind them. Knowledge Management plays a key role in facilitating this, and helps develop a culture of writing, documenting, designing and sharing knowledge for mutual benefit among the employees.

IEEE Projects Solutions

Our approach to IEEE Project solutions has been designed to achieve the highest level of Total Quality Management; with our extensive experience in the design, development and management of IT- related projects, we provide a range of project management services for clients. We offer a complete turnkey service for clients from the preparation of a comprehensive project plan setting out deliverables, time-scales, task dependencies and resource scheduling through to designing and implementing appropriate project management, monitoring, reporting and review procedures and defining quality assurance methods.

PROJECT SUPPORTS &DELIVERABLES

->Project Abstract
-> IEEE Paper
-> PPT / Review Details
-> Project Report
->Working Procedure/ScreenShots
->Materials & Books in CD
->Project Certification

 

2018-2019 Java IEEE Projects List ----- View Live Demo in You Tube ---- Click Here

2018 and 2019 Java Projects Titles
Cloud Computing
Sl No
Project Name
Year
1 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2018
2 Cloud Centric Authentication for Wearable Healthcare Monitoring System
2018
3 Towards Shared Ownership in the Cloud
2018
4 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
2018
5 Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
2018
6 Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
2018
7 An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
2018
8 Secure and Sustainable Load Balancing of Edge Datacenters in Fog Computing
2018
9 Semantic-based Compound Keyword Search over Encrypted Cloud Data
2018
10 A Practical Public Key Encryption Scheme Based on Learning Parity with Noise
2018
11 A Power-of-Two Choices Based Algorithm for Fog Computing
2018
12 virtFlow: Guest Independent Execution Flow Analysis Across Virtualized Environments
2018
13 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
2018
14 Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment
2018
15 Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers
2018
16 Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets
2018
17 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment
2018
18 Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
2018
19 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
2018
20 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
2018
21 An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers
2018
22 VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment
2018
23 Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach
2018
24 Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing
2018
25 An Efficient and Secured Framework for Mobile Cloud Computing
2018
26 Efficient Traceable Authorization Search System for Secure Cloud Storage
2018
27 A Robust Formulation for Efficient Application Offloading to Clouds
2018
28 A Planning Approach for Reassigning Virtual Machines in IaaS Clouds
2018
29 Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
2018
30 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
2018
31 Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage
2018
32 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
2018
33 A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
2018
34 A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing
2018
35 Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
2018
36 An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
2018
37 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
2018
38 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
2018
39 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
2018
40 Chaotic Searchable Encryption for Mobile Cloud Storage
2018
41 Unified Fine-grained Access Control for Personal Health Records in Cloud Computing
2018
42 CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
2018
43 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
2018
44 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
2018
45 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
2018
46 Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
2018
47 Efficient Traceable Authorization Search System for Secure Cloud Storage
2018
48 Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
2018
49 Identity-Based Private Matching over Outsourced Encrypted Datasets
2018
50 Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control
2018
51 Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
2018
52 Privacy Preservation for Outsourced Medical Data With Flexible Access Control
2018
53 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
2018
54 Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
2018
55 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
2018
56 Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
2018
57 Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
2018
58 Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud
2018
59 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
2018
60 Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing
2018

 

Information Forensics Network Security & Information Forensics and Security
Sl No
Project Name
Year
1 Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic
2018
2 Caching Encrypted Content Via Stochastic Cache Partitioning
2018
3 Fast Rerouting Against Multi-Link Failures Without Topology Constraint
2018
4 Joint Optimization of Multicast Energy in Delay-Constrained Mobile Wireless Networks
2018
5 On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks
2018
6 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
2018
7 A Practical Public Key Encryption Scheme Based on Learning Parity with Noise
2018
8 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks
2018
9 Cyber threats under the Bed
2018
10 Exploring Feature Coupling and Model Coupling for Image Source Identification
2018
11 Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data
2018
12 Towards Shared Ownership in the Cloud
2018

 

Information and Security Systems
Sl No
Project Name
Year
1 Fraud Find: Financial Fraud Detection by Analyzing Human Behavior
2018
2 Fraud Vis: Understanding Unsupervised Fraud Detection Algorithms
2018
3 Machine Learning Applied to Rotating Check Fraud Detection
2018
4 Random Forest for Credit Card Fraud Detection
2018

 

SOCIAL NETWORK
Sl No
Project Name
Year
1 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks
2018
2 Analyzing and Detecting Money-Laundering Accounts in Online Social Networks
2018
3 Detection of suicide-related posts in Twitter data streams
2018
4 Risk Assessment in Social Networks based on User Anomalous Behaviours
2018
5 Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
2018
6 Semi-Supervised Spam Detection in Twitter Stream
2018

 

DATA MINING
Sl No
Project Name
Year
1 Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
2018
2 Discovering Canonical Correlations between Topical and Topological Information in Document Networks
2018
3 Reverse k Nearest Neighbor Search over Trajectories
2018
4 Range-based Nearest Neighbor Queries with Complex-shaped Obstacles
2018
5 Weakly-Supervised Deep Learning for Customer Review Sentiment Classification
2018
6 Profit Maximization for Viral Marketing in Online Social Networks Algorithms and analysis
2018
7 A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining
2018
8 Online Product Quantization
2018
9 An Efficient Method for High Quality and Cohesive Topical Phrase Mining
2018
10 Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing
2018
11 Automated Phrase Mining from Massive Text Corpora
2018
12 Collective List-Only Entity Linking: A Graph-Based Approach
2018
13 Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search
2018
14 Complementary Aspect-based Opinion Mining
2018
15 A Weighted Frequent Itemset Mining Algorithm for Intelligent Decision in Smart Systems
2018
16 Fuzzy Bag-of-Words Model for Document Representation
2018
17 Document Summarization for Answering Non-Factoid Queries
2018
18 Efficient Vertical Mining of High Average-Utility Itemsets based on Novel Upper-Bounds
2018
19 Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments on E-Commerce Applications
2018
20 Entity Linking: An Issue to Extract Corresponding Entity With Knowledge Base
2018
21 Frequent Itemsets Mining with Differential Privacy over Large-scale Data
2018
22 Opinion Aspect Relations in Cognizing Customer Feelings via Reviews
2018
23 Highlighter: automatic highlighting of electronic learning documents
2018
24 Predicting Contextual Informativeness for Vocabulary Learning
2018
25 Search Result Diversity Evaluation based on Intent Hierarchies
2018
26 Selective Database Projections Based Approach for Mining High-Utility Itemsets
2018
27 A Correlation-based Feature Weighting Filter for Naive Bayes
2018
28 Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective
2018
29 A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings
2018
30 Bayesian Nonparametric Learning for Hierarchical and Sparse Topics
2018
31 Comments Mining With TF-IDF: The Inherent Bias and Its Removal
2018
32 Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites
2018
33 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
2018
34 CoDetect: Financial Fraud Detection With Anomaly Feature Detection
2018
35 Complementary Aspect-based Opinion Mining
2018
36 Health Monitoring on Social Media over Time
2018
37 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
2018
38 On Generalizing Collective Spatial Keyword Queries
2018
39 Privacy Characterization and Quantification in Data Publishing
2018
40 Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data
2018
41 Scalable Content-Aware Collaborative Filtering for Location Recommendation
2018
42 SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy
2018
43 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
2018

 

MACHINE LEARNING
Sl No
Project Name
Year
1 A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining
2018
2 A Credibility Analysis System for Assessing Information on Twitter
2018
3 A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing
2018
4 Credit Card Fraud Detection Using AdaBoost and Majority Voting
2018
5 Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection
2018
6 Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
2018
7 Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data
2018
8 Using Data Mining to Predict Hospital Admissions From the Emergency Department
2018

 

Mobile Computing
Sl No
Project Name
Year
1 Distributed Faulty Node Detection in Delay Tolerant Networks Design and Analysis
2018
2 Selfish Decentralized Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks
2018
3 Service Provisioning in Mobile Environments through Opportunistic Computing
2018
4 Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency Situations
2018
5 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
2018
6 Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship
2018
7 Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
2018

 

Wireless Sensor Networks
Sl No
Project Name
Year
1 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
2018

 

Android Projects
Sl No
Project Name
Year
1 Cloud Centric Authentication for Wearable Healthcare Monitoring System
2018
2 Significant Permission Identification for Machine Learning Based Android Malware Detection
2018
3 MoRe-care: Mobile-assisted remote healthcare service delivery
2018
4 Droid Fusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection
2018
5 A Tale of Two Fashions: An Empirical Study on the Performance of Native Apps and Web Apps on Android
2018
6 Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis
2018
7 Ad Capsule: Practical Confinement of Advertisements in Android Applications
2018
8 Android User Privacy Preserving through Crowdsourcing
2018
9 Uncovering the Face of Android Ransomware: Characterization and Real-time Detection
2018
10 MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs
2018
11 Understanding In-app Ads and Detecting Hidden Attacks through the Mobile App-Web Interface
2018
12 Text based Graphical Password System to Obscure Shoulder Surfing
2018
13 Shift Route: Achieving Location Privacy for Map Services on Smart phones
2018
14 Counter Measuring Conceivable Security Threats on Smart Healthcare Devices
2018
15 Construction and Mitigation of User-Behavior-Based Covert Channels on Smart phones
2018
16 A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments
2018
17 Code Tracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages
2018

 

Networking and Service Computing, Dependable and Secure Computing
Sl No
Project Name
Year
1 Deep Learning of Constrained Autoencoders for Enhanced Understanding of Data
2018
2 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
2018
3 Analyzing and Detecting Money-Laundering Accounts in Online Social Networks
2018
4 Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
2018
5 Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks
2018
6 Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach
2018
7 Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes
2018
8 Scheduling Inter-Datacenter Video Flows for Cost Efficiency
2018
9 Lightweight Fine-Grained Search over Encrypted Data in Fog Computing
2018
10 GeTrust: A guarantee-based trust model in Chord-based P2P networks
2018
11 Migration Modeling and Learning Algorithms for Containers in Fog Computing
2018
12 Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing
2018
13 Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems
2018
14 Shared Predictive Cross-Modal Deep Quantization
2018
15 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
2018
16 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
2018
17 A Hybrid Approach for Detecting Automated Spammers in Twitter
2018
18 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
2018
19 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness
2018
20 Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
2018
21 Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage
2018
22 Trust-based Collaborative Privacy Management in Online Social Networks
2018
23 Lightweight Fine-Grained Search over Encrypted Data in Fog Computing
2018

 

ACCESS & CYBER SECURITY
Sl No
Project Name
Year
1 CoDetect: Financial Fraud Detection with Anomaly Feature
2018
2 Credit card fraud detection using AdaBoost and majority voting
2018
3 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
2018
4 A Data Analytics Approach to the Cybercrime Underground Economy
2018

 

INTERNET OF THINGS (IOT)
Sl No
Project Name
Year
1 Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation
2018
2 Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
2018
3 MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things
2018

 

Image Processing and Multimedia
Sl No
Project Name
Year
1 Query-free Clothing Retrieval via Implicit Relevance Feedback
2018
2 Automatic Annotation of Text with Pictures
2018
3 Joint Latent Dirichlet Allocation for Social Tags
2018
4 Automatic Generation of Social Event Storyboard From Image Click-Through Data
2018
5 Joint Hypergraph Learning for Tag-based Image Retrieval
2018
6 A Unified Framework for Tracking Based Text Detection and Recognition from Web Videos
2018

 

Software Engineering
Sl No
Project Name
Year
1 Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection
2018
2 EVA: Visual Analytics to Identify Fraudulent Events
2018
3 A Developer Centered Bug Prediction Model
2018