Solutions @ tmksinfotech


More

Current and Futured Services

Achieving the Goals: Successfully Finishing the 2012 and 2014 Academic IEEE Projects with 300 to 400 BE,B.Tech,Mtech,BCA,MCA,B.Sc(Cs) and M.Sc(cs) Student Batches.


2014 and 2014 Academic Batches Started
!!!


ANDROID Applications

Android is open source and Google releases the code under the License. This open source code and permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers.

Details

Cloud Computing

Cloud computing is the delivery of computing as a service rather than a product,whereby shared resources,software,and information...

Details

 

Adhoc Networks and MANET

It generally signifies a solution designed for a specific problem or task, non-generalizable, and not intended to be able to be adapted to other purposes (compare a priori). Common examples are organizations, committees, and commissions created at the national or international level for a specific task.

Details

 



Wireless Communication

Wireless network is a network set up by using radio signal frequency to communicate among computers and other network..

Details
 

Image Processing

The Digital image processing is the use of computer algorithms to perform image processing on digital images.As a subcategory(or)field digital image processing...

Details
   

 

Data Mining


Data mining is the process of extracting hidden patterns from large amounts of data. As more data is gathered,with the amount of data...

Details

 
Network Security

 


In the field of networking,the area of network security consists of the provisions and policies adopted by the network administrator to prevent Mis behaving Users in the network...

Details

 
Digital Signal Processing


Digital signal processing (DSP) is the mathematical manipulation of an information signal to modify or improve it in some way.It is characterized by the frequencies assigned by the admin..
.
Details
 

Mobile Computing

 


Mobile computing is the discipline for creating an information management platform,which is free from spatial and temporal constraints..

Details
 
Multimedia

Multimedia is media and content that uses a combination of different content forms.The term can be used as a noun (a medium)...

Details
   
 

 

 

 

 

   
   

Click Here For 2013 & 2014 IEEE List

Download 2013 and 2014 IEEE java

Download 2013 and 2014 IEEE Dot Net

Download 2013 and 2014 IEEE Ns2

Download 2014 & 2015 Java
Download 2014 & 2015 Dot Net
Download 2014 & 2015 Ns2

2014 IEEE Projects -- View Live Demo

SlNo
Project Title
Year
 
Cloud Computing
 
1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014
2 NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 2014
3 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation 2014
4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014
5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 2014
6 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014
7 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014
8 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. 2014
  Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
10 Low-Emissions Routing for Cloud Computing in IP-over-WDM Networks with Data Centers 2014
11 On the Cost¨CQoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2¡¯s Pricing Models 2014
12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers 2014
13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014
14 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2014
15 Towards Differential Query Services in Cost Efficient Clouds 2014
16 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 2014
17 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization 2014
18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014
19 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage 2014
20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 2014
21 QoS Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems 2014
22 Dynamic Cloud Pricing for Revenue Maximization 2014
23 Integrity for Join Queries in the Cloud 2014
24 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 2014
25 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 2014
26 Secure kNN Query Processing in Un trusted Cloud Environments 2014
27
  • A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
2014
28 Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications 2014
29
  • Consistency as a Service Auditing :Cloud Consistency
2014
30
  • A Secure Client Side De duplication Scheme in Cloud Storage Environments
2014
31
  • Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
2014
32
  • Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability
2014
33
  • Balancing Performance Accuracy and Precision for Secure Cloud Transactions
2014
34
  • A Hybrid Cloud Approach for Secure Authorized Deduplication
2014
35
  • Performance and cost evaluation of an adaptive encryption architecture for cloud databases
2014
36
  • A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
2014
37
  • A Mechanism Design Approach to Resource Procurement in Cloud Computing
2014
38
  • Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
2014
39
  • Cloud-Based Augmentation for Mobile DevicesMotivation, Taxonomies, and Open Challenges
2014
40
  • Compatibility-Aware Cloud Service Composition
    under Fuzzy Preferences of Users
2014
41
  • From the Cloud to the AtmosphereRunning MapReduce across Data Centers
2014
42
  • On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage
2014
43
2014
44   2014
45   2014
46   2014
47   2014
48   2014
49   2014
50   2014
51   2014
52   2014
53   2014
54   2014
55   2014
56
2014
57
2014
58   2014
59   2014
60   2014
61   2014
62   2014
     
Network Security
1 Behavioral Malware Detection in Delay Tolerant Networks 2014
2 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2014
3 An Optimal Distributed Malware Defense System for Mobile Networks with Heterogeneous Devices 2014
4 Building a Scalable System for Stealthy P2P-Botnet Detection 2014
5 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
6 Bandwidth Distributed Denial of Service: Attacks and Defenses 2014
7 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 2014
8 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
9 Captcha as Graphical Passwords¡ªA New Security Primitive Based on Hard AI Problems 2014
10 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
11 PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes 2014
12 A System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis 2014
13 Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption 2014
14   2014
15   2014
16   2014
17   2014
18   2014
19   2014
20   2014
21   2014
     
Adhoc Networks & VANET
1
STARS: A Statistical Traffic Pattern Discovery System for MANETs
2014
2
Trajectory Improves Data Delivery in Urban Vehicular Networks
2014
3
Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
2014
4
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs.
2014
5
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
2014
6
Multicast Capacity in MANET with Infrastructure Support
2014
7
AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment
2014
8
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
2014
9
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
2014
10
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
2014
11 VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014
12   2014
     
 
Mobile Computing
 
1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
2 Large Scale Synthetic Social Mobile Networks with SWIM 2014
3 Stochastic Bandwidth Estimation in Networks With Random Service 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
6 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014
7 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
8   2014
9   2014
10   2014
11   2014
12   2014
 
Sensor Networks
 
1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
2 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
3 A Survey of Intrusion Detection Systems in Wireless Sensor Networks 2014
4 Impact of UPFC on Power Swing Characteristic and Distance Relay Behavior 2014
5 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2014
6 Optimization Decomposition for Scheduling and System Configuration in Wireless Networks 2014
7 Secure Continuous Aggregation in Wireless Sensor Networks 2014
8 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks 2014
9 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014
10 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing 2014
11 DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks 2014
12 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks 2014
13 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks 2014
14 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014
15 Collaborative Scheduling in Dynamic Environments Using Error Inference 2014
16 Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014
     
 
Networking and Wireless Communication
 
1 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks 2014
2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
3 Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast Environments 2014
4 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing 2014
5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014
6 Optimization Decomposition for Scheduling and System Configuration in Wireless Networks 2014
7 Adaptive Transmission for Delay-Constrained Wireless Video. 2014
8 Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 2014
9 Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks 2014
     
 
Data Mining
 
1 Fast Nearest Neighbor Search with Keywords 2014
2 An Empirical Performance Evaluation of Relational Keyword Search Systems 2014
3 Facilitating Document Annotation using Content and Querying Value 2014
4 Supporting Privacy Protection in Personalized Web Search 2014
5 Secure Mining of Association Rules in Horizontally Distributed Databases 2014
6 Efficient Ranking on Entity Graphs with Personalized Relationships 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Privacy-Preserving and Content-Protecting Location Based Queries 2014
9 Active Learning of Constraints for Semi-Supervised Clustering. 2014
10 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme. 2014
11 Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014
12 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014
13 A generic framework for top k pairs and top k objects queries over sliding windows 2014
14 Efficient Prediction of Difficult Keyword Queries over Databases 2014
15 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
16 Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 2014
17 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014
18 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014
19 Access Control in Decentralized Online Social Networks Applying a Policy Hiding Cryptograph 2014
20 Security Evaluation of Pattern Classifiers under Attack 2014
21 Efficient Prediction of Difficult Keyword Queries over Databases 2014
22 Temporal Workload-Aware Replicated Partitioning for Social Networks 2014
     
     
 
Android
 
1 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive 2014
2 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
3 Mobility Prediction-based Smartphone Energy Optimization for Everyday Location Monitoring 2014
4 A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks 2014
5 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring 2014
6 LocaWard A Security and Privacy Aware Location-Based Rewarding System 2014
7 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
8 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014
9 Green Droid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications 2014
10 MOSES: Supporting and Enforcing Security Profiles on Smart phones 2014
11 Security Threats to Mobile Multimedia Applications: Camera Based Attacks on Mobile Phones 2014
12 SOS A Distributed Mobile Q&A System Based on Social Networks 2014
13 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks 2014
14 DELTA++ Reducing the Size of Android Application Updates 2014
15 Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks 2014
     
     
 
J2ME Based Projects
 
1 Adaptation of a virtual campus for mobile learning devices 2014
2 Blutooth Mobile Based College Campus 2014
3 ECops 2014
4 Efficient Computation of Range Aggregates Against Uncertain Location Based Queries 2014
5 Privacy-Conscious Location-Based Queries in Mobile Environments 2014
6 Ranking Model Adaptation for Domain-Specific Search 2014
7 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2014
8 The World in a nutshell the concious range queries 2014
9 IPTV Optimizing cloud resources through virtualization 2014
10 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2014
     
 
IMage Processing
 
1 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014
2 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding 2014
3 Captcha as Graphical Passwords¡ªA New Security Primitive Based on Hard AI Problems 2014
4   2014
5   2014
6   2014
7   2014
8   2014
9   2014
10   2014
     
 
Network Simulation(NS2)
 
1 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014
2 A Study on False Channel Condition Reporting Attacks in Wireless Networks 2014
3 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2014
4 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning 2014
5 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks 2014
6 ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks 2014
7 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2014
8 Neighbour Table Based Shortcut Tree Routing in Zig Bee Wireless Networks 2014
9 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks 2014
10 Secure Continuous Aggregation in Wireless Sensor Networks 2014
11 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing 2014
12 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks 2014
13 Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile Sensors 2014
14 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks 2014
15 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Networks 2014
16 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment 2014
17 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014
18 VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014
19 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multi hop Networks 2014
20 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014
21 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2014
22 STARS: A Statistical Traffic Pattern Discovery System for MANETs 2014
23 Delay and Capacity Analysis in MANETs with Correlated Mobility and f-cast Relay 2014
24 The Impact of Rate Adaptation on Capacity-Delay Tradeoffs in Mobile Ad Hoc Networks 2014
25 Maximizing P2P File Access Availability in Mobile Ad hoc Networks Though Replication for Efficient File Sharing. 2014
26 Mobile-Projected Trajectory Algorithm with Velocity-Change Detection for Predicting Residual Link Lifetime in MANET 2014
27 Rank Preserving Discriminant Analysis for Human Behavior Recognition on Wireless Sensor Networks 2014
28 Efficient Data Collection for Large-Scale Mobile Monitoring Applications 2014
29 Multisensor Wireless System for Eccentricity and Bearing Fault Detection in Induction Motors 2014
30 An Alternative Perspective on Utility Maximization in Energy-Harvesting Wireless Sensor Networks 2014
31 Real-Time Implementation of a Harmony Search Algorithm-Based Clustering Protocol for Energy-Efficient Wireless Sensor Networks 2014
32 Reconfiguration of Sustainable Thermoelectric Generation Using Wireless Sensor Network. 2014
33 Automated Irrigation System Using a Wireless Sensor Network and GPRS Module 2014
34 Network Clock Synchronization Based on the Second-Order Linear Consensus Algorithm 2014
35 Distributed Finite-Horizon Fusion Kalman Filtering for Bandwidth and Energy Constrained Wireless Sensor Networks 2014
36 Ensuring Survivability of Resource-Intensive Sensor Networks Through Ultra-Low Power Overlays 2014
37 Lightweight Robust Device-Free Localization in Wireless Networks 2014
38 Dynamic Packet Length Control in Wireless Sensor Networks 2014
39 A Novel Sensory Data Processing Framework to Integrate Sensor Networks With Mobile Cloud 2014
40 Bayesian Tracking in Underwater Wireless Sensor Networks With Port-Starboard Ambiguity 2014
41 QoS-Aware Scheduling of Services-Oriented Internet of Things 2014
42 Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks 2014
43 RC-MAC: A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks 2014
44 The Channel Estimation Effort for Analog Computation over Wireless Multiple-Access Channels 2014
45 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Networks 2014
46 Path Construction and Visit Scheduling for Targets by Using Data Mules 2014
47 Low-Latency SINR-Based Data Gathering in Wireless Sensor Networks 2014
48 Alternating Optimization Algorithms for Power Adjustment and Receive Filter Design in Multihop Wireless Sensor Networks 2014
49 End-to-End Communication Delay Analysis in Industrial Wireless Networks 2014
50 My Health Assistant: An Event-driven Middleware for Multiple Medical Applications on a Smartphone-mediated Body Sensor Network 2014
51 Efficient and Secure Routing Protocol for WSN through SNR based Dynamic Clustering Mechanisms 2014
52 Collaborative Scheduling in Dynamic Environments Using Error Inference 2014
ECE & Embedded Systems
1 An Embedded Systems Laboratory to Support Rapid Prototyping of Robotics and the Internet of Things 2014
2 An Enhanced Reservation Based Medium Access Control for Voice over Wireless Mesh Networks 2014
3 Autonomous Management of Everyday Places for a personalized location provider 2014
4 Distributed Compression for Condition Monitoring of Wind Farms 2014
5 LOBOT: Low-Cost, Self-Contained Localization of Small-Sized 2014
6 Online Monitoring of Geological CO2 Storage and Leakage Based on Wireless Sensor Networks 2014
7 Remote-Control System of High Efficiency and Intelligent Street Lighting Using a ZigBee Network of Devices and Sensors 2014
8 Triaxial Accelerometer-Based Fall Detection Method Using a Self- Constructing Cascade-AdaBoost-SVM Classifier 2014
9 Security of Autonomous Systems Employing Embedded Computing and Sensors 2014
10 Building a Smart Home System with WSN and Service Robot 2014
     
 
EEE Projects- Power Electronics
 
1 Adaptive MPPT Applied to Variable-Speed Micro hydro power Plant 2014
2 An Energy-Efficient Motor Drive With Autonomous Power Regenerative Control System Based on Cascaded Multilevel Inverters and Segmented Energy Storage 2014
3 Control Structure for Single-Phase Stand-Alone Wind-Based Energy Sources 2014
4 DC-Bus Design and Control for a Single-Phase Grid-Connected Renewable Converter with a Small Energy Storage Component 2014
5 Differential Power Processing for Increased Energy Production and Reliability of Photovoltaic Systems 2014
6 Digital-Controlled Single-Phase Transformer-Based Inverter for Non-Linear Load Applications 2014
7 Dual Transformer less Single-Stage Current Source Inverter With Energy Management Control Strategy 2014
8 Half-Wave Cyclo converter-Based Photovoltaic Microinverter Topology with Phase-Shift Power Modulation 2014
9 Instantaneous Current-Sharing Control Strategy for Parallel Operation of UPS Modules Using Virtual Impedance 2014
10 One-Cycle-Controlled Single-Stage Single-Phase Voltage- Sensorless Grid-Connected PV System 2014

 

Why Choose Us?

Effective Query Solving by well trained MNC's Technical Professionals

 

Client Quote

But I must explain to you how all this mistaken idea of denouncing pleasure praising pain complete account of the system.