
Training
The Sun Technologies Training formats are flexible, We have trained thousands of students

Development
We create a professional websites & Apps which best suit your needs target audience.
IEEE Project Titles
.NET Technology
Domain: Cloud Computing
» Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
» Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
» Consistency as a Service: Auditing Cloud Consistency
» Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
» Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
» Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
» Identity-Based Distributed Provable Data Possession in Multi- Cloud Storage
» Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
» Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
» Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
» Scalable Distributed Service Integrity Attestation for Software-asa- Service Clouds
» A Cocktail Approach for Travel Package Recommendation
» An Empirical Performance Evaluation of Relational Keyword Search Techniques
» LARS*: An Efficient and Scalable Location-Aware Recommender System
» Product Aspect Ranking and Its Applications
» Secure Mining of Association Rules in Horizontally Distributed Databases
» Supporting Privacy Protection in Personalized Web Search
» TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
» Typicality-Based Collaborative Filtering Recommendation
» A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
» Autonomous Mobile Mesh Networks
» DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks
» Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
» Preserving Location Privacy in Geosocial Applications
» A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
» A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
» An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
» Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
» Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
» Multicast Capacity in MANET with Infrastructure Support
» Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
» Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
Java Technology
Domain: Cloud Computing
» A Hybrid Cloud Approach for Secure Authorized Deduplication
» A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
» A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
» Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
» Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
» Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
» Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
» PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
» Towards Differential Query Services in Cost-Efficient Clouds
» Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
» BestPeer++ A Peer-to-Peer Based Large-Scale Data Processing Platform
» Data Mining with Big Data
» Dealing With Concept Drifts in Process Mining
» Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
» Efficient Prediction of Difficult Keyword Queries over Databases
» Facilitating Document Annotation Using Content and Querying Value
» Fast Nearest Neighbor Search with Keywords
» Keyword Query Routing
» Privacy-Preserving and Content-Protecting Location Based Queries
» Security Evaluation of Pattern Classifiers under Attack
» Supporting Privacy Protection in Personalized Web Search
» Towards Online Shortest Path Computation
» An Incentive Framework for Cellular Traffic Offloading
» Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
» Efficient Authentication for Mobile and Pervasive Computing
» Friendbook A Semantic-based Friend Recommendation System for Social Networks
» Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
» Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
» Exploiting Service Similarity for Privacy in Location-Based Search Queries
» LocaWard A Security and Privacy Aware Location-Based Rewarding System
» On False Data-Injection Attacks against Power System State Estimation Modeling and Countermeasures
» RRE: A Game-Theoretic Intrusion Response and Recovery Engine
» Securing Broker-Less PublishSubscribe Systems Using Identity-Based Encryption
» SOS A Distributed Mobile Q&A System Based on Social Networks
» The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Eva
» The Design and Evaluation of An Information Sharing System for Human Networks
» Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
» Secure Outsourced Attribute-based Signatures