IEEE 2015-2016
PROJECTS Technology: JAVA(J2SE & J2EE)
S. No /
PROJECT TITLES
1 / Context-Based Diversification for Keyword Queries over XML Data
2 / Malware Propagation in Large-Scale Networks
3 / On Summarization and Timeline Generation for Evolutionary Tweet Streams
4 / Progressive Duplicate Detection
5 / Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
6 / Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
7 / Towards Effective Bug Triage with Software Data Reduction
8 / A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
9 / A Proximity-Aware Interest-Clustered P2P File Sharing System
10 / Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
11 / Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
12 / User-Defined Privacy Grid System for Continuous Location-Based Services
13 / A Computational Dynamic Trust Model for User Authorization
14 / A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
15 / Continuous and Transparent User Identity Verification for Secure Internet Services
16 / Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts
17 / DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
18 / Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
19 / Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
20 / Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
21 / Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
22 / Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
23 / Secure Distributed Deduplication Systems with Improved Reliability
24 / A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
25 / Effective Key Management in Dynamic Wireless Sensor Networks
26 / Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter
27 / An Attribute-Assisted Reranking Model for Web Image Search
28 / EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
29 / Learning to Rank Image Tags With Limited Training Examples
30 / Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
31 / Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
32 / A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
33 / Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
34 / Detecting Malicious Face book Applications
35 / Key Updating for Leakage Resiliency with Application to AES Modes of Operation
36 / Security-Evaluation-Of-Pattern-Classifiers-Under-Attack
37 / Facilitating-Document-Annotation-Using-Content-And-Querying-Value
38 / Securing-Broker-Less-Publishsubscribe-Systems-Using-Identity-Based-Encryption
39 / Fast-Nearest-Neighbor-Search-With-Keywords
40 / Traffic-Pattern-Based-Content-Leakage-Detection-For-Trusted-Content-Delivery-Networks
41 / Top-K-Query-Result-Completeness-Verification-In-Tiered-Sensor-Networks
42 / Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
43 / Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
44 / SOS: A Distributed Mobile Q&A System Based on Social Networks
45 / Towards Online Shortest Path Computation
46 / Boundary Cutting for Packet Classification
47 / An Incentive Framework for Cellular Traffic Offloading
48 / Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
49 / Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
50 / Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks
51 / Detection And Localization Of Multiple Spoofing
52 / EAACK—A Secure Intrusion-Detection System For Manets
53 / Vampire Attacks Draining Life From Wireless
54 / Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
55 / Multiparty Access Control for Online Social Networks Model and Mechanisms
56 / Cooperative-Caching-For-Efficient-Data-Access-In-Disruption-Tolerant-Networks
57 / Cost-Effective-Resource-Allocation-Of-Overlay-Routing-Relay-Nodes
58 / A Scalable Server Architecture For Mobile Presence Services In
JAVA ANDROID PROJECTS
ENVIRONMENT DETAILS:ANDROID,SQLITE
S. No / PROJECT TITLES
1 / A Location- and Diversity-aware News Feed System for Mobile Users
2 / Context-Based Access Control Systems for Mobile Devices
3 / Cooperative Positioning and Tracking in Disruption Tolerant Networks
4 / CWC: A Distributed Computing Infrastructure Using Smartphone’s
5 / Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile
6 / Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
7 / Privacy-Preserving Relative Location Based Services for Mobile Users
8 / The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
9 / Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds
10 / User Privacy and Data Trustworthiness in Mobile Crowd Sensing
11 / User-Defined Privacy Grid System for Continuous Location-Based Services
12 / Effective Risk Communication for Android Apps
13 / Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
14 / Meet You – Social Networking on Android
15 / MOSES: Supporting and Enforcing Security Profiles on Smart phones
16 / T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
CLOUD COMPUTING
Technology:JAVA,J2EE&MYSQL
S. No / PROJECT TITLES
1 / A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
2 / A Secure and Dynamic Multi-keyword Ranked Search Scheme
3 / Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
4 / Audit-Free Cloud Storage via Deniable Attribute-based Encryption
5 / Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
6 / Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
7 / Identity-Based Encryption with Outsourced Revocation in Cloud Computing
8 / Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
9 / Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
10 / Decentralized-Access-Control-With-Anonymous-Authentication-Of-Data-Stored-In-Clouds
11 / Distributed--Concurrent--And-Independent-Access-To-Encrypted-Cloud-Databases
12 / Scalable-Distributed-Service-Integrity-Attestation-For-Software-As-A-Service-Clouds
13 / A-Hybrid-Cloud-Approach-For-Secure-Authorized-Deduplication
14 / Oruta-Privacy-Preserving-Public-Auditing-For-Shared-Data-In-The-Cloud
15 / A-Stochastic-Model-To-Investigate-Data-Center-Performance-And-Qos-In-Iaas-Cloud-Computing-Systems
16 / Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization
17 / Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud
18 / Cloud A Framework Of Adaptive Mobile Video Streaming And Efficient Social Video Sharing In
19 / Cloudmov Cloud-Based Mobile Social TV
WEB APPLICATIONS
Technology: JAVA J2EE,TOMCAT,ORACLE
S. No / PROJECT TITLES
1 / An-efficient-Mailing-System-for-Detecting-Spam-Mails
2 / Annotating-Search-Results-from-Web-Databases
3 / A-Secure-Cloud-server-System-using-Proxy-Re-Encryption-Model
4 / Attribute-based-Encryption-System-for-Secured-Data-Storage
5 / Automatic-Testing-System-for-Web-Application
6 / Generalized-Flow-Based-Method-for-Analysis-of-Implicit-Relationships-on-Wikipedia
7 / Automated e-government certificates
8 / Friend book: A Semantic-based Friend Recommendation System for Social Networks
9 / QOS: Ranking Prediction For Cloud Services
10 / Fully Anonymous Profile Matching In Mobile Social
11 / Collaboration in Multi cloud Computing Environment
12 / A Cocktail Approach for Travel Package Recommendation
13 / Web Based Framework of Project Performance and Control system
14 / Validation of Code Words Through Images
15 / Student Project Allocation and Mgmt system
16 / Secrecy protecting account for Data Storage Security
17 / The Mobile Agent Based service software in Internet Environment
18 / Going Back and Fourth efficient Multi Deployment and Multi snapshot
19 / E-Banking
20 / Credit Card Fiddles
21 / Database Elasticity
22 / Management of Vitality Cards
23 / Standing Spatial Information
24 / E-Housing
25 / News Bulletin System
26 / Loan Lending
26 / Venue Maintenance System
27 / Medical Allowances Controlling System
28 / Internet Protocol Television System
29 / AMES
30 / CAM
31 / Secure Data Sharing for multi owners
32 / Online Itemization Section
33 / Disburse Mobile Scheme
34 / Motel Resource Tool
35 / Credit Card Fiddles
36 / E-Counseling
37 / Mobile Presence Server
38 / Loan Lending
39 / VISA Dispensing System
40 / Resource Management System
41 / Jellybean Maneuvering Appropriation And Conclave
2015-2016 IEEE PROJECTS
Technology: DOTNET
S. No / PROJECT TITLES
01 / Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites.
02 / Discovery of Ranking Fraud for Mobile Apps.
03 / Query Aware Determinization of Uncertain Objects.
04 / Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization.
05 / Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis.
06 / Universal Network Coding-Based Opportunistic Routing for Unicast.
07 / A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks.
08 / Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks.
09 / Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks.
10 / Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems.
11 / Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.
12 / An Attribute-Assisted Reranking Model for Web Image Search.
13 / Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images.
14 / Detection and Rectification of Distorted Fingerprints.
15 / Learning Fingerprint Reconstruction: From Minutiae to Image.
16 / Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation.
17 / An Empirical Performance Evaluation of Relational Keyword Search Techniques.
18 / Supporting Privacy Protection in Personalized Web Search.
19 / Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality.
20 / Typicality-Based Collaborative Filtering Recommendation.
21 / Secure Mining of Association Rules in Horizontally Distributed Databases.
22 / Product Aspect Ranking and its Applications.
23 / Secure Data Retrieval for Decentralized Disruption-Tolerant Military Network.
24 / Autonomous Mobile Mesh Networks.
25 / The Target Tracking in Mobile Sensor Networks.
26 / Certificate less Remote Anonymous Authentication Scheme for Wireless Body Area Networks.
27 / Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks.
28 / Multicast capacity in MANET with Infrastructure Support.
29 / Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic.
30 / Preserving Location Privacy in Geo social Applications.
31 / Privacy Preserving Data Sharing With Anonymous ID Assignment.
32 / A cocktail approach for travel package recommendation.
33 / Efficient Data Query in Intermittently-Connected Mobile Ad hoc Social Networks.
34 / An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
35 / Optimal content downloading in Vehicular Network.
36 / Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing.
37 / Topology control in mobile ad hoc networks.
38 / The Three-Tier Security Scheme in Wireless
Sensor Networks with Mobile Sinks.
39 / Network Assisted Mobile Computing with Optimal Uplink Query Processing.
40 / Characterizing the Efficacy of the NRL Network
Pump in Mitigating Covert Timing Channels.
41 / Jamming-Aware Traffic Allocation for Multiple-Path
Routing Using Portfolio Selection.
CLOUD COMPUTING
01 / Cloud-Based Multimedia Content Protection System.
02 / Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption.
03 / Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds.
04 / Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.
05 / Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem.
06 / Identity-Based Distributed Provable Data Possession in Multicloud Storage.
07 / PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing .
08 / SelCSP: A Framework to Facilitate Selection of Cloud Service Providers.
09 / Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
10 / Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds.
11 / Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
12 / Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
13 / Distributed, Concurrent, and Independent Access to Encrypted Cloud Data.
14 / Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
15 / Privacy-Preserving Public Auditing for Secure Cloud Storage in Public Clouds.
16 / Balancing Performance, Accuracy and Precision for Secure Cloud Transactions.
WEB APPLICATIONS
01 / User-Query-Dependent Ranking For Web Databases.
02 / Data Storage security in cloud computing.
03 / Error Tracking System.
04 / Expert answer.
05 / Efficient Computation of Range Aggregates against uncertain location based queries.
06 / Exploring Application-Level Semantics for Data Compression.
07 / Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud.
08 / Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.
09 / Vulnerability analysis in SOA-based business processes.
10 / Asset boutique.
11 / Monitoring Service Systems from a Language-Action Perspective.
12 / CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
13 / MONA: Secure Multi-Owner Data Sharing for Dynamic Groups in the Clouds.
14 / Consistency as a Service: Auditing Cloud Consistency.
15 / A system to filter unwanted messages from OSN user walls.
16 / Web Information Gathering Based on Ontology model.
17 / Collective Behavior of Scalable learning.
18 / Go-Between Socially-Enhanced Virtual Communities.
19 / A Gen2-based RFID Authentication Protocol for Security and Privacy.
20 / Monitoring System.
21 / Online Art Gallery.
22 / Gateway Accessory.
23 / E-voting.
24 / Internet File Sharing.
25 / Cybernetics protector.
26 / Scalable record linkage and deduplication.
27 / Garbage Collection System.
28 / Commodity Sustenance.
29 / Affluence Management.
30 / Global Warning System.
31 / Blog Application.
32 / Go-Vegetarian.
33 / Online Classifieds.
34 / Municipal Administration system.
35 / Online Advertise.
36 / Cab Services.
37 / Census.
38 / Orphan Management System.
39 / Vessel Consignment.
40 / Genco Mailing System.
41 / Village morphogenesis.
42 / Ranking Model Adaptation for Domain-Specific Search.
43 / Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators.
44 / Bridging Socially-Enhanced Virtual Communities.
2015-16 PROJECTS
Technology: Embedded System
S.NO / PROJECT TITLES
01 / ARM Platform For Vehicular Monitoring And Tracking.
02 / Advance question paper leakage control system design.
03 / GPS Based Asset/Vehicle/Animal/Child Tracking System.
04 / Automatic Power Meter Reading Using GSM Network.
05 / Advance home security for intruder detection with auto paging/dialing.
06 / Wireless remote and status enquiry for smart industries.
07 / Vehicle ignition security with dynamic password generation.
08 / Emergency alert for women safety with location tracking.