SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Software Project List
(Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET, PHP, Python &Android
Projects)
Project List 2018-2019
Software Projects
Application Projects
IEEE Projects
Android Projects
PHP Projects
Python Projects
IEEE Project Domains
Networking*Mobile Computing
Cloud Computing*Big Data
Network Security *Data Mining
Dependable and Secure Computing
Knowledge and Data Engineering
Web Mining
Information Forensics and Security
Software Engineering
Image Processing
IEEE 2018-19
Java Projects
Java / J2EE
Knowledge and Data Mining
1) Automated Phrase Mining from Massive Text Corpora -2018
2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018
3) Complementary Aspect-based Opinion Mining -2018
4) A Cost Model for SPARK SQL -2018
5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective-2018
6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018
7) Search Result Diversity Evaluation based on Intent Hierarchies -2018
8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018
9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018
10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds
11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018
12) Online Product Quantization -2018
13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018
14) Reverse k Nearest Neighbor Search over Trajectories -2018
15) Search Rank Fraud and Malware Detection in Google Play -2017
16) Designing High Performance Web-Based Computing Services to Promote
Telemedicine Database Management System -2017
17) Computing Semantic Similarity of Concepts in Knowledge Graphs -2017
18) Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification –
2017
19) Crowdsourcing for Top-K Query Processing over Uncertain Data -2016
20) Data mining for automated personality classification-2016
21) Distributed Multi-Agent Online Learning Based on Global Feedback-performance and
22) convergence of multi agent learning -2016
23) GDCluster: A General Decentralized Clustering Algorithm -2016
24) K Nearest Neighbour Joins for Big Data on Map Reduce : A theoretical and
25) experimental analysis -2016
26) K-Subspaces Quantization for Approximate Nearest Neighbor Search -2016
27) Nearest Keyword Set Search in Multi-Dimensional Datasets -2016
28) Quality-Aware Sub graph Matching Over inconsistent Probabilistic graph data bases-2016
29) Scalable daily human behavioral pattern mining from multivariable temporal data-
2016
30) Progressive Duplicate Detection - 2015
31) Keyword Search Over Probabilistic RDF Graphs- 2015
32) k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational
Data- 2015
33) LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015
34) GFilter: A General Gram Filter for String Similarity Search - 2015
35) Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014
36) Range Aggregation With Set Selection-2014
37) Facilitating Document Annotation Using Content and Querying Value-2014
38) Automatic Itinerary Planning for Traveling Services-2014
39) Adaptive Preprocessing for Streaming Data-2014
40) Optimized Cartesian K-Means-2014
41) A Group Incremental Approach to Feature Selection Applying Rough Set Technique-
2014
42) Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at
Location-Based Services-2014
43) Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
44) Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-
2014
45) An Air Index for Spatial Query Processing in Road Networks-2014
46) An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014
47) Extended XML Tree Pattern Matching: Theories and Algorithms-2011
Big Data
1) A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection
and Word Embeddings -2018
2) Automated Phrase Mining from Massive Text Corpora -2018
3) 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks -2018
4) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining-2018
5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective-2018
6) A Meta Path based Method for Entity Set Expansion in Knowledge Graph-2018
7) Search Result Diversity Evaluation based on Intent Hierarchies-2018
8) Emotion Recognition on Twitter: Comparative Study and Training a Unison Model -2018
9) Detecting and Preventing Cyber Insider Threats: A Survey-2018
10) Attribute Based Storage Supporting Secure De duplication of Encrypted Data in Cloud 2017
11) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
12) K Nearest Neighbor Joins for Big Data on Map Reduce : A theoretical and experimental
analysis-2016
13) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers -2014
Cloud Computing
1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018
2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based
Encryption - 2018
3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data
Centers - 2018
4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018
5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018
6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server -
2018
7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information
Hiding for Secure Cloud Storage -2018
8) Information leakage in cloud data warehouses -2018
9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in
Cloud Storage -2018
10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018
11) Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server -2017
12) Securing Cloud Data under Key Exposure -2017
13) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
14) A scalable data chunk similarity based compression approach for efficient big sensing data
Processing on cloud -2016
15) Analysis of Classical Encryption Techniques in Cloud Computing -2016
16) DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments -2016
17) Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
2015
18) Verifiable Auditing for Outsourced Database in Cloud Computing - 2015
19) Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data
Centers- 2015
20) Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds -
2015
21) ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
22) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014
23) Security as a Service Model for Cloud Environment-2014
24) Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems
25) Privacy Preserving Delegated Access Control in public clouds-2013
26) Security and privacy-enhancing multi cloud architectures-2013
27) Toward privacy-assured and searchable cloud data storage services-2013
28) Ensuring Data Storage Security in Cloud Computing-2013
Information security and forensics
1) A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption-
2018
2) Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry
Approach - 2016
3) Effective Data Access Control for Multi authority Cloud Storage Systems-2015
4) Privacy-Preserving Detection of Sensitive Data Exposure-2015
5) On the Use of Client Identity Information for Face Antispoofing -2015
6) On the Security of Trustee-Based Social Authentications -2014
Parallel and Distributed Systems
1) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016
2) Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-
3) 2015
4) Deleting Secret Data with Public Verifiability-2015
5) DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade
6) Attacks -2015
7) Trust-based Service Management for Social Internet of Things Systems-2015
8) Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel
9) Wireless Networks-2014
10) The Client Assignment Problem for Continuous Distributed Interactive Applications:
Analysis, Algorithms, and Evaluation-2014
11) BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
12) Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-
2013
13) Covering Points of Interest with Mobile Sensors-2013
14) Detection and Localization of Multiple Spoofing Attacks-2013.
Software Engineering
1) The role Of Ethnographic studies in empirical software engineering -2016
2) RELAI Testing : A technique to assess and improve software reliability -2016
3) Relation between Combinations of Personal Characteristic Types and Educational
Effectiveness for a Controlled Learning Course -2016
4) Automated Checking of Conformance to Requirements Templates using Natural Language
Processing-2015
5) Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015
6) Estimating Computational Requirements in Multi-Threaded Applications -2015
7) The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015
8) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An Empirical Study -2015
NON –IEEE Projects
Java / J2EE -M.Sc(CS & IT),MCA
1) FOC Management System For TNEB –Abstracts
2) Online Loan Application-Abstract
3) Plant Shopping On Web
4) E - Intelli Cabs
5) Nutraceuticals Management System
6) Placement Management System
7) Time Table Generator
8) Green Planet Awareness
9) Implementation And Validating Environmental And Health
10) Loan Online Application
11) Management System In Metro Train
12) Modern Agriculture Development System
13) Modern Municipal Corporation.
14) Nearest Shopping Location Identification Systems
15) Product Market Manipulations On Asian Stock Market
16) Project Work Tracking System
17) Vendor Information System For Shipping
18) Transport Management System
19) E-Knowledge Wireless Health Care System
20) Adaptive Intrusion Detection System
21) Scheduling Operation With Facility Management For Logistic System
22) Defect Tracking For Improving Product Quality And Productivity
23) Ensuring Data Security In Cloud Computing
24) A New Algorithm For Three Party Quantum Key Distribution
25) Automatic Question Paper Generation
26) Automatic End Semester Time Table Generation
27) Learn To Personalized Image Search From Photo Sharing Web Sites
28) Material Management System
29) Multi Server Communication In Distributed Management System
30) Online Task Management System
31) Optimal Dynamic Path Restoration In Mesh Network
32) Placement Management System
33) Transfer Certificate Issuing System
34) Query Matching Process Using Xml Tree Pattern
35) Scheduled Operations Resource Facilitating System
36) Tollgate Management Systems.
** We can implement your own projects and project Ideas **
 Complete Guidance
 On Time Completion
 Excellent Support
 Project Documentation
 Own Idea Implementation
 For More Titles and any project related
 Quires Contact @M:7812045575
 E : Phoeniixsystems@gmail.com
IEEE – 2018-2019
Dot Project Titles
Cloud Computing
1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018
2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based
Encryption - 2018
3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data
Centers - 2018
4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018
5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018
6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server –
2018
7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information
Hiding for Secure Cloud Storage -2018
8) Information leakage in cloud data warehouses -2018
9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in
Cloud Storage -2018
10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018
11) Securing Cloud Data under Key Exposure -2017
12) Privacy Protection based Access Control Scheme in Cloud-based Services -2017
13) Attribute-Based Data sharing Scheme Revisited in Cloud Computing. -2016
14) Overflow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds –
2016
15) Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in
Public Cloud -2016
16) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing -2016
17) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
Knowledge and Data Mining
1) Automated Phrase Mining from Massive Text Corpora -2018
2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018
3) Complementary Aspect-based Opinion Mining -2018
4) A Cost Model for SPARK SQL -2018
5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective-2018
6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018
7) Search Result Diversity Evaluation based on Intent Hierarchies -2018
8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018
9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018
10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds
11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018
12) Online Product Quantization -2018
13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018
14) Relaxed functional dependencies.-2016
15) Discovery of ranking fraud for mobile applications.- 2015
16) Mining user-aware rare sequential topic patterns in document streams-2016
17) Authentication of moving top-k spatial keyword queries -2015
18) Co-extracting opinion targets and opinion words from online reviews based on the word
alignment model-2015
19) Lossless selection views under conditional domain constraints-2015
20) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through
blind storage-2015
21) A query approach for influence maximization on specific users in social networks-2015
22) Progressive duplicate detection-2015
23) Gdcluster:A general decentralized clustering algorithm-2015
24) Range aggregation with set selection-2014
25) Facilitating document annotation using content and querying value-2014
26) A group incremental approach to feature selection applying rough set technique-2014
27) Route-saver: leveraging route apis for accurate and efficient query processing at location-
based services-2014
28) Classifier ensembles with the extended space forest-2014
29) Decision trees for mining data streams based on the gaussian approximation-2014
30) Privacy preserving and content protecting location based queries-2014
31) Learning conditional preference networks from inconsistent examples-2014
32) Fast nearest neighbor search with keywords-2014
33) Discovering the top-k unexplained sequences in time-stamped observation data-2014
34) Effective and efficient clustering methods for correlated probabilistic graphs-2014
35) Core: a context-aware relation extraction method for relation completion-2014
36) Lars: an efficient and scalable location=aware recommender system-2014
37) Highly comparative feature-based time-series classification-2014
38) Keyword query routing-2014
39) Secure mining of association rules in horizontally distributed databases-2014
40) Personalized mobile search engine-2013
41) Web system upgrading with transaction failure and strategic customers
42) Traffic pattern based content leakage detection for trusted content delivery networks
Software Engineering
1) Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism
Detection - 2018
2) The Impact Of API Change and Fault-Proneness On The User Ratings of Android Apps-2015
3) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An empirical Study-2015
4) ?Using Declarative Specification To Improve the Understanding, Extensibility and
Comparison of Model-Interference algorithms-2015
5) An Observe-Model-Exercise* Paradigm to Test event-Driven Systems with Undetermined
Input Spaces-2014
6) Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013
7) Centroidal Voronoi Tessellations—A New Approach to Random Testin-2013
8) Test Case-Aware Combinatorial Testing-2013
Information security and forensics
1) ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated –
2017
2) Fast detection of transformed data leaks -2016
3) Privacy-Preserving Detection Of Sensitive Data Exposure-2015
4) On the Use of Client Identity Information for Face Anti Spoofing-2015
5) Provable multi-copy Dynamic Data Possession in Cloud Computing Systems-2015
6) On the Secrecy Rate Region Of Multiple –Access Wiretap Channel With Non Causal Side
Information -2015
7) Privacy-Preserving Authenticated Key-Exchange Over Internet-2014
8) Optimal Probabilistic Encryption for Secure Detection in WSN-2014
9) Top-k query Result Completeness Verification in Tiered SensorNetworks-2014
10) A Probabilistic Model of Visual Cryptography-2012
Parallel and Distributed Systems
1) Magic Train Design of Measurement Methods Against Bandwidth Inflation Attacks-2018
2) Secure Data Retrieval For Decentralized Distribution tolerant Military Networks -2016
3) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016
4) Trust-Based Service Management for Social Internet Of Things Systems-2015
5) COMIC: Cost Optimization for Internet Content Multihoming-2014
6) Learning-Based Uplink Interference Management in 4g LTE Cellular Systems-2014
NON – IEEE Projects
Dot Net(Asp.Net,C#.Net) - M.Sc(CS & IT),MCA
1) Easy SQL Query for Non IT Manager
2) Leave Management
3) Flight Management
4) Budget Approval System
5) Consumer Market Basket Analysis For Consumer Correct Decision
6) Multiple Password Authentication
7) Nutraceuticals Management System
8) Predicting User Behavior Using Web Mining
9) Courier Tracking System
10) Ensuring Data Security In Cloud Computing
11) Metro Train Smart Card Recharge System
12) Fireworks Billing
13) Public Web Status Monitoring Systems
14) Task Management System
15) College Application Form
16) Guest Information And Feedback Systems
17) Web Traffic Analyzer And Report Generation
18) Exam Seating Arrangement
19) Data Confidentiality In Health Care Systems
20) Information Leak Detection And Prevention
21) Zero-Knowledge Proof System On Outsourcing Cloud
22) Green Planet Awareness
23) Implementation And Validating Environmental And Health
24) Loan Online Application
25) Modern Agriculture Development System
26) Modern Municipal Corporation.
27) Nearest Shopping Location Identification Systems
28) Plant Shopping On Web
29) Product Market Manipulations On Asian Stock Market
30) Project Work Tracking System
31) Reporting Online Media News Systems
32) Vendor Information System For Shiping
33) Time To Time Stock Market Updater And Monitoring System
34) Tollgate Management Systems
35) Transport Management System
36) Scheduling Operation With Facility Management For Logistic System
37) Defect Tracking For Improving Product Quality And Productivity
38) Ensuring Data Security In Cloud Computing
39) Constructing E-Tourism
40) Consumer Market Basket Analysis For Consumer Correct Decision
41) Data Confidentiality On Health-Care Information System
42) Data Mining Analysis On Eb Bill System
43) Human Expertise Search Engine
44) I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine
45) Predicting Users Behaviors Using Web Mining
46) Product Marketing Analysis On Public Opinion
47) Ultimate Location Information For Given Range
48) Vendor Information System For Shiping
49) Web Based Book Publishing System
50) Web User Service Management System
51) Inventory Library Management System
52) New Generation Of Community Certificate
53) Web Based E-Auction System
54) Exam Scheduler
55) Budget Approval System
56) Data Theft Attack
57) Orphan Home Management
58) Vehicle Sales And Services Management Systems
59) School Management Systems
60) Monitoring Loan Application Processing System
61) Data Leakage Detection
62) Graphical Password Authentication System
63) Fast Nearest Search
64) Pmse: A Personalized Mobile Search Engine
65) Inventory Management-Printing Press
66) Hostel Management System
67) Advertising Agencies
68) Hospital Medicine Supply System
69) Global Employee Management System
70) Industrial Manpower Resource Organizer
71) Real Estate Management Systems.
72) Pension Management System
73) Key Word Query Routing
74) Office Automation In Computer Center
75) Printing Press Management System
76) Personal Health Care Record Management System
77) Vehicle Service Management
78) Web Based Sms Application
79) Automated Transport System For Travel Agencies
80) Quotation Controlling Process Through The Web
81) Welfare Schemes For A Cross Section Of The Society From Time To Time
82) Detecting Fraud On Vehicle Insurance System
83) Auditing Data Integrity And Data Storage Using Cloud
84) Marriage Assistance System
85) Cab Management Systems
86) Efficient Authentication For Mobile And Pervasive Computing
87) University Mark Schedular
88) Student and staff interaction
89) Online smart vehicle parking system
90) Automatic time table generation
91) Pharmacy management system
92) Online admission system
93) Easy leave
***We can implement your own projects and project Ideas***
Android App Projects
1) Android Application For Alert Railway Station
2) Attendance-System-Android Application
3) Campus Recruitment System
4) Doctor Appointment App
5) Electronics Shop Portal
6) Employment Office Management System
7) Gps For Emergency Ambulance
8) Hostel Management System
9) Mobile Shop Portal
10) Online Blood Bank
11) Online Food Order System – Foodoo
12) Passport And Aadhar Card Generation Using Android Application
13) Privacy-Preserving Location Sharing Services For Social Networks
14) Rural And Panchayat Development Application
15) School Management System
16) Swash Bharat App
17) Online Voting System
18) Chennai Local Train Timings App
19) Biometric Mechanism For Enhanced Security Of Online Transaction On Android System
20) Party Hall Booking
21) Indian Recipes
22) Student staff Interaction System.
We can implement your own projects and project Ideas
 Complete Guidance
 On Time Completion
 Excellent Support
 Project Documentation
 Own Idea Implementation
 For More Titles and any project
related
 quires Contact @M:7812045575
 E : Phoeniixsystems@gmail.com

Mais conteúdo relacionado

Semelhante a be cse projects in chennai

Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojects
RICHBRAINPROJECTS
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintech
RICHBRAINTECH
 
Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologies
RICHBRAINTECHNOLOGIES
 

Semelhante a be cse projects in chennai (20)

Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
 
Php 2014 Projects_ S3 Infotech:09884848198.
Php  2014 Projects_ S3 Infotech:09884848198.Php  2014 Projects_ S3 Infotech:09884848198.
Php 2014 Projects_ S3 Infotech:09884848198.
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
final year cse project list 2021 - 2022
final year cse project list 2021 - 2022final year cse project list 2021 - 2022
final year cse project list 2021 - 2022
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
 
CPaaS.io Y1 Review Meeting - Holistic Data Management
CPaaS.io Y1 Review Meeting - Holistic Data ManagementCPaaS.io Y1 Review Meeting - Holistic Data Management
CPaaS.io Y1 Review Meeting - Holistic Data Management
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojects
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintech
 
Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologies
 
Ieee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichyIeee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichy
 
Latest ieee 2016 projects titles in big data@ trichy
Latest ieee 2016 projects titles in big data@ trichyLatest ieee 2016 projects titles in big data@ trichy
Latest ieee 2016 projects titles in big data@ trichy
 
Latest ieee 2016 projects titles in big data@ trichy
Latest ieee 2016 projects titles in big data@ trichyLatest ieee 2016 projects titles in big data@ trichy
Latest ieee 2016 projects titles in big data@ trichy
 
Latest ieee 2016 projects titles in big data@ trichy
Latest ieee 2016 projects titles in big data@ trichyLatest ieee 2016 projects titles in big data@ trichy
Latest ieee 2016 projects titles in big data@ trichy
 
Ieee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichyIeee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichy
 
Ieee 2016 2017 titles in network security for java and dotnet in trichy
Ieee 2016 2017 titles in network security for java and dotnet in trichyIeee 2016 2017 titles in network security for java and dotnet in trichy
Ieee 2016 2017 titles in network security for java and dotnet in trichy
 
Ieee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichyIeee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichy
 
Ieee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichyIeee 2016 project titles for me m.tech in trichy
Ieee 2016 project titles for me m.tech in trichy
 
Final year me mtech project center in trichy @ieee 2016-17 titles for java an...
Final year me mtech project center in trichy @ieee 2016-17 titles for java an...Final year me mtech project center in trichy @ieee 2016-17 titles for java an...
Final year me mtech project center in trichy @ieee 2016-17 titles for java an...
 

Mais de Phoenix Systems

Mais de Phoenix Systems (8)

best project center in chennai
best project center in chennaibest project center in chennai
best project center in chennai
 
Python projects in chennai
Python projects in chennaiPython projects in chennai
Python projects in chennai
 
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
 
mca mini projects in chennai
mca mini projects in chennaimca mini projects in chennai
mca mini projects in chennai
 
msc projects in chennai
msc projects in chennaimsc projects in chennai
msc projects in chennai
 
ECE projects in chennai
ECE projects in chennaiECE projects in chennai
ECE projects in chennai
 
Embedded projects in chennai
Embedded projects in chennaiEmbedded projects in chennai
Embedded projects in chennai
 
Embedded Projects Electrical Projects @ Phoenix Systems
Embedded Projects Electrical Projects @ Phoenix SystemsEmbedded Projects Electrical Projects @ Phoenix Systems
Embedded Projects Electrical Projects @ Phoenix Systems
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

be cse projects in chennai

  • 1. Software Project List (Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET, PHP, Python &Android Projects) Project List 2018-2019 Software Projects Application Projects IEEE Projects Android Projects PHP Projects Python Projects
  • 2. IEEE Project Domains Networking*Mobile Computing Cloud Computing*Big Data Network Security *Data Mining Dependable and Secure Computing Knowledge and Data Engineering Web Mining Information Forensics and Security Software Engineering Image Processing
  • 3. IEEE 2018-19 Java Projects Java / J2EE Knowledge and Data Mining 1) Automated Phrase Mining from Massive Text Corpora -2018 2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018 3) Complementary Aspect-based Opinion Mining -2018 4) A Cost Model for SPARK SQL -2018 5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective-2018 6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018 7) Search Result Diversity Evaluation based on Intent Hierarchies -2018 8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018 9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018 10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds 11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018 12) Online Product Quantization -2018 13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018 14) Reverse k Nearest Neighbor Search over Trajectories -2018 15) Search Rank Fraud and Malware Detection in Google Play -2017 16) Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System -2017 17) Computing Semantic Similarity of Concepts in Knowledge Graphs -2017 18) Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification – 2017 19) Crowdsourcing for Top-K Query Processing over Uncertain Data -2016 20) Data mining for automated personality classification-2016 21) Distributed Multi-Agent Online Learning Based on Global Feedback-performance and 22) convergence of multi agent learning -2016 23) GDCluster: A General Decentralized Clustering Algorithm -2016 24) K Nearest Neighbour Joins for Big Data on Map Reduce : A theoretical and 25) experimental analysis -2016 26) K-Subspaces Quantization for Approximate Nearest Neighbor Search -2016 27) Nearest Keyword Set Search in Multi-Dimensional Datasets -2016 28) Quality-Aware Sub graph Matching Over inconsistent Probabilistic graph data bases-2016
  • 4. 29) Scalable daily human behavioral pattern mining from multivariable temporal data- 2016 30) Progressive Duplicate Detection - 2015 31) Keyword Search Over Probabilistic RDF Graphs- 2015 32) k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015 33) LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015 34) GFilter: A General Gram Filter for String Similarity Search - 2015 35) Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014 36) Range Aggregation With Set Selection-2014 37) Facilitating Document Annotation Using Content and Querying Value-2014 38) Automatic Itinerary Planning for Traveling Services-2014 39) Adaptive Preprocessing for Streaming Data-2014 40) Optimized Cartesian K-Means-2014 41) A Group Incremental Approach to Feature Selection Applying Rough Set Technique- 2014 42) Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services-2014 43) Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014 44) Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data- 2014 45) An Air Index for Spatial Query Processing in Road Networks-2014 46) An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014 47) Extended XML Tree Pattern Matching: Theories and Algorithms-2011 Big Data 1) A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings -2018 2) Automated Phrase Mining from Massive Text Corpora -2018 3) 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks -2018 4) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining-2018 5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective-2018 6) A Meta Path based Method for Entity Set Expansion in Knowledge Graph-2018 7) Search Result Diversity Evaluation based on Intent Hierarchies-2018
  • 5. 8) Emotion Recognition on Twitter: Comparative Study and Training a Unison Model -2018 9) Detecting and Preventing Cyber Insider Threats: A Survey-2018 10) Attribute Based Storage Supporting Secure De duplication of Encrypted Data in Cloud 2017 11) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds- 2016 12) K Nearest Neighbor Joins for Big Data on Map Reduce : A theoretical and experimental analysis-2016 13) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers -2014 Cloud Computing 1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018 2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption - 2018 3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers - 2018 4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018 5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018 6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server - 2018 7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage -2018 8) Information leakage in cloud data warehouses -2018 9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in Cloud Storage -2018 10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018 11) Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server -2017 12) Securing Cloud Data under Key Exposure -2017 13) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds- 2016 14) A scalable data chunk similarity based compression approach for efficient big sensing data Processing on cloud -2016 15) Analysis of Classical Encryption Techniques in Cloud Computing -2016 16) DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments -2016 17) Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2015
  • 6. 18) Verifiable Auditing for Outsourced Database in Cloud Computing - 2015 19) Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers- 2015 20) Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds - 2015 21) ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015 22) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014 23) Security as a Service Model for Cloud Environment-2014 24) Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems 25) Privacy Preserving Delegated Access Control in public clouds-2013 26) Security and privacy-enhancing multi cloud architectures-2013 27) Toward privacy-assured and searchable cloud data storage services-2013 28) Ensuring Data Storage Security in Cloud Computing-2013 Information security and forensics 1) A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption- 2018 2) Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach - 2016 3) Effective Data Access Control for Multi authority Cloud Storage Systems-2015 4) Privacy-Preserving Detection of Sensitive Data Exposure-2015 5) On the Use of Client Identity Information for Face Antispoofing -2015 6) On the Security of Trustee-Based Social Authentications -2014 Parallel and Distributed Systems 1) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016 2) Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things- 3) 2015 4) Deleting Secret Data with Public Verifiability-2015 5) DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade 6) Attacks -2015 7) Trust-based Service Management for Social Internet of Things Systems-2015 8) Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel 9) Wireless Networks-2014 10) The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation-2014
  • 7. 11) BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014 12) Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment- 2013 13) Covering Points of Interest with Mobile Sensors-2013 14) Detection and Localization of Multiple Spoofing Attacks-2013. Software Engineering 1) The role Of Ethnographic studies in empirical software engineering -2016 2) RELAI Testing : A technique to assess and improve software reliability -2016 3) Relation between Combinations of Personal Characteristic Types and Educational Effectiveness for a Controlled Learning Course -2016 4) Automated Checking of Conformance to Requirements Templates using Natural Language Processing-2015 5) Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015 6) Estimating Computational Requirements in Multi-Threaded Applications -2015 7) The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015 8) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault- Proneness Prediction? An Empirical Study -2015 NON –IEEE Projects Java / J2EE -M.Sc(CS & IT),MCA 1) FOC Management System For TNEB –Abstracts 2) Online Loan Application-Abstract 3) Plant Shopping On Web 4) E - Intelli Cabs 5) Nutraceuticals Management System 6) Placement Management System 7) Time Table Generator 8) Green Planet Awareness 9) Implementation And Validating Environmental And Health 10) Loan Online Application 11) Management System In Metro Train 12) Modern Agriculture Development System 13) Modern Municipal Corporation. 14) Nearest Shopping Location Identification Systems 15) Product Market Manipulations On Asian Stock Market
  • 8. 16) Project Work Tracking System 17) Vendor Information System For Shipping 18) Transport Management System 19) E-Knowledge Wireless Health Care System 20) Adaptive Intrusion Detection System 21) Scheduling Operation With Facility Management For Logistic System 22) Defect Tracking For Improving Product Quality And Productivity 23) Ensuring Data Security In Cloud Computing 24) A New Algorithm For Three Party Quantum Key Distribution 25) Automatic Question Paper Generation 26) Automatic End Semester Time Table Generation 27) Learn To Personalized Image Search From Photo Sharing Web Sites 28) Material Management System 29) Multi Server Communication In Distributed Management System 30) Online Task Management System 31) Optimal Dynamic Path Restoration In Mesh Network 32) Placement Management System 33) Transfer Certificate Issuing System 34) Query Matching Process Using Xml Tree Pattern 35) Scheduled Operations Resource Facilitating System 36) Tollgate Management Systems. ** We can implement your own projects and project Ideas **  Complete Guidance  On Time Completion  Excellent Support  Project Documentation  Own Idea Implementation  For More Titles and any project related  Quires Contact @M:7812045575  E : Phoeniixsystems@gmail.com
  • 9. IEEE – 2018-2019 Dot Project Titles Cloud Computing 1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018 2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption - 2018 3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers - 2018 4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018 5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018 6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server – 2018 7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage -2018 8) Information leakage in cloud data warehouses -2018 9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in Cloud Storage -2018 10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018 11) Securing Cloud Data under Key Exposure -2017 12) Privacy Protection based Access Control Scheme in Cloud-based Services -2017 13) Attribute-Based Data sharing Scheme Revisited in Cloud Computing. -2016 14) Overflow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds – 2016 15) Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud -2016 16) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing -2016 17) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds- 2016
  • 10. Knowledge and Data Mining 1) Automated Phrase Mining from Massive Text Corpora -2018 2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018 3) Complementary Aspect-based Opinion Mining -2018 4) A Cost Model for SPARK SQL -2018 5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective-2018 6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018 7) Search Result Diversity Evaluation based on Intent Hierarchies -2018 8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018 9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018 10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds 11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018 12) Online Product Quantization -2018 13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018 14) Relaxed functional dependencies.-2016 15) Discovery of ranking fraud for mobile applications.- 2015 16) Mining user-aware rare sequential topic patterns in document streams-2016 17) Authentication of moving top-k spatial keyword queries -2015 18) Co-extracting opinion targets and opinion words from online reviews based on the word alignment model-2015 19) Lossless selection views under conditional domain constraints-2015 20) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage-2015 21) A query approach for influence maximization on specific users in social networks-2015 22) Progressive duplicate detection-2015 23) Gdcluster:A general decentralized clustering algorithm-2015 24) Range aggregation with set selection-2014 25) Facilitating document annotation using content and querying value-2014 26) A group incremental approach to feature selection applying rough set technique-2014 27) Route-saver: leveraging route apis for accurate and efficient query processing at location- based services-2014 28) Classifier ensembles with the extended space forest-2014 29) Decision trees for mining data streams based on the gaussian approximation-2014 30) Privacy preserving and content protecting location based queries-2014
  • 11. 31) Learning conditional preference networks from inconsistent examples-2014 32) Fast nearest neighbor search with keywords-2014 33) Discovering the top-k unexplained sequences in time-stamped observation data-2014 34) Effective and efficient clustering methods for correlated probabilistic graphs-2014 35) Core: a context-aware relation extraction method for relation completion-2014 36) Lars: an efficient and scalable location=aware recommender system-2014 37) Highly comparative feature-based time-series classification-2014 38) Keyword query routing-2014 39) Secure mining of association rules in horizontally distributed databases-2014 40) Personalized mobile search engine-2013 41) Web system upgrading with transaction failure and strategic customers 42) Traffic pattern based content leakage detection for trusted content delivery networks Software Engineering 1) Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection - 2018 2) The Impact Of API Change and Fault-Proneness On The User Ratings of Android Apps-2015 3) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault- Proneness Prediction? An empirical Study-2015 4) ?Using Declarative Specification To Improve the Understanding, Extensibility and Comparison of Model-Interference algorithms-2015 5) An Observe-Model-Exercise* Paradigm to Test event-Driven Systems with Undetermined Input Spaces-2014 6) Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013 7) Centroidal Voronoi Tessellations—A New Approach to Random Testin-2013 8) Test Case-Aware Combinatorial Testing-2013 Information security and forensics 1) ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated – 2017 2) Fast detection of transformed data leaks -2016 3) Privacy-Preserving Detection Of Sensitive Data Exposure-2015 4) On the Use of Client Identity Information for Face Anti Spoofing-2015
  • 12. 5) Provable multi-copy Dynamic Data Possession in Cloud Computing Systems-2015 6) On the Secrecy Rate Region Of Multiple –Access Wiretap Channel With Non Causal Side Information -2015 7) Privacy-Preserving Authenticated Key-Exchange Over Internet-2014 8) Optimal Probabilistic Encryption for Secure Detection in WSN-2014 9) Top-k query Result Completeness Verification in Tiered SensorNetworks-2014 10) A Probabilistic Model of Visual Cryptography-2012 Parallel and Distributed Systems 1) Magic Train Design of Measurement Methods Against Bandwidth Inflation Attacks-2018 2) Secure Data Retrieval For Decentralized Distribution tolerant Military Networks -2016 3) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016 4) Trust-Based Service Management for Social Internet Of Things Systems-2015 5) COMIC: Cost Optimization for Internet Content Multihoming-2014 6) Learning-Based Uplink Interference Management in 4g LTE Cellular Systems-2014 NON – IEEE Projects Dot Net(Asp.Net,C#.Net) - M.Sc(CS & IT),MCA 1) Easy SQL Query for Non IT Manager 2) Leave Management 3) Flight Management 4) Budget Approval System 5) Consumer Market Basket Analysis For Consumer Correct Decision 6) Multiple Password Authentication 7) Nutraceuticals Management System 8) Predicting User Behavior Using Web Mining 9) Courier Tracking System 10) Ensuring Data Security In Cloud Computing 11) Metro Train Smart Card Recharge System 12) Fireworks Billing 13) Public Web Status Monitoring Systems 14) Task Management System 15) College Application Form 16) Guest Information And Feedback Systems 17) Web Traffic Analyzer And Report Generation
  • 13. 18) Exam Seating Arrangement 19) Data Confidentiality In Health Care Systems 20) Information Leak Detection And Prevention 21) Zero-Knowledge Proof System On Outsourcing Cloud 22) Green Planet Awareness 23) Implementation And Validating Environmental And Health 24) Loan Online Application 25) Modern Agriculture Development System 26) Modern Municipal Corporation. 27) Nearest Shopping Location Identification Systems 28) Plant Shopping On Web 29) Product Market Manipulations On Asian Stock Market 30) Project Work Tracking System 31) Reporting Online Media News Systems 32) Vendor Information System For Shiping 33) Time To Time Stock Market Updater And Monitoring System 34) Tollgate Management Systems 35) Transport Management System 36) Scheduling Operation With Facility Management For Logistic System 37) Defect Tracking For Improving Product Quality And Productivity 38) Ensuring Data Security In Cloud Computing 39) Constructing E-Tourism 40) Consumer Market Basket Analysis For Consumer Correct Decision 41) Data Confidentiality On Health-Care Information System 42) Data Mining Analysis On Eb Bill System 43) Human Expertise Search Engine 44) I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine 45) Predicting Users Behaviors Using Web Mining 46) Product Marketing Analysis On Public Opinion 47) Ultimate Location Information For Given Range 48) Vendor Information System For Shiping 49) Web Based Book Publishing System 50) Web User Service Management System 51) Inventory Library Management System 52) New Generation Of Community Certificate
  • 14. 53) Web Based E-Auction System 54) Exam Scheduler 55) Budget Approval System 56) Data Theft Attack 57) Orphan Home Management 58) Vehicle Sales And Services Management Systems 59) School Management Systems 60) Monitoring Loan Application Processing System 61) Data Leakage Detection 62) Graphical Password Authentication System 63) Fast Nearest Search 64) Pmse: A Personalized Mobile Search Engine 65) Inventory Management-Printing Press 66) Hostel Management System 67) Advertising Agencies 68) Hospital Medicine Supply System 69) Global Employee Management System 70) Industrial Manpower Resource Organizer 71) Real Estate Management Systems. 72) Pension Management System 73) Key Word Query Routing 74) Office Automation In Computer Center 75) Printing Press Management System 76) Personal Health Care Record Management System 77) Vehicle Service Management 78) Web Based Sms Application 79) Automated Transport System For Travel Agencies 80) Quotation Controlling Process Through The Web 81) Welfare Schemes For A Cross Section Of The Society From Time To Time 82) Detecting Fraud On Vehicle Insurance System 83) Auditing Data Integrity And Data Storage Using Cloud 84) Marriage Assistance System 85) Cab Management Systems 86) Efficient Authentication For Mobile And Pervasive Computing 87) University Mark Schedular
  • 15. 88) Student and staff interaction 89) Online smart vehicle parking system 90) Automatic time table generation 91) Pharmacy management system 92) Online admission system 93) Easy leave ***We can implement your own projects and project Ideas***
  • 16. Android App Projects 1) Android Application For Alert Railway Station 2) Attendance-System-Android Application 3) Campus Recruitment System 4) Doctor Appointment App 5) Electronics Shop Portal 6) Employment Office Management System 7) Gps For Emergency Ambulance 8) Hostel Management System 9) Mobile Shop Portal 10) Online Blood Bank 11) Online Food Order System – Foodoo 12) Passport And Aadhar Card Generation Using Android Application 13) Privacy-Preserving Location Sharing Services For Social Networks 14) Rural And Panchayat Development Application 15) School Management System 16) Swash Bharat App 17) Online Voting System 18) Chennai Local Train Timings App 19) Biometric Mechanism For Enhanced Security Of Online Transaction On Android System 20) Party Hall Booking 21) Indian Recipes 22) Student staff Interaction System. We can implement your own projects and project Ideas  Complete Guidance  On Time Completion  Excellent Support  Project Documentation  Own Idea Implementation  For More Titles and any project related  quires Contact @M:7812045575  E : Phoeniixsystems@gmail.com