Anúncio

ieee projects in chennai 2018-2019

Phoenix Systems
16 de Aug de 2018
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
Anúncio
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
Anúncio
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
Anúncio
ieee projects in chennai 2018-2019
ieee projects in chennai 2018-2019
Próximos SlideShares
Readymade project available for be b tech me mtech final year project list@ 9...Readymade project available for be b tech me mtech final year project list@ 9...
Carregando em ... 3
1 de 16
Anúncio

Mais conteúdo relacionado

Similar a ieee projects in chennai 2018-2019(20)

Anúncio

ieee projects in chennai 2018-2019

  1. Software Project List (Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET, PHP, Python &Android Projects) Project List 2018-2019 Software Projects Application Projects IEEE Projects Android Projects PHP Projects Python Projects
  2. IEEE Project Domains Networking*Mobile Computing Cloud Computing*Big Data Network Security *Data Mining Dependable and Secure Computing Knowledge and Data Engineering Web Mining Information Forensics and Security Software Engineering Image Processing
  3. IEEE 2018-19 Java Projects Java / J2EE Knowledge and Data Mining 1) Automated Phrase Mining from Massive Text Corpora -2018 2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018 3) Complementary Aspect-based Opinion Mining -2018 4) A Cost Model for SPARK SQL -2018 5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective-2018 6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018 7) Search Result Diversity Evaluation based on Intent Hierarchies -2018 8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018 9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018 10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds 11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018 12) Online Product Quantization -2018 13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018 14) Reverse k Nearest Neighbor Search over Trajectories -2018 15) Search Rank Fraud and Malware Detection in Google Play -2017 16) Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System -2017 17) Computing Semantic Similarity of Concepts in Knowledge Graphs -2017 18) Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification – 2017 19) Crowdsourcing for Top-K Query Processing over Uncertain Data -2016 20) Data mining for automated personality classification-2016 21) Distributed Multi-Agent Online Learning Based on Global Feedback-performance and 22) convergence of multi agent learning -2016 23) GDCluster: A General Decentralized Clustering Algorithm -2016 24) K Nearest Neighbour Joins for Big Data on Map Reduce : A theoretical and 25) experimental analysis -2016 26) K-Subspaces Quantization for Approximate Nearest Neighbor Search -2016 27) Nearest Keyword Set Search in Multi-Dimensional Datasets -2016 28) Quality-Aware Sub graph Matching Over inconsistent Probabilistic graph data bases-2016
  4. 29) Scalable daily human behavioral pattern mining from multivariable temporal data- 2016 30) Progressive Duplicate Detection - 2015 31) Keyword Search Over Probabilistic RDF Graphs- 2015 32) k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015 33) LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015 34) GFilter: A General Gram Filter for String Similarity Search - 2015 35) Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014 36) Range Aggregation With Set Selection-2014 37) Facilitating Document Annotation Using Content and Querying Value-2014 38) Automatic Itinerary Planning for Traveling Services-2014 39) Adaptive Preprocessing for Streaming Data-2014 40) Optimized Cartesian K-Means-2014 41) A Group Incremental Approach to Feature Selection Applying Rough Set Technique- 2014 42) Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services-2014 43) Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014 44) Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data- 2014 45) An Air Index for Spatial Query Processing in Road Networks-2014 46) An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014 47) Extended XML Tree Pattern Matching: Theories and Algorithms-2011 Big Data 1) A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings -2018 2) Automated Phrase Mining from Massive Text Corpora -2018 3) 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks -2018 4) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining-2018 5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective-2018 6) A Meta Path based Method for Entity Set Expansion in Knowledge Graph-2018 7) Search Result Diversity Evaluation based on Intent Hierarchies-2018
  5. 8) Emotion Recognition on Twitter: Comparative Study and Training a Unison Model -2018 9) Detecting and Preventing Cyber Insider Threats: A Survey-2018 10) Attribute Based Storage Supporting Secure De duplication of Encrypted Data in Cloud 2017 11) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds- 2016 12) K Nearest Neighbor Joins for Big Data on Map Reduce : A theoretical and experimental analysis-2016 13) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers -2014 Cloud Computing 1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018 2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption - 2018 3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers - 2018 4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018 5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018 6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server - 2018 7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage -2018 8) Information leakage in cloud data warehouses -2018 9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in Cloud Storage -2018 10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018 11) Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server -2017 12) Securing Cloud Data under Key Exposure -2017 13) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds- 2016 14) A scalable data chunk similarity based compression approach for efficient big sensing data Processing on cloud -2016 15) Analysis of Classical Encryption Techniques in Cloud Computing -2016 16) DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments -2016 17) Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2015
  6. 18) Verifiable Auditing for Outsourced Database in Cloud Computing - 2015 19) Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers- 2015 20) Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds - 2015 21) ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015 22) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014 23) Security as a Service Model for Cloud Environment-2014 24) Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems 25) Privacy Preserving Delegated Access Control in public clouds-2013 26) Security and privacy-enhancing multi cloud architectures-2013 27) Toward privacy-assured and searchable cloud data storage services-2013 28) Ensuring Data Storage Security in Cloud Computing-2013 Information security and forensics 1) A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption- 2018 2) Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach - 2016 3) Effective Data Access Control for Multi authority Cloud Storage Systems-2015 4) Privacy-Preserving Detection of Sensitive Data Exposure-2015 5) On the Use of Client Identity Information for Face Antispoofing -2015 6) On the Security of Trustee-Based Social Authentications -2014 Parallel and Distributed Systems 1) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016 2) Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things- 3) 2015 4) Deleting Secret Data with Public Verifiability-2015 5) DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade 6) Attacks -2015 7) Trust-based Service Management for Social Internet of Things Systems-2015 8) Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel 9) Wireless Networks-2014 10) The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation-2014
  7. 11) BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014 12) Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment- 2013 13) Covering Points of Interest with Mobile Sensors-2013 14) Detection and Localization of Multiple Spoofing Attacks-2013. Software Engineering 1) The role Of Ethnographic studies in empirical software engineering -2016 2) RELAI Testing : A technique to assess and improve software reliability -2016 3) Relation between Combinations of Personal Characteristic Types and Educational Effectiveness for a Controlled Learning Course -2016 4) Automated Checking of Conformance to Requirements Templates using Natural Language Processing-2015 5) Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015 6) Estimating Computational Requirements in Multi-Threaded Applications -2015 7) The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015 8) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault- Proneness Prediction? An Empirical Study -2015 NON –IEEE Projects Java / J2EE -M.Sc(CS & IT),MCA 1) FOC Management System For TNEB –Abstracts 2) Online Loan Application-Abstract 3) Plant Shopping On Web 4) E - Intelli Cabs 5) Nutraceuticals Management System 6) Placement Management System 7) Time Table Generator 8) Green Planet Awareness 9) Implementation And Validating Environmental And Health 10) Loan Online Application 11) Management System In Metro Train 12) Modern Agriculture Development System 13) Modern Municipal Corporation. 14) Nearest Shopping Location Identification Systems 15) Product Market Manipulations On Asian Stock Market
  8. 16) Project Work Tracking System 17) Vendor Information System For Shipping 18) Transport Management System 19) E-Knowledge Wireless Health Care System 20) Adaptive Intrusion Detection System 21) Scheduling Operation With Facility Management For Logistic System 22) Defect Tracking For Improving Product Quality And Productivity 23) Ensuring Data Security In Cloud Computing 24) A New Algorithm For Three Party Quantum Key Distribution 25) Automatic Question Paper Generation 26) Automatic End Semester Time Table Generation 27) Learn To Personalized Image Search From Photo Sharing Web Sites 28) Material Management System 29) Multi Server Communication In Distributed Management System 30) Online Task Management System 31) Optimal Dynamic Path Restoration In Mesh Network 32) Placement Management System 33) Transfer Certificate Issuing System 34) Query Matching Process Using Xml Tree Pattern 35) Scheduled Operations Resource Facilitating System 36) Tollgate Management Systems. ** We can implement your own projects and project Ideas **  Complete Guidance  On Time Completion  Excellent Support  Project Documentation  Own Idea Implementation  For More Titles and any project related  Quires Contact @M:7812045575  E : Phoeniixsystems@gmail.com
  9. IEEE – 2018-2019 Dot Project Titles Cloud Computing 1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018 2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption - 2018 3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers - 2018 4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018 5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018 6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server – 2018 7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage -2018 8) Information leakage in cloud data warehouses -2018 9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in Cloud Storage -2018 10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018 11) Securing Cloud Data under Key Exposure -2017 12) Privacy Protection based Access Control Scheme in Cloud-based Services -2017 13) Attribute-Based Data sharing Scheme Revisited in Cloud Computing. -2016 14) Overflow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds – 2016 15) Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud -2016 16) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing -2016 17) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds- 2016
  10. Knowledge and Data Mining 1) Automated Phrase Mining from Massive Text Corpora -2018 2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018 3) Complementary Aspect-based Opinion Mining -2018 4) A Cost Model for SPARK SQL -2018 5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective-2018 6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018 7) Search Result Diversity Evaluation based on Intent Hierarchies -2018 8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018 9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018 10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds 11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018 12) Online Product Quantization -2018 13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018 14) Relaxed functional dependencies.-2016 15) Discovery of ranking fraud for mobile applications.- 2015 16) Mining user-aware rare sequential topic patterns in document streams-2016 17) Authentication of moving top-k spatial keyword queries -2015 18) Co-extracting opinion targets and opinion words from online reviews based on the word alignment model-2015 19) Lossless selection views under conditional domain constraints-2015 20) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage-2015 21) A query approach for influence maximization on specific users in social networks-2015 22) Progressive duplicate detection-2015 23) Gdcluster:A general decentralized clustering algorithm-2015 24) Range aggregation with set selection-2014 25) Facilitating document annotation using content and querying value-2014 26) A group incremental approach to feature selection applying rough set technique-2014 27) Route-saver: leveraging route apis for accurate and efficient query processing at location- based services-2014 28) Classifier ensembles with the extended space forest-2014 29) Decision trees for mining data streams based on the gaussian approximation-2014 30) Privacy preserving and content protecting location based queries-2014
  11. 31) Learning conditional preference networks from inconsistent examples-2014 32) Fast nearest neighbor search with keywords-2014 33) Discovering the top-k unexplained sequences in time-stamped observation data-2014 34) Effective and efficient clustering methods for correlated probabilistic graphs-2014 35) Core: a context-aware relation extraction method for relation completion-2014 36) Lars: an efficient and scalable location=aware recommender system-2014 37) Highly comparative feature-based time-series classification-2014 38) Keyword query routing-2014 39) Secure mining of association rules in horizontally distributed databases-2014 40) Personalized mobile search engine-2013 41) Web system upgrading with transaction failure and strategic customers 42) Traffic pattern based content leakage detection for trusted content delivery networks Software Engineering 1) Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection - 2018 2) The Impact Of API Change and Fault-Proneness On The User Ratings of Android Apps-2015 3) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault- Proneness Prediction? An empirical Study-2015 4) ?Using Declarative Specification To Improve the Understanding, Extensibility and Comparison of Model-Interference algorithms-2015 5) An Observe-Model-Exercise* Paradigm to Test event-Driven Systems with Undetermined Input Spaces-2014 6) Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013 7) Centroidal Voronoi Tessellations—A New Approach to Random Testin-2013 8) Test Case-Aware Combinatorial Testing-2013 Information security and forensics 1) ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated – 2017 2) Fast detection of transformed data leaks -2016 3) Privacy-Preserving Detection Of Sensitive Data Exposure-2015 4) On the Use of Client Identity Information for Face Anti Spoofing-2015
  12. 5) Provable multi-copy Dynamic Data Possession in Cloud Computing Systems-2015 6) On the Secrecy Rate Region Of Multiple –Access Wiretap Channel With Non Causal Side Information -2015 7) Privacy-Preserving Authenticated Key-Exchange Over Internet-2014 8) Optimal Probabilistic Encryption for Secure Detection in WSN-2014 9) Top-k query Result Completeness Verification in Tiered SensorNetworks-2014 10) A Probabilistic Model of Visual Cryptography-2012 Parallel and Distributed Systems 1) Magic Train Design of Measurement Methods Against Bandwidth Inflation Attacks-2018 2) Secure Data Retrieval For Decentralized Distribution tolerant Military Networks -2016 3) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016 4) Trust-Based Service Management for Social Internet Of Things Systems-2015 5) COMIC: Cost Optimization for Internet Content Multihoming-2014 6) Learning-Based Uplink Interference Management in 4g LTE Cellular Systems-2014 NON – IEEE Projects Dot Net(Asp.Net,C#.Net) - M.Sc(CS & IT),MCA 1) Easy SQL Query for Non IT Manager 2) Leave Management 3) Flight Management 4) Budget Approval System 5) Consumer Market Basket Analysis For Consumer Correct Decision 6) Multiple Password Authentication 7) Nutraceuticals Management System 8) Predicting User Behavior Using Web Mining 9) Courier Tracking System 10) Ensuring Data Security In Cloud Computing 11) Metro Train Smart Card Recharge System 12) Fireworks Billing 13) Public Web Status Monitoring Systems 14) Task Management System 15) College Application Form 16) Guest Information And Feedback Systems 17) Web Traffic Analyzer And Report Generation
  13. 18) Exam Seating Arrangement 19) Data Confidentiality In Health Care Systems 20) Information Leak Detection And Prevention 21) Zero-Knowledge Proof System On Outsourcing Cloud 22) Green Planet Awareness 23) Implementation And Validating Environmental And Health 24) Loan Online Application 25) Modern Agriculture Development System 26) Modern Municipal Corporation. 27) Nearest Shopping Location Identification Systems 28) Plant Shopping On Web 29) Product Market Manipulations On Asian Stock Market 30) Project Work Tracking System 31) Reporting Online Media News Systems 32) Vendor Information System For Shiping 33) Time To Time Stock Market Updater And Monitoring System 34) Tollgate Management Systems 35) Transport Management System 36) Scheduling Operation With Facility Management For Logistic System 37) Defect Tracking For Improving Product Quality And Productivity 38) Ensuring Data Security In Cloud Computing 39) Constructing E-Tourism 40) Consumer Market Basket Analysis For Consumer Correct Decision 41) Data Confidentiality On Health-Care Information System 42) Data Mining Analysis On Eb Bill System 43) Human Expertise Search Engine 44) I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine 45) Predicting Users Behaviors Using Web Mining 46) Product Marketing Analysis On Public Opinion 47) Ultimate Location Information For Given Range 48) Vendor Information System For Shiping 49) Web Based Book Publishing System 50) Web User Service Management System 51) Inventory Library Management System 52) New Generation Of Community Certificate
  14. 53) Web Based E-Auction System 54) Exam Scheduler 55) Budget Approval System 56) Data Theft Attack 57) Orphan Home Management 58) Vehicle Sales And Services Management Systems 59) School Management Systems 60) Monitoring Loan Application Processing System 61) Data Leakage Detection 62) Graphical Password Authentication System 63) Fast Nearest Search 64) Pmse: A Personalized Mobile Search Engine 65) Inventory Management-Printing Press 66) Hostel Management System 67) Advertising Agencies 68) Hospital Medicine Supply System 69) Global Employee Management System 70) Industrial Manpower Resource Organizer 71) Real Estate Management Systems. 72) Pension Management System 73) Key Word Query Routing 74) Office Automation In Computer Center 75) Printing Press Management System 76) Personal Health Care Record Management System 77) Vehicle Service Management 78) Web Based Sms Application 79) Automated Transport System For Travel Agencies 80) Quotation Controlling Process Through The Web 81) Welfare Schemes For A Cross Section Of The Society From Time To Time 82) Detecting Fraud On Vehicle Insurance System 83) Auditing Data Integrity And Data Storage Using Cloud 84) Marriage Assistance System 85) Cab Management Systems 86) Efficient Authentication For Mobile And Pervasive Computing 87) University Mark Schedular
  15. 88) Student and staff interaction 89) Online smart vehicle parking system 90) Automatic time table generation 91) Pharmacy management system 92) Online admission system 93) Easy leave ***We can implement your own projects and project Ideas***
  16. Android App Projects 1) Android Application For Alert Railway Station 2) Attendance-System-Android Application 3) Campus Recruitment System 4) Doctor Appointment App 5) Electronics Shop Portal 6) Employment Office Management System 7) Gps For Emergency Ambulance 8) Hostel Management System 9) Mobile Shop Portal 10) Online Blood Bank 11) Online Food Order System – Foodoo 12) Passport And Aadhar Card Generation Using Android Application 13) Privacy-Preserving Location Sharing Services For Social Networks 14) Rural And Panchayat Development Application 15) School Management System 16) Swash Bharat App 17) Online Voting System 18) Chennai Local Train Timings App 19) Biometric Mechanism For Enhanced Security Of Online Transaction On Android System 20) Party Hall Booking 21) Indian Recipes 22) Student staff Interaction System. We can implement your own projects and project Ideas  Complete Guidance  On Time Completion  Excellent Support  Project Documentation  Own Idea Implementation  For More Titles and any project related  quires Contact @M:7812045575  E : Phoeniixsystems@gmail.com
Anúncio