Software Project List
(Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET, PHP, Python &Android
Projects)
Project List 2018-2019
Software Projects
Application Projects
IEEE Projects
Android Projects
PHP Projects
Python Projects
IEEE Project Domains
Networking*Mobile Computing
Cloud Computing*Big Data
Network Security *Data Mining
Dependable and Secure Computing
Knowledge and Data Engineering
Web Mining
Information Forensics and Security
Software Engineering
Image Processing
IEEE 2018-19
Java Projects
Java / J2EE
Knowledge and Data Mining
1) Automated Phrase Mining from Massive Text Corpora -2018
2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018
3) Complementary Aspect-based Opinion Mining -2018
4) A Cost Model for SPARK SQL -2018
5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective-2018
6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018
7) Search Result Diversity Evaluation based on Intent Hierarchies -2018
8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018
9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018
10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds
11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018
12) Online Product Quantization -2018
13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018
14) Reverse k Nearest Neighbor Search over Trajectories -2018
15) Search Rank Fraud and Malware Detection in Google Play -2017
16) Designing High Performance Web-Based Computing Services to Promote
Telemedicine Database Management System -2017
17) Computing Semantic Similarity of Concepts in Knowledge Graphs -2017
18) Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification –
2017
19) Crowdsourcing for Top-K Query Processing over Uncertain Data -2016
20) Data mining for automated personality classification-2016
21) Distributed Multi-Agent Online Learning Based on Global Feedback-performance and
22) convergence of multi agent learning -2016
23) GDCluster: A General Decentralized Clustering Algorithm -2016
24) K Nearest Neighbour Joins for Big Data on Map Reduce : A theoretical and
25) experimental analysis -2016
26) K-Subspaces Quantization for Approximate Nearest Neighbor Search -2016
27) Nearest Keyword Set Search in Multi-Dimensional Datasets -2016
28) Quality-Aware Sub graph Matching Over inconsistent Probabilistic graph data bases-2016
29) Scalable daily human behavioral pattern mining from multivariable temporal data-
2016
30) Progressive Duplicate Detection - 2015
31) Keyword Search Over Probabilistic RDF Graphs- 2015
32) k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational
Data- 2015
33) LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015
34) GFilter: A General Gram Filter for String Similarity Search - 2015
35) Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014
36) Range Aggregation With Set Selection-2014
37) Facilitating Document Annotation Using Content and Querying Value-2014
38) Automatic Itinerary Planning for Traveling Services-2014
39) Adaptive Preprocessing for Streaming Data-2014
40) Optimized Cartesian K-Means-2014
41) A Group Incremental Approach to Feature Selection Applying Rough Set Technique-
2014
42) Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at
Location-Based Services-2014
43) Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
44) Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-
2014
45) An Air Index for Spatial Query Processing in Road Networks-2014
46) An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014
47) Extended XML Tree Pattern Matching: Theories and Algorithms-2011
Big Data
1) A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection
and Word Embeddings -2018
2) Automated Phrase Mining from Massive Text Corpora -2018
3) 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks -2018
4) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining-2018
5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective-2018
6) A Meta Path based Method for Entity Set Expansion in Knowledge Graph-2018
7) Search Result Diversity Evaluation based on Intent Hierarchies-2018
8) Emotion Recognition on Twitter: Comparative Study and Training a Unison Model -2018
9) Detecting and Preventing Cyber Insider Threats: A Survey-2018
10) Attribute Based Storage Supporting Secure De duplication of Encrypted Data in Cloud 2017
11) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
12) K Nearest Neighbor Joins for Big Data on Map Reduce : A theoretical and experimental
analysis-2016
13) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers -2014
Cloud Computing
1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018
2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based
Encryption - 2018
3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data
Centers - 2018
4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018
5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018
6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server -
2018
7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information
Hiding for Secure Cloud Storage -2018
8) Information leakage in cloud data warehouses -2018
9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in
Cloud Storage -2018
10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018
11) Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server -2017
12) Securing Cloud Data under Key Exposure -2017
13) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
14) A scalable data chunk similarity based compression approach for efficient big sensing data
Processing on cloud -2016
15) Analysis of Classical Encryption Techniques in Cloud Computing -2016
16) DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments -2016
17) Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
2015
18) Verifiable Auditing for Outsourced Database in Cloud Computing - 2015
19) Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data
Centers- 2015
20) Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds -
2015
21) ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
22) Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014
23) Security as a Service Model for Cloud Environment-2014
24) Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems
25) Privacy Preserving Delegated Access Control in public clouds-2013
26) Security and privacy-enhancing multi cloud architectures-2013
27) Toward privacy-assured and searchable cloud data storage services-2013
28) Ensuring Data Storage Security in Cloud Computing-2013
Information security and forensics
1) A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption-
2018
2) Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry
Approach - 2016
3) Effective Data Access Control for Multi authority Cloud Storage Systems-2015
4) Privacy-Preserving Detection of Sensitive Data Exposure-2015
5) On the Use of Client Identity Information for Face Antispoofing -2015
6) On the Security of Trustee-Based Social Authentications -2014
Parallel and Distributed Systems
1) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016
2) Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-
3) 2015
4) Deleting Secret Data with Public Verifiability-2015
5) DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade
6) Attacks -2015
7) Trust-based Service Management for Social Internet of Things Systems-2015
8) Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel
9) Wireless Networks-2014
10) The Client Assignment Problem for Continuous Distributed Interactive Applications:
Analysis, Algorithms, and Evaluation-2014
11) BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
12) Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-
2013
13) Covering Points of Interest with Mobile Sensors-2013
14) Detection and Localization of Multiple Spoofing Attacks-2013.
Software Engineering
1) The role Of Ethnographic studies in empirical software engineering -2016
2) RELAI Testing : A technique to assess and improve software reliability -2016
3) Relation between Combinations of Personal Characteristic Types and Educational
Effectiveness for a Controlled Learning Course -2016
4) Automated Checking of Conformance to Requirements Templates using Natural Language
Processing-2015
5) Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015
6) Estimating Computational Requirements in Multi-Threaded Applications -2015
7) The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015
8) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An Empirical Study -2015
NON –IEEE Projects
Java / J2EE -M.Sc(CS & IT),MCA
1) FOC Management System For TNEB –Abstracts
2) Online Loan Application-Abstract
3) Plant Shopping On Web
4) E - Intelli Cabs
5) Nutraceuticals Management System
6) Placement Management System
7) Time Table Generator
8) Green Planet Awareness
9) Implementation And Validating Environmental And Health
10) Loan Online Application
11) Management System In Metro Train
12) Modern Agriculture Development System
13) Modern Municipal Corporation.
14) Nearest Shopping Location Identification Systems
15) Product Market Manipulations On Asian Stock Market
16) Project Work Tracking System
17) Vendor Information System For Shipping
18) Transport Management System
19) E-Knowledge Wireless Health Care System
20) Adaptive Intrusion Detection System
21) Scheduling Operation With Facility Management For Logistic System
22) Defect Tracking For Improving Product Quality And Productivity
23) Ensuring Data Security In Cloud Computing
24) A New Algorithm For Three Party Quantum Key Distribution
25) Automatic Question Paper Generation
26) Automatic End Semester Time Table Generation
27) Learn To Personalized Image Search From Photo Sharing Web Sites
28) Material Management System
29) Multi Server Communication In Distributed Management System
30) Online Task Management System
31) Optimal Dynamic Path Restoration In Mesh Network
32) Placement Management System
33) Transfer Certificate Issuing System
34) Query Matching Process Using Xml Tree Pattern
35) Scheduled Operations Resource Facilitating System
36) Tollgate Management Systems.
** We can implement your own projects and project Ideas **
Complete Guidance
On Time Completion
Excellent Support
Project Documentation
Own Idea Implementation
For More Titles and any project related
Quires Contact @M:7812045575
E : Phoeniixsystems@gmail.com
IEEE – 2018-2019
Dot Project Titles
Cloud Computing
1) A Practical Public Key Encryption Scheme Based on Learning Parity with Noise-2018
2) Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based
Encryption - 2018
3) An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data
Centers - 2018
4) Budget and Deadline Aware e-Science Workflow Scheduling in Clouds -2018
5) CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics -2018
6) Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server –
2018
7) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information
Hiding for Secure Cloud Storage -2018
8) Information leakage in cloud data warehouses -2018
9) Lightweight and Privacy-Preserving Delegable Proofs of Storage with Data Dynamics in
Cloud Storage -2018
10) Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing-2018
11) Securing Cloud Data under Key Exposure -2017
12) Privacy Protection based Access Control Scheme in Cloud-based Services -2017
13) Attribute-Based Data sharing Scheme Revisited in Cloud Computing. -2016
14) Overflow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds –
2016
15) Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in
Public Cloud -2016
16) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing -2016
17) A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
Knowledge and Data Mining
1) Automated Phrase Mining from Massive Text Corpora -2018
2) An Efficient Method for High Quality and Cohesive Topical Phrase Mining -2018
3) Complementary Aspect-based Opinion Mining -2018
4) A Cost Model for SPARK SQL -2018
5) Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective-2018
6) A Two-Phase Algorithm for Differentially Private Frequent Sub graph Mining -2018
7) Search Result Diversity Evaluation based on Intent Hierarchies -2018
8) Comments Mining With TF-IDF: The Inherent Bias and Its Removal -2018
9) A Correlation-based Feature Weighting Filter for Naive Bayes -2018
10) Efficient Vertical Mining of High Average-Utility Item sets based on Novel Upper-Bounds
11) Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing -2018
12) Online Product Quantization -2018
13) Range-based Nearest Neighbor Queries with Complex-shaped Obstacles -2018
14) Relaxed functional dependencies.-2016
15) Discovery of ranking fraud for mobile applications.- 2015
16) Mining user-aware rare sequential topic patterns in document streams-2016
17) Authentication of moving top-k spatial keyword queries -2015
18) Co-extracting opinion targets and opinion words from online reviews based on the word
alignment model-2015
19) Lossless selection views under conditional domain constraints-2015
20) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through
blind storage-2015
21) A query approach for influence maximization on specific users in social networks-2015
22) Progressive duplicate detection-2015
23) Gdcluster:A general decentralized clustering algorithm-2015
24) Range aggregation with set selection-2014
25) Facilitating document annotation using content and querying value-2014
26) A group incremental approach to feature selection applying rough set technique-2014
27) Route-saver: leveraging route apis for accurate and efficient query processing at location-
based services-2014
28) Classifier ensembles with the extended space forest-2014
29) Decision trees for mining data streams based on the gaussian approximation-2014
30) Privacy preserving and content protecting location based queries-2014
31) Learning conditional preference networks from inconsistent examples-2014
32) Fast nearest neighbor search with keywords-2014
33) Discovering the top-k unexplained sequences in time-stamped observation data-2014
34) Effective and efficient clustering methods for correlated probabilistic graphs-2014
35) Core: a context-aware relation extraction method for relation completion-2014
36) Lars: an efficient and scalable location=aware recommender system-2014
37) Highly comparative feature-based time-series classification-2014
38) Keyword query routing-2014
39) Secure mining of association rules in horizontally distributed databases-2014
40) Personalized mobile search engine-2013
41) Web system upgrading with transaction failure and strategic customers
42) Traffic pattern based content leakage detection for trusted content delivery networks
Software Engineering
1) Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism
Detection - 2018
2) The Impact Of API Change and Fault-Proneness On The User Ratings of Android Apps-2015
3) Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An empirical Study-2015
4) ?Using Declarative Specification To Improve the Understanding, Extensibility and
Comparison of Model-Interference algorithms-2015
5) An Observe-Model-Exercise* Paradigm to Test event-Driven Systems with Undetermined
Input Spaces-2014
6) Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013
7) Centroidal Voronoi Tessellations—A New Approach to Random Testin-2013
8) Test Case-Aware Combinatorial Testing-2013
Information security and forensics
1) ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated –
2017
2) Fast detection of transformed data leaks -2016
3) Privacy-Preserving Detection Of Sensitive Data Exposure-2015
4) On the Use of Client Identity Information for Face Anti Spoofing-2015
5) Provable multi-copy Dynamic Data Possession in Cloud Computing Systems-2015
6) On the Secrecy Rate Region Of Multiple –Access Wiretap Channel With Non Causal Side
Information -2015
7) Privacy-Preserving Authenticated Key-Exchange Over Internet-2014
8) Optimal Probabilistic Encryption for Secure Detection in WSN-2014
9) Top-k query Result Completeness Verification in Tiered SensorNetworks-2014
10) A Probabilistic Model of Visual Cryptography-2012
Parallel and Distributed Systems
1) Magic Train Design of Measurement Methods Against Bandwidth Inflation Attacks-2018
2) Secure Data Retrieval For Decentralized Distribution tolerant Military Networks -2016
3) An Efficient Privacy-Preserving Ranked Keyword Search Method -2016
4) Trust-Based Service Management for Social Internet Of Things Systems-2015
5) COMIC: Cost Optimization for Internet Content Multihoming-2014
6) Learning-Based Uplink Interference Management in 4g LTE Cellular Systems-2014
NON – IEEE Projects
Dot Net(Asp.Net,C#.Net) - M.Sc(CS & IT),MCA
1) Easy SQL Query for Non IT Manager
2) Leave Management
3) Flight Management
4) Budget Approval System
5) Consumer Market Basket Analysis For Consumer Correct Decision
6) Multiple Password Authentication
7) Nutraceuticals Management System
8) Predicting User Behavior Using Web Mining
9) Courier Tracking System
10) Ensuring Data Security In Cloud Computing
11) Metro Train Smart Card Recharge System
12) Fireworks Billing
13) Public Web Status Monitoring Systems
14) Task Management System
15) College Application Form
16) Guest Information And Feedback Systems
17) Web Traffic Analyzer And Report Generation
18) Exam Seating Arrangement
19) Data Confidentiality In Health Care Systems
20) Information Leak Detection And Prevention
21) Zero-Knowledge Proof System On Outsourcing Cloud
22) Green Planet Awareness
23) Implementation And Validating Environmental And Health
24) Loan Online Application
25) Modern Agriculture Development System
26) Modern Municipal Corporation.
27) Nearest Shopping Location Identification Systems
28) Plant Shopping On Web
29) Product Market Manipulations On Asian Stock Market
30) Project Work Tracking System
31) Reporting Online Media News Systems
32) Vendor Information System For Shiping
33) Time To Time Stock Market Updater And Monitoring System
34) Tollgate Management Systems
35) Transport Management System
36) Scheduling Operation With Facility Management For Logistic System
37) Defect Tracking For Improving Product Quality And Productivity
38) Ensuring Data Security In Cloud Computing
39) Constructing E-Tourism
40) Consumer Market Basket Analysis For Consumer Correct Decision
41) Data Confidentiality On Health-Care Information System
42) Data Mining Analysis On Eb Bill System
43) Human Expertise Search Engine
44) I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine
45) Predicting Users Behaviors Using Web Mining
46) Product Marketing Analysis On Public Opinion
47) Ultimate Location Information For Given Range
48) Vendor Information System For Shiping
49) Web Based Book Publishing System
50) Web User Service Management System
51) Inventory Library Management System
52) New Generation Of Community Certificate
53) Web Based E-Auction System
54) Exam Scheduler
55) Budget Approval System
56) Data Theft Attack
57) Orphan Home Management
58) Vehicle Sales And Services Management Systems
59) School Management Systems
60) Monitoring Loan Application Processing System
61) Data Leakage Detection
62) Graphical Password Authentication System
63) Fast Nearest Search
64) Pmse: A Personalized Mobile Search Engine
65) Inventory Management-Printing Press
66) Hostel Management System
67) Advertising Agencies
68) Hospital Medicine Supply System
69) Global Employee Management System
70) Industrial Manpower Resource Organizer
71) Real Estate Management Systems.
72) Pension Management System
73) Key Word Query Routing
74) Office Automation In Computer Center
75) Printing Press Management System
76) Personal Health Care Record Management System
77) Vehicle Service Management
78) Web Based Sms Application
79) Automated Transport System For Travel Agencies
80) Quotation Controlling Process Through The Web
81) Welfare Schemes For A Cross Section Of The Society From Time To Time
82) Detecting Fraud On Vehicle Insurance System
83) Auditing Data Integrity And Data Storage Using Cloud
84) Marriage Assistance System
85) Cab Management Systems
86) Efficient Authentication For Mobile And Pervasive Computing
87) University Mark Schedular
88) Student and staff interaction
89) Online smart vehicle parking system
90) Automatic time table generation
91) Pharmacy management system
92) Online admission system
93) Easy leave
***We can implement your own projects and project Ideas***
Android App Projects
1) Android Application For Alert Railway Station
2) Attendance-System-Android Application
3) Campus Recruitment System
4) Doctor Appointment App
5) Electronics Shop Portal
6) Employment Office Management System
7) Gps For Emergency Ambulance
8) Hostel Management System
9) Mobile Shop Portal
10) Online Blood Bank
11) Online Food Order System – Foodoo
12) Passport And Aadhar Card Generation Using Android Application
13) Privacy-Preserving Location Sharing Services For Social Networks
14) Rural And Panchayat Development Application
15) School Management System
16) Swash Bharat App
17) Online Voting System
18) Chennai Local Train Timings App
19) Biometric Mechanism For Enhanced Security Of Online Transaction On Android System
20) Party Hall Booking
21) Indian Recipes
22) Student staff Interaction System.
We can implement your own projects and project Ideas
Complete Guidance
On Time Completion
Excellent Support
Project Documentation
Own Idea Implementation
For More Titles and any project
related
quires Contact @M:7812045575
E : Phoeniixsystems@gmail.com