Menu

IEEE BASED 2019 - 2020 JAVA PROJECT DOMAINS


Java Project Titles

    Cloud Computing

  1. Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
  2. Toward Cloud-Based Distributed Interactive Applications: Measurement, Modeling, and Analysis
  3. Dummy Generation Based on User-Movement Estimation for Location Privacy Protection
  4. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
  5. Knowledge of Data Engineering

  6. A Data-Driven Knowledge Acquisition System: An End-to-End Knowledge Engineering Process for Generating Production Rules
  7. Characteristics Analysis of Data From News and Social Network Services
  8. An Effective High Threating Alarm Mining Method for Cloud Security Management
  9. Temporal enhanced sentence-level attention model for hashtag recommendation
  10. Web Mining

  11. Deep Multi-Layer Perceptron Classifier for Behavior Analysis to Estimate Parkinson's Disease Severity Using Smartphones
  12. Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites
  13. A New Weighted Algorithm Based on the Uneven Spatial Resolution of RSSI for Indoor Localization
  14. Networking

  15. Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption
  16. An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
  17. Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model
  18. A Practical Public Key Encryption Scheme Based on Learning Parity With Noise
  19. Network Security

  20. Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
  21. Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks
  22. IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
  23. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
  24. Information and Forensics Security

  25. Fake Colorized Image Detection
  26. Efficient Encrypted Images Filtering and Transform Coding with Walsh-Hadamard Transform and Parallelization
  27. Parallel and Distributed System

  28. Location Privacy and Its Applications: A Systematic Study
  29. Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
  30. Decentralized grid scheduling approach based on multi- agent reinforcement learning and gossip mechanism
  31. Web Service

  32. Comparative Analysis of Energy-Efficient Scheduling Algorithms for Big Data Applications
  33. Bigdata

  34. Big Data Analysis-based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
  35. Multi-objective Optimization for Virtual Machine Allocation and Replica Placement in Virtualized Hadoop
  36. Data Processing in Cyber-Physical-Social Systems Through Edge Computing
  37. Image Processing

  38. Predicting CT Image from MRI Data through Feature Matching with Learned Nonlinear Local Descriptors
  39. Histopathological whole slide image analysis using context-based CBIR

  40. IEEE BASED 2019 - 2020 DOTNET PROJECT DOMAINS


DotNet Project Titles

    Cloud Computing

  1. Multilateral Security Architecture for Virtualization Platform in Multi-tenancy Cloud Environment
  2. Joint Pricing and Security Investment for Cloud-Insurance: A Security Interdependency Perspective
  3. Joint Minimization of the Energy Costs from Computing, Data Transmission, and Migrations in Cloud Data Centers
  4. Towards Secure Approximate k-Nearest Neighbor Query Over Encrypted High-Dimensional Data
  5. Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing
  6. Mobile Computing

  7. Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination
  8. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
  9. Information and Forensics Security

  10. Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
  11. T2FA: Transparent Two-Factor Authentication
  12. Privacy-preserving Indexing and Query Processing for Secure Dynamic
  13. Cloud Storage

  14. Cognitive Approach for Location Privacy Protection
  15. A Differentiated Caching Mechanism to Enable Primary Storage Deduplication in Clouds
  16. Knowledge and Data Engineering

  17. Efficient and Secure Top-k Queries with Top Order-Preserving Encryption
  18. Provably Secure Multi-Server Authentication Protocol using Fuzzy Commitment
  19. Networking

  20. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
  21. SEMKC:Secure & Efficient Computation over Outsourced Data Encrypted under Multiple Keys
  22. Dependable And Secure Computing

  23. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
  24. Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
  25. Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage
  26. Semantic-based Compound Keyword Search over Encrypted Cloud Data
  27. Efficient k-Nearest Neighbor Classification over Semantically Secure Hybrid Encrypted Cloud Database
  28. Image Processing

  29. Adaptive Feature Mapping for Customizing Deep Learning Based Facial Expression Recognition Model
  30. Spatial–Temporal Recurrent Neural Network for Emotion Recognition
  31. Hashing with Angular Reconstructive Embeddings
  32. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator
  33. Bigdata

  34. Big Data Analysis-based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
  35. Multi-objective Optimization for Virtual Machine Allocation and Replica Placement in Virtualized Hadoop
  36. Data Processing in Cyber-Physical-Social Systems Through Edge Computing
  37. Image Processing

  38. Predicting CT Image from MRI Data through Feature Matching with Learned Nonlinear Local Descriptors
  39. Histopathological whole slide image analysis using context-based CBIR
  40. Android Project Titles

    1. Smart Bus Pass Management System
    2. Employee Management System
    3. Great Indian Legal Advisory And Smart Lawyer System.
    4. Smart Wearable Hand Device For Sign Language Interpretation System With Sensors Fusion
    5. Farm And Land: Farmer Auction System
    6. Streamline Customer Resourcing And Relationship Management System
    7. Speak It Up: Speech To Text And Text To Speech Conversion App
    8. Spotcrime Report Detection App
    9. Automated Blood Bank System Using Web Services
    10. A Framework For Real Time Emotion Recognition Based On Human ans Using Pervasive Device
    11. Dynamic College Parent Interaction Portal System
    12. Secure Image Lbp Feature Extraction In Cloudbased Smart Campus
    13. Secure Electro-Voting and Social Governance System.
    14. Integrated Library Management System.
    15. Secure Password-based Authentication Scheme: CG Based
    16. Ubiquitous Attendance Monitoring System
    17. Fooducate: A Food Switch App with Barcode Scanner.
    18. Implementation Of Real-Time Scanner Java Language Text With Mobile Vision Android Based
    19. What Do Software Developers Need To Know To Build Secure Energy-Efficient Android Applications?
    20. Droidensemble: Detecting Android Malicious Applications With Ensemble Of String And Structural Static Features
    21. Data-Driven 3-D Human Body Customization With A Mobile Device
    22. A Comparison Of Android Reverse Engineering Tools Via Program Behaviours Validation Based On Intermediate Languages Transformation
    23. Real-Time Behavior Analysis And Identification For Android Application
    24. A Novel Dynamic Android Malware Detection System With Ensemble Learning
    25. A Real-Time, Automated And Privacy-Preserving Mobile Emergency-Medical-Service Network For Informing The Closest Rescuer To Rapidly Support Mobile-Emergency-Call Victims
    26. Secure Identity-Based Data Sharing And Profile Matching For Mobile Healthcare Social Networks In Cloud Computing
    27. User Conventional Root Detection For Indoor Mall
    28. Permission Based Android Malware Detection With Multilayer Perceptron
    29. An Android-Based Iot System For Vehicle Monitoring And Diagnostic
    30. Senseio: Realistic Ubiquitous Indoor Outdoor Detection System Using Smartphones
    31. Android Malware Familial Classification And Representative Sample Selection Via Frequent Subgraph Analysis


Clients

Enquiry