FINAL YEAR STUDENT PROJECT 2015-2016
ANDROID PROJECT:-
2015 – 2016 IEEE ANDROID PROJECT TITLES
1) A Real-Time Adaptive Algorithm for Video
Streaming over Multiple Wireless Access Networks
2) Catch Me If You Can: Evaluating Android
Anti-Malware against Transformation Attacks
3) Collaborative Policy Administration
4) Context-based Access Control Systems for
Mobile Devices
5) Context-driven, Prescription-Based Personal
Activity Classification: Methodology, Architecture, and End-to-End
Implementation
6) Cooperative Positioning and Tracking in
Disruption Tolerant Networks
7) DELTA++: Reducing
the Size of Android Application Updates
8) Effective Risk Communication for Android
Apps
9) Face-to-Face Proximity Estimation Using
Bluetooth on Smart phones
10) Generating Summary Risk Scores for Mobile
Applications
11)GreenDroid: Automated Diagnosis of Energy
Inefficiency for Smartphone Applications
12) Hiding in the Mobile Crowd: Location
Privacy through Collaboration
13) How Long to Wait? Predicting Bus Arrival
Time with Mobile Phone Based Participatory Sensing
14) MOSES: Supporting and Enforcing Security
Profiles on Smartphone's
15) Security Threats
to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones
16) The Places of Our Lives: Visiting Patterns
and Automatic Labeling from Longitudinal Smartphone Data.
JAVA PROJECT 2015 – 2016 IEEE JAVA PROJECT TITLE
CLOUD
COMPUTING
1) A Hybrid Cloud Approach for Secure
Authorized Reduplication
2) A Scalable Two-Phase Top-Down
Specialization Approach for Data Anonymization Using Map Reduce on Cloud
3) A Stochastic Model to Investigate
Data Center Performance and QoS in IaaS Cloud Computing Systems
4) Building Confidential and Efficient
Query Services in the Cloud with RASP Data Perturbation
5) Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds
6) Distributed, Concurrent, and
Independent Access to Encrypted Cloud Databases
7) Expressive, Efficient, and Revocable
Data Access Control for Multi-Authority Cloud Storage
8) Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud Storage
9) Oruta: Privacy-Preserving Public
Auditing for Shared Data in the Cloud
10) PACK: Prediction-Based Cloud
Bandwidth and Cost Reduction System
11) Privacy-Preserving Multi-Keyword
Ranked Search over Encrypted Cloud Data
12) Scalable Distributed Service
Integrity Attestation for Software-as-a-Service Clouds
13) Towards Differential Query Services
in Cost-Efficient Clouds
DATA
MINING
14) A Cocktail Approach for Travel
Package Recommendation
15) Accuracy-Constrained
Privacy-Preserving Access Control Mechanism for Relational Data
16) BestPeer++: A Peer-to-Peer Based
Large-Scale Data Processing Platform
17) Data Mining with Big Data
18) Dealing With Concept Drifts in Process Mining
19) Discovering Emerging Topics in
Social Streams via Link-Anomaly Detection
20) Efficient Prediction of Difficult
Keyword Queries over Databases
21) Facilitating Document Annotation
Using Content and Querying Value
22) Fast Nearest Neighbor Search with
Keywords
23) Keyword Query Routing
24) Privacy-Preserving and
Content-Protecting Location Based Queries
25) Security Evaluation of Pattern
Classifiers under Attack
26) Supporting Privacy Protection in
Personalized Web Search
27) Towards Online Shortest Path
Computation
SECURE
COMPUTING
28) Captcha as Graphical Passwords—A
New Security Primitive Based on Hard AI Problems
29) Efficient and Privacy-Aware Data
Aggregation in Mobile Sensing
30) PROFILR: Toward Preserving
Privacy and Functionality in Geo social Networks
31) Top-k Query Result
Completeness Verification in Tiered Sensor Networks
NETWORKING
32) Automatic Test Packet Generation
33) Cost-Effective Resource Allocation of Overlay Routing Relay
Nodes
34) Boundary Cutting for Packet
Classification
35) Secure Data Retrieval for
Decentralized Disruption-Tolerant Military Networks
PARALLEL
AND DISTRIBUTED SYSTEMS
36) Enabling Trustworthy Service
Evaluation in Service-Oriented Mobile Social Networks
37) Exploiting Service Similarity for
Privacy in Location-Based Search Queries
38) LocaWard: A Security and Privacy
Aware Location-Based Rewarding System
39) On False Data-Injection Attacks
against Power System State Estimation: Modeling and Countermeasures
40) RRE: A Game-Theoretic Intrusion
Response and Recovery Engine
41) Securing Broker-Less
Publish/Subscribe Systems Using Identity-Based Encryption
42) SOS: A Distributed Mobile Q&A
System Based on Social Networks
43) The Client Assignment Problem for
Continuous Distributed Interactive Applications: Analysis, Algorithms, and
Evaluation
44) The Design and Evaluation of An
Information Sharing System for Human Networks
45) Traffic Pattern-Based Content
Leakage Detection for Trusted Content Delivery Networks
46) Secure Outsourced Attribute-based Signatures.
MOBILE
COMPUTING
47) An Incentive Framework for Cellular
Traffic Offloading
48) Cooperative Caching for Efficient
Data Access in Disruption Tolerant Networks
49)
Efficient Authentication for Mobile and Pervasive Computing
50) Friendbook: A Semantic-based Friend
Recommendation System for Social Networks
51) Optimal Distributed Malware Defense
in Mobile Networks with Heterogeneous Devices
SERVICE
COMPUTING (Web Service)
52) Privacy-Enhanced Web Service
Composition
53) Web Service Recommendation via
Exploiting Location and QoS Information
DOT NET PROJECT:-
2015 – 2016 IEEE DOT NET PROJECT TITLES
CLOUD
COMPUTING
1) Balancing Performance, Accuracy, and
Precision for Secure Cloud Transactions
2) Building Confidential and Efficient
Query Services in the Cloud with RASP Data Perturbation
3) Consistency as a Service: Auditing
Cloud Consistency
4) Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds
5) Distributed, Concurrent, and
Independent Access to Encrypted Cloud Databases
6) Enabling Data Integrity Protection
in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
7) Identity-Based Distributed Provable
Data Possession in Multi-Cloud Storage
8) Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud Storage
9) Panda: Public Auditing for Shared
Data with Efficient User Revocation in the Cloud
10) Privacy-Preserving Multi-Keyword
Ranked Search over Encrypted Cloud Data
11)
Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
DATA
MINING
12) A Cocktail Approach for Travel
Package Recommendation
13) An Empirical Performance Evaluation
of Relational Keyword Search Techniques
14) LARS*: An Efficient and Scalable
Location-Aware Recommender System
15) Product Aspect Ranking and Its
Applications
16) Secure Mining of Association Rules
in Horizontally Distributed Databases
17) Supporting Privacy Protection in
Personalized Web Search
18) Trusted DB: A Trusted
Hardware-Based Database with Privacy and Data Confidentiality
19) Typicality-Based Collaborative
Filtering Recommendation
SECURE
COMPUTING
20) Captcha as Graphical Passwords—A
New Security Primitive Based on Hard AI Problems
NETWORKING
21) Content Caching and Scheduling in
Wireless Networks with Elastic and Inelastic Traffic
22) Secure Data Retrieval for
Decentralized Disruption-Tolerant Military Networks
PARALLEL
AND DISTRIBUTED SYSTEMS
23) A Probabilistic Misbehavior
Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant
Networks
24) A System for Denial-of-Service
Attack Detection Based on Multivariate Correlation Analysis
25) An Error-Minimizing Framework for
Localizing Jammers in Wireless Networks
26) Certificate less Remote Anonymous
Authentication Schemes for Wireless Body Area Networks
27) Efficient Data Query in
Intermittently-Connected Mobile Ad Hoc Social Networks
28) Multicast Capacity in MANET with
Infrastructure Support
29) Secure and Efficient Data
Transmission for Cluster-Based Wireless Sensor Networks
30) Transmission-Efficient Clustering
Method for Wireless Sensor Networks Using Compressive Sensing
MOBILE
COMPUTING
31) A QoS-Oriented Distributed Routing
Protocol for Hybrid Wireless Networks
32) Autonomous Mobile Mesh Networks
33) DA-Sync: A Doppler-Assisted
Time-Synchronization Scheme for Mobile
Underwater Sensor Networks
34) Leveraging Social Networks for P2P Content-Based
File Sharing in Disconnected MANETs
35) Preserving Location Privacy in Geo social
Applications
PATTERN
ANALYSIS & MACHINE INTELLIGENCE
36) Web Image Re-Ranking Using
Query-Specific Semantic Signatures
IMAGE
PROCESSING
37) Click Prediction for Web Image
Reran king Using Multimodal Sparse Coding
38) Designing an Efficient Image
Encryption-Then-Compression System via Prediction Error Clustering and Random
Permutation