Java Projects for IS,CS-IEEE Projects

CLOUD COMPUTING

  1. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
  2. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
  3. An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
  4. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy
  5. Catch You if You Misbehave Ranked Keyword Search Results Verification in Cloud Computing
  6. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
  7. Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
  8. Efficient-Traceable-Authorization-Search-System-for-Secure-Cloud-Storage
  9. Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
  • Normal cloud model-based algorithm for multi-attribute trusted cloud service selection
  • Privacy Aware Data Deduplication for Side Channel in Cloud Storage
  • Provably-secure-and-lightweight-identity-based-authenticated-data-sharing-protocol-for-cyber-physical-cloud-environment
  • Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
  • Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
  • SEPDP- Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
  • Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid
  • Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
  • Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
  • Attribute- Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  • Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centres

DATA MINING

  1. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
  2. Collaboratively Tracking Interests for User Clustering in Streams of Short Texts
  3. Heterogeneous Information Network Embedding for Recommendation
  4. Learning Customer Behaviors for Effective Load Forecasting
  5. NAIS – Neural Attentive Item Similarity Model for Recommendation
  6. Opinion Aspect Relations in Cognizing Customer Feelings via Reviews
  7. Secure Attribute-Based Signature Scheme with Multiple Authorities for Block-chain in Electronic Health Records Systems
  8. Semantic Clustering-Based Deep Hypergraph Model for Online Reviews Semantic Classification in Cyber-Physical-Social Systems
  9. String Similarity Search – A Hash-Based Approach
  • Analyzing Sentiments in One Go :A Supervised Joint Topic Modelling Approach
  • Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method
  • Sentiment Analysis of Indian Movie Review with various Feature Selection Techniques
  • Predicting Student Actions in a Procedural Training Environment
  • Detecting Stress Based on Social Interactions in Social Networks
  • I-Injection : Toward Effective Collaborative Filtering Using Uninteresting items

MACHINE LEARNING

  1. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
  2. Heterogeneous Information Network Embedding for Recommendation
  3. Learning Customer Behaviors for Effective Load Forecasting
  4. Opinion Aspect Relations in Cognizing Customer Feelings via Reviews
  5. Secure Attribute-Based Signature Scheme with Multiple Authorities for Block-chain in Electronic Health Records Systems
  6. NetSpam A Network-Based Spam Detection Framework for Reviews in Online Social Media
  7. Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
  8. Twitter analytics sentiment analysis
  9. Towards real time country level location classification of worldwide Tweets
  • Real time tweets classification for daily news and followers
  • Collaborative Filtering-Based Recommendation of Online Social Voting
  • DRIMUX : Dynamic Rumor Influence Minimization with User Experience in Social Networks

WEB MINING

  1. Achieving Data Truthfulness and Privacy Preservation in Data Markets
  2. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
  3. Analyzing and Detecting Money-Laundering Accounts in Online Social Networks
  4. Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
  5. Semi-Supervised Spam Detection in Twitter Stream
  6. NetSpam A Network-Based Spam Detection Framework for Reviews in Online Social Media
  7. Top-k Critical Vertices Query on Shortest Path

 

NETWORKING

  1. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
  2. Net Spam: a Network-based Spam Detection Framework for Reviews in Online Social Media
  3. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
  4. A Multilevel Access Control Scheme for Data Security in Transparent Computing
  5. Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
  6. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
  7. Fast-Geo: Efficient Geometric Range Queries on Encrypted Spatial Data
  8. Transactional Behavior Verification in Business Process as a Service Configurations
  9. Data-driven faulty node detection scheme for Wireless Sensor Networks
  • SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
  • An Overlay Architecture for Throughput Optimal Multipath Routing
  • Face Change: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks with Fine-Grained Control
  • Network Capability in Localizing Node Failures via End-to-End Path Measurements
  • Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network
  • Routing in Accumulative Multi-Hop Networks

WIRELESS NETWORKING

 

  1. Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
  2. Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function
  3. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
  4. Energy Efficient Clustering Algorithm for Multi-hop Wireless Sensor Network Using Type-2 Fuzzy logic
  5. E2HRC: An Energy Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
  6. Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
  7. SUPERMAN Security Using Pre Existing Routing for Mobile Ad hoc Networks
  8. Malware Propagations in Wireless Ad Hoc Networks
  9. CANS Towards Congestion Adaptive and Small Stretch Emergency Navigation with WSN

 

NETWORK SECURITY

 

  1. Structural Vulnerability Assessment ofCommunity-based Routing in Opportunistic Networks
  2. Evaluation of web Security Mechanism Using Vulnerability & Attack Injection
  3. My Privacy- My decision: Control of Photo Sharing on Online Social Networks
  4. Detection of False Data Injection Attacks in smart Grid Communication System

 

IMAGE PROCESSING

 

  1. Robust Face Recognition with Kernelized Locality-Sensitive Group
  2. Sparsity Representation
  3. MuLoG, or How to apply Gaussian denoisers to multi-channel SAR speckle reduction?
  4. DeepFix: A Fully Convolutional Neural Network for predicting Human Eye Fixations
  5. Multimodal Similarity Gaussian Process Latent Variable Model
  6. Ocular Recognition for Blinking Eyes
  7. Piecewise-stationary motion modeling and iterative smoothing to track heterogeneous particle motions in dense environments
  8. 300 FPS Salient Object Detection via Minimum Directional Contrast
  9. Multimodal Biometrics for user authentication
  • Automatic Semantic Face Recognition
  • Motion Detection Application Using Web Camera
  • Detection of Plant Leaf Disease Using Image Processing Approach
  • Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain
  • Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
  • Agricultural plant Leaf Disease Detection Using Image Processing
Advertisements

Embedded system projects for EC,EEE (IOT-Raspberry pi)

IOT Latest Projects on Amazon Cloud Server (Web Services)

  1. A Hybrid Approach for Identification of Manhole and Staircase to Assist Visually Challenged
  2. A Social-Network-Based Crypto currency
  3. A Survey on the Roles of Communication Technologies in IoT-based Personalized Healthcare
  4. A WSN-based approach for prioritizing emergency vehicles Performance analysis
  5. Advanced IOT Based Combined Remote Health
  6. Agribot – IoT based Solar Powered Agribot for Irrigation
  7. An Analysis of Systems-of-Systems Opportunities and Challenges Related to Mobility in Smart Cities
  8. Android Based Vehicle Anti-Theft Alarm And Tracking System
  9. Automation of Train Cab Front Cleaning With a Robot Manipulator
  10. Continuous Patient Monitoring With a Patient Centric Agent
  11. Design and Implementation of an RFID-GSM based Vehicle Identification System on Highways
  12. Detecting And Monitoring Of Voltage And Frequency
  13. ECSHUB: An Off-Grid Bunk
  14. Efficiency Improvement of Photovoltaic Panels by Design Improvement of Cooling System using Water Cooler
  15. Embedded System for Motion Control of an Omni directional Mobile Robot

IOT – Amazon Cloud Server (Web Services)

  1. A Decision Support System for Cooperative Logistics
  2. A Multi-function Robot for Military Application
  3. A New Approach for Designing a Smart Glove for Sign Language Recognition
  4. A Smart Approach on Collecting Working Condition Data from Home Appliances under the Field Test
  5. A Web Service Based Application Serving Vegetation Condition Indices for Flood Crop Loss Assessment
  6. A Wireless IoT System Towards Gait Detection in Stroke Patients
  7. Advance Automatic Toll Collection & Vehicle Detection During Collision using RFID
  8. Advancing Security and Human Rights – Jail and Prisoner
  9. Antismuggling System for Trees in Forest with Solar Power Generation
  10. Anti-theft protection of vehicle by GSM & GPS with fingerprint verification
  11. Automated Lighting System for Park Pathways
  12. Blister Testing in Drug Industry
  13. Campus Navigator with Speech Assistance
  14. Car Surveillance and Driver Assistance Using Black box with the help of GSM and GPS Technology
  15. Challenges and Opportunities of Waste Management in IoT

Raspberry PI Based Projects

  1. Ad world – Useless Space, Endless Opportunity – Analysis and Prediction of Visitors
  2. Android – Design and Implementation of Automated Blood Bank using Embedded Systems
  3. Hardware Design and Web-based Communication Modules of a Real-time MultiSensor
  4. Image Processing For Indoor Purpose
  5. IoT based fire alarming and authentication system for workhouse using Raspberry Pi
  6. PI – Design of automatic nutrition supply system using IoT technique in modern cities
  7. PI – Design of automatic nutrition supply system using IoT technique in modern cities
  8. PI – EMACS – Design and Implementation of Indoor Environment Monitoring and Control System
  9. PI – Fall detection system and Body positioning with Heart Rate Monitoring
  10. PI – Fuel Management System

Robotics

  1. A Multi-function Robot for Military Application
  2. A Review on Design of Automated Floor Cleaning System
  3. AmbuBot – Robotic Automated External Defibrillator Ambulance for Emergency Medical Service in Smart Cities
  4. AmbuBot – Robotic Automated External Defibrillator Ambulance for Emergency Medical Service in Smart Cities
  5. Android – Design of an Intelligent Combat Robot for war field
  6. AndroidRobust Railway Crack Detection Scheme (RRCDS) Using LED-LDR Assembly
  7. Automated Book Picking Robot for Libraries
  8. Automated Waste Segregator
  9. Automatic and intelligent car motion
  10. Autonomus Cleaning Robot

Biomedical & Medical Applications

  1. A Wireless IoT System Towards Gait Detection in Stroke Patients
  2. Accessible Electronic Interaction for People with Partial Paralysis
  3. An IoT Based Remote HRV Monitoring System for Hypertensive Patients
  4. Android – Electronic Stick and Android Smartphones to the Aid of Blindly Disabled Individuals
  5. Android based Monitoring Human Insole Movement Using Wearable Computing
  6. Android based Monitoring Human Knee Joint Movement Using Wearable Computing
  7. Android based Novel Low-Cost Sensor for Human Bite Force Measurement
  8. Android based patient monitoring in hospitals and oldages at home
  9. AndroidRapid Entire Body Postural Analysis Assessment Device for Computer Operators
  10. ANY TIME MEDICINE

Agriculture & Irrigation

  1. (Motor)Intelligent Food Management System-Maintenance of Agro and Non-Agro Foods in Cold Storage  Warehouse
  2. A Web Service Based Application Serving Vegetation Condition Indices for Flood Crop Loss Assessment
  3. Bird – Solar powered Irrigation with auto control of pump & SMS alert
  4. Bluetooth embedded robotic agriculture plowing, seeding and grass cutting powered by solar energy
  5. BT embedded robotic lawn mover powered by solar energy
  6. Crop Leaf Area Index Observations with a Wireless Sensor Network and Its Potential for Validating Remote Sensing Products
  7. GPS based virtual fencing
  8. Intelligent Food Management System-Maintenance of Agro and Non-Agro Foods in Cold Storage Warehouse
  9. IOT – Leaf Lattice and Smart Agriculture
  10. IOT Ayurvedic Medicine Beetel Leaf Vine Cultivation using IoT & Wireless Sensor Network

Vehicle Automation, Traffic, Automotive Application

  1. Advance Automatic Toll Collection & Vehicle Detection During Collision using RFID
  2. AMEMS Accelerometer sensors based semi-automated rash driving
  3. Android application voice output based anti-fuel theft system for vehicles with alarm
  4. Android based Sign Board Detection with Image & Voice Alert System
  5. Application of RF Technology to Solve Traffic Signal Scheduling by Monitoring the Vehicle Intensity in the Perticular Road
  6. Central Locking Control using Android Application with Fuel Theft Voice Alert
  7. Design And Implementation Of Driverless Car To Recognize Traffic Signs Using MATLAB And Android Device IP Camera
  8. Design of bus tracking and fuel monitoring system
  9. Evidence Collection in Automotive Industry for Legal Claim
  10. Headlight Central Locking Control using Android Application with Fuel Theft Voice Alert

Security System, Biometrics

  1. A Web Service Based Application Serving Vegetation Condition Indices for Flood Crop Loss Assessment
  2. Advancing Security and Human Rights – Jail and Prisoner
  3. Antismuggling System for Trees in Forest with Solar Power Generation
  4. Anti-theft protection of vehicle by GSM & GPS with fingerprint verification
  5. Blister Testing in Drug Industry
  6. Campus Navigator with Speech Assistance
  7. Efficient Remote Control System using SMS Technology for Outdoor Security Lighting Applications
  8. Identification of Underground Cable Fault Location
  9. Invisible Eye – An advanced Security System Using Web Camera
  10. IOT – Camcorder piracy – Addhar Based Anti-Piracy Screen

CAN Protocol

  1. A Decision Support System for Cooperative Logistics
  2. A Multi-function Robot for Military Application
  3. A Navigation and Reservation Based Smart Parking Platform Using Genetic Optimization for Smart Cities
  4. A New Approach for Designing a Smart Glove for Sign Language Recognitio
  5. A New WSN Deployment Approach for Air Pollution Monitoring
  6. A Novel Concept for Remotely Monitoring Babies
  7. A Novel Electric Bicycle Battery Monitoring System Based on
  8. A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment using web server
  9. A Safe Driving Embedded System Integrated With CAN Protocol
  10. A Smart Power Meter to Monitor Energy Flow in Smart Grids

Real Time Projects

  1. Reconfigurable Smart Water Quality Monitoring System in IoT Environment
  2. REMOTE AIRFIELD LIGHTING SYSTEM
  3. Remote Control System of High Efficiency and Intelligent Street Lighting using Android Server
  4. Remote Monitoring and Controlling of Electrical Devices with Automatic Active Phase Selector
  5. Remotely Controlled Irrigation System With Theft Alert
  6. Renesas Based Renewable energy – V DC Power generation using Back EMF & Solar for LED load
  7. Research and Design of Embedded Timber Drying Monitoring System
  8. RFID Based Advanced Shopping Trolley for Super Market
  9. RFID-Cloud Smart Cart System
  10. Robot Design And Development Of Android Controlled Small Unit Unmanned Vehicle For Surveillance
  11. Rotating solar system for automobiles with Boost & charge control
  12. Safety Helmet
  13. Satellite and RF Enabled Assistance for Marine Navigation

IEEE Academic projects for CS,IS

Whatsapp Image 2

Natural Language Process

  1. A Framework for Real-Time Spam Detection in Twitter
  2. A Novel Mechanism for Fast Detection of Transformed Data Leakage
  3. A Workflow Management System for Scalable Data Mining on Clouds
  4. Machine Learning Methods for Disease Prediction with Claims Data
  5. Review Spam Detection using Machine Learning
  6. NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media

Android Projects

  1. TripImputor Real-Time Imputing Taxi Trip Purpose Leveraging Multi-Sourced Urban Data Processing Algorithms
  2. Android Based Advanced Attendance Vigilance System Using Wireless Network with Fusion of Bio-metric Fingerprint Authentication
  3. Web Services for Mobile Devices from One Server
  4. Privacy-Preserving Context-Aware Friend Discovery Based on Mobile Sensing
  5. NFC-based mobile application design restaurant ordering system APP
  6. Providing Security for NFC-Based Payment Systems Using a Management Authentication Server
  7. Defining the Functional Requirements for the NFC Based Medication Administration and Clinical Communication System
  8. Cloud-based Web Application with NFC for Employee Attendance Management System
  9. A Classroom Scheduling Service for Smart Classes
  10. GeoMoB – A Geo Location based browser for secured Mobile Banking

Big Data

  1. MR-Mafia Parallel Subspace Clustering Algorithm Based on MapReduce for Large Multi-dimensional Datasets
  2. Cipher text-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records
  3. Client Side Secure Image Deduplication Using DICE Protocol
  4. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
  5. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
  6. Efficient Processing of Skyline Queries Using MapReduce
  7. FiDoop-DP Data Partitioning in Frequent Itemset Mining on Hadoop Clusters
  8. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
  9. SocialQ&A An Online Social Network Based Question and Answer System
  10. On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications
  11. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
  12. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
  13. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
  14. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  15. Secure Big Data Storage and Sharing Scheme for Cloud Tenants

Python

  1. Deep Air Learning: Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
  2. Classification of A Bank Data Set On Various Data Mining Platforms
  3. A Data Mining based Model for Detection of Fraudulent Behavior in Water Consumption
  4. Collaborative Filtering Algorithm Based on Rating Difference and User Interest
  5. Review Spam Detection using Machine Learning
  6. A Framework for Real-Time Spam Detection in Twitter
  7. Serendipitous Recommendation in E-Commerce Using Innovator-Based Collaborative Filtering
  8. NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
  9. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors

 

Block Chain Projects

  1. Design and Implementation of an Automated and Decentralized Pollution Monitoring System with Blockchains, Smart Contracts, and LoRaWAN
  2. Consortium Blockchain-based Malware Detection in Mobile Devices
  3. Blockchain-Enabled E-Voting
  4. Secure Attribute-Based Signature Scheme with Multiple Authorities for Blockchain in Electronic Health Records Systems
  5. Evaluating Blockchains for IoT
  6. Blockchain: A Game Changer for Securing IoT Data
  7. Poster Abstract: Privacy in Blockchain-Enabled IoT Devices
  8. Blockchain and the Internet of Things in the Industrial Sector
  9. Implementation of IoT System using BlockChain with Authentication and Data Protection

 

Data Science

  1. Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
  2. Classification of A Bank Data Set On Various Data Mining Platforms Bir Banka Müsteri Verilerinin Farkli VeriMadenciligi Platformlarinda Siniflandirilmasi
  3. Correlated Matrix Factorization for Recommendation with Implicit Feedback
  4. Heterogeneous Information Network Embedding for Recommendation
  5. Deep Air Learning: Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
  6. Point-of-interest Recommendation for Location Promotion in Location-based Social Networks
  7. NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
  8. SocialQ&A: An Online Social Network Based Question and Answer System
  9. Modeling Urban Behavior by Mining Geotagged Social Data
  10. A Workflow Management System for Scalable Data Mining on Clouds

Cloud Computing

  1. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
  2. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems
  3. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
  4. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
  5. Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage
  6. Optimizing the Cost-Performance Tradeoff for Coflows across Geo-distributed Datacenters
  7. A Secure Client-Side Framework for Protecting the Privacy of Health Data Stored on the Cloud
  8. Dynamic Mobile Cloudlet Clustering for Fog Computing
  9. Towards Deadline Guaranteed Cloud Storage Services
  • Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Image Processing

  1. Eye Recognition with Mixed Convolutional and Residual Network (MiCoRe-Net)
  2. Latent Fingerprint Value Prediction Crowd-based Learning
  3. Developing LSB Method Using Mask in Colored Images
  4. Efficient Quantum Information Hiding for Remote Medical Image Sharing
  5. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images
  6. Visual Secret Sharing Schemes Encrypting Multiple Images
  7. Human Identification From Freestyle Walks Using Posture-Based Gait Feature
  8. Computer Assisted Segmentation of Palm print Images for Biometric Research
  9. Deep Convolutional Neural Networks for Human Action Recognition Using Depth Maps and Postures
  10. Image Classification using Manifold Learning Based Non-Linear Dimensionality Reduction

Network Security

  1. Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
  2. Network Capability in Localizing Node Failures via End-to-End Path Measurements
  3. Secure Routing based on Social Similarity in Opportunistic Networks
  4. SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks

Networking

  1. Anomaly Detection and Attribution in Networks with Temporally Correlated Traffic
  2. Privacy Preserving IP Traceback
  3. ALLYS All You can Send for Energy Harvesting Networks
  4. AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
  5. Vehicular Cloud Data Collection for Intelligent Transportation Systems
  6. Optimizing Cloud-Service Performance Efficient Resource Provisioning via Optimal Workload Allocation
  7. Cost Minimization Algorithms for Data CenterManagement
  8. Multi-party secret key agreement over state-dependent wireless broadcast channels
  9. STAMP Enabling Privacy-Preserving Location Proofs for Mobile Users
  10. FRAppE Detecting Malicious Facebook Applications.

IEEE Java Projects on ML and AI for CSE, ISE

1111

Machine Learning / Artificial Intelligence 

  1. Deep Air Learning Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
  2. Heterogeneous Information Network Embedding for Recommendation
  3. Correlated Matrix Factorisation for Recommendation with Implicit Feedback
  4. Classification of A Bank Data Set On Various Data Mining Platforms
  5. Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
  6. A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption
  7. Collaborative Filtering Algorithm Based on Rating Difference and User Interest
  8. A Novel Mechanism for Fast Detection of Transformed Data Leakage
  9. Machine Learning Methods for Disease Prediction with Claims Data
  10. Review Spam Detection using Machine Learning
  11. A Framework for Real-Time Spam Detection in Twitter
  12. Serendipitous Recommendation in E-Commerce Using Innovator-Based Collaborative Filtering
  13. A Collaborative Filtering Recommender System in Primary Care Towards a Trusting Patient-Doctor Relationship
  14. A Workflow Management System for Scale able Data Mining on Clouds
  15. Efficient Processing of Skyline Queries Using Map Reduce
  16. Net Spam a Network-based Spam Detection Framework for Reviews in Online Social Media
  17. Practical Privacy-Preserving Map Reduce Based K-means Clustering over Large-scale Data set
  18. Social Q&A An Online Social Network Based Question and Answer System
  19. Authorship Attribution for Social Media Forensics
  20. Detecting and Analysing Urban Regions with High Impact of Weather Change on Transport
  21. Soci Rank Identifying and Ranking Prevalent News Topics Using Social Media Factors
  22. RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem

IEEE Academic Projects on Java

Whatsapp Image 2

JAVA PROJECT LIST 2018-2019

Machine Learning
1. Deep Air Learning Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
2. Heterogeneous Information Network Embedding for Recommendation
3. Correlated Matrix Factorization for Recommendation with Implicit Feedback
4. Classification of A Bank Data Set On Various Data Mining Platforms
5. Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
6. A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption
7. Collaborative Filtering Algorithm Based on Rating Difference and User Interest
8. A Novel Mechanism for Fast Detection of Transformed Data Leakage
9. Machine Learning Methods for Disease Prediction with Claims Data
10. Review Spam Detection using Machine Learning
11. A Framework for Real-Time Spam Detection in Twitter
12. Serendipitous Recommendation in E-Commerce Using Innovator-Based Collaborative Filtering
13. A Collaborative Filtering Recommender System in Primary Care Towards a Trusting Patient-Doctor Relationship
14. A Workflow Management System for Scalable Data Mining on Clouds
15. Efficient Processing of Skyline Queries Using MapReduce
16. NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
17. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
18. SocialQ&A An Online Social Network Based Question and Answer System
19. Authorship Attribution for Social Media Forensics
20. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
21. SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors
22. RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem

Artificial Intelligence
1. Deep Air Learning Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
2. Heterogeneous Information Network Embedding for Recommendation
3. Correlated Matrix Factorization for Recommendation with Implicit Feedback
4. Classification of A Bank Data Set On Various Data Mining Platforms
5. Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
6. A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption
7. Collaborative Filtering Algorithm Based on Rating Difference and User Interest
8. A Novel Mechanism for Fast Detection of Transformed Data Leakage
9. Machine Learning Methods for Disease Prediction with Claims Data
10. Review Spam Detection using Machine Learning
11. A Framework for Real-Time Spam Detection in Twitter
12. Serendipitous Recommendation in E-Commerce Using Innovator-Based Collaborative Filtering
13. A Collaborative Filtering Recommender System in Primary Care Towards a Trusting Patient-Doctor Relationship
14. A Workflow Management System for Scalable Data Mining on Clouds
15. Efficient Processing of Skyline Queries Using MapReduce
16. Net Spam a Network-based Spam Detection Framework for Reviews in Online Social Media
17. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
18. SocialQ&A An Online Social Network Based Question and Answer System
19. Authorship Attribution for Social Media Forensics
20. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
21. SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors
22. RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem

Internet of Thing (IOT)
1. Malware Threats and Detection for Industrial Mobile-IoT Networks
2. Fog-Based Crime-Assistance in Smart IoT Transportation System
3. VCAMS Viterbi-based Context Aware Mobile Sensing to Trade-off Energy and Delay
4. MEDIBOX – IoT Enabled Patient Assisting Device
5. IAPcloud A Cloud Control Platform for Heterogeneous Robots
6. ETAP Energy-Efficient and Traceable Authentication Protocol in Mobile Medical Cloud Architecture
7. Querying in Internet of Things with Privacy Preserving Challenges, Solutions and Opportunities
8. Fog Computing Approach for Mobility Support in Internet-of-Things Systems
9. Data Transfusion Pairing Wearable Devices and Its Implication on Security for Internet of Things
10. Efficient External Sensors for Smartphonesthrough Near Field Communication (NFC)
11. NFC-based mobile application design restaurant ordering system APP
12. Lightweight Smart Home Security System Using Multiple RSS-based Voting
13. IoT Based Indoor Location Detection System for Smart Home Environment
14. Cloud-based Web Application with NFC for Employee Attendance Management System
15. Evaluation of Internet Connectivity under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes
16. Defining the Functional Requirements for the NFCBased Medication Administration and Clinical Communication System
17. Heterogeneous Online Learning for “Thing-Adaptive” Fog Computing in IoT
18. Validation of a simple Metabolic-Equivalent-of-Task sensor based on a low-cost NFC RFID wristband
19. Adaptive and Fault-tolerant Data Processing in Healthcare IoT Based on Fog Computing
20. A New Distributed Localization Algorithm Using Social Learning based Particle Swarm Optimization for Internet of Things
21. Reliable and Privacy-preserving Task Recomposition for Crowd sensing in Vehicular Fog Computing
22. New Quantum Secure Key Exchange Protocols Based on MaTRU
23. Providing Security for NFC-Based Payment Systems Using a Management Authentication Server
24. Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols
25. PEEC-Based Multi-Objective Synthesis of NFC Antennas in the Presence of Conductive Structures
26. Internet of Things in Health care using Fog Computing
27. Security Weakness of a Lattice-based Key Exchange Protocol
28. Approximation and Temperature Control System via an Actuator and a Cloud An Application Based on the IoT for Smart Houses
29. A Method to Detect Internet of Things Botnets
30. Poster Abstract Who’s Watching Your Child? Exploring Home Security Risks with Smart Toy Bears
31. Secure Key Exchange Using Enhanced Diffie-Hellman Protocol Based on String Comparison
32. Intelligent Accident Detection Classification using Mobile Phones

IOT with Hardware
1. VCAMS Viterbi-based Context Aware Mobile Sensing to Trade-off Energy and Delay
2. MEDIBOX – IoT Enabled Patient Assisting Device
3. IoT based Indoor Environment Data Modelling and Prediction
4. A Semantic Smart Interconnected Healthcare System using Ontology and Cloud Computing
5. Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems
6. Smart Parking Using IoT Technology
7. 12. Privacy-preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval
8. Optimizing Routine Collection Efficiency in IoT based Garbage Collection Monitoring Systems
9. RISE Role-based Internet of Things Service Environment
10. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
11. SMART HELMET
12. IoT BASED GARBAGE SYSTEM
13. Enabling RF data analytics services and applications via cloudification
14. Smart parking in the Smart city application
15. Cloud MIMO for Smart Parking System
16. A novel and Secure Smart Parking Management System (SPMS) based on integration of WSN, RFID, and IoT
17. Using Energy-aware Scheduling Weather Forecast based Harvesting for Reconfigurable Hardware

Natural Language Process
1. A Framework for Real-Time Spam Detection in Twitter
2. A Novel Mechanism for Fast Detection of Transformed Data Leakage
3. A Workflow Management System for Scalable Data Mining on Clouds
4. Machine Learning Methods for Disease Prediction with Claims Data
5. Review Spam Detection using Machine Learning
6. NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media

Android Projects
1. TripImputor Real-Time Imputing Taxi Trip Purpose Leveraging Multi-Sourced Urban Data Processing Algorithms
2. Android Based Advanced Attendance Vigilance System Using Wireless Network with Fusion of Bio-metric Fingerprint Authentication
3. Web Services for Mobile Devices from One Server
4. Privacy-Preserving Context-Aware Friend Discovery Based on Mobile Sensing
5. NFC-based mobile application design restaurant ordering system APP
6. Providing Security for NFC-Based Payment Systems Using a Management Authentication Server
7. Defining the Functional Requirements for the NFC Based Medication Administration and Clinical Communication System
8. Cloud-based Web Application with NFC for Employee Attendance Management System
9. A Classroom Scheduling Service for Smart Classes
10. GeoMoB – A Geo Location based browser for secured Mobile Banking
11. Child Safety Wearable Device
12. Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
13. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
14. Privacy-Preserving Location-Proximity for Mobile Apps
15. Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
16. My Privacy My Decision Control of Photo Sharing on Online Social Networks
17. IoT based Home Security through Digital Image
18. Dummy-Based User Location Anonymization Under Real-World Constraints
19. SBVLC Secure Barcode-Based Visible Light Communication for Smartphones
20. Mobile attendance using Near Field Communication and One-Time Password
21. Context-Aware Mobile Cloud Computing and Its Challenges
22. STAMP Enabling Privacy-Preserving Location Proofs for Mobile Users
23. Monitoring of School Kids Using Android Devices and Near Field Communication (NFC)
24. Intelligent Hands Free Speech based SMS System on Android
25. PRISM PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
26. An Online Security Protocol for NFC Payment
27. Cloud Based Web Application Supporting Vehicle Toll Payment System

Big Data
1. MR-Mafia Parallel Subspace Clustering Algorithm Based on MapReduce for Large Multi-dimensional Datasets
2. Cipher text-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records
3. Client Side Secure Image Deduplication Using DICE Protocol
4. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
5. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
6. Efficient Processing of Skyline Queries Using MapReduce
7. FiDoop-DP Data Partitioning in Frequent Itemset Mining on Hadoop Clusters
8. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
9. SocialQ&A An Online Social Network Based Question and Answer System
10. On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications
11. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
12. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
13. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
14. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
15. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
16. The SP Theory of Intelligence Distinctive Features and Advantages
17. A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data
18. Protection of Big Data Privacy
19. Sentiment Analysis of Top Colleges in India Using Twitter Data
20. FiDoop Parallel Mining of Frequent Itemsets Using MapReduce
21. Phoenix A MapReduce Implementation With New Enhancements
22. Research Directions for Engineering Big Data Analytics Software
23. Secure sensitive data sharing on a big data platform
24. A Hierarchical Distributed Processing Framework for Big Image Data
25. Wide Area Analytics for Geographically Distributed Datacenters

Python
1. Deep Air Learning: Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
2. Classification of A Bank Data Set On Various Data Mining Platforms
3. A Data Mining based Model for Detection of Fraudulent Behavior in Water Consumption
4. Collaborative Filtering Algorithm Based on Rating Difference and User Interest
5. Review Spam Detection using Machine Learning
6. A Framework for Real-Time Spam Detection in Twitter
7. Serendipitous Recommendation in E-Commerce Using Innovator-Based Collaborative Filtering
8. NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
9. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors

Block Chain Projects
1. Design and Implementation of an Automated and Decentralized Pollution Monitoring System with Blockchains, Smart Contracts, and LoRaWAN
2. Consortium Blockchain-based Malware Detection in Mobile Devices
3. Blockchain-Enabled E-Voting
4. Secure Attribute-Based Signature Scheme with Multiple Authorities for Blockchain in Electronic Health Records Systems
5. Evaluating Blockchains for IoT
6. Blockchain: A Game Changer for Securing IoT Data
7. Poster Abstract: Privacy in Blockchain-Enabled IoT Devices
8. Blockchain and the Internet of Things in the Industrial Sector
9. Implementation of IoT System using BlockChain with Authentication and Data Protection

Data Science
1. Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
2. Classification of A Bank Data Set On Various Data Mining Platforms Bir Banka Müsteri Verilerinin Farkli VeriMadenciligi Platformlarinda Siniflandirilmasi
3. Correlated Matrix Factorization for Recommendation with Implicit Feedback
4. Heterogeneous Information Network Embedding for Recommendation
5. Deep Air Learning: Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
6. Point-of-interest Recommendation for Location Promotion in Location-based Social Networks
7. NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
8. SocialQ&A: An Online Social Network Based Question and Answer System
9. Modeling Urban Behavior by Mining Geotagged Social Data
10. A Workflow Management System for Scalable Data Mining on Clouds

Cloud Computing
1. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
2. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems
3. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
4. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
5. Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage
6. Optimizing the Cost-Performance Tradeoff for Coflows across Geo-distributed Datacenters
7. A Secure Client-Side FrameworPage | 6k for Protecting the Privacy of Health Data Stored on the Cloud
8. Dynamic Mobile Cloudlet Clustering for Fog Computing
9. Towards Deadline Guaranteed Cloud Storage Services
10. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
11. Stability of Evolving Fuzzy Systems based on Data Clouds
12. Anonymous and Traceable Group Data Sharing in Cloud Computing
13. SDN-enabled Traffic-aware Load Balancing for M2M Networks
14. Energy-efficient two-layer cooperative defense scheme to secure Sensor-Clouds
15. TKSE Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain
16. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
17. A Collision-Mitigation Cuckoo Hashing Scheme for Large-scale Storage Systems
18. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
19. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
20. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
21. RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
22. Vehicular Cloud Data Collection for Intelligent Transportation Systems
23. Cost Minimization Algorithms for Data Center Management
24. Optimizing Green Energy, Cost, and Availability in Distributed Data Centers
25. Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks
26. Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
27. Optimizing Cloud-Service Performance Efficient Resource Provisioning via Optimal Workload Allocation
28. TAFC Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
29. FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data
30. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
31. Temporal Task Scheduling With Constrained Service Delay for Profit Maximization in Hybrid Clouds
32. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
33. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
34. Monitoring Elastically Adaptive Multi-Cloud Services

Data Mining
1. Deep Air Learning Interpolation, Prediction, and Feature Analysis of Fine-grained Air Quality
2. Heterogeneous Information Network Embedding for Recommendation
3. Correlated Matrix Factorization for Recommendation with Implicit Feedback
4. Classification of A Bank Data Set On Various Data Mining Platforms
5. Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
6. A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption
7. Collaborative Filtering Algorithm Based on Rating Difference and User Interest
8. A Novel Mechanism for Fast Detection of Transformed Data Leakage
9. Machine Learning Methods for Disease Prediction with Claims Data
10. Review Spam Detection using Machine Learning
11. A Framework for Real-Time Spam Detection in Twitter
12. Serendipitous Recommendation in E-Commerce Using Innovator-Based Collaborative Filtering
13. A Collaborative Filtering Recommender System in Primary Care Towards a Trusting Patient-Doctor Relationship
14. A Workflow Management System for Scalable Data Mining on Clouds
15. NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
16. Point-of-interest Recommendation for Location Promotion in Location-based Social Networks
17. SocialQ&A An Online Social Network Based Question and Answer System
18. Modeling Urban Behavior by Mining Geotagged Social Data
19. A Workflow Management System for Scalable Data Mining on Clouds
20. SociRank Identifying and Ranking Prevalent NewsTopics Using Social Media Factors
21. RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem
22. A Profile-Based Big Data Architecture for Agricultural Context
23. l-Injection Toward Effective Collaborative Filtering Using Uninteresting Items
24. User-Centric Similarity Search
25. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
26. Efficient Processing of Skyline Queries Using MapReduce
27. FiDoop-DP Data Partitioning in Frequent Itemset Mining on Hadoop Clusters
28. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset

Image Processing
1. Eye Recognition with Mixed Convolutional and Residual Network (MiCoRe-Net)
2. Latent Fingerprint Value Prediction Crowd-based Learning
3. Developing LSB Method Using Mask in Colored Images
4. Efficient Quantum Information Hiding for Remote Medical Image Sharing
5. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images
6. Visual Secret Sharing Schemes Encrypting Multiple Images
7. Human Identification From Freestyle Walks Using Posture-Based Gait Feature
8. Computer Assisted Segmentation of Palm print Images for Biometric Research
9. Deep Convolutional Neural Networks for Human Action Recognition Using Depth Maps and Postures
10. Image Classification using Manifold Learning Based Non-Linear Dimensionality Reduction
11. Conceptual view of the IRIS recognition systems in the biometric world using image processing techniques
12. Animal classification using facial images with score-level fusion
13. Design of Biometric Recognition Software Based on Image Processing
14. Evolutionary Design of Problem-Adapted Image Descriptors for Texture Classification
15. One-time Password for Biometric Systems Disposable Feature Templates
16. Effective and Efficient Global Context Verification for Image Copy Detection
17. Face Recognition Using Sparse Fingerprint Classification Algorithm
18. Enhanced Password Processing Scheme Based on Visual Cryptography and OCR
19. Image Re-ranking based on Topic Diversity

Network Security
1. Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
2. Network Capability in Localizing Node Failures via End-to-End Path Measurements
3. Secure Routing based on Social Similarity in Opportunistic Networks
4. SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks

Networking
1. Anomaly Detection and Attribution in Networks with Temporally Correlated Traffic
2. Privacy Preserving IP Traceback
3. ALLYS All You can Send for Energy Harvesting Networks
4. AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
5. Vehicular Cloud Data Collection for Intelligent Transportation Systems
6. Optimizing Cloud-Service Performance Efficient Resource Provisioning via Optimal Workload Allocation
7. Cost Minimization Algorithms for Data CenterManagement
8. Multi-party secret key agreement over state-dependent wireless broadcast channels
9. STAMP Enabling Privacy-Preserving Location Proofs for Mobile Users
10. FRAppE Detecting Malicious Facebook Applications.
11. Toward Optimum Crowdsensing Coverage with Guaranteed Performance
12. PRISM Privacy-aware Interest Sharing and Matching in Mobile Social Networks
13. JOKER A Novel Opportunistic Routing Protocol
14. Software Defined Networking with Pseudonym Systems for Secure Vehicular Clouds
15. An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path
16. Privacy-Preserving Location Sharing Services for Social Networks
17. Authenticated Key Exchange Protocols for Parallel Network File Systems
18. SmartCrawler A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces

Web Security
1. A proposed approach for preventing Cross-Site Scripting
2. SkyShield A Sketch-Based Defense System Against Application Layer DDoS Attacks
3. Multi-party secret key agreement over state-dependent wireless broadcast channels
4. Someone in Your Contact List Cued Recall-Based Textual Passwords
5. Authorship Attribution for Social Media Forensics
6. NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
7. My Privacy My Decision Control of Photo Sharing on Online Social Networks
8. One-time Password for Biometric Systems Disposable Feature Templates
9. Enhanced Password Processing Scheme Based on Visual Cryptography and OCR
10. Effective and Efficient Global Context Verification for Image Copy Detection
11. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications