ANDROID - IOT PROJECT TITLES 2016 - 2017
S.No | Titles |
1 | The Internet Of Things for South African Tourism |
2 | Cloud Based Web Application Supporting Vehicle Toll payment System |
3 | HIVE: Home Automation System for Intrusion Detection |
4 | For Computing may help to save Energy in Cloud Computing |
5 | Effective Ways to Use Internet of Things in the Field of Medical and Smart Health Care |
6 | EyeSim: A Mobile Application for Visual-Assisted Wormhole Attack Detection in IoT-Enabled WSNs |
7 | A Conceptual Framework for IoT-Based Healthcare System Using Cloud Computing |
8 | RISE: Role - Based internet of Things Service Environment |
9 | Real - Time Locating Systems Using Active RFID for Internet of things |
ANDROID PROJECT TITLES 2016-2017
S.No | Titles |
1 | Dummy - Based User Location Annoymization Under Real World Constraints |
2 | SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones |
3 | Mobile Attendance Using Near Field communication and One Time Password |
4 | Context - Aware Mobile Cloud Computing and Its Challenges |
5 | STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
6 | Monitoring of School Kids Using Android Devices and Near Field communication (NFC) |
7 | Intelligent Hands Free Speech Based SMS System on Android |
8 | PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks |
9 | An Online Security Protocol for NFC Payment |
10 | A Parallel Patient Treatment Time Prediction Algorithm and its Applications in Hospital |
11 | Seasame: A Secure and Convenient Mobile Solutions for passwords |
12 | Just - in - Time Code Offloading for Wearable Computing |
13 | Energy Cost Models of Smartphones for task Offloading to the Cloud |
14 | Context Based Access Control Systems for Mobile Devices |
15 | Avatar: mobile Distributed Computing in the Cloud |
16 | Developing an Efficient Digital Image Watermarking for Smartphone |
17 | Automatic Door Access System using Face Recognition |
18 | The Internet of Things For Health Care |
19 | Secure Transmission Medical data for pervasive Healthcare System Using Android |
20 | An IoT - Aware Architecture for Smart Healthcare Systems |
21 | Smart Garbage Collection System in Residential Area Using Android |
22 | Navigation System for Visually Impaired People |
23 | NFC Based Applications for Visually Impaired People -A Review |
24 | NFC Based Secure Mobile Healthcare System |
25 | Anti - Theft For Android Based Devices |
26 | Location Based Encrypted to Improve the Security of Data Access in Cloud Computing |
27 | Wireless Sensor Networks Using Android Virtual Devices And Near Field communication Peer - to - Peer Emulation |
28 | Privacy - Preserving Optimal Meeting Location Determination on Mobile devices |
29 | How Long To wait Predicting Bus Arrival time With Mobile phone Based Participatory Sensing |
30 | SPOC: A Secure and Privacy-Preserving Opportunistic computing Framework for Mobile-healthcare Emergency |
BIGDATA PROJECT TITLES 2016-2017
S.No | Titles |
1 | On Traffic - Aware Partition and Aggregation in MapReduce for Big data Applications |
2 | The SP Theory of Intelligence: Distinctive Features and Advantages |
3 | A Parallel Patient Treatment Time Prediction Algorithm and its Application in Hospital Queuing - Recommendation in a Big data |
4 | Protection of Bigdata Privacy |
5 | Towards a Virtual Domain based Authentication on MapReduce |
6 | C Miner: Opinion Extraction And Summarization For Chinese micro Blogs |
7 | Secure Sensitive Data Sharing On a Bigdata Platform |
DATAMINING PROJECT TITLES 2016 - 2017
S.No | Titles |
1 | SPORE: A Sequential Personalised Spatial Item Recommender System |
2 | Inverted Linear Quadtree: Effiecent Top K Spatial Keyword Search |
3 | Truth Discovery in crowdsourced Detection of Spatial Events |
4 | Sentiment Analysis of Top Colleges in India Using Twitter data |
5 | FRAPPE:Detecting Malicious Facebook Applications |
6 | Practical Approximate K Nearest Neighbor Queiries with Location and Query Privacy |
7 | A Novel Pipeline Approach for efficient big data Broadcasting |
8 | VoteTrust: Leveraging Friend Invitation Graph to Defend Against Social Network Sybils |
9 | A Secure and Dynamic Multi - Keyword ranked Search Scheme Over encrypted Cloud data |
10 | SmartCrawler: A two Stage Crawler for Efficiently Harvesting Deep - Web Interfaces |
11 | fiDoop: Parallel mining of frequent itemsets Using MapReduce |
12 | Discover the Expert: context adaptive Expert selection for medical diagnosis |
13 | Active leaning for Ranking through Expected Loss optimization |
14 | k - Nearest neighbor classification over Semantically secure Encrypted Relational Data |
15 | Generating searchable Public-key Ciphertexts with hidden structures for fast keyword search |
NETWORKING PROJECT TITLES 2016-2017
S.No | Titles |
1 | STAMP: Enabling Privacy - Preserving Location Proofs for Mobile Users |
2 | FRAPPE:Detecting Malicious Facebook Applications |
3 | Toward Optimum Crowdsensing Coverage with Guaranteed Performance |
4 | PRISM: Privacy - Aware interest sharing and matching in Mobile Social Networks |
5 | JOKER: A Novel Opportunistic Routing Protocol |
6 | Software Defined Networking with Pseudonym Systems for Secure Vehicular Clouds |
7 | An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path |
8 | Privacy - Preserving Location Sharing Services for Social Networks |
9 | Authenticated Key Exchange Protocols for Parallel Network File Systems |
10 | SmartCrawler: A Two - Stage Crawler for Efficiently Harvesting Deep - Web Interfaces |
11 | JAMMY: a Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs |
12 | Distortion - Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks |
13 | Cost - Effective Authentic and Anonymous data Sharing with Forward Security |
14 | SHARP: Secured Hierarchical Anonymous Routing Protocol for MANETs |
15 | CStream: Neighborhood Bandwidth Aggregation for Better Video Streaming |
16 | The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities |
17 | Passive Ip Traceback: Disclosing the Locations of Ip Spoofers from Path Backscatter |
18 | Resource Allocation for Energy Efficiency Optimization in Heterogenious networks |
WEB SECURITY PROJECT TITLES IEEE2016-2017
S.No | Titles |
1 | Secure Auditing and Deduplicating Data in Cloud |
2 | Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
3 | Key - Aggregate Searchable Encryption(KASE) for Group Data Sharing Via Cloud Storage |
4 | FRAPPE:Detecting Malicious Facebook Applications |
5 | A Secure and Dynamic Multi - Keyword Ranked Search Scheme Over Encrypted Cloud Data |
6 | An Exploration of Geographic Authentication Schemes |
7 | Dummy - Based - user location Anonymization under Real - World Constraints |
8 | Privacy - Preserving Location Sharing Services for Social Networks |
9 | STAMP: Enabling Privacy - Preserving Location Proofs for Mobile Users |
10 | PRISM: Privacy - Aware interest sharing and matching in Mobile Social Networks |
11 | A Shoulder Surfing Resistant Graphical Authentication System |
12 | Reversible data Hiding in Encrypted images Based on Progressive Recovery |
13 | Secure Sensitive data Sharing on Bigdata Platform |
14 | A Hybrid Cloud Approach for Secure Authorized Deduplication |
15 | RRW - A Robust and Reversible Water Marking technique for Relational Data |
16 | Steganography Using Reversible Texture Synthesis |
17 | Constructing a Global Social Service Network for Better Quality of web Service Discovery |
18 | Friendbook: A Semantic Based Friend Recommendation System for Social Networks |
Subscribe to:
Posts (Atom)