IEEE 2016-17 MCA Project Titles

Let us help you grow your business through the web

 

2016-17 IEEE Final year projects for CSE, IT, MCA, M.Phil., Ph.D., B.E., B.Tech., M.E., M.Tech., M.S., M.Sc., B.Sc., BCA, Diploma etc on Latest Domains Cloud Computing, Big Data, IoT (Internet of Things), Mobile Computing, Data Mining (Knowledge and Data Engineering), Networking, Network Security, Mobile Security, Data Security, Image Processing, Parallel and Distributed Systems, Secure Computing, Web Services (Service Computing) etc using JAVA, DOT NET, ANDROID, HADOOP, MATLAB, NS2, WEKA, OMNET++, PHP etc.

JAVA/J2EE Based Projects for MCA in IEEE/Non-IEEE/Application Projects/Real Time Projects/ Industry Projects/ Live Projects/Mini Projects/Research Projects/Own Concepts
DOT Net/ ASP.net/ C#.net/ VB.Net Based Projects for MCA in IEEE/Non-IEEE/Application Projects/Real Time Projects/ Industry Projects/ Live Projects/Mini Projects/Research Projects/Own Concepts 
Android Based projects for MCA using Android Studio/Eclipse in IEEE/Non-IEEE/ Application Projects/ Real Time Projects/ Industry Projects/ Live Projects/ Mini Projects/ Research PRojects/ Own Concepts 
PhP Based projects for MCA using WAMP/LAMP in IEEE/Non-IEEE/ Application Projects/ Real Time Projects/ Industry Projects/ Live Projects/ Mini Projects/ Research PRojects/ Own Concepts
 

2016-2017 IEEE DOT NET PROJECT TITLES:

CLOUD COMPUTING PROJECT TITLES:

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm

DATA MINING PROJECT TITLES

A Mixed Generative-Discriminative Based Hashing Method

Personalized Travel Sequence Recommendation on Multi-Source Big Social Media

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy

Text Mining the Contributors to Rail Accidents

User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors

NETWORKING PROJECT TITLES

Efficient Certificateless Access Control for Wireless Body Area Networks

Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage

Geographic and Opportunistic Routing for Underwater Sensor Networks

Optimizing Cost for Online Social Networks on Geo-Distributed Clouds

Secure and Efficient data communication protocol for Wireless Body Area Networks

MOBILE COMPUTING PROJECT TITLES

A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks

DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

Authenticated Key Exchange Protocols for Parallel Network File Systems

Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

SECURE COMPUTING PROJECT TITLES

Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining

ID2S Password-Authenticated Key Exchange Protocols

INFORMATION FORENSICS AND SECURITY PROJECT TITLES

Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

IMAGE PROCESSING PROJECT TITLES

Content-Adaptive Steganography by Minimizing Statistical Detectability

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data

IoT (Internet of Things)

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

SERVICE COMPUTING PROJECT TITLES

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

100% Assurance on Execution

Best Price

100% Trusted

2016-2017 IEEE JAVA PROJECT TITLES:

CLOUD COMPUTING PROJECT TITLES:

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

An Efficient Privacy-Preserving Ranked Keyword Search Method

CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Geometric Range Search on Encrypted Spatial Data

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

SecRBAC: Secure data in the Clouds

DATA MINING PROJECT TITLES

A Novel Recommendation Model Regularized with User Trust and Item Ratings

Automatically Mining Facets for Queries from Their Search Results

Booster in High Dimensional Data Classification

Building an intrusion detection system using a filter-based feature selection algorithm

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings

Crowdsourcing for Top-K Query Processing over Uncertain Data

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

Domain-Sensitive Recommendation with User-Item Subgroup Analysis

Efficient Algorithms for Mining Top-K High Utility Itemsets

Efficient Cache-Supported Path Planning on Roads

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

Nearest Keyword Set Search in Multi-Dimensional Datasets

Rating Prediction based on Social Sentiment from Textual Reviews

Location Aware Keyword Query Suggestion Based on Document Proximity

Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

Relevance Feedback Algorithms Inspired By Quantum Detection

Sentiment Embeddings with Applications to Sentiment Analysis

Top-Down XML Keyword Query Processing

TopicSketch: Real-time Bursty Topic Detection from Twitter

Top-k Dominating Queries on Incomplete Data

Understanding Short Texts through Semantic Enrichment and Hashing

NETWORKING PROJECT TITLES

A Stable Approach for Routing Queries in Unstructured P2P Networks

iPath: Path Inference in Wireless Sensor Networks

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

MOBILE COMPUTING PROJECT TITLES

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

A Hop-by-Hop Routing Mechanism for Green Internet

Continuous Answering Holistic Queries over Sensor Networks

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

The Server Provisioning Problem for Continuous Distributed Interactive Applications

SECURE COMPUTING PROJECT TITLES

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

Data Lineage in Malicious Environments

Detecting Malicious Facebook Applications

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

Resolving Multi-party Privacy Conflicts in Social Media

INFORMATION FORENSICS AND SECURITY PROJECT TITLES

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data

Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms

Profiling Online Social Behaviors for Compromised Account Detection

IMAGE PROCESSING PROJECT TITLES

A Locality Sensitive Low-Rank Model for Image Tag Completion

A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks

Learning of Multimodal Representations with Random Walks on the Click Graph

Online Multi-Modal Distance Metric Learning with Application to Image Retrieval

Tag Based Image Search by Social Re-ranking

MULTIMEDIA PROJECT TITLES

Social Friend Recommendation Based on Multiple Network Correlation

User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors

 

SOFTWARE ENGINEERING PROJECT TITLES

Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

Metamorphic Testing for Software Quality Assessment: A Study of Search Engines

SITAR: GUI Test Script Repair

FUZZY SYSTEMS PROJECT TITLES

Answering Approximate Queries over XML Data

 

Our Latest Project Titles

See all