Projects / B.Tech / CSE & IT / Major / List
 
IEEE JAVA Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
2 Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
3 Verifiable and Multi Keyword Searchable Attribute Based Encryption Scheme for Cloud Storage
4 Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
5 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT
6 Performance and power consumption evaluation in smart phone based image processing for medical applications
7 Filtering Instagram hash tags through crowd tagging and the HITS algorithm
8 Cloud Data Protection for the Masses
9 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
10 Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
11 Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
12 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
13 Predicting Cyber bullying on Social Media in the Big Data Era Using Machine Learning Algorithms
14 Online Public Shaming on Twitter Detection Analysis and Mitigation
15 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
16 Hate Speech on Twitter A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection
17 Follow But No Track Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
18 Detecting Malicious Social Bots Based on Clickstream Sequences
19 DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction
20 Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud
21 Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
22 Automated Phrase Mining from Massive Text Corpora
23 An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
24 A Hierarchical Attention Model for Social Contextual Image Recommendation
25 A Credibility Analysis System for Assessing Information on Twitter
26 Authentication by Encrypted Negative Password
27 ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks
28 User Vitality Ranking and Prediction in Social Networking Servicesa Dynamic Network Perspective
29 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
30 Toward Shared Ownership in the Cloud
31 The Server Provisioning Problem for Continuous Distributed Interactive Applications
32 Tag Based Image Search by Social Re-ranking
33 SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks
34 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
35 SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors
36 SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud
37 Securing Aggregate Queries for DNA Databases
38 Secure Range Search over Encrypted Uncertain loT Outsourced Data
39 SDE A Novel Clustering Framework Based on Sparsity-Density Entropy
40 Resource renting for periodical cloud workflow applications
41 RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem
42 QoS Recommendation in Cloud Services
43 Profiling Online Social Behaviors for Compromised Account Detection
44 PrivacyProtectionAccessControlScheme
45 Privacy Characterization and Quantification in Data Publishing
46 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
47 NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
48 Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
49 Mitigating Cross-Site Scripting Attacks with a Content Security Policy
50 Location Aware Keyword Query Suggestion Based on Document Proximity
51 Joint Optimization of Multicast Energy in Delay Constrained Mobile WSNs
52 Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
53 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
54 Identity-Based Private Matching over Outsourced Encrypted Datasets
55 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
56 Ghost Riders Sybil Attacks on Crowdsourced Mobile Mapping Services
57 Generating Query Facets using Knowledge Bases
58 FRoDO Fraud Resilient Device for Off-Line Micro-Payments
59 Frequent Itemsets Mining with Differential Privacy over Large-scale Data
60 FraudFind Financial Fraud Detection by Analyzing Human Behavior
61 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
62 Fast Phrase Search for Encrypted Cloud Storage
63 EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
64 Enhancing Information Resilience in Disruptive Information-Centric Networks
65 Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks
66 Efficient Keyword-aware Representative Travel Route Recommendation
67 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
68 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
69 Distributed Faulty Node Detection in Delay Tolerant Networks Design and Analysis
70 DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments
71 Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
72 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
73 CryptCloud+ Secure and Expressive Data Access Control for Cloud Storage
74 CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING
75 Crawling Hidden Objects with kNN Queries
76 CoDetect Financial Fraud Detection with Anomaly Feature Detection
77 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
78 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
79 Block Design-based Key Agreement for Group Data Sharing in Cloud Computing
80 Automatically Mining Facets for Queries from Their Search Results
81 Audience Behavior Mining Integrating TV Ratings with Multimedia Conten
82 Aspect-level Influence Discovery from Graphs
83 Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach
84 Analysis of users behaviour in structured e-commerce websites
85 An Efficient Privacy-Preserving Ranked Keyword Search Method
86 Active Trust Secure and Trustable Routing in Wireless Sensor Network Networks
87 Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
88 Achieving Data Truthfulness and Privacy Preservation in Data Markets
89 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
90 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
91 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
92 A Hybrid Approach for Detecting Automated Spammers in Twitter
93 A Cross Tenant Access Control (CTAC) Model for Cloud Computing Formal Specification and Verification
94 A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
95 Secure Data Sharing In Cloud Computing Using Revocable-Storage Identity-Based Encryption
96 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
97 A Shoulder Surfing Resistant Graphical Authentication System
98 SocialQ&A An Online Social Network Based Question and Answer System
99 Using Data Mining to Predict Hospital Admissions from the Emergency Department
100 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys (Big Data)
101 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers (NETWORKING)
102 Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis with Co-Occurrence Data
103 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
104 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach (KNOWLEDGE AND DATA ENGINEERING)
105 iPath Path Inference in Wireless Sensor Networks
106 SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces (SERVICES COMPUTING)
107 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems (PARALLEL AND DISTRIBUTED SYSTEMS)
108 Continuous Answering Holistic Queries over Sensor Networks(PARALLEL AND DISTRIBUTED SYSTEMS)
109 FRAppE Detecting Malicious Facebook Applications (NETWORKING)
110 Search Me If You Can Privacy-preserving Location Query Service (MOBILE COMPUTING)
111 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach (MOBILE COMPUTING)
112 An Incentive Framework for Cellular Traffic Offloading(MOBILE COMPUTING)
113 Privacy-Preserving and Content-Protecting Location Based Queries (KNOWLEDGE AND DATA ENGINEERING)
114 Location Aware Keyword Query Suggestion Based on Document Proximity (KNOWLEDGE AND DATA ENGINEERING)
115 Resolving Multi-party Privacy Conflicts in Social Media (KNOWLEDGE AND DATA ENGINEERING)
116 FOCS Fast Overlapped Community Search (KNOWLEDGE AND DATA ENGINEERING)
117 DiploCloud Efficient and Scalable Management of RDF Data in the Cloud
118 Automatically Mining Facets for Queries from Their Search Results (KNOWLEDGE AND DATA ENGINEERING)
119 A Cocktail Approach for Travel Package Recommendation (KNOWLEDGE AND DATA ENGINEERING)
120 EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data (INTERNET OF THINGS)
121 Geometric Range Search on Encrypted Spatial Data (INFORMATION Forensics and Security)
122 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Computers)
123 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email (Computers)
124 Building an intrusion detection system using a filter-based feature selection algorithm (Computers)
125 Identity Based Encryption with Cloud Revocation Authority and Its Applications (Cloud Computing)
NON IEEE JAVA Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 CBD Cyberbullying Detection
2 Interview Insight Hub
3 Shuffling Algorithm based Dynamic Question Paper generation
4 Automated Detecting Spammers in social media
5 Bug Tracking for Improving Software Reliability
6 Improving the customer relationship management Using Data Mining
7 comprehensive analysis of security algorithm in cloud computing
8 MEASURING CLINICAL HEALTH DATABASE SIMILARITY USING CLUSTERING AND CLASSIFICATION
9 Training and Placement system
Non IEEE Android Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 LIBRARY ACCESS SYSTEM BY SMARTPHONE APPLICATION USING ANDROID
2 APARTMENT MANAGEMENT SYSTEM
IEEE Android Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Hiding in the Mobile Crowd: Location Privacy through Collaboration
2 Face-to-Face Proximity Estimation Using Bluetooth On Smartphones
3 Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
Python Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 READEASE EMPOWERING DYSLEXIA
2 Automated Multi-Language Video Subtitle Generation with English Translation
3 MediBot Drug Recommendations system
4 Deep Learning-based Auto Accident Detection and Alert System
5 Large Language Model (LLM) for Blog Article Generator with both text and images
6 Detecting Suspicious Activities in Exam Halls to Prevent Cheating
7 AI-Assisted Search for Identifying Missing Persons by Facial Recognition
8 Intelligent Social Distancing Enforcement for Health Security
9 Secured E-voting system based on iris identification
10 Educational Certificate Verification System Using Blockchain
11 Cervical Spine Fracture Detection Using Deep Neural Networks
12 Video-Text Retrieval Using Deep Learning
13 Secure and Transparent Donation Platform with Blockchain
14 Language Detection Using Machine Learning
15 Automatic Timetable Generator Using Python
16 Cough Sound Diagnostics for Lung Infection Identification
17 Malware Classification Is Used To Distinguish Unique Types of Malware from Each Other
18 An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning
19 A Controllable False Data Injection Attack for a Cyber Physical System
20 Movie Recommendation System Using Collaborative Filtering
21 ONLINE DIGITAL CHEQUE CLEARANCE AND VERIFICATION SYSTEM
22 Cyber Attack Detection Model (CADM) Based on Machine Learning
23 Spammer Detection and Fake User Identification on Social Networks
24 Currency Detection For Visually Impaired
25 Automatic Text Transcribes and Summarize From Length Audio
26 Generating Synthetic Images from textual description using GAN
27 Smart Suspect Tracker Using ML
28 Image forgery detection based on fusion of lightweight deep learning model
29 End-to-end Conversion Speed Analysis of an FPT AI-based Text-to-Speech Application
30 Machine Learning Methods For Calories Measurement of Fruits and Vegetables
31 Skin Disease Classification using Convolutional Neural Network
32 Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
33 Diabetes Prediction Using Machine Learning Algorithm
34 Social Media and Misleading Information in a Democracy A Mechanism Design Approach
35 Real Time Object detection and Recognition Using Deep Learning
36 Sign language recognition to text and voice using Cnn
37 Image Based Question and Answering System
38 Drug Recommendation System based on Sentiment Analysis of Drug Reviews using Machine Learning
39 Facial Recognition for Crime Detection
40 Gender and Age classification using CNN
41 Machine learning techniques for cyber attacks detection in network
42 DocEnTr-An End-to-End Document Image Enhancement Transformer
43 Phishing Website Detection Using Machine Learning Algorithm
44 IPL MATCH PREDICTION
45 Disease Prediction using Machine Learning
46 Online Food Ordering System
47 Clustering News Headlines using k-means and Hierarchical algorithm
48 Serendipitous Drug Usage In Social Media
49 personalized recommendataion of social images by constrcuting a user interest tree with deep features and tag trees
50 machine learning based error detection and dell design optimisation in signal intergrity application
51 Hitboost survival analysis via a multi-output gradient boosting decision tree method
52 Efficient vertical mining of high average utility itemset based on novel upper bonds
53 classified different users with mulitple instance learning from social network data
54 block chain a a game charnger for securing iot data
55 assessing the effectiveness of riparian restoration projects using landsat and preception data from the cloud computing application
56 A Generic Human Machine Annotation Framework Based on Dynamic Cooperative Learning
57 Securing ATM Transactions using Face Recognition
58 Estimate the Height Weight and BMI from Face Using Machine Learning
59 TwitPersonality-Computing Personality Traits from Tweets Using Word Embeddings and Supervised Learning
60 Fault Detection and Isolation in Industrial Processes Using Deep Learning Approaches
61 Number Plate Recognition by using ML algorithm
62 Blockchain-based Electronic Voting System with Special Ballot and Block Structures that Complies with Indonesian Principle of Voting
63 SUPERMARKET SALES ANALYSIS
64 user ratings and reviews based fraud app detection in google playstore
65 Mark It For Down Article Maker
66 EMOTION DETECTION FROM LIVE CAMERA USING CNN
67 Solving Nurse Scheduling Problem Using Constraint Programming Technique
68 Facial Movements Based Mouse Cursor Control for Physically Disabled Individual
69 Weakly-supervised Deep Embedding for Product Review Sentiment Analysis
70 Toward Better Statistical Validation of Machine Learning-Based Multimedia Quality Estimators
71 Semi-supervised machine learning approach for DDoS detection
72 Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
73 Rich Short Text Conversation Using Semantic-Key-Controlled Sequence Generation
74 Price-based Resource Allocation for Edge Computing A Market Equilibrium Approach
75 Prediction of Crude Oil Prices using Support Vector Regression (SVR) with grid search cross validation algorithm
76 Personalized Affective Feedback to Address Students Frustration in ITS
77 Multi-Traffic Scene Perception Based on Supervised Learning
78 Modeling and Predicting Cyber Hacking Breaches
79 Loan Approval Prediction based on Machine Learning Approach
80 Image Based Appraisal of Real Estate Properties
81 How Data-Driven Entrepreneur Analyzes Imperfect Information for Business Opportunity Evaluation
82 Generating Wikipedia By Summarizing Long Sequences
83 Exploratory Visual Sequence Mining Based on Pattern-Growth
84 Efficient Vertical Mining of High Average-Utility Itemsets Based on Novel Upper-Bounds
85 Designing Cyber Insurance Policies The Role of Pre-Screening and Security Interdependence
86 Deep Learning Applications in Medical Image Analysis
87 Data-Driven Design of Fog-Computing-Aided Process Monitoring System for Large-Scale Industrial Processes
88 Correlated Matrix Factorization for Recommendation with Implicit Feedback
89 Characterizing And Predicting Early Reviewers For Effective Product Marketing On E-Commerce Websites
90 Cancer Scenario in India with Future Perspectives
91 Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
92 A user-centric machine learning framework for cyber security operations center
93 A Data Mining Based Model For Detection Of Fraudulent Behaviour In Water Consumption
94 A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security
95 Spammer Detection and Fake User Identification on Social Networks
96 Credit card Fraud Detection using Predictive Modeling
97 Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes
98 A Method for Hybrid Personalized Recommender based on Clustering of Fuzzy User Profiles
R-Language Based Projects Note: We are not restricted for this list, We will do out of list also.
S.No Name
No records found.
.net Note: We are not restricted for this list, We will do out of list also.
S.No Name
No records found.
IOT Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Google Assistant Based Home Automation (IOT)
2 Home Automation Using IOT
3 Password Based Door Locking System Over IOT
4 Smart Energy Meter over IOT
5 IOT Based Garbage Monitoring System
6 Smart Street Lighting Control over IOT
7 Smart Environmental Parameters Monitoring Systme Over IOT
8 Industrial Automation over IOT
9 An IoT based Patient Health Monitoring System
10 Weather Reporting Over IOT (Temp and Humidity)
11 Dam Gate Level Monitoring For Water Resource Analysis over IOT
12 Plant Irrigation Pump Control over IOT
13 SMART STREET LIGHTS
paper preparation Note: We are not restricted for this list, We will do out of list also.
S.No Name
No records found.
MATLAB Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images
PHP Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Email Alerts on Whatsapp Web Clone
2 Library Management System
3 Online Voting System
4 Fake Product Review Monitoring and Removal for Genuine Online Product Reviews
5 E-Marketplace for Tribals
Angular js Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Loan EMI Calculator AngularJS
2 apartment management system AngularJS