?
X
+91 73383 45250      
javafirst.in@gmail.com      
  Home Full Project List Contact us          
      Students Login 
IEEE 2016-2017 JAVA PROJECTS IEEE 2016-2017 ANDROID PROJECTS IEEE 2016-2017 ANDROID IOT PROJECTS IEEE 2015-2016 JAVA PROJECTS
IEEE 2015-2016 ANDROID PROJECTS IEEE 2014-2015 JAVA PROJECTS IEEE 2014-2015 ANDROID PROJECTS REAL TIME PROJECTS
ANDROID REAL TIME PROJECTS
 
IEEE 2016-2017 JAVA PROJECTS
IEEE CLOUD COMPUTING
1. SecRBAC: Secure data in the Clouds
2. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage.
3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
4. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
5. Differentially Private Online Learning for Cloud-Based Video Recommendation with Multimedia Big Data in Social Networks
6. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
7. A Cloud Trust Evaluation System using Hierarchical Fuzzy Inference System for Service Selection
8. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
9. Fog Computing May Help to Save Energy in Cloud Computing
10. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
IEEE NETWORKING
11. JOKER: A Novel Opportunistic Routing Protocol
12. Software Defined Networking with Pseudonym Systems for Secure Vehicular Clouds
13. An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path
14. Privacy-Preserving Location Sharing Services for Social Networks
15. Modified AODV Routing Protocol to Improve Security and Performance against Black Hole Attack
IEEE IMAGE PROCESSING
16. Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
17. A Shoulder Surfing Resistant Graphical Authentication System
18. Single Sample Face Recognition Based on LPP Feature Transfer
19. Reversible Data Hiding in Encrypted Image with Distributed Source Encoding
20. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
IEEE DATA MINING OR WEB MINING
21. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
22. Sentiment Analysis of Top Colleges in India Using Twitter Data
23. FRAppE: Detecting Malicious Facebook Applications
24. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
25. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
26. Machine Learning Approach to Forecasting Urban Pollution
27. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
IEEE WEB SECURITY
28. Dummy-Based User Location Anonymization Under Real-World Constraints
29. An Exploration of Geographic Authentication Schemes
30. PRISM: PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
IEEE BIG DATA
31. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
32. Protection of Big Data Privacy
33. The SP Theory of Intelligence: Distinctive Features and Advantages
34. Phoenix: A MapReduce Implementation With New Enhancements
IEEE 2016-2017 ANDROID PROJECTS
IEEE ANDROID PROJECTS
35. Dummy-Based User Location Anonymization Under Real World Constraints
36. Context-Aware Mobile Cloud Computing and Its Challenges
37. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
38. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
39. Intelligent Hands Free Speech based SMS System on Android
40. Centralized web application supporting vehicle Toll Payment System
IEEE 2016-2017 ANDROID IOT PROJECTS
IEEE ANDROID IOT
41. Centralized web application supporting vehicle Toll Payment System
IEEE 2015-2016 JAVA PROJECTS
IEEE CLOUD COMPUTING
42. Secure Sensitive Data Sharing on a Big Data Platform
43. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
44. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
45. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
46. A Hybrid Cloud Approach for Secure Authorized Deduplication
47. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
48. A Tree Regression Based Approach for VM Power Metering
49. Secure Auditing and Deduplicating Data in Cloud
50. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
51. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
52. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
53. I-sieve: An Inline High Performance Deduplication System Used in Cloud Storage
54. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
55. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
56. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
57. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
IEEE NETWORKING
58. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
59. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
60. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
61. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
62. Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
63. Resource Allocation for Energy Efficiency Optimization in Heterogeneous Networks
IEEE IMAGE PROCESSING
64. FeatureMatch: A General ANNF Estimation Technique and its Applications
65. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
66. Reversible Image Data Hiding with Contrast Enhancement
67. RRW?A Robust and Reversible WatermarkingTechnique for Relational Data
68. Face Recognition and Retrieval Using Cross-Age Reference Coding With Cross-Age Celebrity Dataset
69. Joint Feature Learning for Face Recognition
IEEE DATA MINING OR WEB MINING
70. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
71. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
72. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
73. Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis
74. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
IEEE WEB SECURITY
75. Secure Auditing and Deduplicating Data in Cloud
76. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
77. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
78. Secure Sensitive Data Sharing on a Big Data Platform
79. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
80. RRW?A Robust and Reversible Watermarking Technique for Relational Data
81. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
IEEE BIG DATA
82. Secure Sensitive Data Sharing on a Big Data Platform
83. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
84. Big Data and the SP Theory of Intelligence
85. Research Directions for Engineering Big Data Analytics Software
IEEE 2015-2016 ANDROID PROJECTS
IEEE ANDROID PROJECTS
86. Energy Cost Models of Smartphones for Task Offloading to the Cloud
87. Context-based Access Control Systemsfor Mobile Devices
88. Sesame: A Secure and Convenient Mobile Solution for Passwords
89. Avatar: Mobile Distributed Computing in the Cloud
IEEE 2014-2015 JAVA PROJECTS
IEEE CLOUD COMPUTING
90. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
91. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
92. A Review on the State-of-the-Art Privacy Preserving Approaches in the e-Health Clouds
93. Proactive Workload Management in Hybrid Cloud Computing
94. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
95. Consistency as a Service:Auditing Cloud Consistency
96. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
97. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
98. Towards Differential Query Services in Cost-Efficient Clouds
IEEE NETWORKING
99. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
100. E -MACs: Towards More Secure and More Efficient Constructions of Secure Channels
101. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
102. Preserving Location privacy in Geo-Social Applications
103. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
104. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
105. Reliable Energy Efficient Routing Algorithms In Wireless Ad Hoc Networks
106. Community-Aware Opportunistic Routing in Mobile Social Networks
107. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
108. Building a Scalable System for Stealthy P2P-Botnet Detection
109. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
110. Intrusion detection System(IDS) using layered based approaches for finding attacks
IEEE IMAGE PROCESSING
111. Web Image Re-ranking Using Query-Specific Semantic Signatures
112. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
113. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
114. Online Payment System using Steganography and Visual Cryptography
115. Captcha as Graphical Passwords?A New Security Primitive Based on Hard AI Problems
IEEE DATA MINING OR WEB MINING
116. Supporting Privacy Protection in Personalized Web Search
117. Exploiting Service Similarity for Privacy in Location Based Search Queries
118. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
119. Web Image Re-ranking Using Query-Specific Semantic Signatures
120. Framework for Surveillance of Instant Messages in Instant messengers and Social neworking sites using Data Mining and Ontology
121. Secure Mining of Association Rules in Horizontally Distributed Databases
122. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
123. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
124. Facilitating Document Annotation using Content and Querying Value
125. Towards Differential Query Services in Cost-Efficient Clouds
IEEE WEB SECURITY
126. E -MACs: Towards More Secure and More Efficient Constructions of Secure Channels
127. Preserving Location Privacy in Geo-Social Applications
128. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
129. Online Payment System using Steganography and Visual Cryptography
130. Captcha as Graphical Passwords?A New Security Primitive Based on Hard AI Problems
IEEE 2014-2015 ANDROID PROJECTS
IEEE ANDROID PROJECTS
131. Anti-theft for Android Based Devices
132. Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
133. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
134. How Long to Wait? Predicting Bus Arrival Time With Mobile Phone Based Participatory Sensing
135. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
136. ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password reuse Attacks
137. iMAS: an Intelligent Mobile Advertising System: Development and Implementation
138. Secure Transmission Medical Data for Pervasive Healthcare System using Android
139. Context Aware Mobile Navigation System for Visually Impaired People Using Mobile Cloud Computing
140. RoadAlarm: a Spatial Alarm System on Road Networks
141. NFC Based Secure Mobile Healthcare System
REAL TIME PROJECTS
REAL TIME PROJECTS
142. Election Polling System
143. Using Template Based Password for Authentication in E-Banking
144. Secret Message Communication Using Image Steganography
145. Innovative Flat searching system using GPS Co-ordinates
146. Blood Bank Management System
147. Jewellery Shop Management System
148. An Intelligent Cloud Computing Architecture Supporting e-Governance
ANDROID REAL TIME PROJECTS
ANDROID REAL TIME PROJECTS


 
 
  ON JOB TRAINING  
Students need not search a JOB. This is a Training cum 100% Placement program.
Students get the Job with in 2 to 3 months
Students are trained in different platforms to work one real time project.
Students will be getting real knowledge on Software Development Life Cycle.
Students will be treated individually with special care.
       
: 73383 45250
: javafirst.in@gmail.com
Home   Full Project List   Contact Us
 
Copyright 2015 Java First