IEEE 2016 IT PROJECTS
S.NO |
Project Title |
Tech |
1
|
SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
|
JAVA |
2 |
On Summarization and Timeline Generation for Evolutionary Tweet Streams
|
JAVA |
3 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
JAVA |
4 |
EnDAS Efficient Encrypted Data Search as a Mobile Cloud Service
|
JAVA |
5 |
FRAppE: Detecting Malicious Facebook Applications |
JAVA |
6 |
Steganography Using Reversible Texture Synthesis |
JAVA |
7 |
Smar tCrawler : A Two-stage Crawler for Efficiently Har vesting Deep-Web Interfaces |
JAVA |
8 |
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System |
DOTNET |
9 |
Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter |
JAVA |
10 |
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
JAVA |
11 |
Secure Auditing and Deduplicating Data in Cloud |
JAVA |
12 |
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
JAVA |
13 |
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
JAVA |
14 |
An Attribute-assisted Re ranking Model for Web Image Search |
JAVA |
15 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
JAVA |
16 |
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks |
JAVA |
17 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
JAVA |
18 |
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
JAVA |
19 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
JAVA |
20 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
JAVA |
21 |
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
JAVA |
22 |
Tweet Segmentation and Its Application to Named Entity Recognition |
JAVA |
23 |
Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks |
JAVA |
24 |
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
JAVA |
25 |
Effective Key Management in Dynamic Wireless Sensor Networks |
JAVA |
26 |
Discovery of Ranking Fraud for Mobile Apps |
JAVA |
27 |
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
JAVA |
28 |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
|
JAVA |
29 |
Anonymizing Collections of Tree-Structured Data |
JAVA |
30 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
|
JAVA |
31 |
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
JAVA |
32 |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
JAVA |
33 |
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks |
JAVA |
34 |
Continuous and Transparent User Identity Verification for Secure Internet Services |
JAVA |
35 |
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
JAVA |
36 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
JAVA |
37 |
Progressive Duplicate Detection |
JAVA |
38 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
JAVA |
|
|
|
|
|
|
2016-01-01National Computers at Padmavathi Nagar
2016-01-01SBTET Office Automation Admissions open