?
X
+91 73383 45250      
javafirst.in@gmail.com      
  Home Full Project List Contact us          
      Students Login 
IEEE 2017-2018 JAVA PROJECTS IEEE 2017-2018 ANDROID PROJECTS IEEE 2017-2018 ANDROID IOT PROJECTS IEEE 16-2017 JAVA PROJECTS
IEEE 2016-2017 ANDROID PROJECTS IEEE 2016-2017 ANDROID IOT PROJECTS IEEE 15-2016 JAVA PROJECTS IEEE 15-2016 ANDROID PROJECTS
IEEE 14-2015 JAVA PROJECTS IEEE 14-2015 ANDROID PROJECTS REAL TIME PROJECTS ANDROID REAL TIME PROJECTS
 
IEEE 2017-2018 JAVA PROJECTS
IEEE CLOUD COMPUTING
1. Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
2. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
3. Cost Minimization Algorithms for Data Center Management
4. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
5. Optimizing Green Energy, Cost, and Availability in Distributed Data Centers
6. Vehicular Cloud Data Collection for Intelligent Transportation Systems
7. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
8. A Collision-Mitigation Cuckoo Hashing Scheme for Large-scale Storage Systems
9. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
10. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
11. Minimum-cost Cloud Storage Service Across Multiple Cloud Providers
12. Poster Abstract: Data-Centric IoT Services Provisioning in Fog-Cloud Computing
IEEE NETWORKING
IEEE IMAGE PROCESSING
13. Face Recognition Using Sparse Fingerprint Classification Algorithm
14. Enhanced Password Processing Scheme Based on Visual Cryptography and OCR
15. One-time Password for Biometric Systems: Disposable Feature Templates
16. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
IEEE DATA MINING OR WEB MINING
17. A Workflow Management System for Scalable Data Mining on Clouds
18. NetSpam: a Network-based Spam DetectionFramework for Reviews in Online Social Media
19. SocialQ&A: An Online Social Network Based Question and Answer System
20. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors
21. Truth Discovery in Crowdsourced Detection of Spatial Events
22. Point-of-interest Recommendation for Location Promotion in Location-based Social Networks
23. Efficient Processing of Skyline Queries Using MapReduce
IEEE WEB SECURITY
24. Authorship Attribution for Social Media Forensics
IEEE BIG DATA
25. SocialQ&A: An Online Social Network Based Question and Answer System
IEEE 2017-2018 ANDROID PROJECTS
IEEE ANDROID PROJECTS
26. IOT Based Home Security Through Digital Image Processing Algorithms
27. Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems
28. Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
29. IOT SENTINEL: Automated Device-TypeIdentification for Security Enforcement in IoT
30. NFC Featured 3 Level Authentication System for ATM
31. A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password∗
32. Blind Aid Stick:Hurdle Recognition,Simulated Perception,Android Integrated Voice Based Cooperation via GPS Along With Panic Alert System.
IEEE 2017-2018 ANDROID IOT PROJECTS
IEEE ANDROID IOT
33. IOT Based Home Security Through Digital Image Processing Algorithms
34. NFC Featured 3 Level Authentication System for ATM
35. A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password∗
36. IOT S ENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
37. Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
38. Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems
39. Blind Aid Stick:Hurdle Recognition,Simulated Perception,Android Integrated Voice Based Cooperation via GPS Along With Panic Alert System.
IEEE 16-2017 JAVA PROJECTS
IEEE CLOUD COMPUTING
40. SecRBAC: Secure data in the Clouds
41. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage.
42. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
43. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
44. Differentially Private Online Learning for Cloud-Based Video Recommendation with Multimedia Big Data in Social Networks
45. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
46. A Cloud Trust Evaluation System using Hierarchical Fuzzy Inference System for Service Selection
47. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
48. Fog Computing May Help to Save Energy in Cloud Computing
49. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
IEEE NETWORKING
50. JOKER: A Novel Opportunistic Routing Protocol
51. Software Defined Networking with Pseudonym Systems for Secure Vehicular Clouds
52. An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path
53. Privacy-Preserving Location Sharing Services for Social Networks
54. Modified AODV Routing Protocol to Improve Security and Performance against Black Hole Attack
IEEE IMAGE PROCESSING
55. Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
56. A Shoulder Surfing Resistant Graphical Authentication System
57. Single Sample Face Recognition Based on LPP Feature Transfer
58. Reversible Data Hiding in Encrypted Image with Distributed Source Encoding
59. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
IEEE DATA MINING OR WEB MINING
60. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
61. Sentiment Analysis of Top Colleges in India Using Twitter Data
62. FRAppE: Detecting Malicious Facebook Applications
63. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
64. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
65. Machine Learning Approach to Forecasting Urban Pollution
66. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
IEEE WEB SECURITY
67. Dummy-Based User Location Anonymization Under Real-World Constraints
68. An Exploration of Geographic Authentication Schemes
69. PRISM: PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
IEEE BIG DATA
70. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
71. Protection of Big Data Privacy
72. The SP Theory of Intelligence: Distinctive Features and Advantages
73. Phoenix: A MapReduce Implementation With New Enhancements
IEEE 2016-2017 ANDROID PROJECTS
IEEE ANDROID PROJECTS
74. Dummy-Based User Location Anonymization Under Real World Constraints
75. Context-Aware Mobile Cloud Computing and Its Challenges
76. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
77. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
78. Intelligent Hands Free Speech based SMS System on Android
79. Centralized web application supporting vehicle Toll Payment System
IEEE 2016-2017 ANDROID IOT PROJECTS
IEEE ANDROID IOT
80. Centralized web application supporting vehicle Toll Payment System
IEEE 15-2016 JAVA PROJECTS
IEEE CLOUD COMPUTING
81. Secure Sensitive Data Sharing on a Big Data Platform
82. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
83. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
84. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
85. A Hybrid Cloud Approach for Secure Authorized Deduplication
86. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
87. A Tree Regression Based Approach for VM Power Metering
88. Secure Auditing and Deduplicating Data in Cloud
89. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
90. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
91. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
92. I-sieve: An Inline High Performance Deduplication System Used in Cloud Storage
93. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
94. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
95. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
96. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
IEEE NETWORKING
97. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
98. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
99. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
100. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
101. Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
102. Resource Allocation for Energy Efficiency Optimization in Heterogeneous Networks
IEEE IMAGE PROCESSING
103. FeatureMatch: A General ANNF Estimation Technique and its Applications
104. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
105. Reversible Image Data Hiding with Contrast Enhancement
106. RRW?A Robust and Reversible WatermarkingTechnique for Relational Data
107. Face Recognition and Retrieval Using Cross-Age Reference Coding With Cross-Age Celebrity Dataset
108. Joint Feature Learning for Face Recognition
IEEE DATA MINING OR WEB MINING
109. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
110. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
111. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
112. Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis
113. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
IEEE WEB SECURITY
114. Secure Auditing and Deduplicating Data in Cloud
115. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
116. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
117. Secure Sensitive Data Sharing on a Big Data Platform
118. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
119. RRW?A Robust and Reversible Watermarking Technique for Relational Data
120. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
IEEE BIG DATA
121. Secure Sensitive Data Sharing on a Big Data Platform
122. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
123. Big Data and the SP Theory of Intelligence
124. Research Directions for Engineering Big Data Analytics Software
IEEE 15-2016 ANDROID PROJECTS
IEEE ANDROID PROJECTS
125. Energy Cost Models of Smartphones for Task Offloading to the Cloud
126. Context-based Access Control Systemsfor Mobile Devices
127. Sesame: A Secure and Convenient Mobile Solution for Passwords
128. Avatar: Mobile Distributed Computing in the Cloud
IEEE 14-2015 JAVA PROJECTS
IEEE CLOUD COMPUTING
129. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
130. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
131. A Review on the State-of-the-Art Privacy Preserving Approaches in the e-Health Clouds
132. Proactive Workload Management in Hybrid Cloud Computing
133. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
134. Consistency as a Service:Auditing Cloud Consistency
135. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
136. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
137. Towards Differential Query Services in Cost-Efficient Clouds
IEEE NETWORKING
138. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
139. E -MACs: Towards More Secure and More Efficient Constructions of Secure Channels
140. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
141. Preserving Location privacy in Geo-Social Applications
142. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
143. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
144. Reliable Energy Efficient Routing Algorithms In Wireless Ad Hoc Networks
145. Community-Aware Opportunistic Routing in Mobile Social Networks
146. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
147. Building a Scalable System for Stealthy P2P-Botnet Detection
148. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
149. Intrusion detection System(IDS) using layered based approaches for finding attacks
IEEE IMAGE PROCESSING
150. Web Image Re-ranking Using Query-Specific Semantic Signatures
151. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
152. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
153. Online Payment System using Steganography and Visual Cryptography
154. Captcha as Graphical Passwords?A New Security Primitive Based on Hard AI Problems
IEEE DATA MINING OR WEB MINING
155. Supporting Privacy Protection in Personalized Web Search
156. Exploiting Service Similarity for Privacy in Location Based Search Queries
157. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
158. Web Image Re-ranking Using Query-Specific Semantic Signatures
159. Framework for Surveillance of Instant Messages in Instant messengers and Social neworking sites using Data Mining and Ontology
160. Secure Mining of Association Rules in Horizontally Distributed Databases
161. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
162. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
163. Facilitating Document Annotation using Content and Querying Value
164. Towards Differential Query Services in Cost-Efficient Clouds
IEEE WEB SECURITY
165. E -MACs: Towards More Secure and More Efficient Constructions of Secure Channels
166. Preserving Location Privacy in Geo-Social Applications
167. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
168. Online Payment System using Steganography and Visual Cryptography
169. Captcha as Graphical Passwords?A New Security Primitive Based on Hard AI Problems
IEEE 14-2015 ANDROID PROJECTS
IEEE ANDROID PROJECTS
170. Anti-theft for Android Based Devices
171. Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
172. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
173. How Long to Wait? Predicting Bus Arrival Time With Mobile Phone Based Participatory Sensing
174. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
175. ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password reuse Attacks
176. iMAS: an Intelligent Mobile Advertising System: Development and Implementation
177. Secure Transmission Medical Data for Pervasive Healthcare System using Android
178. Context Aware Mobile Navigation System for Visually Impaired People Using Mobile Cloud Computing
179. RoadAlarm: a Spatial Alarm System on Road Networks
180. NFC Based Secure Mobile Healthcare System
REAL TIME PROJECTS
REAL TIME PROJECTS
181. Election Polling System
182. Using Template Based Password for Authentication in E-Banking
183. Secret Message Communication Using Image Steganography
184. Innovative Flat searching system using GPS Co-ordinates
185. Blood Bank Management System
186. Jewellery Shop Management System
187. An Intelligent Cloud Computing Architecture Supporting e-Governance
188. Drugs Purchase & Sales
189. Web Based Ordering Portal for Food Courts
190. HOAX App Detection
191. Signature Verification System
192. Online Bus Reservation System
193. Old Age Pension System
194. Ad Sense
195. Image Stegnography
ANDROID REAL TIME PROJECTS
ANDROID REAL TIME PROJECTS


 
 
  ON JOB TRAINING  
Students need not search a JOB. This is a Training cum 100% Placement program.
Students get the Job with in 2 to 3 months
Students are trained in different platforms to work one real time project.
Students will be getting real knowledge on Software Development Life Cycle.
Students will be treated individually with special care.
       
: 73383 45250
: javafirst.in@gmail.com
Home   Full Project List   Contact Us
 
Copyright 2015 Java First