software projects in chennai

12
T:044-43515757 M:- 7812045575 * 1 * www.phoenix-systems.co.in Project Guidance For M.E, M.Tech, B.E, B.Tech, M.Sc,M.C.A,B.Sc,B.C.A, Diploma JAVA * J2EE* C#.Net * ASP.NET & ANDROID Projects In The Areas Of Networking,Application Projects,Web Application Projects ,Data Mining,Mobile Applications Using Java/J2EE/J2ME ,Asp.Net/C#.Net

Upload: phoenix-systems

Post on 11-Aug-2015

127 views

Category:

Education


0 download

TRANSCRIPT

T:044-43515757 M:- 7812045575 * 1 * www.phoenix-systems.co.in

Project Guidance For

M.E, M.Tech, B.E, B.Tech,

M.Sc,M.C.A,B.Sc,B.C.A, Diploma

JAVA * J2EE* C#.Net * ASP.NET

&

ANDROID

Projects In The Areas Of

Networking,Application Projects,Web Application

Projects ,Data Mining,Mobile Applications Using Java/J2EE/J2ME ,Asp.Net/C#.Net

T:044-43515757 M:- 7812045575 * 2 * www.phoenix-systems.co.in

JAVA*J2EE Projects Knowledge and Data Engineering

1. A Query Approach for Influence Maximization on Specific Users in Social Networks - 2015

2. Progressive Duplicate Detection - 2015

3. Scalable Constrained Spectral Clustering - 2015

4. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing - 2015

5. Discovery of Ranking Fraud for Mobile Apps - 2015

6. INSPIRE: A Framework for Incremental Spatial Prefix Query Relaxation - 2015

7. Checking Chase Termination: Cyclicity Analysis and Rewriting Techniques - 2015

8. Active Learning for Ranking through Expected Loss Optimization- 2015

9. Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection - 2015

10. ePeriodicity: Mining Event Periodicity from Incomplete Observations- 2015

11. GDCluster: A General Decentralized Clustering Algorithm- 2015

12. Spatio-Temporal Analysis of Passive Consumption in Internet Media - 2015

13. Authentication of Moving Top-k Spatial Keyword Queries- 2015

14. Keyword Search Over Probabilistic RDF Graphs- 2015

15. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015

16. Distributed Multi-Agent Online Learning Based on Global Feedback- 2015

17. Customizable Point-of-Interest Queries in Road Networks- 2015

18. E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams- 2015

19. LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015

20. Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks- 2015

21. GFilter: A General Gram Filter for String Similarity Search - 2015

22. PruDent: A Pruned and Confident Stacking Approach for Multi-label Classification- 2015

23. RRW—A Robust and Reversible Watermarking Technique for Relational Data- 2015

24. Multi-Keyword Privacy-Preserving Search in Personal Server Networks- 2015

25. Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014

26. Range Aggregation With Set Selection-2014

27. Facilitating Document Annotation Using Content and Querying Value-2014

28. Automatic Itinerary Planning for Traveling Services-2014

29. Adaptive Preprocessing for Streaming Data-2014

30. Optimized Cartesian K-Means-2014

31. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-2014

32. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services-

2014

33. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014

34. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-2014

35. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014

36. An Air Index for Spatial Query Processing in Road Networks-2014

37. An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014

38. Multi-Dimensional Classification with Super-Classes

39. T-Drive : Driving Directions Based on Taxi Trajectories-2013

40. A System to filter unwanted messages from OSN user walls-2013

41. A Fast Clustering Based Feature Subset Selection Algorithm for High Dimensional Data-2013

42. A fuzzy self-constructing feature clustering algorithm for text classification -2011

43. Extended XML Tree Pattern Matching: Theories and Algorithms-2011

T:044-43515757 M:- 7812045575 * 3 * www.phoenix-systems.co.in

Mobile Computing

1. Performance Comparison of Routing Protocols for Cognitive Radio Networks-2015

2. Towards Maximizing Timely Content Delivery in Delay Tolerant Networks-2015

3. High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks-2015

4. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems-2015

5. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers-2015

6. Taming Cross-Technology Interference for WiFi and ZigBee Coexistence Networks-2015

7. Sequence-Based Localization in Wireless Sensor Networks-2015

8. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015

9. A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless

Networks-2015

10. Distributed Channel Probing for Efficient Transmission Scheduling in Wireless Networks-2015

11. Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols-2015

12. Offloading in Mobile Cloudlet Systems with Intermittent Connectivity-2015

13. Global Sensor Deployment and Local Coverage-Aware Recovery Schemes for Smart Environments-2015

14. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014

15. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014

16. Discovery and verification of Neighbor positions in Mobile Ad HOC networks-2013

17. EMAP - Expedite Message Authentication Protocol for Vehicular Ad-hoc Networks-2013

18. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013

Cloud Computing

1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing- 2015

2. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds -2015

3. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015

4. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems- 2015

5. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers-

2015

6. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds - 2015

7. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015

8. Strategy Configurations of Multiple Users Competition for Cloud Service Reservation- 2015

9. MonPaaS: An Adaptive Monitoring Platformas a Service for Cloud Computing Infrastructures and

Services - 2015

10. DyScale: a Map Reduce Job Scheduler for Heterogeneous Multicore Processors- 2015

11. Poris: A Scheduler for Parallel Soft Real-Time Applications in Virtualized Environment- 2015

12. Hadoop Performance Modeling for Job Estimation and Resource Provisioning - 2015

13. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud - 2015

14. Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments with

Telecom Operator Cloud- 2015

15. Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing Systems-

2015

16. BURSE: A Bursty and Self-Similar Workload Generator for Cloud Computing - 2015

T:044-43515757 M:- 7812045575 * 4 * www.phoenix-systems.co.in

17. Coral: a Cloud-Backed Frugal File System- 2015

18. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014 19. Security as a Service Model for Cloud Environment-2014

20. Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems-2013 21. Privacy Preserving Delegated Access Control in public clouds-2013 22. Security and privacy-enhancing multi cloud architectures-2013 23. Toward privacy-assured and searchable cloud data storage services-2013 24. Ensuring Data Storage Security in Cloud Computing-2013

Networking & Wireless Sensor Networks

1. Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs-2015

2. Resampling-Based Ensemble Methods for Online Class Imbalance Learning-2015

3. Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks-2015

4. Decentralized Energy Allocation for Wireless Networks with Renewable Energy Powered Base Stations-2015

5. Directional Diagnosis for Wireless Sensor Networks -2015

6. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks-2015

7. Disco: Improving Packet Delivery via Deliberate Synchronized Constructive Interference -2015

8. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks-2015

9. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks -2015

10. Trust Management for Defending On-Off Attacks -2015

11. Throughput Assurance for Multiple Body Sensor Networks -2015

12. An Efficient Distributed Trust Model for Wireless Sensor Networks -2015

13. Cluster-Based Epidemic Control through Smartphone-Based Body Area Networks -2015

14. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce-2015

15. Content-Aware Concurrent Multipath Transfer for High-Definition Video Streaming over Heterogeneous

Wireless Networks-2015

16. Proportional Fair Coding for Wireless Mesh Networks-2014

17. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous

Wireless Sensor Networks-2014

18. Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks-2014

19. DTN-Metro: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility-2014

20. Denial-of-Service Attacks in Bloom-Filter-Based Forwarding-2014

21. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014

22. Topology-Transparent Scheduling via the Chinese Remainder Theorem-2014

23. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014

24. Cross-domain privacy-preserving protocol for cooperative firewall optimization-2013

25. EAACK - A Secure Intrusion Detection System for MANETs-2013

26. Enhancing Voice over WLAN via Rate Adaptation and Retry Scheduling-2013

27. Network Modeling Peer to Peer Analyze using Cache-2013.

Information Forensics and Security

1. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing-2015

2. Effective Data Access Control for Multi authority Cloud Storage Systems-2015

3. Privacy-Preserving Detection of Sensitive Data Exposure-2015

T:044-43515757 M:- 7812045575 * 5 * www.phoenix-systems.co.in

4. On the Use of Client Identity Information for Face Anti spoofing -2015

5. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems -2015

6. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Non causal Side Information-2015

7. A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks-2014

8. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks-2014

9. On the Security of Trustee-Based Social Authentications -2014

Dependable and Secure Computing

1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015

2. Deleting Secret Data with Public Verifiability-2015

3. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015

4. Trust-based Service Management for Social Internet of Things Systems-2015

5. PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications-2014 6. STARS: A Statistical Traffic Pattern Discovery System for manets-2014 7. Hiding in the mobile crowd:Location privacy through collaboration-2014 8. NICE: Network Intrusion Detection and Countermeasure Selection In Virtual Network Systems -

2013 9. A Self-Organizing Trust Model for Peer-to-Peer Systems-2013 10. Nymble: Blocking Misbehaving Users in Anonymizing Networks-2011

Software Engineering

1. Automated Checking of Conformance to Requirements Templates using Natural Language Processing-2015

2. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015

3. Estimating Computational Requirements in Multi-Threaded Applications -2015

4. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015

5. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-Proneness Prediction?

An Empirical Study -2015

6. Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-

Inference Algorithms-2015

7. A Model-Driven Methodology for Developing Secure Data-Management Applications-2014

Parallel and Distributed Systems

1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015

2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-2015

3. Deleting Secret Data with Public Verifiability-2015

4. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015

5. Trust-based Service Management for Social Internet of Things Systems-2015

6. COMIC: Cost Optimization for Internet Content Multihoming-2014

7. Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless Networks-2014

8. The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and

Evaluation-2014

9. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014

10. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-2013

11. Covering Points of Interest with Mobile Sensors-2013

12. Detection and Localization of Multiple Spoofing Attacks-2013.

T:044-43515757 M:- 7812045575 * 6 * www.phoenix-systems.co.in

Application Projects (MCA, M.Sc., Diploma Projects)

1. Erp

2. Adaptive intrusion detection system

3. Natural language query processing

4. Scheduling operation with facility management for logistic system

5. Defect tracking for improving product quality and productivity

6. Ensuring data security in cloud computing

7. A new algorithm for three party quantum key distribution

8. A fuzzy feature clustering for text classification

9. Automatic question paper generation

10. Automatic end semester time table generation

11. Learn to personalized image search from photo sharing web sites

12. Material management system

13. Mobile banking security system using j2me application

14. Multi server communication in distributed management system

15. Online task management system

16. Online quiz

17. Optimal dynamic path restoration in mesh network

18. Placement management system

19. Transfer certificate issuing system

20. Query matching process using xml tree pattern

21. Scheduled Operations Resource Facilitating System

T:044-43515757 M:- 7812045575 * 7 * www.phoenix-systems.co.in

DOT. NET PROJECT TITLES

(VB.NET*C#.NET*ASP.NET) Information Forensics and Security

1. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing-2015

2. Effective Data Access Control for Multi authority Cloud Storage Systems-2015

3. Privacy-Preserving Detection of Sensitive Data Exposure-2015

4. On the Use of Client Identity Information for Face Anti spoofing -2015

5. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems -2015

6. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Non causal Side Information-2015

7. Privacy-Preserving Authenticated Key-Exchange Over Internet-2014

8. Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks-2014 9. Top-k Query Result Completeness Verification in Tiered Sensor Networks-2014

10. A Probabilistic Model of Visual Cryptography-2012

Mobile Computing

1. Performance Comparison of Routing Protocols for Cognitive Radio Networks-2015

2. Towards Maximizing Timely Content Delivery in Delay Tolerant Networks-2015

3. High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks-2015

4. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems-2015

5. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers-2015

6. Sequence-Based Localization in Wireless Sensor Networks-2015

7. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015

8. A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless

Networks-2015

9. Distributed Channel Probing for Efficient Transmission Scheduling in Wireless Networks-2015

10. Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols-2015

11. Offloading in Mobile Cloudlet Systems with Intermittent Connectivity-2015

12. Global Sensor Deployment and Local Coverage-Aware Recovery Schemes for Smart Environments-2015

13. A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute Mobile-2014

14. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014

15. GreenBSN: Enabling Energy-Proportional Cellular Base Station Networks-2014

16. Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular Networks-2014

17. Rate Adaptation for 802.11 Multiuser MIMO Networks-2014

18. RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning-2014

19. Smart cut: Mitigating 3G Radio Tail Effect on Smartphones-2014

20. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014

21. Effective Authentication of Mobile and pervasive computing-2014

22. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013

23. Toward Privacy Preserving and Collusion Resistance in a Location Proof -2013

24. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity-2013

25. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks-2009

26. On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Routing-2009

T:044-43515757 M:- 7812045575 * 8 * www.phoenix-systems.co.in

Cloud Computing

1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing- 2015

2. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015

3. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems- 2015

4. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers-

2015

5. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds - 2015

6. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015

7. Strategy Configurations of Multiple Users Competition for Cloud Service Reservation- 2015

8. MonPaaS: An Adaptive Monitoring Platformas a Service for Cloud Computing Infrastructures and

Services - 2015

9. DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors- 2015

10. Poris: A Scheduler for Parallel Soft Real-Time Applications in Virtualized Environment- 2015

11. Hadoop Performance Modeling for Job Estimation and Resource Provisioning - 2015

12. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud - 2015

13. Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments with

Telecom Operator Cloud- 2015

14. Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing Systems-

2015

15. BURSE: A Bursty and Self-Similar Workload Generator for Cloud Computing - 2015

16. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks-2014

17. An Analysis of Failure-Related Energy Waste in a Large-Scale Cloud Environment-2014

18. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application-2014

19. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014

20. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud-2013

21. QOS Ranking Prediction for Cloud Services-2013

22. Tokenization And Encryption For Personal Health Record Using Cloud-2013

23. Scalable and Secure Sharing of Personal Health Records in Cloud Computing-2013

24. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud-2012

25. Exploiting Dynamic Resource Allocation-2011

Knowledge and Data Engineering

1. Authentication of Moving Top-k Spatial Keyword Queries- 2015

2. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

-2015

3. Lossless Selection Views under Conditional Domain Constraints-2015

4. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage -

2015

5. Keyword Search Over Probabilistic RDF Graphs- 2015

6. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015

7. Distributed Multi-Agent Online Learning Based on Global Feedback- 2015

8. A Query Approach for Influence Maximization on Specific Users in Social Networks - 2015

9. Progressive Duplicate Detection - 2015

T:044-43515757 M:- 7812045575 * 9 * www.phoenix-systems.co.in

10. Scalable Constrained Spectral Clustering - 2015

11. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing - 2015

12. Discovery of Ranking Fraud for Mobile Apps - 2015

13. INSPIRE: A Framework for Incremental Spatial Prefix Query Relaxation - 2015

14. Checking Chase Termination: Cyclicity Analysis and Rewriting Techniques - 2015

15. Active Learning for Ranking through Expected Loss Optimization- 2015

16. Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection - 2015

17. ePeriodicity: Mining Event Periodicity from Incomplete Observations- 2015

18. GDCluster: A General Decentralized Clustering Algorithm- 2015

19. Spatio-Temporal Analysis of Passive Consumption in Internet Media - 2015

20. Range Aggregation With Set Selection-2014

21. Facilitating Document Annotation Using Content and Querying Value-2014

22. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-2014

23. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services-

2014

24. Classifier Ensembles with the Extended Space Forest-2014

25. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014

26. Privacy-Preserving and Content-Protecting Location Based Queries-2014

27. Learning Conditional Preference Networks from Inconsistent Examples-2014

28. Fast Nearest Neighbor Search with Keywords-2014

29. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-2014

30. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs-2014

31. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014

32. LARS: An Efficient and Scalable Location-Aware Recommender System-2014

33. Highly comparative feature-based time-series classification-2014

34. Keyword Query Routing-2014

35. Secure Mining of Association Rules in Horizontally Distributed Databases-2014

36. Personalized Mobile Search Engine-2013

37. A Quick web search Engine-2013

38. Toward Secure Multi keyword Top-k-2013

39. Lineage encoding-an efficient wireless xml streaming supporting twig pattern queries-2013

Dependable and Secure Computing

1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015

2. Deleting Secret Data with Public Verifiability-2015

3. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015

4. Trust-based Service Management for Social Internet of Things Systems-2015

5. STARS: A Statistical Traffic Pattern Discovery System for manets-2014

6. Abductive Analysis of Administrative Policies in Rule-based Access Control-2014

Software Engineering

1. Automated Checking of Conformance to Requirements Templates using Natural Language Processing-2015

2. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015

3. Estimating Computational Requirements in Multi-Threaded Applications -2015

4. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015

T:044-43515757 M:- 7812045575 * 10 * www.phoenix-systems.co.in

5. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-Proneness Prediction?

An Empirical Study -2015

6. Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-

Inference Algorithms-2015

7. An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with Undetermined Input

Spaces-2014

8. Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013

9. Centroidal Voronoi Tessellations—A New Approach to Random Testing-2013

10. Test Case-Aware Combinatorial Interaction Testing-2013

Parallel and Distributed Systems

1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015

2. Deleting Secret Data with Public Verifiability-2015

3. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015

4. Trust-based Service Management for Social Internet of Things Systems-2015

5. COMIC: Cost Optimization for Internet Content Multihoming-2014

6. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014

7. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks-2014

8. CUTS: Improving Channel Utilization in Both Time and Spatial Domain in wlans-2014

9. Learning-Based Uplink Interference Management in 4g Lte Cellular Systems-2014

10. Secure data retrieval for decentralized distribution tolerant Military Networks-2014

11. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data-2014

12. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks-2012

13. Adaptive Provisioning of Human Expertise in Service-oriented Systems-2012

14. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service-2011

Application Projects MCA, M.Sc. & Diploma Projects

1. Building construction and cost estimation

2. Customer relationship management

3. Eb management system

4. English language comparison

5. Home appliances

6. Multi server with secure communication

7. Net bank in recharge

8. Online book publishing

9. Road networks

10. Computer service center

11. Complete medical transcription system

12. Inventory library management system

13. Online rental system

14. New generation of community certificate

15. Credit card safety system

16. Online monthly bus pass system

17. Remote energy monitoring, profiling and

control using gsm

18. Theft vehicle tracking system

19. Horticulture management system

20. Online examination with emerging

password

21. Bug tracking system

22. E-crime report system

23. Advanced traffic signal system

24. Academic trivia

25. New generation of social website

26. Automatic question paper generation

T:044-43515757 M:- 7812045575 * 11 * www.phoenix-systems.co.in

27. Web based e-auction system

28. Exam scheduler

29. Budget approval system

30. Data theft attack

31. Encapsulating multi-organization with

unique identification card

32. Parent – teacher interaction system

33. Multi banking system

34. Metro train and bus smart card issue and

renewal

35. Orphan home management

36. Vehicle sales and services management

systems

37. E bus pass registration and renewal

systems

38. Metro train smart card systems

39. School management systems

40. Cab management systems

41. Online jewellry shopping

42. University grade system

43. Network level security and protection

using watermark technique

44. An approach to detect sql injection-k

45. Monitoring loan application processing

system

46. Attendance management system-tpt

47. Data leakage detection

48. Graphical password authentication system

49. Fast nearest search

50. PMSE: a personalized mobile search

engine

51. Inventory management-printing press

52. Hostel management system

53. Advertising agencies

54. Hospital medicine supply system

55. Global employee management system

56. Flight booking portal

57. Constructing e-tourism

58. Industrial manpower resource organizer

59. Task management systems

60. Real estate management systems.

T:044-43515757 M:- 7812045575 * 12 * www.phoenix-systems.co.in

Android Projects

1. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

2. Authenticated Key Exchange Protocols for Parallel Network File Systems

3. Decentralized Computation Offloading Game for Mobile Cloud Computing

4. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

5. A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems

6. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

7. Enabling Fine-grained Multi-keyword Search Supporting Classified Subdictionaries

8. over Encrypted Cloud Data

9. Governance Model for Cloud Computing in Building Information Management

10. Identity-Based Encryption with Outsourced Revocation in Cloud Computing

11. Performing Initiative Data Prefetching in Distributed File Systems for Cloud

12. Computing

13. Proof of ownership in duplicated cloud storage with mobile device efficiency

14. Friend book A Semantic-Based Friend Recommendation System for Social Networks

Complete Guidance

On Time Completion

Excellent Support

Project Documentation

Own Idea Implementation

For More Titles and any project related Quires

Contact @M: 7812045575, 7810995575 E -Mail: [email protected]

Website: - www.Phoenix-systems.co.in