Contact Us : 08662487655 | 9505890136  |  8008169169
Python  Core Java  Hibernate  Adv Java  J2EE/Java EE  Android Frame Work  Android With CoreJava  C#.net  Struts Frame Work  Asp.Net  Ado.net  Oracle(Sql.)  SQL.Server  My SQL  C  C with DS  C++  C/C++  PHP  Basics/MsOffice/Internet Concepts  Web Designing  Accounts Package  
2018 IEEE Project List and Abstracts
Project CodeProject TitleAbstract
Project ListProject Listdownload
Cloud ComputingCLASS: Cloud Log Assuring Soundness and Secrecy Scdownload
Cloud ComputingCloud Centric Authentication for Wearable Healthcadownload
Cloud ComputingTowards Shared Ownership in the Clouddownload
Cloud ComputingSecurity Analysis of Smartphone and Cloud Computindownload
Cloud ComputingIntegrated Authentication and Key Agreement Framewdownload
Cloud ComputingDynamic VM Scaling: Provisioning and Pricing throudownload
Cloud ComputingAn Approach to Balance Maintenance Costs and Electdownload
Cloud ComputingSecure and Sustainable Load Balancing of Edge Datadownload
Cloud ComputingSemantic-based Compound Keyword Search over Encrypdownload
Cloud ComputingA Practical Public Key Encryption Scheme Based on download
Cloud ComputingA Power-of-Two Choices Based Algorithm for Fog Comdownload
Cloud ComputingvirtFlow: Guest Independent Execution Flow Analysidownload
Cloud ComputingAdaptive Resource Management for Analyzing Video Sdownload
Cloud ComputingEnhancing Performance and Energy Efficiency for Hydownload
Cloud ComputingMinimal Cost Server Configuration for Meeting Timedownload
Cloud ComputingAggregation-Based Colocation Datacenter Energy Mandownload
Cloud ComputingProvably secure and lightweight identity-based autdownload
Cloud ComputingEnergy Efficient Scheduling of Servers with Multi-download
Cloud ComputingSEPDP: Secure and Efficient Privacy Preserving Prodownload
Cloud ComputingHealthDep: An Efficient and Secure Deduplication Sdownload
Cloud ComputingAn Efficient and Fair Multi-Resource Allocation Medownload
Cloud ComputingVMGuard: A VMI-based Security Architecture for Intdownload
Cloud ComputingPrice-based Resource Allocation for Edge Computingdownload
Cloud ComputingEfficient Resource Allocation for On-Demand Mobiledownload
Cloud ComputingAn Efficient and Secured Framework for Mobile Cloudownload
Cloud ComputingEfficient Traceable Authorization Search System fodownload
Cloud ComputingA Robust Formulation for Efficient Application Offdownload
Cloud ComputingA Planning Approach for Reassigning Virtual Machindownload
Cloud ComputingEfficient Retrieval Over Documents Encrypted by Atdownload
Cloud ComputingA Key-Policy Attribute-Based Temporary Keyword Seadownload
Cloud ComputingCombining Data Owner-side and Cloud-side Access Codownload
Cloud ComputingA Lightweight Secure Data Sharing Scheme for Mobildownload
Cloud ComputingInference Attack-Resistant E-Healthcare Cloud Systdownload
Cloud ComputingIdentity-Based Private Matching over Outsourced Endownload
Cloud ComputingFine-Grained Two-Factor Protection Mechanism for Ddownload
Cloud ComputingEfficient Traceable Authorization Search System fodownload
Cloud ComputingEfficient Retrieval over Documents Encrypted by Atdownload
Cloud ComputingEfficient Fine-Grained Data Sharing Mechanism for download
Cloud ComputingEfficient and Expressive Keyword Search Over Encrydownload
Cloud ComputingDROPS: Division and Replication of Data in Cloud fdownload
Cloud ComputingCryptCloud+: Secure and Expressive Data Access Condownload
Cloud ComputingUnified Fine-grained Access Control for Personal Hdownload
Cloud ComputingChaotic Searchable Encryption for Mobile Cloud Stodownload
Cloud ComputingCatch You if You Misbehave: Ranked Keyword Search download
Cloud ComputingAudit-Free Cloud Storage via Deniable Attribute-badownload
Cloud ComputingAn Efficient Ranked Multi-Keyword Search for Multidownload
Cloud ComputingAn Efficient and Privacy-Preserving Biometric Idendownload
Cloud ComputingAchieving Secure and Efficient Dynamic Searchable download
Cloud ComputingA Three-Layer Privacy Preserving Cloud Storage Schdownload
Cloud ComputingA New Lightweight Symmetric Searchable Encryption download
Cloud ComputingA Lightweight Secure Data Sharing Scheme for Mobildownload
Cloud ComputingCombining Data Owner-side and Cloud-side Access Codownload
Cloud ComputingLightweight and Privacy-Preserving Delegatable Prodownload
Cloud ComputingPrivacy Preservation for Outsourced Medical Data Wdownload
Cloud ComputingPrivacy Protection and Intrusion Avoidance for Clodownload
Cloud ComputingProvably Secure Fine-Grained Data Access Control odownload
Cloud ComputingPublicly Verifiable Boolean Query Over Outsourced download
Cloud ComputingSecure and Efficient Attribute-Based Access Controdownload
Cloud ComputingSecure Data Group Sharing and Dissemination with Adownload
Cloud ComputingSecure Fine-Grained Access Control and Data Sharindownload
Cloud ComputingSeSPHR: A Methodology for Secure Sharing of Persondownload
Cloud ComputingTowards Privacy-preserving Content-based Image Retdownload
Information Forensics Network Security & Informa3-HBP: A Three-Level Hidden Bayesian Link Predictidownload
Information Forensics Network Security & InformaSupervised and Unsupervised Aspect Category Detectdownload
Information Forensics Network Security & InformaTowards Shared Ownership in the Clouddownload
Information Forensics Network Security & InformaCyber threats under the Beddownload
Information Forensics Network Security & InformaA Practical Public Key Encryption Scheme Based on download
Information Forensics Network Security & InformaA Network Coding and DES Based Dynamic Encryption download
Information Forensics Network Security & InformaExploring Feature Coupling and Model Coupling for download
Information and Security SystemsFraud Find: Financial Fraud Detection by Analyzingdownload
Information and Security SystemsFraud Vis: Understanding Unsupervised Fraud Detectdownload
Information and Security SystemsMachine Learning Applied to Rotating Check Fraud Ddownload
Information and Security SystemsRandom Forest for Credit Card Fraud Detectiondownload
SOCIAL NETWORK3-HBP: A Three-Level Hidden Bayesian Link Predictidownload
SOCIAL NETWORKAnalyzing and Detecting Money-Laundering Accounts download
SOCIAL NETWORKDetection of suicide-related posts in Twitter datadownload
SOCIAL NETWORKRisk Assessment in Social Networks based on User Adownload
SOCIAL NETWORKSegregating Spammers and Unsolicited Bloggers fromdownload
SOCIAL NETWORKSemi-Supervised Spam Detection in Twitter Streamdownload
DATA MININGEmotion Recognition on Twitter: Comparative Study download
DATA MININGDiscovering Canonical Correlations between Topicaldownload
DATA MININGReverse k Nearest Neighbor Search over Trajectoriedownload
DATA MININGRange-based Nearest Neighbor Queries with Complex-download
DATA MININGComplementary Aspect-based Opinion Miningdownload
DATA MININGProfit Maximization for Viral Marketing in Online download
DATA MININGA Two-Phase Algorithm for Differentially Private Fdownload
DATA MININGOnline Product Quantizationdownload
DATA MININGAn Efficient Method for High Quality and Cohesive download
DATA MININGFast Cosine Similarity Search in Binary Space withdownload
DATA MININGAutomated Phrase Mining from Massive Text Corporadownload
DATA MININGCollective List-Only Entity Linking: A Graph-Baseddownload
DATA MININGPrincipal Component Analysis Based Filtering for Sdownload
DATA MININGComplementary Aspect-based Opinion Miningdownload
DATA MININGA Weighted Frequent Itemset Mining Algorithm for Idownload
DATA MININGFuzzy Bag-of-Words Model for Document Representatidownload
DATA MININGDocument Summarization for Answering Non-Factoid Qdownload
DATA MININGEfficient Vertical Mining of High Average-Utility download
DATA MININGSupervised Topic Modeling using Hierarchical Diricdownload
DATA MININGEntity Linking: An Issue to Extract Corresponding download
DATA MININGFrequent Itemsets Mining with Differential Privacydownload
DATA MININGOpinion Aspect Relations in Cognizing Customer Feedownload
DATA MININGHighlighter: automatic highlighting of electronic download
DATA MININGPredicting Contextual Informativeness for Vocabuladownload
DATA MININGSearch Result Diversity Evaluation based on Intentdownload
DATA MININGSelective Database Projections Based Approach for download
DATA MININGA Correlation-based Feature Weighting Filter for Ndownload
DATA MININGWeb Media and Stock Markets : A Survey and Future download
DATA MININGA Two-stage Biomedical Event Trigger Detection Metdownload
DATA MININGBayesian Nonparametric Learning for Hierarchical adownload
DATA MININGComments Mining With TF-IDF: The Inherent Bias anddownload
DATA MININGRelevant Feedback Based Accurate and Intelligent Rdownload
DATA MININGCharacterizing and Predicting Early Reviewers for download
DATA MININGCoDetect: Financial Fraud Detection With Anomaly Fdownload
DATA MININGWhen to Make a Topic Popular Again? A Temporal Moddownload
DATA MININGHealth Monitoring on Social Media over Timedownload
DATA MININGl-Injection: Toward Effective Collaborative Filterdownload
DATA MININGOn Generalizing Collective Spatial Keyword Queriesdownload
DATA MININGPrivacy Characterization and Quantification in Datdownload
DATA MININGRoad Traffic Speed Prediction: A Probabilistic Moddownload
DATA MININGScalable Content-Aware Collaborative Filtering fordownload
DATA MININGSDE: A Novel Clustering Framework Based on Sparsitdownload
Wireless Sensor NetworksTraffic and Energy Aware Routing for Heterogeneousdownload
Mobile ComputingDistributed Faulty Node Detection in Delay Tolerandownload
Mobile ComputingSelfish Decentralized Computation Offloading for Mdownload
Mobile ComputingService Provisioning in Mobile Environments througdownload
Mobile ComputingTraffic-Aware Efficient Mapping of Wireless Body Adownload
Mobile ComputingEfficient Privacy-Aware Authentication Scheme for download
Mobile ComputingIdentifying On-site Users for Social Events: Mobildownload
Mobile ComputingProtecting Location Privacy for Task Allocation indownload
MACHINE LEARNINGA Comprehensive Study on Social Network Mental Disdownload
MACHINE LEARNINGA Credibility Analysis System for Assessing Informdownload
MACHINE LEARNINGA Novel Machine Learning Algorithm for Spammer Idedownload
MACHINE LEARNINGCredit Card Fraud Detection Using AdaBoost and Majdownload
MACHINE LEARNINGHate Speech on Twitter: A Pragmatic Approach to Codownload
MACHINE LEARNINGPerformance Comparison of Support Vector Machine, download
MACHINE LEARNINGSupervised and Unsupervised Aspect Category Detectdownload
MACHINE LEARNINGUsing Data Mining to Predict Hospital Admissions Fdownload
Software EngineeringReviving Sequential Program Birthmarking for Multidownload
Software EngineeringEVA: Visual Analytics to Identify Fraudulent Eventdownload
Software EngineeringA Developer Centered Bug Prediction Modeldownload
Image Processing and MultimediaQuery-free Clothing Retrieval via Implicit Relevandownload
Image Processing and MultimediaAutomatic Annotation of Text with Picturesdownload
Image Processing and MultimediaJoint Latent Dirichlet Allocation for Social Tagsdownload
Image Processing and MultimediaAutomatic Generation of Social Event Storyboard Frdownload
Image Processing and MultimediaJoint Hypergraph Learning for Tag-based Image Retrdownload
Image Processing and MultimediaA Unified Framework for Tracking Based Text Detectdownload
IEEE ACCESS & CYBER SECURITYCoDetect: Financial Fraud Detection with Anomaly Fdownload
IEEE ACCESS & CYBER SECURITYCredit card fraud detection using AdaBoost and majdownload
IEEE ACCESS & CYBER SECURITYA Network Coding and DES Based Dynamic Encryption download
IEEE ACCESS & CYBER SECURITYA Data Analytics Approach to the Cybercrime Undergdownload
INTERNET OF THINGS (IOT)Cloud-based Fine-grained Health Information Accessdownload
INTERNET OF THINGS (IOT)Light-Weight Security and Data Provenance for Multdownload
INTERNET OF THINGS (IOT)MDSClone: Multidimensional Scaling Aided Clone Detdownload
Android ProjectsCloud Centric Authentication for Wearable Healthcadownload
Android ProjectsSignificant Permission Identification for Machine download
Android ProjectsMoRe-care: Mobile-assisted remote healthcare servidownload
Android ProjectsDroid Fusion: A Novel Multilevel Classifier Fusiondownload
Android ProjectsA Tale of Two Fashions: An Empirical Study on the download
Android ProjectsCharacterizing Privacy Risks of Mobile Apps with Sdownload
Android ProjectsAd Capsule: Practical Confinement of Advertisementdownload
Android ProjectsAndroid User Privacy Preserving through Crowdsourcdownload
Android ProjectsUncovering the Face of Android Ransomware: Charactdownload
Android ProjectsMalPat: Mining Patterns of Malicious and Benign Andownload
Android ProjectsUnderstanding In-app Ads and Detecting Hidden Attadownload
Android ProjectsText based Graphical Password System to Obscure Shdownload
Android ProjectsShift Route: Achieving Location Privacy for Map Sedownload
Android ProjectsCounter Measuring Conceivable Security Threats on download
Android ProjectsConstruction and Mitigation of User-Behavior-Baseddownload
Android ProjectsA Secure Transaction Scheme With Certificateless Cdownload
Android ProjectsCode Tracker: A Lightweight Approach to Track and download
Networking and Service Computing, Dependable and Deep Learning of Constrained Autoencoders for Enhadownload
Networking and Service Computing, Dependable and Efficient Fine-Grained Data Sharing Mechanism for download
Networking and Service Computing, Dependable and Analyzing and Detecting Money-Laundering Accounts download
Networking and Service Computing, Dependable and Magic Train: Design of Measurement Methods Againstdownload
Networking and Service Computing, Dependable and Energy Efficient Link-Delay Aware Routing in Wireldownload
Networking and Service Computing, Dependable and Quality and Profit Assured Trusted Cloud Federatiodownload
Networking and Service Computing, Dependable and Optimizing Autonomic Resources for the Management download
Networking and Service Computing, Dependable and Scheduling Inter-Datacenter Video Flows for Cost Edownload
Networking and Service Computing, Dependable and Lightweight Fine-Grained Search over Encrypted Datdownload
Networking and Service Computing, Dependable and GeTrust: A guarantee-based trust model in Chord-badownload
Networking and Service Computing, Dependable and Migration Modeling and Learning Algorithms for Condownload
Networking and Service Computing, Dependable and Multi-user Multi-task Computation Offloading in Grdownload
Networking and Service Computing, Dependable and Achieving Fairness-aware Two-level Scheduling for download
Networking and Service Computing, Dependable and Shared Predictive Cross-Modal Deep Quantizationdownload
Networking and Service Computing, Dependable and PROVEST: Provenance-based Trust Model for Delay Todownload
Networking and Service Computing, Dependable and Traffic and Energy Aware Routing for Heterogeneousdownload
Networking and Service Computing, Dependable and A Hybrid Approach for Detecting Automated Spammersdownload
Networking and Service Computing, Dependable and A Provably-Secure Cross-Domain Handshake Scheme widownload
Networking and Service Computing, Dependable and Anonymization of Sensitive Quasi-Identifiers for ldownload
Networking and Service Computing, Dependable and Collective Data-Sanitization for Preventing Sensitdownload
Networking and Service Computing, Dependable and Exploiting Social Network to Enhance Human-to-Humadownload
Networking and Service Computing, Dependable and Trust-based Collaborative Privacy Management in Ondownload
Networking and Service Computing, Dependable and Lightweight Fine-Grained Search over Encrypted Datdownload
MACHINE LEARNING/PYTHONA user-centric machine learning framework for cybedownload
MACHINE LEARNING/PYTHONReview of the Use of AI Techniques in Serious Gamedownload
MACHINE LEARNING/PYTHONSemi-supervised machine learning approach for ddosdownload
MACHINE LEARNING/PYTHONWeakly-supervised Deep Embedding for Product Reviedownload
MACHINE LEARNING/PYTHONHow Data-Driven Entrepreneur Analyzes Imperfect Indownload
MACHINE LEARNING/PYTHONMulti-Traffic Scene Perception Based on Superviseddownload
MACHINE LEARNING/PYTHONA Bi-objective Hyper-Heuristic Support Vector Machdownload
MACHINE LEARNING/PYTHONModeling and Predicting Cyber Hacking Breachesdownload
MACHINE LEARNING/PYTHONPrice-based Resource Allocation for Edge Computingdownload
MACHINE LEARNING/PYTHONString Similarity Search: A Hash-Based Approachdownload
MACHINE LEARNING/PYTHONA Data Mining based Model for Detection of Frauduldownload
MACHINE LEARNING/PYTHONData-Driven Design of Fog Computing aided Process download
MACHINE LEARNING/PYTHONDesigning Cyber Insurance Policies: The Role of Prdownload
MACHINE LEARNING/PYTHONWeb application for community question answeringdownload
MACHINE LEARNING/PYTHONText classification for newsgroup using machine ledownload
MACHINE LEARNING/PYTHONData Analytics Approach to the Cybercrime Undergrodownload
MACHINE LEARNING/PYTHONImage based appraisal of real estate propertiesdownload
MACHINE LEARNING/PYTHONCloud-based multimedia content protection systemdownload
MACHINE LEARNING/PYTHONAssessing the effectiveness of riparian restoratiodownload
MACHINE LEARNING/PYTHONData security approach on cyber crime with web vuldownload
MACHINE LEARNING/PYTHONExploratory Visual Sequence Mining Based on Patterdownload
MACHINE LEARNING/PYTHONToward better statistical validation of machine ledownload
MACHINE LEARNING/PYTHONRainfall rate prediction based on artificial neuradownload
MACHINE LEARNING/PYTHONPhishing web sites features classification based odownload
MACHINE LEARNING/PYTHONApplied machine learning predictive analytics to sdownload
MACHINE LEARNING/PYTHONMachine learning and deep learning methods for cybdownload
MACHINE LEARNING/PYTHONSelf-taught low-rank coding for visual learningdownload
MACHINE LEARNING/PYTHONCredit card fraud detection using AdaBoost and majdownload
MACHINE LEARNING/PYTHONBlockchain: A game changer for securing IoT datadownload
MACHINE LEARNING/PYTHONUsing data mining to predict hospital admissions fdownload