Post on 11-Aug-2015
transcript
T:044-43515757 M:- 7812045575 * 1 * www.phoenix-systems.co.in
Project Guidance For
M.E, M.Tech, B.E, B.Tech,
M.Sc,M.C.A,B.Sc,B.C.A, Diploma
JAVA * J2EE* C#.Net * ASP.NET
&
ANDROID
Projects In The Areas Of
Networking,Application Projects,Web Application
Projects ,Data Mining,Mobile Applications Using Java/J2EE/J2ME ,Asp.Net/C#.Net
T:044-43515757 M:- 7812045575 * 2 * www.phoenix-systems.co.in
JAVA*J2EE Projects Knowledge and Data Engineering
1. A Query Approach for Influence Maximization on Specific Users in Social Networks - 2015
2. Progressive Duplicate Detection - 2015
3. Scalable Constrained Spectral Clustering - 2015
4. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing - 2015
5. Discovery of Ranking Fraud for Mobile Apps - 2015
6. INSPIRE: A Framework for Incremental Spatial Prefix Query Relaxation - 2015
7. Checking Chase Termination: Cyclicity Analysis and Rewriting Techniques - 2015
8. Active Learning for Ranking through Expected Loss Optimization- 2015
9. Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection - 2015
10. ePeriodicity: Mining Event Periodicity from Incomplete Observations- 2015
11. GDCluster: A General Decentralized Clustering Algorithm- 2015
12. Spatio-Temporal Analysis of Passive Consumption in Internet Media - 2015
13. Authentication of Moving Top-k Spatial Keyword Queries- 2015
14. Keyword Search Over Probabilistic RDF Graphs- 2015
15. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015
16. Distributed Multi-Agent Online Learning Based on Global Feedback- 2015
17. Customizable Point-of-Interest Queries in Road Networks- 2015
18. E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams- 2015
19. LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015
20. Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks- 2015
21. GFilter: A General Gram Filter for String Similarity Search - 2015
22. PruDent: A Pruned and Confident Stacking Approach for Multi-label Classification- 2015
23. RRW—A Robust and Reversible Watermarking Technique for Relational Data- 2015
24. Multi-Keyword Privacy-Preserving Search in Personal Server Networks- 2015
25. Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014
26. Range Aggregation With Set Selection-2014
27. Facilitating Document Annotation Using Content and Querying Value-2014
28. Automatic Itinerary Planning for Traveling Services-2014
29. Adaptive Preprocessing for Streaming Data-2014
30. Optimized Cartesian K-Means-2014
31. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-2014
32. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services-
2014
33. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
34. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-2014
35. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014
36. An Air Index for Spatial Query Processing in Road Networks-2014
37. An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014
38. Multi-Dimensional Classification with Super-Classes
39. T-Drive : Driving Directions Based on Taxi Trajectories-2013
40. A System to filter unwanted messages from OSN user walls-2013
41. A Fast Clustering Based Feature Subset Selection Algorithm for High Dimensional Data-2013
42. A fuzzy self-constructing feature clustering algorithm for text classification -2011
43. Extended XML Tree Pattern Matching: Theories and Algorithms-2011
T:044-43515757 M:- 7812045575 * 3 * www.phoenix-systems.co.in
Mobile Computing
1. Performance Comparison of Routing Protocols for Cognitive Radio Networks-2015
2. Towards Maximizing Timely Content Delivery in Delay Tolerant Networks-2015
3. High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks-2015
4. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems-2015
5. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers-2015
6. Taming Cross-Technology Interference for WiFi and ZigBee Coexistence Networks-2015
7. Sequence-Based Localization in Wireless Sensor Networks-2015
8. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015
9. A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless
Networks-2015
10. Distributed Channel Probing for Efficient Transmission Scheduling in Wireless Networks-2015
11. Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols-2015
12. Offloading in Mobile Cloudlet Systems with Intermittent Connectivity-2015
13. Global Sensor Deployment and Local Coverage-Aware Recovery Schemes for Smart Environments-2015
14. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014
15. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014
16. Discovery and verification of Neighbor positions in Mobile Ad HOC networks-2013
17. EMAP - Expedite Message Authentication Protocol for Vehicular Ad-hoc Networks-2013
18. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013
Cloud Computing
1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing- 2015
2. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds -2015
3. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015
4. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems- 2015
5. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers-
2015
6. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds - 2015
7. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
8. Strategy Configurations of Multiple Users Competition for Cloud Service Reservation- 2015
9. MonPaaS: An Adaptive Monitoring Platformas a Service for Cloud Computing Infrastructures and
Services - 2015
10. DyScale: a Map Reduce Job Scheduler for Heterogeneous Multicore Processors- 2015
11. Poris: A Scheduler for Parallel Soft Real-Time Applications in Virtualized Environment- 2015
12. Hadoop Performance Modeling for Job Estimation and Resource Provisioning - 2015
13. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud - 2015
14. Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments with
Telecom Operator Cloud- 2015
15. Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing Systems-
2015
16. BURSE: A Bursty and Self-Similar Workload Generator for Cloud Computing - 2015
T:044-43515757 M:- 7812045575 * 4 * www.phoenix-systems.co.in
17. Coral: a Cloud-Backed Frugal File System- 2015
18. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014 19. Security as a Service Model for Cloud Environment-2014
20. Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems-2013 21. Privacy Preserving Delegated Access Control in public clouds-2013 22. Security and privacy-enhancing multi cloud architectures-2013 23. Toward privacy-assured and searchable cloud data storage services-2013 24. Ensuring Data Storage Security in Cloud Computing-2013
Networking & Wireless Sensor Networks
1. Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs-2015
2. Resampling-Based Ensemble Methods for Online Class Imbalance Learning-2015
3. Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks-2015
4. Decentralized Energy Allocation for Wireless Networks with Renewable Energy Powered Base Stations-2015
5. Directional Diagnosis for Wireless Sensor Networks -2015
6. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks-2015
7. Disco: Improving Packet Delivery via Deliberate Synchronized Constructive Interference -2015
8. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks-2015
9. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks -2015
10. Trust Management for Defending On-Off Attacks -2015
11. Throughput Assurance for Multiple Body Sensor Networks -2015
12. An Efficient Distributed Trust Model for Wireless Sensor Networks -2015
13. Cluster-Based Epidemic Control through Smartphone-Based Body Area Networks -2015
14. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce-2015
15. Content-Aware Concurrent Multipath Transfer for High-Definition Video Streaming over Heterogeneous
Wireless Networks-2015
16. Proportional Fair Coding for Wireless Mesh Networks-2014
17. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous
Wireless Sensor Networks-2014
18. Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks-2014
19. DTN-Metro: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility-2014
20. Denial-of-Service Attacks in Bloom-Filter-Based Forwarding-2014
21. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014
22. Topology-Transparent Scheduling via the Chinese Remainder Theorem-2014
23. Security Concepts and Sybil Attack Detection in wireless sensor networks-2014
24. Cross-domain privacy-preserving protocol for cooperative firewall optimization-2013
25. EAACK - A Secure Intrusion Detection System for MANETs-2013
26. Enhancing Voice over WLAN via Rate Adaptation and Retry Scheduling-2013
27. Network Modeling Peer to Peer Analyze using Cache-2013.
Information Forensics and Security
1. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing-2015
2. Effective Data Access Control for Multi authority Cloud Storage Systems-2015
3. Privacy-Preserving Detection of Sensitive Data Exposure-2015
T:044-43515757 M:- 7812045575 * 5 * www.phoenix-systems.co.in
4. On the Use of Client Identity Information for Face Anti spoofing -2015
5. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems -2015
6. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Non causal Side Information-2015
7. A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks-2014
8. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks-2014
9. On the Security of Trustee-Based Social Authentications -2014
Dependable and Secure Computing
1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015
2. Deleting Secret Data with Public Verifiability-2015
3. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015
4. Trust-based Service Management for Social Internet of Things Systems-2015
5. PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications-2014 6. STARS: A Statistical Traffic Pattern Discovery System for manets-2014 7. Hiding in the mobile crowd:Location privacy through collaboration-2014 8. NICE: Network Intrusion Detection and Countermeasure Selection In Virtual Network Systems -
2013 9. A Self-Organizing Trust Model for Peer-to-Peer Systems-2013 10. Nymble: Blocking Misbehaving Users in Anonymizing Networks-2011
Software Engineering
1. Automated Checking of Conformance to Requirements Templates using Natural Language Processing-2015
2. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015
3. Estimating Computational Requirements in Multi-Threaded Applications -2015
4. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015
5. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-Proneness Prediction?
An Empirical Study -2015
6. Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-
Inference Algorithms-2015
7. A Model-Driven Methodology for Developing Secure Data-Management Applications-2014
Parallel and Distributed Systems
1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015
2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-2015
3. Deleting Secret Data with Public Verifiability-2015
4. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015
5. Trust-based Service Management for Social Internet of Things Systems-2015
6. COMIC: Cost Optimization for Internet Content Multihoming-2014
7. Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless Networks-2014
8. The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and
Evaluation-2014
9. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
10. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-2013
11. Covering Points of Interest with Mobile Sensors-2013
12. Detection and Localization of Multiple Spoofing Attacks-2013.
T:044-43515757 M:- 7812045575 * 6 * www.phoenix-systems.co.in
Application Projects (MCA, M.Sc., Diploma Projects)
1. Erp
2. Adaptive intrusion detection system
3. Natural language query processing
4. Scheduling operation with facility management for logistic system
5. Defect tracking for improving product quality and productivity
6. Ensuring data security in cloud computing
7. A new algorithm for three party quantum key distribution
8. A fuzzy feature clustering for text classification
9. Automatic question paper generation
10. Automatic end semester time table generation
11. Learn to personalized image search from photo sharing web sites
12. Material management system
13. Mobile banking security system using j2me application
14. Multi server communication in distributed management system
15. Online task management system
16. Online quiz
17. Optimal dynamic path restoration in mesh network
18. Placement management system
19. Transfer certificate issuing system
20. Query matching process using xml tree pattern
21. Scheduled Operations Resource Facilitating System
T:044-43515757 M:- 7812045575 * 7 * www.phoenix-systems.co.in
DOT. NET PROJECT TITLES
(VB.NET*C#.NET*ASP.NET) Information Forensics and Security
1. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing-2015
2. Effective Data Access Control for Multi authority Cloud Storage Systems-2015
3. Privacy-Preserving Detection of Sensitive Data Exposure-2015
4. On the Use of Client Identity Information for Face Anti spoofing -2015
5. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems -2015
6. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Non causal Side Information-2015
7. Privacy-Preserving Authenticated Key-Exchange Over Internet-2014
8. Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks-2014 9. Top-k Query Result Completeness Verification in Tiered Sensor Networks-2014
10. A Probabilistic Model of Visual Cryptography-2012
Mobile Computing
1. Performance Comparison of Routing Protocols for Cognitive Radio Networks-2015
2. Towards Maximizing Timely Content Delivery in Delay Tolerant Networks-2015
3. High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks-2015
4. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems-2015
5. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers-2015
6. Sequence-Based Localization in Wireless Sensor Networks-2015
7. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones-2015
8. A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless
Networks-2015
9. Distributed Channel Probing for Efficient Transmission Scheduling in Wireless Networks-2015
10. Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols-2015
11. Offloading in Mobile Cloudlet Systems with Intermittent Connectivity-2015
12. Global Sensor Deployment and Local Coverage-Aware Recovery Schemes for Smart Environments-2015
13. A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute Mobile-2014
14. Adaptive Sub-carrier Level Power Allocation in OFDMA Networks-2014
15. GreenBSN: Enabling Energy-Proportional Cellular Base Station Networks-2014
16. Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular Networks-2014
17. Rate Adaptation for 802.11 Multiuser MIMO Networks-2014
18. RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning-2014
19. Smart cut: Mitigating 3G Radio Tail Effect on Smartphones-2014
20. Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks-2014
21. Effective Authentication of Mobile and pervasive computing-2014
22. Network-Assisted Mobile Computing with Optimal Uplink Query Processing-2013
23. Toward Privacy Preserving and Collusion Resistance in a Location Proof -2013
24. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity-2013
25. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks-2009
26. On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Routing-2009
T:044-43515757 M:- 7812045575 * 8 * www.phoenix-systems.co.in
Cloud Computing
1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing- 2015
2. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015
3. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems- 2015
4. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers-
2015
5. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds - 2015
6. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
7. Strategy Configurations of Multiple Users Competition for Cloud Service Reservation- 2015
8. MonPaaS: An Adaptive Monitoring Platformas a Service for Cloud Computing Infrastructures and
Services - 2015
9. DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors- 2015
10. Poris: A Scheduler for Parallel Soft Real-Time Applications in Virtualized Environment- 2015
11. Hadoop Performance Modeling for Job Estimation and Resource Provisioning - 2015
12. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud - 2015
13. Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments with
Telecom Operator Cloud- 2015
14. Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing Systems-
2015
15. BURSE: A Bursty and Self-Similar Workload Generator for Cloud Computing - 2015
16. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks-2014
17. An Analysis of Failure-Related Energy Waste in a Large-Scale Cloud Environment-2014
18. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application-2014
19. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014
20. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud-2013
21. QOS Ranking Prediction for Cloud Services-2013
22. Tokenization And Encryption For Personal Health Record Using Cloud-2013
23. Scalable and Secure Sharing of Personal Health Records in Cloud Computing-2013
24. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud-2012
25. Exploiting Dynamic Resource Allocation-2011
Knowledge and Data Engineering
1. Authentication of Moving Top-k Spatial Keyword Queries- 2015
2. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
-2015
3. Lossless Selection Views under Conditional Domain Constraints-2015
4. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage -
2015
5. Keyword Search Over Probabilistic RDF Graphs- 2015
6. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015
7. Distributed Multi-Agent Online Learning Based on Global Feedback- 2015
8. A Query Approach for Influence Maximization on Specific Users in Social Networks - 2015
9. Progressive Duplicate Detection - 2015
T:044-43515757 M:- 7812045575 * 9 * www.phoenix-systems.co.in
10. Scalable Constrained Spectral Clustering - 2015
11. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing - 2015
12. Discovery of Ranking Fraud for Mobile Apps - 2015
13. INSPIRE: A Framework for Incremental Spatial Prefix Query Relaxation - 2015
14. Checking Chase Termination: Cyclicity Analysis and Rewriting Techniques - 2015
15. Active Learning for Ranking through Expected Loss Optimization- 2015
16. Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection - 2015
17. ePeriodicity: Mining Event Periodicity from Incomplete Observations- 2015
18. GDCluster: A General Decentralized Clustering Algorithm- 2015
19. Spatio-Temporal Analysis of Passive Consumption in Internet Media - 2015
20. Range Aggregation With Set Selection-2014
21. Facilitating Document Annotation Using Content and Querying Value-2014
22. A Group Incremental Approach to Feature Selection Applying Rough Set Technique-2014
23. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services-
2014
24. Classifier Ensembles with the Extended Space Forest-2014
25. Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
26. Privacy-Preserving and Content-Protecting Location Based Queries-2014
27. Learning Conditional Preference Networks from Inconsistent Examples-2014
28. Fast Nearest Neighbor Search with Keywords-2014
29. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-2014
30. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs-2014
31. CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014
32. LARS: An Efficient and Scalable Location-Aware Recommender System-2014
33. Highly comparative feature-based time-series classification-2014
34. Keyword Query Routing-2014
35. Secure Mining of Association Rules in Horizontally Distributed Databases-2014
36. Personalized Mobile Search Engine-2013
37. A Quick web search Engine-2013
38. Toward Secure Multi keyword Top-k-2013
39. Lineage encoding-an efficient wireless xml streaming supporting twig pattern queries-2013
Dependable and Secure Computing
1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015
2. Deleting Secret Data with Public Verifiability-2015
3. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015
4. Trust-based Service Management for Social Internet of Things Systems-2015
5. STARS: A Statistical Traffic Pattern Discovery System for manets-2014
6. Abductive Analysis of Administrative Policies in Rule-based Access Control-2014
Software Engineering
1. Automated Checking of Conformance to Requirements Templates using Natural Language Processing-2015
2. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015
3. Estimating Computational Requirements in Multi-Threaded Applications -2015
4. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015
T:044-43515757 M:- 7812045575 * 10 * www.phoenix-systems.co.in
5. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-Proneness Prediction?
An Empirical Study -2015
6. Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-
Inference Algorithms-2015
7. An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with Undetermined Input
Spaces-2014
8. Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013
9. Centroidal Voronoi Tessellations—A New Approach to Random Testing-2013
10. Test Case-Aware Combinatorial Interaction Testing-2013
Parallel and Distributed Systems
1. Achieving Flatness: Selecting the Honey words from Existing User Passwords -2015
2. Deleting Secret Data with Public Verifiability-2015
3. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks -2015
4. Trust-based Service Management for Social Internet of Things Systems-2015
5. COMIC: Cost Optimization for Internet Content Multihoming-2014
6. BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
7. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks-2014
8. CUTS: Improving Channel Utilization in Both Time and Spatial Domain in wlans-2014
9. Learning-Based Uplink Interference Management in 4g Lte Cellular Systems-2014
10. Secure data retrieval for decentralized distribution tolerant Military Networks-2014
11. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data-2014
12. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks-2012
13. Adaptive Provisioning of Human Expertise in Service-oriented Systems-2012
14. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service-2011
Application Projects MCA, M.Sc. & Diploma Projects
1. Building construction and cost estimation
2. Customer relationship management
3. Eb management system
4. English language comparison
5. Home appliances
6. Multi server with secure communication
7. Net bank in recharge
8. Online book publishing
9. Road networks
10. Computer service center
11. Complete medical transcription system
12. Inventory library management system
13. Online rental system
14. New generation of community certificate
15. Credit card safety system
16. Online monthly bus pass system
17. Remote energy monitoring, profiling and
control using gsm
18. Theft vehicle tracking system
19. Horticulture management system
20. Online examination with emerging
password
21. Bug tracking system
22. E-crime report system
23. Advanced traffic signal system
24. Academic trivia
25. New generation of social website
26. Automatic question paper generation
T:044-43515757 M:- 7812045575 * 11 * www.phoenix-systems.co.in
27. Web based e-auction system
28. Exam scheduler
29. Budget approval system
30. Data theft attack
31. Encapsulating multi-organization with
unique identification card
32. Parent – teacher interaction system
33. Multi banking system
34. Metro train and bus smart card issue and
renewal
35. Orphan home management
36. Vehicle sales and services management
systems
37. E bus pass registration and renewal
systems
38. Metro train smart card systems
39. School management systems
40. Cab management systems
41. Online jewellry shopping
42. University grade system
43. Network level security and protection
using watermark technique
44. An approach to detect sql injection-k
45. Monitoring loan application processing
system
46. Attendance management system-tpt
47. Data leakage detection
48. Graphical password authentication system
49. Fast nearest search
50. PMSE: a personalized mobile search
engine
51. Inventory management-printing press
52. Hostel management system
53. Advertising agencies
54. Hospital medicine supply system
55. Global employee management system
56. Flight booking portal
57. Constructing e-tourism
58. Industrial manpower resource organizer
59. Task management systems
60. Real estate management systems.
T:044-43515757 M:- 7812045575 * 12 * www.phoenix-systems.co.in
Android Projects
1. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
2. Authenticated Key Exchange Protocols for Parallel Network File Systems
3. Decentralized Computation Offloading Game for Mobile Cloud Computing
4. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
5. A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems
6. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
7. Enabling Fine-grained Multi-keyword Search Supporting Classified Subdictionaries
8. over Encrypted Cloud Data
9. Governance Model for Cloud Computing in Building Information Management
10. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
11. Performing Initiative Data Prefetching in Distributed File Systems for Cloud
12. Computing
13. Proof of ownership in duplicated cloud storage with mobile device efficiency
14. Friend book A Semantic-Based Friend Recommendation System for Social Networks
Complete Guidance
On Time Completion
Excellent Support
Project Documentation
Own Idea Implementation
For More Titles and any project related Quires
Contact @M: 7812045575, 7810995575 E -Mail: Phoenixsystemsindia@gmail.com
Website: - www.Phoenix-systems.co.in