SlideShare a Scribd company logo
1 of 15
Download to read offline
IEEE CSE TITLES 2019-20
I.CLOUD COMPUTING
S.NO TITLES YEAR
1 A Practical Attribute-Based Document Collection
Hierarchical Encryption Scheme in Cloud Computing
2019
2 A Trust-Based Agent Learning Model for Service
Composition in Mobile Cloud Computing Environments
2019
3 Dynamic Multi-Keyword Ranked Search Based on Bloom
Filter Over Encrypted Cloud Data
2019
4 Reliability and Availability Evaluation for Cloud Data
Center Networks Using Hierarchical Models
2019
5 Verifiable and Multi-keyword Searchable Attribute-based
Encryption Scheme for Cloud Storage
2019
6 Hidden Cipher text Policy Attribute-Based Encryption with
Fast Decryption for Personal Health Record System
2019
7 A Lightweight Secure Auditing Scheme for Shared Data in
Cloud Storage
2019
8 Practical Attribute-Based Document Collection
Hierarchical Encryption Scheme in Cloud Computing
2019
9 Dynamic Cloud Network Control Under Reconfiguration
Delay and Cost
2019
10 Novel Multi-Keyword Search on Encrypted Data in the
Cloud
2019
11
Privacy-aware Personal Data Storage (P-PDS) Learning
how to Protect User Privacy from External Applications 2019
12 Privacy-Preserving Attribute-Based Keyword Search in
Shared Multi-owner Setting
2019
13 SEPTIC Detecting Injection Attacks and Vulnerabilities
Inside the DBMS
2019
14 V-Matrix-Based Scalable Data Aggregation Scheme in
WSN
2019
15 Dynamic Demand Prediction and Allocation in Cloud
Service Brokerage
2019
16 Towards AI-Powered Multiple Cloud Management 2019
17 A Fog-centric Secure Cloud Storage Scheme 2019
18 A New Encrypted Data Switching Protocol: Bridging IBE and
ABE Without Loss of Data Confidentiality
2019
19 An Attribute-Based Controlled Collaborative Access Control
Scheme for Public Cloud Storage
2019
20 CHARON: A Secure Cloud-of-Clouds System for Storing
and Sharing Big Data
2019
21 Crypt-DAC: Cryptographically Enforced Dynamic Access
Control in the Cloud
2019
22 Design of Secure Authenticated Key Management Protocol
for Cloud Computing Environments
2019
23 Fast Boolean Queries With Minimized Leakage for Encrypted
Databases in Cloud Computing
2019
24 FS-PEKS: Lattice-based Forward Secure Public-key
Encryption with Keyword Search for Cloud-assisted
Industrial Internet of Things
2019
25 Secure Data Group Sharing and Conditional Dissemination
with Multi-Owner in Cloud Computing
2019
26 The Soft Underbelly of Cloud Security 2019
27 Enabling Verifiable and Dynamic Ranked Search Over
Outsourced Data
2019
28 A Data Sharing Protocol to Minimize Security and Privacy
Risks of Cloud Storage in Big Data Era
2019
29 A Secure Searchable Encryption Framework for Privacy-
Critical Cloud Storage Services
2019
30 Achieve Privacy-Preserving Priority Classification on Patient 2019
Health Data in Remote eHealth care System
31 Data Integrity Auditing without Private Key Storage for
Secure Cloud Storage
2019
32 Enabling Authorized Encrypted Search for Multi-Authority
Medical Databases
2019
33 Fuzzy Identity-Based Data Integrity Auditing for Reliable
Cloud Storage Systems
2019
34 P-MOD: Secure Privilege-Based Multilevel Organizational
Data-Sharing in Cloud Computing
2019
35 Practical Privacy-Preserving MapReduce Based K-means
Clustering over Large-scale Dataset
2019
36 Profit Maximization for Cloud Brokers in Cloud Computing 2019
37 Provable Data Possession with Outsourced Data Transfer 2019
38 Provably Secure Fine-Grained Data Access Control over
Multiple Cloud Servers in Mobile Cloud Computing Based
Healthcare Applications
2019
39 Revocable Identity-Based Broadcast Proxy Re-encryption for
Data Sharing in Clouds
2019
40 Searchable Symmetric Encryption with Forward Search
Privacy
2019
41 Privacy Preserving Searchable Encryption with Fine-grained
Access Control
2019
42 A Secure G-Cloud-Based Framework for Government
Healthcare Services
2019
II.SECURE COMPUTING
S.NO TITLE YEAR
1 Traffic Analysis Attack for Identifying Users’ Online
Activities
2019
2 Coverless Information Hiding Method Based on Web
Text
2019
3 Automated Decision Making in Airport Checkpoints:
Bias Detection Toward Smarter Security and Fairness
2019
4 A Lightweight Privacy-Preserving CNN Feature
Extraction Framework for Mobile Sensing
2019
5 LBOA: Location-Based Secure Outsourced Aggregation
in IoT
2019
6 Looking Back! Using Early Versions of Android Apps as
Attack Vectors
2019
7 Towards Thwarting Template Side-channel Attacks in
Secure Cloud Deduplications
2019
8 Toward Edge-Assisted Internet of Things: From Security
and Efficiency Perspectives
2019
9 SEPTIC Detecting Injection Attacks and Vulnerabilities
Inside the DBMS
2019
10 Detecting Malicious Social Bots Based on Click stream
Sequences
2019
11 Authenticated Medical Documents Releasing with
Privacy Protection and Release Control
2019
12 Collusion Defender: Preserving Subscribers’ Privacy in
Publish and Subscribe Systems
2019
13 Privacy-Preserving Aggregate Queries for Optimal
Location Selection
2019
14 Privacy-Preserving Attribute-Based Keyword Search in
Shared Multi-owner Setting
2019
15 Privacy-Preserving Multi-keyword Top-k Similarity
Search Over Encrypted Data
2019
16 Sensitive Label Privacy Preservation with Anatomization
for Data Publishing
2019
17 Towards Achieving Keyword Search over Dynamic
Encrypted Cloud Data with Symmetric-Key Based
Verification
2019
18 Who You Should Not Follow: Extracting Word
Embeddings from Tweets to Identify Groups of Interest
and Hijackers in Demonstrations
2019
III.DATA MINING
S.NO TITLE YEAR
1 A Novel Load Image Profile-Based Electricity Load
Clustering Methodology
2019
2 Predicting the Impact of Android Malicious Samples via
Machine Learning
2019
3 NASM: Nonlinearly Attentive Similarity Model for
Recommendation System via Locally Attentive Embedding
2019
4 Network Representation Learning Enhanced
Recommendation Algorithm
2019
5 DCCR: Deep Collaborative Conjunctive Recommender for
Rating Prediction
2019
6 Motion Based Inference of Social Circles via Self-Attention
and Contextualized Embedding
2019
7 Composition Context-Based Web Services Similarity
Measure
2019
8 Neural Binary Representation Learning for Large-Scale
Collaborative Filtering
2019
9 Clustering-Based Collaborative Filtering Using an
Incentivized/Penalized User Model
2019
10 A Hierarchical Attention Model for Social Contextual
Image Recommendation
2019
11 Visualizing Three-Dimensional Ocean Eddies in Web 2019
12 A Query-based Framework for Searching, Sorting, and 2019
Exploring Data Ensembles
13 BD2K Training Coordinating Center's Erudite: the
Educational Resource Discovery Index for Data Science
2019
14 A Particle Swarm Optimized Learning Model of Fault
Classification in Web-Apps
2019
15 Mining Users Trust From E-Commerce Reviews Based on
Sentiment Similarity Analysis
2019
16 Old and Young Users’ White Space Preferences for Online
News Web Pages
2019
17 A Generalized Locally Linear Factorization Machine with
Supervised Variation Encoding
2019
18 Analysis and Accurate Prediction of User’s Response
Behavior in Incentive-Based Demand Response
2019
19 Trust Relationship Prediction in Alibaba E-Commerce
Platform
2019
20 An Efficient Method for High Quality and Cohesive
Topical Phrase Mining
2019
21 Credibility Evaluation of Twitter-Based Event Detection by
a Mixing Analysis of Heterogeneous Data
2019
22 Filtering Instagram hash tags through crowd tagging and the
HITS algorithm
2019
23 A Hybrid E-learning Recommendation Approach Based on
Learners’ Influence Propagation
2019
24 Active Online Learning for Social Media Analysis to
Support Crisis Management
2019
25 Applying Simulated Annealing and Parallel Computing to
the Mobile Sequential Recommendation
2019
26 Collaboratively Tracking Interests for User Clustering in 2019
Streams of Short Texts
27 Detecting Pickpocket Suspects from Large-Scale Public
Transit Records
2019
28 Finding Optimal Skyline Product Combinations under Price
Promotion
2019
29 Heterogeneous Information Network Embedding for
Recommendation
2019
30 Hierarchical Multi-Clue Modeling for POI Popularity
Prediction with Heterogeneous Tourist Information
2019
31 K-nearest Neighbor Search by Random Projection Forests 2019
32 Learning Customer Behaviors for Effective Load
Forecasting
2019
33 Normalization of Duplicate Records from Multiple Sources 2019
34 On Scalable and Robust Truth Discovery in Big Data Social
Media Sensing Applications
2019
35 Privacy-Preserving Social Media Data Publishing for
Personalized Ranking-Based Recommendation
2019
36 Secure and Efficient Skyline Queries on Encrypted Data 2019
37 Predicting Consumption Patterns with Repeated and Novel
Events
2019
38 Multi-Party High-Dimensional Data Publishing under
Differential Privacy
2019
39 Minimizing Influence of Rumors by Blockers on Social
Networks: Algorithms and Analysis
2019
40 Detection of fake online reviews using semi-supervised and
supervised learning
2019
41 Collaborative Filtering-based Electricity Plan
Recommender System
2019
IV.BLOCK CHAIN TECHNOLOGY
S.NO TITLE YEAR
1 PBCert: Privacy-Preserving Block chain-Based Certificate
Status Validation Toward Mass Storage Management
2019
2 Blockchain for AI: Review and Open Research Challenges 2019
3 Block chain-Based Public Integrity Verification for Cloud
Storage against Procrastinating Auditors
2019
V.MACHINE LEARNING
S.NO TITLE YEAR
1 Towards Efficient U-Nets: A Coupled and Quantized
Approach
2019
2 Inferring Salient Objects from Human Fixations 2019
3 ROAM: a Rich Object Appearance Model with
Application to Rotoscoping
2019
4 End-to-end Active Object Tracking and Its Real-world
Deployment via Reinforcement Learning
2019
VI.BIG DATA
S.NO TITLE YEAR
1 Comparison of Swam Intelligence Clustering Algorithms
for Analysis of Big Data in Healthcare
2019
2 Effective and Efficient Content Redundancy Detection of
Web Videos
2019
3 Incorporating Data Context to Cost-Effectively Automate
End-to-End Data Wrangling
2019
4 Sentiment Analysis of Comment Texts Based on BiLSTM 2019
5 Data Interpolation and Reconstruction 2019
6 Large-Margin Regularized Soft max Cross-Entropy Loss 2019
VII.SOCIAL NETWORK
S.NO TITLE YEAR
1 A Hybrid Approach to Service Recommendation Based on
Network Representation Learning
2019
2 Social Network Rumor Diffusion Predication Based on
Equal Responsibility Game Model
2019
3 Fundamental Visual Concept Learning from Correlated
Images and Text
2019
VIII.SOFTWARE ENGINEERING
S.NO TITLE YEAR
1 Scheduling real time security aware tasks in fog networks 2019
2 Platform-Independent Dynamic Taint Analysis for
JavaScript
2019
IX.FUZZY SYSTEM
S.NO TITLE YEAR
1 Epistasis Analysis Using an Improved Fuzzy C-means-based
Entropy Approach
2019
2 Intelligent Security Planning for Regional Distributed Energy
Internet
2019
X.ANDROID PROJECTS
S.NO TITLE year
1 RescueMe: Smartphone-Based Self Rescue System for
Disaster Rescue
2019
(IEEE)
2 FallDroid: An Automated Smart Phone based Fall Detection
System using Multiple Kernel Learning
2019
(IEEE)
3 Dating with Scambots: Understanding the Ecosystem of
Fraudulent Dating Applications
2019
(IEEE)
4 Applying Simulated Annealing and Parallel Computing to the
Mobile Sequential Recommendation
2019
(IEEE)
5 An Indoor Position-Estimation Algorithm Using Smartphone
IMU Sensor Data
2019
(IEEE)
6 Achieve Privacy-Preserving Priority Classification on Patient
Health Data in Remote eHealthcare System
2019
(IEEE)
7 Blood banking 2018
8 Unified locality management system 2018
9 College management system 2018
10 Former forum 2018
11 Hospital Management System 2018
12 Google Maps
Application
2018
13 News Application 2018
14 Offline Mobile Management Tec knowledge 2018
15 Placement Assistance 2018
16 Placement Management
System
2018
`17 Uber application 2018
18 Online Blood Banking 2018
19 College Event Management
System
2018
XI.CYBER SECURITY
S.NO TITLE Year
1 Predicting Cyber bullying on Social Media in the Big Data
Era Using Machine Learning Algorithms: Review of
Literature and Open Challenges
2019
2 Spammer Detection and Fake User Identification on Social
Networks
2019
3 Ant Colony Stream Clustering: A Fast Density Clustering
Algorithm for Dynamic Data Streams
2019
XII.IMAGE PROCESSING AND MULTI MEDIA
S.NO TITLE YEAR
1 Fundamental Visual Concept Learning from Correlated
Images and Text
2019
2 Trust-based Privacy-Preserving Photo Sharing in Online
Social Networks
2019
3 Towards Robust Image Stegnography 2019
20 Emergency Call 2018
21 Agriculture Update Send Via SMS 2018
XIII.INTERNET OF THINGS
S.NO TITLE YEAR
1 Secure Phrase Search for Intelligent Processing of Encrypted
Data in Cloud-Based IoT
2019
2 Securing Data in Internet of Things (IoT) Using
Cryptography and Steganography Techniques
2019
3 Trustworthy Delegation toward Securing Mobile Healthcare
Cyber-Physical Systems
2019
4 Hybrid Keyword-Field Search with Efficient Key
Management for Industrial Internet of Things
2019
5 Trustworthy Delegation toward Securing Mobile Healthcare
Cyber-Physical Systems
2019
6 Securing Data in Internet of Things (IoT) Using
Cryptography and Steganography Techniques
2019
XIV.MOBILE COMPUTING
S.NO TITLE YEAR
1 An Indoor Position-Estimation Algorithm Using Smartphone
IMU Sensor Data
2019
2 FooDNet: Toward an Optimized Food Delivery Network
based on Spatial Crowd sourcing
2019
3 Privacy-preserving Crowd-sourced Statistical Data Publishing 2019
with An Untrusted Server
XV.PARALLEL AND DISTRIBUTED SYSTEMS
S.NO TITLE YEAR
1 A Distributed Trust Evaluation Protocol with Privacy
Protection for Inter cloud
2019
2 Deadline-aware Map Reduce Job Scheduling with Dynamic
Resource Availability
2019
XVI.SERVICE COMPUTING
S.NO TITLE YEAR
1 Transactional Behavior Verification in Business Process as a
Service Configuration
2019
2 Building and Querying an Enterprise Knowledge Graph 2019
3 Delegated Authorization Framework for EHR Services using
Attribute Based Encryption
2019
4 Secure Channel Free Certificate-Based Searchable Encryption
Withstanding Outside and Inside Keyword Guessing Attacks
2019
XVII.WIRELESS SENSOR NETWORKS
S.NO TITLE YEAR
1 V-Matrix-Based Scalable Data Aggregation Scheme in WSN 2019
2 A Probabilistic Source Location Privacy Protection Scheme
in Wireless Sensor Networks
2019
3 Memory Leakage-Resilient Dynamic and Verifiable Multi-
keyword Ranked Search on Encrypted Smart Body Sensor
Network Data
2019
4 Primary User-aware Optimal Discovery Routing for
Cognitive Radio Networks
2019
5 A Probabilistic Source Location Privacy Protection Scheme
in Wireless Sensor Networks
2019
XVIII.PYTHON
S.NO TITLE YEAR
1 A Distributed Trust Evaluation Protocol with Privacy
Protection for Intercloud
2018
2 A Secure Searchable Encryption Framework for Privacy-
Critical Cloud Storage Services
2018
3 Crypt-DAC: Cryptographically Enforced Dynamic Access 2018
4 P-MOD: Secure Privilege-Based Multilevel
Organizational Data-Sharing in Cloud Computing
2018
5 Revocable Identity-Based Broadcast Proxy Re-encryption
for Data Sharing in Clouds
2018
6 Ant Colony Stream Clustering: A Fast Density Clustering
Algorithm for Dynamic Data Streams
2018
7 Detecting Pickpocket Suspects from Large-Scale Public
Transit Records
2018
8 Secure and Efficient Skyline Queries on Encrypted Data 2018
9 Conversational Networks for Automatic Online
Moderation
2018
10 Sensitive Label Privacy Preservation with Anatomization
for Data Publishing
2018
11
Multi-faced Workplace Grievance Reporting Mechanism
2018
12
Missing People Identification System
2018
13 sentiment embedding with applications to sentiment analysis
using Twitter
2018
14 Online Car service 2018
15 combining data owner side and cloud side access control for
encrypted cloud storage
2018
16 Characterizing and Predicting Early Reviewers for Effective
Product Marketing on E-Commerce Websites
2018
17 Automatic Generation of Social Event Storyboard from
Image Click-through Data
2018
18 efficient clue based route search on road networks 2018
19 Search rank fraud and malware detection in google play 2018
20 detecting stress based on social interactions in social
networks
2018
21 Sentiment Analysis On Text Data 2018

More Related Content

Similar to Cse Final year projects

Similar to Cse Final year projects (20)

2019 and 2020 java Data Mining ieee projects list
2019 and 2020 java Data Mining ieee projects list2019 and 2020 java Data Mining ieee projects list
2019 and 2020 java Data Mining ieee projects list
 
2019 and 2020 Cloud Computing by java ieee projects list
2019 and 2020 Cloud Computing by java ieee projects list2019 and 2020 Cloud Computing by java ieee projects list
2019 and 2020 Cloud Computing by java ieee projects list
 
2019 and 2020 Social Network by java ieee projects list
2019 and 2020 Social Network by  java ieee projects list2019 and 2020 Social Network by  java ieee projects list
2019 and 2020 Social Network by java ieee projects list
 
2019 and 2020 Android ieee projects list
2019 and 2020 Android ieee projects list2019 and 2020 Android ieee projects list
2019 and 2020 Android ieee projects list
 
2019 and 2020 IEEE Secure Computing by java ieee projects list
2019 and 2020 IEEE Secure Computing by java ieee projects list2019 and 2020 IEEE Secure Computing by java ieee projects list
2019 and 2020 IEEE Secure Computing by java ieee projects list
 
2019 and 2020 Image Processing java ieee projects list
2019 and 2020 Image Processing java ieee projects list2019 and 2020 Image Processing java ieee projects list
2019 and 2020 Image Processing java ieee projects list
 
2019 and 2020 Data Mining projects list
2019 and 2020 Data Mining projects list2019 and 2020 Data Mining projects list
2019 and 2020 Data Mining projects list
 
2019 and 2020 Network Security projects list
2019 and 2020 Network Security projects list2019 and 2020 Network Security projects list
2019 and 2020 Network Security projects list
 
2019 and 2020 Cloud Computing
2019 and 2020 Cloud Computing2019 and 2020 Cloud Computing
2019 and 2020 Cloud Computing
 
2019 and 2020 Secure Computing projects list
2019 and 2020 Secure Computing projects list2019 and 2020 Secure Computing projects list
2019 and 2020 Secure Computing projects list
 
2019 and 2020 Android list
2019 and 2020 Android list2019 and 2020 Android list
2019 and 2020 Android list
 
JAVA PROJECTS TITLES 2022-23.pdf
JAVA PROJECTS  TITLES 2022-23.pdfJAVA PROJECTS  TITLES 2022-23.pdf
JAVA PROJECTS TITLES 2022-23.pdf
 
2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects
 
2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 

More from GREEN CORNER TECH

More from GREEN CORNER TECH (20)

VLSI TITLES 2022- 23.pdf
VLSI TITLES 2022- 23.pdfVLSI TITLES 2022- 23.pdf
VLSI TITLES 2022- 23.pdf
 
SCHOOL PROJECTS 2022-23.pdf
SCHOOL PROJECTS 2022-23.pdfSCHOOL PROJECTS 2022-23.pdf
SCHOOL PROJECTS 2022-23.pdf
 
MINI PROJECTS TITLES 2022-23.pdf
MINI PROJECTS  TITLES 2022-23.pdfMINI PROJECTS  TITLES 2022-23.pdf
MINI PROJECTS TITLES 2022-23.pdf
 
MECHANICAL SW TITLES 2022-23.pdf
MECHANICAL SW TITLES 2022-23.pdfMECHANICAL SW TITLES 2022-23.pdf
MECHANICAL SW TITLES 2022-23.pdf
 
MECHANICAL HW TITLES 2022-23.pdf
MECHANICAL HW TITLES 2022-23.pdfMECHANICAL HW TITLES 2022-23.pdf
MECHANICAL HW TITLES 2022-23.pdf
 
EMBEDDED & IOT TITLES 2022-23.pdf
EMBEDDED & IOT TITLES 2022-23.pdfEMBEDDED & IOT TITLES 2022-23.pdf
EMBEDDED & IOT TITLES 2022-23.pdf
 
EEE MATLAB TITLES 2022-23.pdf
EEE MATLAB TITLES 2022-23.pdfEEE MATLAB TITLES 2022-23.pdf
EEE MATLAB TITLES 2022-23.pdf
 
EEE EMBEDDED TITLES 2022-23.pdf
EEE EMBEDDED TITLES 2022-23.pdfEEE EMBEDDED TITLES 2022-23.pdf
EEE EMBEDDED TITLES 2022-23.pdf
 
ECE MATLAB TITLES 2022-23.pdf
ECE MATLAB TITLES 2022-23.pdfECE MATLAB TITLES 2022-23.pdf
ECE MATLAB TITLES 2022-23.pdf
 
Matlab ece ieee projects 2019 20
Matlab ece ieee projects 2019 20 Matlab ece ieee projects 2019 20
Matlab ece ieee projects 2019 20
 
Eee matlab simulink titles 2019 20
Eee matlab simulink titles 2019 20Eee matlab simulink titles 2019 20
Eee matlab simulink titles 2019 20
 
Matlab
Matlab Matlab
Matlab
 
Mechanical Projects
Mechanical ProjectsMechanical Projects
Mechanical Projects
 
Php list
Php listPhp list
Php list
 
Dotnet list
Dotnet listDotnet list
Dotnet list
 
Bigdata projects
Bigdata projectsBigdata projects
Bigdata projects
 
Web based java projects
Web based java projectsWeb based java projects
Web based java projects
 
JAVA Web Based Projects
JAVA Web Based ProjectsJAVA Web Based Projects
JAVA Web Based Projects
 
Vlsi titles 2017 18
Vlsi titles 2017 18Vlsi titles 2017 18
Vlsi titles 2017 18
 
Matlab titles 2017 2018
Matlab titles 2017 2018Matlab titles 2017 2018
Matlab titles 2017 2018
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Cse Final year projects

  • 1. IEEE CSE TITLES 2019-20 I.CLOUD COMPUTING S.NO TITLES YEAR 1 A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing 2019 2 A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments 2019 3 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data 2019 4 Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models 2019 5 Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage 2019 6 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System 2019 7 A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage 2019 8 Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing 2019 9 Dynamic Cloud Network Control Under Reconfiguration Delay and Cost 2019 10 Novel Multi-Keyword Search on Encrypted Data in the Cloud 2019 11 Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications 2019 12 Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting 2019 13 SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS 2019
  • 2. 14 V-Matrix-Based Scalable Data Aggregation Scheme in WSN 2019 15 Dynamic Demand Prediction and Allocation in Cloud Service Brokerage 2019 16 Towards AI-Powered Multiple Cloud Management 2019 17 A Fog-centric Secure Cloud Storage Scheme 2019 18 A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality 2019 19 An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage 2019 20 CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data 2019 21 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud 2019 22 Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments 2019 23 Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing 2019 24 FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things 2019 25 Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing 2019 26 The Soft Underbelly of Cloud Security 2019 27 Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data 2019 28 A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era 2019 29 A Secure Searchable Encryption Framework for Privacy- Critical Cloud Storage Services 2019 30 Achieve Privacy-Preserving Priority Classification on Patient 2019
  • 3. Health Data in Remote eHealth care System 31 Data Integrity Auditing without Private Key Storage for Secure Cloud Storage 2019 32 Enabling Authorized Encrypted Search for Multi-Authority Medical Databases 2019 33 Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems 2019 34 P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing 2019 35 Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset 2019 36 Profit Maximization for Cloud Brokers in Cloud Computing 2019 37 Provable Data Possession with Outsourced Data Transfer 2019 38 Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications 2019 39 Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds 2019 40 Searchable Symmetric Encryption with Forward Search Privacy 2019 41 Privacy Preserving Searchable Encryption with Fine-grained Access Control 2019 42 A Secure G-Cloud-Based Framework for Government Healthcare Services 2019 II.SECURE COMPUTING S.NO TITLE YEAR 1 Traffic Analysis Attack for Identifying Users’ Online Activities 2019 2 Coverless Information Hiding Method Based on Web Text 2019
  • 4. 3 Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness 2019 4 A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing 2019 5 LBOA: Location-Based Secure Outsourced Aggregation in IoT 2019 6 Looking Back! Using Early Versions of Android Apps as Attack Vectors 2019 7 Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications 2019 8 Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives 2019 9 SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS 2019 10 Detecting Malicious Social Bots Based on Click stream Sequences 2019 11 Authenticated Medical Documents Releasing with Privacy Protection and Release Control 2019 12 Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems 2019 13 Privacy-Preserving Aggregate Queries for Optimal Location Selection 2019 14 Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting 2019 15 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data 2019 16 Sensitive Label Privacy Preservation with Anatomization for Data Publishing 2019
  • 5. 17 Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification 2019 18 Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify Groups of Interest and Hijackers in Demonstrations 2019 III.DATA MINING S.NO TITLE YEAR 1 A Novel Load Image Profile-Based Electricity Load Clustering Methodology 2019 2 Predicting the Impact of Android Malicious Samples via Machine Learning 2019 3 NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding 2019 4 Network Representation Learning Enhanced Recommendation Algorithm 2019 5 DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction 2019 6 Motion Based Inference of Social Circles via Self-Attention and Contextualized Embedding 2019 7 Composition Context-Based Web Services Similarity Measure 2019 8 Neural Binary Representation Learning for Large-Scale Collaborative Filtering 2019 9 Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model 2019 10 A Hierarchical Attention Model for Social Contextual Image Recommendation 2019 11 Visualizing Three-Dimensional Ocean Eddies in Web 2019 12 A Query-based Framework for Searching, Sorting, and 2019
  • 6. Exploring Data Ensembles 13 BD2K Training Coordinating Center's Erudite: the Educational Resource Discovery Index for Data Science 2019 14 A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps 2019 15 Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis 2019 16 Old and Young Users’ White Space Preferences for Online News Web Pages 2019 17 A Generalized Locally Linear Factorization Machine with Supervised Variation Encoding 2019 18 Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand Response 2019 19 Trust Relationship Prediction in Alibaba E-Commerce Platform 2019 20 An Efficient Method for High Quality and Cohesive Topical Phrase Mining 2019 21 Credibility Evaluation of Twitter-Based Event Detection by a Mixing Analysis of Heterogeneous Data 2019 22 Filtering Instagram hash tags through crowd tagging and the HITS algorithm 2019 23 A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation 2019 24 Active Online Learning for Social Media Analysis to Support Crisis Management 2019 25 Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation 2019 26 Collaboratively Tracking Interests for User Clustering in 2019
  • 7. Streams of Short Texts 27 Detecting Pickpocket Suspects from Large-Scale Public Transit Records 2019 28 Finding Optimal Skyline Product Combinations under Price Promotion 2019 29 Heterogeneous Information Network Embedding for Recommendation 2019 30 Hierarchical Multi-Clue Modeling for POI Popularity Prediction with Heterogeneous Tourist Information 2019 31 K-nearest Neighbor Search by Random Projection Forests 2019 32 Learning Customer Behaviors for Effective Load Forecasting 2019 33 Normalization of Duplicate Records from Multiple Sources 2019 34 On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications 2019 35 Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation 2019 36 Secure and Efficient Skyline Queries on Encrypted Data 2019 37 Predicting Consumption Patterns with Repeated and Novel Events 2019 38 Multi-Party High-Dimensional Data Publishing under Differential Privacy 2019 39 Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis 2019
  • 8. 40 Detection of fake online reviews using semi-supervised and supervised learning 2019 41 Collaborative Filtering-based Electricity Plan Recommender System 2019 IV.BLOCK CHAIN TECHNOLOGY S.NO TITLE YEAR 1 PBCert: Privacy-Preserving Block chain-Based Certificate Status Validation Toward Mass Storage Management 2019 2 Blockchain for AI: Review and Open Research Challenges 2019 3 Block chain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors 2019 V.MACHINE LEARNING S.NO TITLE YEAR 1 Towards Efficient U-Nets: A Coupled and Quantized Approach 2019 2 Inferring Salient Objects from Human Fixations 2019 3 ROAM: a Rich Object Appearance Model with Application to Rotoscoping 2019 4 End-to-end Active Object Tracking and Its Real-world Deployment via Reinforcement Learning 2019 VI.BIG DATA S.NO TITLE YEAR 1 Comparison of Swam Intelligence Clustering Algorithms for Analysis of Big Data in Healthcare 2019 2 Effective and Efficient Content Redundancy Detection of Web Videos 2019 3 Incorporating Data Context to Cost-Effectively Automate End-to-End Data Wrangling 2019 4 Sentiment Analysis of Comment Texts Based on BiLSTM 2019
  • 9. 5 Data Interpolation and Reconstruction 2019 6 Large-Margin Regularized Soft max Cross-Entropy Loss 2019 VII.SOCIAL NETWORK S.NO TITLE YEAR 1 A Hybrid Approach to Service Recommendation Based on Network Representation Learning 2019 2 Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model 2019 3 Fundamental Visual Concept Learning from Correlated Images and Text 2019 VIII.SOFTWARE ENGINEERING S.NO TITLE YEAR 1 Scheduling real time security aware tasks in fog networks 2019 2 Platform-Independent Dynamic Taint Analysis for JavaScript 2019 IX.FUZZY SYSTEM S.NO TITLE YEAR 1 Epistasis Analysis Using an Improved Fuzzy C-means-based Entropy Approach 2019 2 Intelligent Security Planning for Regional Distributed Energy Internet 2019 X.ANDROID PROJECTS S.NO TITLE year 1 RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue 2019 (IEEE)
  • 10. 2 FallDroid: An Automated Smart Phone based Fall Detection System using Multiple Kernel Learning 2019 (IEEE) 3 Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications 2019 (IEEE) 4 Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation 2019 (IEEE) 5 An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data 2019 (IEEE) 6 Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System 2019 (IEEE) 7 Blood banking 2018 8 Unified locality management system 2018 9 College management system 2018 10 Former forum 2018 11 Hospital Management System 2018 12 Google Maps Application 2018 13 News Application 2018 14 Offline Mobile Management Tec knowledge 2018 15 Placement Assistance 2018 16 Placement Management System 2018 `17 Uber application 2018 18 Online Blood Banking 2018 19 College Event Management System 2018
  • 11. XI.CYBER SECURITY S.NO TITLE Year 1 Predicting Cyber bullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges 2019 2 Spammer Detection and Fake User Identification on Social Networks 2019 3 Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams 2019 XII.IMAGE PROCESSING AND MULTI MEDIA S.NO TITLE YEAR 1 Fundamental Visual Concept Learning from Correlated Images and Text 2019 2 Trust-based Privacy-Preserving Photo Sharing in Online Social Networks 2019 3 Towards Robust Image Stegnography 2019 20 Emergency Call 2018 21 Agriculture Update Send Via SMS 2018
  • 12. XIII.INTERNET OF THINGS S.NO TITLE YEAR 1 Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT 2019 2 Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques 2019 3 Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems 2019 4 Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things 2019 5 Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems 2019 6 Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques 2019 XIV.MOBILE COMPUTING S.NO TITLE YEAR 1 An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data 2019 2 FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowd sourcing 2019 3 Privacy-preserving Crowd-sourced Statistical Data Publishing 2019
  • 13. with An Untrusted Server XV.PARALLEL AND DISTRIBUTED SYSTEMS S.NO TITLE YEAR 1 A Distributed Trust Evaluation Protocol with Privacy Protection for Inter cloud 2019 2 Deadline-aware Map Reduce Job Scheduling with Dynamic Resource Availability 2019 XVI.SERVICE COMPUTING S.NO TITLE YEAR 1 Transactional Behavior Verification in Business Process as a Service Configuration 2019 2 Building and Querying an Enterprise Knowledge Graph 2019 3 Delegated Authorization Framework for EHR Services using Attribute Based Encryption 2019 4 Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks 2019 XVII.WIRELESS SENSOR NETWORKS S.NO TITLE YEAR 1 V-Matrix-Based Scalable Data Aggregation Scheme in WSN 2019 2 A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks 2019
  • 14. 3 Memory Leakage-Resilient Dynamic and Verifiable Multi- keyword Ranked Search on Encrypted Smart Body Sensor Network Data 2019 4 Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks 2019 5 A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks 2019 XVIII.PYTHON S.NO TITLE YEAR 1 A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud 2018 2 A Secure Searchable Encryption Framework for Privacy- Critical Cloud Storage Services 2018 3 Crypt-DAC: Cryptographically Enforced Dynamic Access 2018 4 P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing 2018 5 Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds 2018 6 Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams 2018 7 Detecting Pickpocket Suspects from Large-Scale Public Transit Records 2018 8 Secure and Efficient Skyline Queries on Encrypted Data 2018 9 Conversational Networks for Automatic Online Moderation 2018 10 Sensitive Label Privacy Preservation with Anatomization for Data Publishing 2018 11 Multi-faced Workplace Grievance Reporting Mechanism 2018 12 Missing People Identification System 2018
  • 15. 13 sentiment embedding with applications to sentiment analysis using Twitter 2018 14 Online Car service 2018 15 combining data owner side and cloud side access control for encrypted cloud storage 2018 16 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites 2018 17 Automatic Generation of Social Event Storyboard from Image Click-through Data 2018 18 efficient clue based route search on road networks 2018 19 Search rank fraud and malware detection in google play 2018 20 detecting stress based on social interactions in social networks 2018 21 Sentiment Analysis On Text Data 2018