Final Year Projects for Computer Science Engineering

Best Final Year Projects for Computer Science Engineering (CSE) Students

M.TECH JAVA & .NET CLOUD COMPUTING
1.    Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
2.    Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
3.    Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
4.    Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
5.    A Hybrid Cloud Approach for Secure Authorized Deduplication
6.    Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
7.    Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
8.    PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
9.    A Scalable Two-Phase Top-DownSpecialization Approach for Data Anonymization Using MapReduce on Cloud
10.    A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
11.    Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
12.    Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
13.    Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
14.    Consistency as a Service: Auditing Cloud Consistency
15.    Towards Differential Query Services in Cost-Efficient Clouds
16.    A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
17.    AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
18.    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
19.    Privacy-Preserving Public Auditing for Secure Cloud Storage
20.    QoS Ranking Prediction for Cloud Services
21.    Winds of Change: From Vendor Lock-In to the Meta Cloud
22.    A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
23.    Collaboration in Multi cloud Computing Environments: Framework and Security Issues
24.    Outsourcing Privacy-Preserving Social Networks to a Cloud
25.    Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
26.    Costing of Cloud Computing Services: A Total Cost of Ownership Approach
27.    Efficient similarity search over encrypted data
28.    Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
29.    Ensuring Distributed Accountability for Data Sharing in the Cloud
30.    Anchor: A Versatile and Efficient Framework for Resource Management in the Clouds

DATA MINING

31.    Supporting Privacy Protection in Personalized Web Search
32.    A Cocktail Approach for Travel Package Recommendation
33.    Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
34.    Efficient Prediction of Difficult Keyword Queries over Databases
35.    Facilitating Document Annotation using Content and Querying Value
36.    Fast Nearest Neighbor Search with Keywords
37.    Keyword Query Routing
38.    Privacy-Preserving and Content-Protecting Location Based Queries
39.    Towards Online Shortest Path Computation
40.    Data Mining with Big Data
41.    Dealing With Concept Drifts in Process Mining
42.    Privacy-Preserving Enhanced Collaborative Tagging
43.    OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
44.    Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks
45.    Task Trail: An Effective Segmentation of User Search Behavior
46.    Spatial Approximate String Search
47.    A Survey of XML Tree Patterns
48.    A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
49.    Optimal Route Queries with Arbitrary Order Constraints
50.    Crowd sourcing Predictors of Behavioral Outcomes
51.    Mining User Queries with Markov Chains: Application to Online Image Retrieval
52.    m-Privacy for Collaborative Data Publishing
53.    Privacy Preserving Delegated Access Control in Public Clouds
54.    T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
55.    Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures
56.    Ranking on Data Manifold with Sink Points
57.    Sampling Online Social Networks
58.    Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes
59.    Facilitating Document Annotation Using Content And Querying Value
60.    FOCUS Learning to Crawl Web Forums
61.    Incentive Compatible Privacy-Preserving Data Analysis
62.    PMSE A Personalized Mobile Search Engine
63.    Secure Mining of Association Rules in Horizontally Distributed Databases
64.    Dynamic Query Forms for Database Queries
65.    Improving Security and Efficiency in Attribute-Based Data Sharing
66.    Facilitating Effective User Navigation through Website Structure Improvement
67.    Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
68.    Supporting Search-As-You-Type Using SQL in Databases
69.    A Link-Based Cluster Ensemble Approach for Categorical Data Clustering
70.    Answering General Time-Sensitive Queries
71.    Creating Evolving User Behavior Profiles Automatically
72.    Effective Pattern Discovery for Text Mining
73.    Incremental Information Extraction Using Relational Databases

NET WORKING & NETWORK SECURITY

74.    Automatic Test Packet Generation
75.    Boundary Cutting for Packet Classification
76.    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
77.    Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
78.    Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
79.    A Two-stage Deanonymization Attack Against Anonymized Social Networks
80.    Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
81.    Multiparty Access Control for Online Social Networks: Model and Mechanisms
82.    Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
83.    PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
84.    Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
85.    Importance of Coherence Protocols with Network Applications on Multi core Processors
86.    Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
87.    A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
88.    Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
89.    Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
90.    Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
91.    Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
92.    On the Node Clone Detection in Wireless Sensor Networks
93.    Opportunistic MANETs Mobility Can Make Up for Low Transmission Power
94.    Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
95.    A Decentralized Service Discovery Approach on Peer-to-Peer Networks
96.    Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
97.    DRINA A Lightweight And Reliable Routing
98.    Cut Detection In Wireless Sensor Network
99.    SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
100.    AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
101.    FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
102.    The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

MOBILE COMPUTING

103.    Preserving Location Privacy in Geo-Social Applications
104.    Efficient Authentication for Mobile and Pervasive Computing
105.    An Incentive Framework for Cellular Traffic Offloading
106.    Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
107.    A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
108.    IP-Geo location Mapping for Moderately Connected Internet Regions
109.    Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
110.    Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
111.    A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
112.    Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation
113.    Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
114.    Search Me If You Can Privacy-preserving Location Query Service
115.    Vampire attacks Draining life from wireless ad-hoc sensor networks
116.    Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
117.    Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
118.    Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
119.    Top-k Query Result Completeness Verification in Tiered Sensor Networks
120.    Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
121.    Extracting Spread-Spectrum Hidden Data from Digital Media
122.    Two tales of privacy in online social networks
123.    Risk-Aware Mitigation for MANET Routing Attacks
124.    Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
125.    Detecting Spam Zombies by Monitoring Outgoing Messages

PARALLEL & DISTRIBUTED SYSTEMS

126.    Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
127.    Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
128.    LocaWard: A Security and Privacy Aware Location-Based Rewarding System
129.    Exploiting Service Similarity for Privacy in Location-Based Search Queries
130.    Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
131.    Secure Out sourced Attribute-based Signatures
132.    CONDESA: A Framework for Controlling Data Distribution on Elastic Server Architectures
133.    Reliable Bulk-Data Dissemination in Delay Tolerant Networks
134.    Securely Outsourcing Attribute-Based Encryption with Checkability
135.    A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud
136.    A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
137.    A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
138.    Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
139.    Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
140.    IP-Geo location Mapping for Moderately Connected Internet Regions
141.    Load Rebalancing for Distributed File Systems in Clouds

SOFTWARE ENGINEERING

142.    Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm
143.    Self-Management of Adaptable Component-Based Applications
144.    Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler
145.    Automatic Detection of Unsafe Dynamic Component Loadings
146.    QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems

NS2

147.    SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems
148.    Vampire attacks: Draining life from wireless ad-hoc sensor networks
149.    A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
150.    Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
151.    Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
152.    Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
153.    An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
154.    GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs
155.    Risk-Aware Mitigation for MANET Routing Attacks
156.    Packet-Hiding Methods for Preventing Selective Jamming Attacks
157.    CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
158.    TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS
159.    The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
160.    A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network
161.    Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks

DOT NET M.TECH PROJECT LIST   CLOUD COMPUTING

162.    Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
163.    Exploiting Service Similarity for Privacy in Location Based Search Queries
164.    Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
165.    Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
166.    Dynamic Optimization of Multi attribute Resource Allocation in Self-Organizing Clouds
167.    Enabling Dynamic Data and Indirect Mutual Trust for Cloud and computing storage systems
168.    Data integrity and data dynamics with secure storage service in cloud
169.    Privacy-Preserving Public Auditing for Secure Cloud Storage
170.    Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
171.    Security Challenges in Vehicular Cloud Computing
172.    An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
173.    Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
174.    On the Optimal Allocation of Virtual Resources in Cloud Computing Networks
175.    Load Rebalancing for Distributed File Systems in Clouds

DATA MINING

176.    Supporting Privacy Protection in Personalized Web Search
177.    Privacy-Preserving and Content-Protecting Location Based Queries
178.    Dynamic Personalized Recommendation on Sparse Data
179.    CoDe modeling of graph composition for Data Warehouse report visualization
180.    Reversible Data Hiding with Optimal Value Transfer
181.    A New Algorithm for Inferring User Search Goals with Feedback Sessions
182.    Automatic Extraction of Top-k Lists from the Web
183.    Dynamic Query Forms for Database Queries
184.    ELCA Evaluation for Keyword Search on Probabilistic XML Data
185.    Sampling Online Social Network
186.    Secure Mining of Association Rules in Horizontally Distributed Databases
187.    SUSIE: Search using services and information extraction
188.    Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development

MOBILE COMPUTING

189.    Importance of Coherence Protocols with Network Applications on Multicore Processors
190.    Real-Time Scheduling with Security Enhancement for Packet Switched Networks
191.    A Survey of Cross-Layer Designs in Wireless Networks
192.    AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks
193.    Overhead of using Secure Wireless Communications in Mobile Computing

For further details Contact us

Keywords:
ieee projects for cse, b tech cse projects, cse projects topics, projects for cse, ieee cse projects, cse projects 2015, cse projects ideas, cse projects list, m tech cse projects, iit cse projects, cse projects download, projects for cse students,
be cse projects, cse major projects, cse projects in java, latest cse projects, btech projects for cse, cse main projects, main projects for cse, projects in cse, projects of cse, ieee projects cse, latest projects for cse, projects cse, projects on cse, final year cse projects, cse projects for final year, cse final year projects, final year projects for cse, projects for cse final year.