You are on page 1of 12

Software Project List

(Projects in the areas of JAVA - J2EE - VB.NET - ASP.NET – C#.NET & Android)
Phoenix Systems
2017 - 2018

Software Projects

Application Projects

IEEE Projects

Android Projects

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 1
IEEE 2017-18
Java Projects
Java / J2EE
Knowledge and Data Mining
1. Search Rank Fraud and Malware Detection in Google Play -2017
2. Temporal task scheduling with constrained service delay for profit maximization in hybrid
clouds -2017
3. Designing High Performance Web-Based Computing Services to Promote Telemedicine
Database Management System -2017
4. Computing Semantic Similarity of Concepts in Knowledge Graphs -2017
5. Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification -2017
6. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach -
2017
7. PPRank: Economically Selecting Initial Users for Influence Maximization in Social
Networks.—2017
8. AML Rule Tuning: Applying statistical and risk based approach to achieve higher alert
efficiency. -2016
9. Crowdsourcing for Top-K Query Processing over Uncertain Data -2016
10.Data mining for automated personality classification-2016
11.Distributed Multi-Agent Online Learning Based on Global Feedback-performance and
convergence of multi agent learning -2016
12.Efficient Online Summarization of Large-scale Dynamic Networks -2016
13.GDCluster: A General Decentralized Clustering Algorithm -2016
14.K Nearest Neighbour Joins for Big Data on Map Reduce : A theoretical and experimental
analysis -2016
15.K-Subspaces Quantization for Approximate Nearest Neighbor Search -2016
16.Nearest Keyword Set Search in Multi-Dimensional Datasets -2016
17.Quality-Aware Subgraph Matching Over inconsistent Probabilistic graph data bases -2016
18.Scalable daily human behavioral pattern mining from multivariable temporal data-2016
19.Progressive Duplicate Detection - 2015
20.Keyword Search Over Probabilistic RDF Graphs- 2015
21.k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data- 2015
22.LINQ: A Framework for Location-Aware Indexing and Query Processing- 2015
23.GFilter: A General Gram Filter for String Similarity Search - 2015
24.Adaptive Anomaly Detection with Kernel Eigen space Splitting and Merging-2014
25.Range Aggregation With Set Selection-2014
26.Facilitating Document Annotation Using Content and Querying Value-2014
27.Automatic Itinerary Planning for Traveling Services-2014

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 2
28.Adaptive Preprocessing for Streaming Data-2014
29.Optimized Cartesian K-Means-2014
30.A Group Incremental Approach to Feature Selection Applying Rough Set Technique-2014
31.Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-
Based Services-2014
32.Decision Trees for Mining Data Streams Based on the Gaussian Approximation-2014
33.Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data-2014
34.CoRE: A Context-Aware Relation Extraction Method for Relation Completion-2014
35.An Air Index for Spatial Query Processing in Road Networks-2014
36.An Efficient Approach for Outlier Detection with Imperfect Data Labels-2014
37.Multi-Dimensional Classification with Super-Classes
38.T-Drive : Driving Directions Based on Taxi Trajectories-2013
39.A System to filter unwanted messages from OSN user walls-2013
40.A Fast Clustering Based Feature Subset Selection Algorithm for High Dimensional Data2013
41.A fuzzy self-constructing feature clustering algorithm for text classification -2011
42.Extended XML Tree Pattern Matching: Theories and Algorithms-2011

Big Data
1. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2017
2. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification 2017
3. GroRec: AGroup-centricIntelligen Recommender System Integrating Social, Mobile and Big
Data Technologies 2017
4. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage 2016
5. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
6. K Nearest Neighbour Joins for Big Data on Map Reduce : A theoretical and experimental
analysis-2016
7. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications -2015
8. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers -2014

Cloud Computing
1. Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server -2017
2. Securing Cloud Data under Key Exposure -2017
3. Privacy Protection based Access Control Scheme in Cloud-based Services -2017
4. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds -
2016
5. A scalable data chunk similarity based compression approach for efficient big sensing data
processing on cloud -2016

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 3
6. Analysis of Classical Encryption Techniques in Cloud Computing -2016
7. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments -2016
8. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing-
2015
9. Verifiable Auditing for Outsourced Database in Cloud Computing - 2015
10.Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data
Centers- 2015
11.Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds -
2015
12.ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds - 2015
13.Cost Minimization for Big Data Processing in Geo-Distributed Data Centers-2014
14.Security as a Service Model for Cloud Environment-2014
15.Enabling Dynamic Data and Indirect Mutual For Cloud Computing Storage Systems
16.Privacy Preserving Delegated Access Control in public clouds-2013
17.Security and privacy-enhancing multi cloud architectures-2013
18.Toward privacy-assured and searchable cloud data storage services-2013
19.Ensuring Data Storage Security in Cloud Computing-2013

Information security and forensics


1. ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated -
2017
2. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy
Preserving 2017
3. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public
Cloud Storage 2017
4. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry
Approach - 2016
5. Effective Data Access Control for Multi authority Cloud Storage Systems-2015
6. Privacy-Preserving Detection of Sensitive Data Exposure-2015
7. On the Use of Client Identity Information for Face Anti spoofing -2015
8. Active Learning Methods Based on New Structural Feature Extraction Methodology
9. A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor
Networks-2014
10.On the Security of Trustee-Based Social Authentications -2014

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 4
Parallel and Distributed Systems
1. Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud
Version -2017
2. A cloud gaming system based on user level virtualization and its resource scheduling -2016
3. An Efficient Privacy-Preserving Ranked Keyword Search Method -2016
4. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things-
2015
5. Deleting Secret Data with Public Verifiability-2015
6. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
-2015
7. Trust-based Service Management for Social Internet of Things Systems-2015
8. Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless
Networks-2014
9. The Client Assignment Problem for Continuous Distributed Interactive Applications:
Analysis, Algorithms, and Evaluation-2014
10.BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures-2014
11.Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment-
2013
12.Covering Points of Interest with Mobile Sensors-2013
13.Detection and Localization of Multiple Spoofing Attacks-2013.
Software Engineering
1. A Templating System to Generate Provenance -2017
2. Adaptive Multi-objective Evolutionary Algorithms for Overtime Planning in Software
Projects -2017
3. Detecting Trivial Mutant Equivalences via Compiler Optimisations -2017
4. Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles -2017
5. The role Of Ethnographic studies in empirical software engineering -2016
6. RELAI Testing : A technique to assess and improve software reliability -2016
7. Relation between Combinations of Personal Characteristic Types and Educational
Effectiveness for a Controlled Learning Course -2016
8. Automated Checking of Conformance to Requirements Templates using Natural Language
Processing-2015
9. Performance Analysis for Object-Oriented Software: A Systematic Mapping -2015
10.Estimating Computational Requirements in Multi-Threaded Applications -2015
11.The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps-2015
12.Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An Empirical Study -2015

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 5
NON – IEEE Projects
Java / J2EE - M.Sc(CS & IT),MCA
1. FOC Management System For TNEB -Abstracts
2. Online Loan Application-Abstract
3. Plant Shopping On Web
4. E - Intelli Cabs
5. Nutraceuticals Management System
6. Placement Management System
7. Time Table Generator
8. Green Planet Awareness
9. Implementation And Validating Environmental And Health
10.Loan Online Application
11.Management System In Metro Train
12.Modern Agriculture Development System
13.Modern Municipal Corporation.
14.Nearest Shopping Location Identification Systems
15.Product Market Manipulations On Asian Stock Market
16.Project Work Tracking System
17.Vendor Information System For Shipping
18.Transport Management System
19.E-Knowledge Wireless Health Care System
20.Adaptive Intrusion Detection System
21.Scheduling Operation With Facility Management For Logistic System
22.Defect Tracking For Improving Product Quality And Productivity
23.Ensuring Data Security In Cloud Computing
24.A New Algorithm For Three Party Quantum Key Distribution
25.Automatic Question Paper Generation
26.Automatic End Semester Time Table Generation
27.Learn To Personalized Image Search From Photo Sharing Web Sites
28.Material Management System
29.Multi Server Communication In Distributed Management System
30.Online Task Management System
31.Optimal Dynamic Path Restoration In Mesh Network
32.Placement Management System
33.Transfer Certificate Issuing System
34.Query Matching Process Using Xml Tree Pattern
35.Scheduled Operations Resource Facilitating System
36.Tollgate Management Systems.

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 6
IEEE – 2017-2018
Dot Project Titles
Cloud Computing
1. Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server -2017
2. Securing Cloud Data under Key Exposure -2017
3. Privacy Protection based Access Control Scheme in Cloud-based Services -2017
4. Attribute-Based Data sharing Scheme Revisited in Cloud Computing. -2016
5. OverFlow: Multi-Site Aware Big DataManagement for Scientific Workflows on Clouds --2016
6. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public
Cloud -2016
7. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing -2016
8. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds-
2016
Knowledge and Data Mining
1. Search Rank Fraud and Malware Detection in Google Play -2017
2. Temporal task scheduling with constrained service delay for profit maximization in hybrid
clouds -2017
3. Designing High Performance Web-Based Computing Services to Promote Telemedicine -
Database Management System -2017
4. Computing Semantic Similarity of Concepts in Knowledge Graphs -2017
5. Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification -2017
6. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach -
2017
7. PPRank: Economically Selecting Initial Users for Influence Maximization in Social
Networks.—2017
8. Discovery of ranking fraud for mobile applications.
9. Relaxed functional dependencies.
10.Mining user-aware rare sequential topic patterns in document streams-2016
11.Authentication of moving top-k spatial keyword queries -2015
12.Co-extracting opinion targets and opinion words from online reviews based on the word
alignment model-2015
13.Lossless selection views under conditional domain constraints-2015
14.Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through
blind storage-2015
15.A query approach for influence maximization on specific users in social networks-2015
16.Progressive duplicate detection-2015
17.Gdcluster:A general decentralized clustering algorithm-2015
18.Range aggregation with set selection-2014

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 7
19.Facilitating document annotation using content and querying value-2014
20.A group incremental approach to feature selection applying rough set technique-2014
21.Route-saver: leveraging route apis for accurate and efficient query processing at location-
based services-2014
22.Classifier ensembles with the extended space forest-2014
23.Decision trees for mining data streams based on the gaussian approximation-2014
24.Privacy preserving and content protecting location based queries-2014
25.Learning conditional preference networks from inconsistent examples-2014
26.Fast nearest neighbor search with keywords-2014
27.Discovering the top-k unexplained sequences in time-stamped observation data-2014
28.Effective and efficient clustering methods for correlated probabilistic graphs-2014
29.Core: a context-aware relation extraction method for relation completion-2014
30.Lars: an efficient and scalable location=aware recommender system-2014
31.Highly comparative feature-based time-series classification-2014
32.Keyword query routing-2014
33.Secure mining of association rules in horizontally distributed databases-2014
34.Personalized mobile search engine-2013
35.Web system upgrading with transaction failure and strategic customers
36.Traffic pattern based content leakage detection for trusted content delivery networks
Software Engineering

1. A Templating System to Generate Provenance -2017


2. Adaptive Multi-objective Evolutionary Algorithms for Overtime Planning in Software
Projects -2017
3. Detecting Trivial Mutant Equivalences via Compiler Optimisations -2017
4. Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles -2017
5. The Impact Of API Change and Fault-Proneness On The User Ratings of Android Apps-2015
6. Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-
Proneness Prediction? An empirical Study-2015
7. ?Using Declarative Specification To Improve the Understanding, Extensibility and
Comparison of Model-Interference algorithms-2015
8. An Observe-Model-Exercise* Paradigm to Test event-Driven Systems with Undetermined
Input Spaces-2014
9. Event Logs for the Analysis of Software Failures: A Rule-Based Approach-2013
10.Centroidal Voronoi Tessellations—A New Approach to Random Testin-2013
11.Test Case-Aware Combinatorial Testing-2013

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 8
Big Data

1. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2017
2. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification 2017
3. GroRec: AGroup-centricIntelligen Recommender System Integrating Social, Mobile and Big
Data Technologies 2017
4. OverFlow: Multi-Site Aware Big DataManagement for Scientific Workflows on Clouds -2016
5. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds -
2016
Information security and forensics

1. ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated -


2017
2. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy
Preserving 2017
3. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public
Cloud Storage 2017
4. Fast detection of transformed data leaks -2016
5. Privacy-Preserving Detection Of Sensitive Data Exposure-2015
6. On the Use of Client Identity Information for Face Anti Spoofing-2015
7. Provable multi-copy Dynamic Data Possession in Cloud Computing Systems-2015
8. On the Secrecy Rate Region Of Multiple –Access Wiretap Channel With Non Causal Side
information -2015
9. Privacy-Preserving Authenticated Key-Exchange Over Internet-2014
10.Optimal Probabilistic Encryption for Secure Detection in WSN-2014
11.Top-k query Result Completeness Verification in Tiered SensorNetworks-2014
12.A Probabilistic Model of Visual Cryptography-2012
13.Parallel and Distributed Systems
14.Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud
Version -2017
15.Secure Data Retrieval For Decentralized Distribution tolerant Military Networks -2016
16.An Efficient Privacy-Preserving Ranked Keyword Search Method -2016
17.Trust-Based Service Management for Social Internet Of Things Systems-2015
18.COMIC: Cost Optimization for Internet Content Multihoming-2014
19.BFS-4K: An Efficient Implementation of BFS for Kepler GPU Architecture-2014
20.Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks-
2014
21.Learning-Based Uplink Interference Management in 4g LTE Cellular Systems-2014

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 9
NON – IEEE Projects
Java / J2EE - M.Sc(CS & IT),MCA
1. Easy SQL Query for Non IT Manager
2. Leave Management
3. Flight Management
4. Budget Approval System
5. Consumer Market Basket Analysis For Consumer Correct Decision
6. Multiple Password Authentication
7. Nutraceuticals Management System
8. Predicting User Behavior Using Web Mining
9. Courier Tracking System
10.Ensuring Data Security In Cloud Computing
11.Metro Train Smart Card Recharge System
12.Fireworks Billing
13.Public Web Status Monitoring Systems
14.Task Management System
15.College Application Form
16.Guest Information And Feedback Systems
17.Web Traffic Analyser And Report Generation
18.Exam Seating Arrangement
19.Data Confidentiality In Health Care Systems
20.Information Leak Detection And Prevention
21.Zero-Knowledge Proof System On Outsourcing Cloud
22.Green Planet Awareness
23.Implementation And Validating Environmental And Health
24.Loan Online Application
25.Modern Agriculture Development System
26.Modern Municipal Corporation.
27.Nearest Shopping Location Identification Systems
28.Plant Shopping On Web
29.Product Market Manipulations On Asian Stock Market
30.Project Work Tracking System
31.Reporting Online Media News Systems
32.Vendor Information System For Shiping
33.Time To Time Stock Market Updater And Monitoring System
34.Tollgate Management Systems
35.Transport Management System
36.Scheduling Operation With Facility Management For Logistic System

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 10
37.Defect Tracking For Improving Product Quality And Productivity
38.Ensuring Data Security In Cloud Computing
39.Constructing E-Tourism
40.Consumer Market Basket Analysis For Consumer Correct Decision
41.Data Confidentiality On Health-Care Information System
42.Data Mining Analysis On Eb Bill System
43.Human Expertise Search Engine
44.I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine
45.Predicting Users Behaviors Using Web Mining
46.Product Marketing Analysis On Public Opinion
47.Ultimate Location Information For Given Range
48.Vendor Information System For Shiping
49.Web Based Book Publishing System
50.Web User Service Management System
51.Inventory Library Management System
52.New Generation Of Community Certificate
53.Web Based E-Auction System
54.Exam Scheduler
55.Budget Approval System
56.Data Theft Attack
57.Orphan Home Management
58.Vehicle Sales And Services Management Systems
59.School Management Systems
60.Monitoring Loan Application Processing System
61.Data Leakage Detection
62.Graphical Password Authentication System
63.Fast Nearest Search
64.Pmse: A Personalized Mobile Search Engine
65.Inventory Management-Printing Press
66.Hostel Management System
67.Advertising Agencies
68.Hospital Medicine Supply System
69.Global Employee Management System
70.Industrial Manpower Resource Organizer
71.Real Estate Management Systems.
72.Pension Management System
73.Key Word Query Routing
74.Office Automation In Computer Center

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 11
75.Printing Press Management System
76.Personal Health Care Record Management System
77.Vehicle Service Management
78.Web Based Sms Application
79.Automated Transport System For Travel Agencies
80.Quotation Controlling Process Through The Web
81.Welfare Schemes For A Cross Section Of The Society From Time To Time
82.Detecting Fraud On Vehicle Insurance System
83.Auditing Data Integrity And Data Storage Using Cloud
84.Marriage Assistance System
85.Cab Management Systems
86.Efficient Authentication For Mobile And Pervasive Computing
87.University Mark Schedular
88.Student and staff interaction
89.Online smart vehicle parking system
90.Automatic time table generation
91.Pharmacy management system
92.Online admission system
93.Easy leave

13,Babu Rajendra Prasad II St 7812045575 044-43515757


West Mambalam phoeniixsystems@gmail.com Chennai – 33 12

You might also like