Software Projects
(For Purchase / Abstract related, call / msg : 07775066660 (whats app) OR Mail : tecxoinfo@gmail.com )
we provide : Project Model + Abstract + PPT + Thesis/Report + Images & Video + Project Guidance + Certificate + Shipping + Data CD.
**Discount offer on all projects **
(Just refer your friend or other groups and get 10 % discount on your project)
Or (refer your friend or groups and earn 5% Cash or Mobile Recharge)
1.
A Dynamic Secure Group Sharing Framework in Public Cloud Computing
Cloud Computing
2.
A Mechanism Design Approach to Resource Procurement in Cloud Computing
Cloud Computing
3.
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
Cloud Computing
4.
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Cloud Computing
5.
A secure data self-destructing scheme in cloud computing
Cloud Computing
6.
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
Cloud Computing
7.
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
Cloud Computing
8.
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cloud Computing
9.
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Cloud Computing
10.
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing
11.
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
Cloud Storage
Cloud Computing
12.
A Hybrid Cloud Approach for Secure Authorized Deduplication
Cloud Computing
13.
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
Cloud Computing
14.
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
Cloud Computing
15.
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Cloud Computing
16.
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Cloud Computing
17.
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Cloud Computing
18.
Secure Auditing and Deduplicating Data in Cloud
Cloud Computing
19.
Secure Distributed Deduplication Systems with
Improved Reliability
Cloud Computing
20.
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Cloud Computing
21.
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
Cloud Computing
22.
An Efficient Privacy-Preserving Ranked Keyword Search Method
Cloud Computing
23.
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
Cloud Computing
24.
DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads
Cloud Computing
25.
DeyPoS: Deduplicatable Dynamic Proof of
Storage for Multi-User Environments
Cloud Computing
26.
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Cloud Computing
27.
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Cloud Computing
28.
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
Cloud Computing
29.
A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing
Cloud Computing
30.
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
Cloud Computing
31.
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
Cloud Computing
32.
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
Cloud Computing
33.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
Cloud Computing
34.
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
Cloud Computing
35.
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds
Cloud Computing
36.
Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
Cloud Computing
37.
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Cloud Computing
38.
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Cloud Computing
39.
Enabling Cloud Storage Auditing with Key-Exposure Resistance
Cloud Computing
40.
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
Cloud Computing
41.
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Cloud Computing
42.
Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing
Cloud Computing
43.
Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Cloud Computing
44.
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Cloud Computing
45.
Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions
Cloud Computing
46.
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Cloud Computing
47.
Identity-based Encryption with Outsourced Revocation in Cloud Computing
Cloud Computing
48.
KSF-OABE: Outsorce Attribute Based Encryption with Keyword Search Function in Cloud Storage
Cloud Computing
49.
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Cloud Computing
50.
SecRBAC: Secure data in the Clouds
Cloud Computing
51.
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Cloud Computing
52.
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
Cloud Computing
53.
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
Cloud Computing
54.
A General Geographical Probabilistic Factor Model for Point of Interest Recommendation
Data Mining
55.
A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval
Data Mining
56.
A Query Approach for Influence Maximization on Specific Users in Social Networks
Data Mining
57.
Accelerated PSO Swarm Search Feature Selection for Data Stream Mining Big Data
Data Mining
58.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
Data Mining
59..
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
Data Mining
60.
Best Keyword Cover Search
Data Mining
61.
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
Data Mining
62.
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Data Mining
63.
Discovery of Ranking Fraud for Mobile Apps
Data Mining
64.
Disease Inference from Health-Related Questions via Sparse Deep Learning
Data Mining
65.
Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions
Data Mining
66.
Facilitating Document Annotation Using Content and Querying Value
Data Mining
67.
Fast Nearest Neighbor Search with Keywords
Data Mining
68.
Fine-Grained Knowledge Sharing in Collaborative Environments
Data Mining
69.
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
Data Mining
70.
Keyword Extraction and Clustering for Document Recommendation in Conversations
Data Mining
71.
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Data Mining
72.
Mining Social Media Data for Understanding Students' Learning Experiences
Data Mining
73.
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification
Data Mining
74.
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases
Data Mining
75.
Ranking on Data Manifold with Sink Points
Data Mining
76.
Rule-Based Method for Entity Resolution
Data Mining
77.
Secure Mining of Association Rules in Horizontally Distributed Databases
Data Mining
78.
SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Data Mining
79.
Supporting Privacy Protection in Personalized Web Search
Data Mining
80.
Towards Effective Bug Triage with Software Data Reduction Techniques
Data Mining
81.
Towards Online Shortest Path Computation
Data Mining
82.
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark,and Feature Evaluation
Data Mining
83.
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Data Mining
84.
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
Data Mining
85.
Outlier Analysis and Top Scoring Pair for Integrated Data Analysis and Biomarker Discovery
Data Mining
86.
Outlier Analysis and Top Scoring Pair for Integrated Data Analysis and Biomarker Discovery
Data Mining
87.
MIRAGE: An Iterative MapReduce based Frequent Subgraph Mining Algorithm
Data Mining
88.
Venus: Scalable Real-Time Spatial Queries on Microblogs with Adaptive Load Shedding
Data Mining
89.
Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
Data Mining
90.
RSkNN: kNN Search on Road Networks by Incorporating Social Influence
Data Mining
91.
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
Data Mining
92.
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Data Mining
93.
Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
Data Mining
94.
Adaptive Influence Maximization in Dynamic Social Networks
Data Mining
95.
Adapting to User Interest Drift for POI Recommendation
Data Mining
96.
On Summarization and Timeline Generation for Evolutionary Tweet Streams
Data Mining
97.
A Novel Recommendation Model Regularized with User Trust and Item Ratings
Data Mining
98.
Automatically Mining Facets for Queries from Their Search Results
Data Mining
99.
Coupled Topic Model for Collaborative Filtering With User-Generated Content
Data Mining
100.
Crawling Hidden Objects with kNN Queries
Data Mining
101.
Cross-domain Sentiment Classification using Sentiment Sensitive Embeddings
Data Mining
102.
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
Data Mining
103.
Fast Online EM for Big Topic Modeling
Data Mining
104.
Learning to Find Topic Experts in Twitter via Different Relations
Data Mining
105.
Least Cost Influence Maximization Across Multiple Social Networks
Data Mining
106.
Location Aware Keyword Query Suggestion Based on Document Proximity
Data Mining
107.
Microblogging Content Propagation Modeling Using Topic-specific Behavioral Factors
Data Mining
108.
Personalized Influential Topic Search via Social Network Summarization
Data Mining
109.
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
Data Mining
110.
Quantifying Political Leaning from Tweets, Retweets, and Retweeters
Data Mining
111.
Rating Prediction Based On Social Sentiment from Textual Reviews
Data Mining
112.
Quantifying Political Leaning from Tweets, Retweets, and Retweeters
Data Mining
113.
Survey on Aspect-Level Sentiment Analysis
Data Mining
114.
The Moving K Diversified Nearest Neighbor Query
Data Mining
115.
Tweet Segmentation and Its Application to Named Entity Recognition
Data Mining
116.
Understanding Short Texts through Semantic Enrichment and Hashing
Data Mining
117.
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
Data Mining
118.
A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking
Networking
119.
A Lightweight Secure Scheme for Detecting packet drop attacks and packet forgery in WSN
Networking
120.
A Novel En-Route Filtering Scheme Against false data injection attacks in cyber-physical network system
Networking
121.
A Proximity-Aware Interest-Clustered P2P File Sharing System
Networking
122.
A Temporal-Topic Model for Friend recommendation in Chinese Microblogging system
Networking
123.
Active Trust: Secure and Trustable Routing in Wireless Sensor Network
Networking
124.
Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
Networking
125.
An Authenticated Trust and Reputation Calculation and management system for cloud and sensor network integration
Networking
126.
Anti-jamming Strategy versus a Low-Power jamming attack when the intelligence of adversary's attack type is unknown
Networking
127.
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
Networking
128.
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
Networking
129.
Botnet Detection based on Anomaly and Community Detection
Networking
130.
Building an intrusion detection system using a filter-based feature selection algorithm
Networking
131.
Data Lineage in Malicious Environments
Networking
132.
Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
Networking
133.
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
Networking
134.
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
Networking
135.
Dynamic Network Control for Confidential Multi-Hop Communications
Networking
136.
Dynamic Routing for Data Integrity and Delay Differentiated Services
in Wireless Sensor Networks
Networking
137.
Effective Key Management in Dynamic Wireless Sensor Networks
Networking
138.
Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness
Networking
139.
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Networking
140.
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
Networking
141.
Achieving Flatness: Selecting the Honeywords from Existing User Passwords
Networking
142.
Keylogging-Resistant Visual Authentication Protocols
Networking
143.
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
Networking
144.
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks
Networking
145.
OpenSec: Policy-based Security Using Software-defined Networking
Networking
146.
Opportunistic Piggyback Marking for IP Traceback
Networking
147.
Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
Networking
148.
Privacy Protection for Wireless Medical Sensor Data
Networking
149.
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Networking
150.
Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
Networking
151.
Profiling Online Social Behaviors for Compromised Account Detection
Networking
152.
Real-Time Detection of Traffic From Twitter Stream Analysis
Networking
153.
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
Networking
154.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
Networking
155.
The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
Networking
156.
TopicSketch: Real-time Bursty Topic Detection from Twitter
Networking
157.
Wireless Communications under Broadband Reactive Jamming Attacks
Networking
158.
A Shoulder Surfing Resistant Graphical Authentication System
Networking
159.
Designing a Secure Exam Management
System (SEMS) for M-Learning Environments
Networking
160.
A Visual Model-Based Perceptual Image Hash for Content Authentication
Image Processing
161.
An Attribute-Assisted Reranking Model for Web Image Search
Image Processing
162.
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
Image Processing
163.
Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
Image Processing
164.
Content-Based Image Retrieval Using Features Extracted From Halftoning-Based Block Truncation Coding
Image Processing
165.
Detection and Rectification of Distorted Fingerprints
Image Processing
166.
Learning-Based, Automatic 2D-to-3D Image and Video Conversion
Image Processing
167.
Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography
Image Processing
168.
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Image Processing
169.
Secure Data Hiding in Audio Vedio Steganalysis by Anti-Forensics Technique
Image Processing
170.
Steganography Using Reversible Texture Synthesis
Image Processing
171.
My Privacy My Decision: Control of Photo Sharing on Online Social Networks
Image Processing
172.
An Access Control Model for Online Social using user-to-user relationships
Image Processing
173.
Using Distance Estimation and Deep Learning to Simplify Calibration in Food Calorie Measurement
Image Processing
174.
Two level QR code for private message sharing and
document authentication
Image Processing
175.
Fusion of Quantitative Image and Genomic Biomarkers to Improve Prognosis Assessment of Early Stage Lung Cancer Patients
Image Processing
176.
A Real-time Time-consistent 2D-to-3D Video Conversion System Using Color Histogram
Image Processing
177.
Reversible Image Data Hiding with Contrast Enhancement
Image Processing
178.
Tag Based Image Search by Social Re-ranking
Image Processing
179.
Online Multi-modal Distance Metric Learning with Application to Image Retrieval
Image Processing
Resolving Multi-party Privacy Conflicts in Social Media
Image Processing
180.
Context-Based Access Control Systemsfor Mobile Devices
Android
181.
Proximity Sensing Based on Dynamic VisionSensor for Mobile Devices
Android
182.
MobiContext: A Context-aware Cloud-BasedVenue Recommendation Framework
Android
183.
iParker-A New Smart Car-Parking System Basedon Dynamic Resource Allocation and Pricing
Android
184.
A Location- and Diversity-aware News FeedSystem for Mobile Users
Android
185.
User-Defined Privacy Grid System forContinuous Location-Based Services
Android
186.
Internet of Things for Smart Cities
Android
187.
Seeing the Unseen: Revealing Mobile MalwareHidden Communications via Energy Consumptionand Artificial Intelligence
Android
188.
Efficient and Privacy-preserving Polygons SpatialQuery Framework for Location-based Services
Android
189.
Collective Travel Planning in Spatial Networks
Android
190.
EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
Android
191.
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
Android
192.
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
Android
193..
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
Android
194..
FRAppE: Detecting Malicious Facebook Applications
Android
195.
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Android
196.
Sherlock: Micro-Environment Sensing for Smartphones
Android
197.
PIS: A Multi-dimensional Routing Protocol for
Socially-aware Networking
Android
198.
Privacy-Preserving Location Sharing Services for Social Networks
Android
199.
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Android
200.
The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
Android