0% found this document useful (0 votes)
53 views2 pages

2017-2018 Software Ieee Final Year Project Titles

This document lists 25 potential software project titles for IEEE final year projects. Some of the project titles include developing a novel cluster head selection algorithm based on fuzzy clustering and particle swarm optimization, designing a scalable data chunk similarity based compression approach for efficient big sensing data processing on cloud, and creating a distributed vehicular traffic re-routing system for congestion avoidance.

Uploaded by

mindworkz pro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

2017-2018 Software Ieee Final Year Project Titles

This document lists 25 potential software project titles for IEEE final year projects. Some of the project titles include developing a novel cluster head selection algorithm based on fuzzy clustering and particle swarm optimization, designing a scalable data chunk similarity based compression approach for efficient big sensing data processing on cloud, and creating a distributed vehicular traffic re-routing system for congestion avoidance.

Uploaded by

mindworkz pro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

2017-2018 SOFTWARE IEEE FINAL YEAR PROJECT TITLES

S.NO PROJECT TITLES


1 A Novel Cluster Head Selection AlgorithmBased on Fuzzy Clustering
and Particle SwarmOptimization
2 A Scalable Data Chunk Similarity BasedCompression Approach for
Efficient BigSensing Data Processing on Cloud
3 Lane-Change Detection Based on Vehicle-TrajectoryPrediction
4 Attribute-Based Storage Supporting SecureDeduplication of Encrypted
Data in Cloud
5 PassBYOP: Bring Your Own Picture for SecuringGraphical Passwords
6 Contradiction Based Gray-Hole AttackMinimization for Ad-Hoc
Networks
7 Cooperative Jamming Aided Secrecy Enhancementin P2P
Communications with Social InteractionConstraints
8 FRAppE: Detecting Malicious Facebook Applications
9 DIVERT: A Distributed Vehicular TrafficRe-routing System for
Congestion Avoidance
10 Drive Now, Text Later: NonintrusiveTexting-while-Driving Detection
usingSmartphones
11 EAAP: Efficient Anonymous Authentication WithConditional Privacy-
Preserving Scheme forVehicular Ad Hoc Networks
12 EPLQ: Efficient Privacy-Preserving Location-basedQuery over
Outsourced Encrypted Data
13 Fine-grained Two-factor Access Control forWeb-based
CloudComputing Services
14 FRoDO: Fraud Resilient Device for Off-linemicro-payments
15 Lightweight Secure Data Sharing Schemefor Mobile Cloud Computing
16 Multimedia traffic avoidance using opportunistic routing protocol
17 Online and Scalable Unsupervised NetworkAnomaly Detection Method
18 Privacy-Preserving Multi-Keyword SimilaritySearch Over Outsourced
Cloud Data
19 Service Usage Classification with EncryptedInternet Traffic in Mobile
Messaging Apps
20 Vote Trust: Leveraging Friend Invitation Graph toDefend against Social
Network Sybil’s
21 VPSearch: Achieving Verifiability forPrivacy-Preserving Multi-
Keyword Search overEncrypted Cloud Data
22 SeDaSC: Secure Data Sharing in Clouds
23 RoadSense: Smartphone Application to EstimateRoad Conditions using
Accelerometer andGyroscope
24 Secure and Efficient data communicationprotocol for Wireless Body
Area Networks
25 Privacy-Preserving Multi-keyword Top-kSimilarity Search Over
Encrypted Data

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy