Software Projects

(For Purchase / Abstract related, call / msg : 07775066660 (whats app) OR Mail : tecxoinfo@gmail.com )

we provide : Project Model + Abstract + PPT + Thesis/Report + Images & Video + Project Guidance + Certificate + Shipping + Data CD.

**Discount offer on all projects **

(Just refer your friend or other groups and get 10 % discount on your project)

Or (refer your friend or groups and earn 5% Cash or Mobile Recharge)


1.

A Dynamic Secure Group Sharing Framework in Public Cloud Computing

Cloud Computing

2.

A Mechanism Design Approach to Resource Procurement in Cloud Computing

Cloud Computing

3.

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

Cloud Computing

4.

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Cloud Computing

5.

A secure data self-destructing scheme in cloud computing

Cloud Computing

6.

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds

Cloud Computing

7.

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

Cloud Computing

8.

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

Cloud Computing

9.

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Cloud Computing

10.

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Cloud Computing

11.

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority

Cloud Storage

Cloud Computing

12.

A Hybrid Cloud Approach for Secure Authorized Deduplication

Cloud Computing

13.

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

Cloud Computing

14.

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

Cloud Computing

15.

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Cloud Computing

16.

Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Cloud Computing

17.

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Cloud Computing

18.

Secure Auditing and Deduplicating Data in Cloud

Cloud Computing

19.

Secure Distributed Deduplication Systems with

Improved Reliability

Cloud Computing

20.

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

Cloud Computing

21.

An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy

Cloud Computing

22.

An Efficient Privacy-Preserving Ranked Keyword Search Method

Cloud Computing

23.

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

Cloud Computing

24.

DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads

Cloud Computing

25.

DeyPoS: Deduplicatable Dynamic Proof of

Storage for Multi-User Environments

Cloud Computing

26.

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

Cloud Computing

27.

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Cloud Computing

28.

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Cloud Computing

29.

A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing

Cloud Computing

30.

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Cloud Computing

31.

Audit-Free Cloud Storage via Deniable Attribute-based Encryption

Cloud Computing

32.

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

Cloud Computing

33.

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Cloud Computing

34.

CloudArmor: Supporting Reputation-based Trust Management for Cloud Services

Cloud Computing

35.

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds

Cloud Computing

36.

Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage

Cloud Computing

37.

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Cloud Computing

38.

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Cloud Computing

39.

Enabling Cloud Storage Auditing with Key-Exposure Resistance

Cloud Computing

40.

Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

Cloud Computing

41.

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

Cloud Computing

42.

Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing

Cloud Computing

43.

Fine-grained Two-factor Access Control for Web-based Cloud Computing Services

Cloud Computing

44.

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Cloud Computing

45.

Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions

Cloud Computing

46.

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Cloud Computing

47.

Identity-based Encryption with Outsourced Revocation in Cloud Computing

Cloud Computing

48.

KSF-OABE: Outsorce Attribute Based Encryption with Keyword Search Function in Cloud Storage

Cloud Computing

49.

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Cloud Computing

50.

SecRBAC: Secure data in the Clouds

Cloud Computing

51.

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Cloud Computing

52.

Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds

Cloud Computing

53.

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Cloud Computing

54.

A General Geographical Probabilistic Factor Model for Point of Interest Recommendation

Data Mining

55.

A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval

Data Mining

56.

A Query Approach for Influence Maximization on Specific Users in Social Networks

Data Mining

57.

Accelerated PSO Swarm Search Feature Selection for Data Stream Mining Big Data

Data Mining

58.

Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data

Data Mining

59..

Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme

Data Mining

60.

Best Keyword Cover Search

Data Mining

61.

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Data Mining

62.

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Data Mining

63.

Discovery of Ranking Fraud for Mobile Apps

Data Mining

64.

Disease Inference from Health-Related Questions via Sparse Deep Learning

Data Mining

65.

Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions

Data Mining

66.

Facilitating Document Annotation Using Content and Querying Value

Data Mining

67.

Fast Nearest Neighbor Search with Keywords

Data Mining

68.

Fine-Grained Knowledge Sharing in Collaborative Environments

Data Mining

69.

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Data Mining

70.

Keyword Extraction and Clustering for Document Recommendation in Conversations

Data Mining

71.

Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest

Data Mining

72.

Mining Social Media Data for Understanding Students' Learning Experiences

Data Mining

73.

Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification

Data Mining

74.

Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases

Data Mining

75.

Ranking on Data Manifold with Sink Points

Data Mining

76.

Rule-Based Method for Entity Resolution

Data Mining

77.

Secure Mining of Association Rules in Horizontally Distributed Databases

Data Mining

78.

SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces

Data Mining

79.

Supporting Privacy Protection in Personalized Web Search

Data Mining

80.

Towards Effective Bug Triage with Software Data Reduction Techniques

Data Mining

81.

Towards Online Shortest Path Computation

Data Mining

82.

Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark,and Feature Evaluation

Data Mining

83.

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

Data Mining

84.

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information

Data Mining

85.

Outlier Analysis and Top Scoring Pair for Integrated Data Analysis and Biomarker Discovery

Data Mining

86.

Outlier Analysis and Top Scoring Pair for Integrated Data Analysis and Biomarker Discovery

Data Mining

87.

MIRAGE: An Iterative MapReduce based Frequent Subgraph Mining Algorithm

Data Mining

88.

Venus: Scalable Real-Time Spatial Queries on Microblogs with Adaptive Load Shedding

Data Mining

89.

Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search

Data Mining

90.

RSkNN: kNN Search on Road Networks by Incorporating Social Influence

Data Mining

91.

Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks

Data Mining

92.

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

Data Mining

93.

Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

Data Mining

94.

Adaptive Influence Maximization in Dynamic Social Networks

Data Mining

95.

Adapting to User Interest Drift for POI Recommendation

Data Mining

96.

On Summarization and Timeline Generation for Evolutionary Tweet Streams

Data Mining

97.

A Novel Recommendation Model Regularized with User Trust and Item Ratings

Data Mining

98.

Automatically Mining Facets for Queries from Their Search Results

Data Mining

99.

Coupled Topic Model for Collaborative Filtering With User-Generated Content

Data Mining

100.

Crawling Hidden Objects with kNN Queries

Data Mining

101.

Cross-domain Sentiment Classification using Sentiment Sensitive Embeddings

Data Mining

102.

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

Data Mining

103.

Fast Online EM for Big Topic Modeling

Data Mining

104.

Learning to Find Topic Experts in Twitter via Different Relations

Data Mining

105.

Least Cost Influence Maximization Across Multiple Social Networks

Data Mining

106.

Location Aware Keyword Query Suggestion Based on Document Proximity

Data Mining

107.

Microblogging Content Propagation Modeling Using Topic-specific Behavioral Factors

Data Mining

108.

Personalized Influential Topic Search via Social Network Summarization

Data Mining

109.

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy

Data Mining

110.

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

Data Mining

111.

Rating Prediction Based On Social Sentiment from Textual Reviews

Data Mining

112.

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

Data Mining

113.

Survey on Aspect-Level Sentiment Analysis

Data Mining

114.

The Moving K Diversified Nearest Neighbor Query

Data Mining

115.

Tweet Segmentation and Its Application to Named Entity Recognition

Data Mining

116.

Understanding Short Texts through Semantic Enrichment and Hashing

Data Mining

117.

Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs

Data Mining

118.

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking

Networking

119.

A Lightweight Secure Scheme for Detecting packet drop attacks and packet forgery in WSN

Networking

120.

A Novel En-Route Filtering Scheme Against false data injection attacks in cyber-physical network system

Networking

121.

A Proximity-Aware Interest-Clustered P2P File Sharing System

Networking

122.

A Temporal-Topic Model for Friend recommendation in Chinese Microblogging system

Networking

123.

Active Trust: Secure and Trustable Routing in Wireless Sensor Network

Networking

124.

Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks

Networking

125.

An Authenticated Trust and Reputation Calculation and management system for cloud and sensor network integration

Networking

126.

Anti-jamming Strategy versus a Low-Power jamming attack when the intelligence of adversary's attack type is unknown

Networking

127.

Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

Networking

128.

Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

Networking

129.

Botnet Detection based on Anomaly and Community Detection

Networking

130.

Building an intrusion detection system using a filter-based feature selection algorithm

Networking

131.

Data Lineage in Malicious Environments

Networking

132.

Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

Networking

133.

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

Networking

134.

Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

Networking

135.

Dynamic Network Control for Confidential Multi-Hop Communications

Networking

136.

Dynamic Routing for Data Integrity and Delay Differentiated Services

in Wireless Sensor Networks

Networking

137.

Effective Key Management in Dynamic Wireless Sensor Networks

Networking

138.

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness

Networking

139.

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Networking

140.

Friendbook: A Semantic-Based Friend Recommendation System for Social Networks

Networking

141.

Achieving Flatness: Selecting the Honeywords from Existing User Passwords

Networking

142.

Keylogging-Resistant Visual Authentication Protocols

Networking

143.

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

Networking

144.

Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks

Networking

145.

OpenSec: Policy-based Security Using Software-defined Networking

Networking

146.

Opportunistic Piggyback Marking for IP Traceback

Networking

147.

Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter

Networking

148.

Privacy Protection for Wireless Medical Sensor Data

Networking

149.

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Networking

150.

Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications

Networking

151.

Profiling Online Social Behaviors for Compromised Account Detection

Networking

152.

Real-Time Detection of Traffic From Twitter Stream Analysis

Networking

153.

Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

Networking

154.

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

Networking

155.

The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps

Networking

156.

TopicSketch: Real-time Bursty Topic Detection from Twitter

Networking

157.

Wireless Communications under Broadband Reactive Jamming Attacks

Networking

158.

A Shoulder Surfing Resistant Graphical Authentication System

Networking

159.

Designing a Secure Exam Management

System (SEMS) for M-Learning Environments

Networking

160.

A Visual Model-Based Perceptual Image Hash for Content Authentication

Image Processing

161.

An Attribute-Assisted Reranking Model for Web Image Search

Image Processing

162.

Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images

Image Processing

163.

Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems

Image Processing

164.

Content-Based Image Retrieval Using Features Extracted From Halftoning-Based Block Truncation Coding

Image Processing

165.

Detection and Rectification of Distorted Fingerprints

Image Processing

166.

Learning-Based, Automatic 2D-to-3D Image and Video Conversion

Image Processing

167.

Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography

Image Processing

168.

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

Image Processing

169.

Secure Data Hiding in Audio Vedio Steganalysis by Anti-Forensics Technique

Image Processing

170.

Steganography Using Reversible Texture Synthesis

Image Processing

171.

My Privacy My Decision: Control of Photo Sharing on Online Social Networks

Image Processing

172.

An Access Control Model for Online Social using user-to-user relationships

Image Processing

173.

Using Distance Estimation and Deep Learning to Simplify Calibration in Food Calorie Measurement

Image Processing

174.

Two level QR code for private message sharing and

document authentication

Image Processing

175.

Fusion of Quantitative Image and Genomic Biomarkers to Improve Prognosis Assessment of Early Stage Lung Cancer Patients

Image Processing

176.

A Real-time Time-consistent 2D-to-3D Video Conversion System Using Color Histogram

Image Processing

177.

Reversible Image Data Hiding with Contrast Enhancement

Image Processing

178.

Tag Based Image Search by Social Re-ranking

Image Processing

179.

Online Multi-modal Distance Metric Learning with Application to Image Retrieval

Image Processing

Resolving Multi-party Privacy Conflicts in Social Media

Image Processing

180.

Context-Based Access Control Systemsfor Mobile Devices

Android

181.

Proximity Sensing Based on Dynamic VisionSensor for Mobile Devices

Android

182.

MobiContext: A Context-aware Cloud-BasedVenue Recommendation Framework

Android

183.

iParker-A New Smart Car-Parking System Basedon Dynamic Resource Allocation and Pricing

Android

184.

A Location- and Diversity-aware News FeedSystem for Mobile Users

Android

185.

User-Defined Privacy Grid System forContinuous Location-Based Services

Android

186.

Internet of Things for Smart Cities

Android

187.

Seeing the Unseen: Revealing Mobile MalwareHidden Communications via Energy Consumptionand Artificial Intelligence

Android

188.

Efficient and Privacy-preserving Polygons SpatialQuery Framework for Location-based Services

Android

189.

Collective Travel Planning in Spatial Networks

Android

190.

EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data

Android

191.

One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications

Android

192.

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy

Android

193..

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

Android

194..

FRAppE: Detecting Malicious Facebook Applications

Android

195.

PassBYOP: Bring Your Own Picture for Securing Graphical Passwords

Android

196.

Sherlock: Micro-Environment Sensing for Smartphones

Android

197.

PIS: A Multi-dimensional Routing Protocol for

Socially-aware Networking

Android

198.

Privacy-Preserving Location Sharing Services for Social Networks

Android

199.

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

Android

200.

The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps

Android


Place an order

Please leave us your details and we'll get back to you as soon as possible.

© 2016 Tecxo Solutions. India.
Powered by Webnode
Create your website for free! This website was made with Webnode. Create your own for free today! Get started