IEEE Projects for CSE

IEEE Projects for CSE
Projects for CSE Students

IEEE Projects for CSE

Find latest 2018 IEEE Projects for CSE students, IEEE projects for CSE 2018, final year projects for CSE students, Mini Projects for CSE Students:

Computer Science and Engineering (CSE) is an engineering field deals with design, implementation, and management of information system of both software & hardware processes where possibilities are countless. CITL Tech Varsity, Bangalore offers 2018-2019 IEEE Projects for CSE students. We also offer Mini IEEE projects for CSE students and our experienced and professional lectures can provide class guidance for mini projects on CSE. We have IEEE software projects on Java, Dot net and Android final year projects for CSE students. We also have IEEE hardware projects on embedded system, VLSI, Automation, Simulations and quad copter projects for Computer Science and Engineering students. Mini projects for CSE students can also available at CITL; you can select the IEEE projects in Java, Dot net, android, embedded system.

CITL Tech Varsity also offers online training for projects to final year CSE students. Our experienced faculties try to identify the preferences of the students and provide them suggestions based on their area of interest. IEEE Projects on CSE department is one of our primary specialties and we offer the maximum number of projects for students to choose from. We prefer latest of technologies that are available within the limitations of a student’s project on CSE. We have got 1000’s of IEEE projects for CSE, Explore our list of IEEE Projects for CSE students and contact us for discounted offers.

Java Projects

Cloud Computing

  1. A Survey of Medicare Data Processing and Integration for Fraud Detection
  2. Customized Bundle Recommendation by Association Rules of Product Categories for Online Supermarkets
  3. Application of Text Classification and Clustering of Twitter Data for Business Analytics
  4. Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud
  5. Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN and Priority
  6. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
  7. Enabling Efficient User Revocation in Identity-based cloud Storage Auditing for Shared Big Data
  8. Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage
  9. Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record
  10. Adaptive Encrypted Cloud Storage Model
  11. Access control by signature keys to provide privacy for cloud and Big Data
  12. Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud
  13. Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN and Priority
  14. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
  15. Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage
  16. Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record
  17. Adaptive Encrypted Cloud Storage Model
  18. Access control by signature - key to provide privacy for cloud and Big Data
  19. Secure and Efficient Cloud Computing Framework
  20. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
  21. IFCaaS: Information Flow Control as a Service for Cloud Security
  22. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
  23. Implementation OF DNA cryptography in cloud computing and using socket programming
  24. Anonymous Authentication for Secure Data Stored on Cloud with Decentralized Access Control
  25. Performance-Oriented Deployment of Streaming Applications on Cloud
  26. Smart Grid Solution for Charging and Discharging Services Based on Cloud Computing Scheduling
  27. Towards Approximating the Mean Time to Failure in Vehicular Clouds
  28. Linked Semantic Model for Information Resource Service towards Cloud Manufacturing
  29. Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing
  30. Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an Application to Glucose Control
  31. Online Learning for Offloading and Autoscaling in Energy Harvesting Mobile Edge Computing
  32. Flexible Container-Based Computing Platform on Cloud for Scientific Workflows
  33. Machine Learning with Sensitivity Analysis to Determine Key Factors Contributing to Energy Consumption in Cloud Data Centers
  34. Cost-Efficient Provisioning Strategy for Multiple Services in Distributed Clouds
  35. An Anomalous Behavior Detection Model in Cloud Computing
  36. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems
  37. Deleting Secret Data with Public Verifiability
  38. Secure Cloud Storage Meets with Secure Network Coding
  39. Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization
  40. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
  41. A Hybrid Cloud Approach for Secure Authorized Deduplication
  42. On the Security ofDataAccess Control for Multiauthority CloudStorageSystems
  43. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
  44. Task Scheduling in Cloud Computing
  45. An Optimized Task Scheduling Algorithm in CloudComputing
  46. Attribute-Based Access Control for Multi-Authority with constant size ciphertext in cloud Computing
  47. A Study on Secure Intrusion Detection System in Wireless MANETs to Increase the Performance of Eaack
  48. Privacy-Preserving Detection of Sensitive Data Exposure
  49. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
  50. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
  51. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
  52. Secure Auditing and Deduplicating Data in Cloud
  53. An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
  54. Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds
  55. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
  56. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
  57. A packet marking approach to protect cloud environment against DDoS attacks
  58. EasySMS: A Protocol for End-to-End Secure Transmission of SMS
  59. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
  60. CloudMoV: Cloud-based Mobile Social TV
  61. Load Balancing for Privacy-Preserving Access to Big Data in Cloud
  62. Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework
  63. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
  64. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application
  65. A Load Balancing Model Based on Cloud Partitioning
  66. Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
  67. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
  68. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
  69. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
  70. Toward Efficient and Privacy-Preserving Computing in Big Data Era
  71. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
  72. Privacy Preserving Data Analytics for Smart Homes
  73. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
  74. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
  75. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
  76. A Framework For Selection Of Best Cloud Service Provider Using Ranked Voting Method
  77. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
  78. iFarm: Development of Cloud-based System of Cultivation Management for Precision Agriculture
  79. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
  80. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  81. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  82. Load Rebalancing for Distributed File Systems in Clouds
  83. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
  84. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
  85. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
  86. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
  87. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
  88. Secure Logging As a Service—Delegating Log Management to the Cloud
  89. Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
  90. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
  91. C-MART: Benchmarking the Cloud Parallel and Distributed Systems
  92. A cloud computing based telemedicine service
  93. Pre-emptive scheduling of on-line real time services with task migration for cloud computing
  94. Privacy-Preserving Public Auditing for Secure Cloud Storage
  95. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
  96. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  97. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
  98. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
  99. An Improved Mutual Authentication Framework for Cloud Computing

Big Data Projects

  1. Map Reduce Programming Model for Parallel K-Mediod Algorithm on Hadoop Cluster
  2. Logic Bug Detection and Localization Using Symbolic Quick Error Detection
  3. Cloud Centric Authentication for Wearable Healthcare Monitoring System
  4. Big Data Analytics:Predicting Academic Course Preference Using Hadoop Inspired MapReduce
  5. Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data
  6. Smart Governance through Bigdata: Digital Transformation of Public Agencies
  7. Big Data Analytics:Predicting Academic Course Preference Using Hadoop Inspired MapReduce
  8. Map Reduce Programming Model for Parallel K-Mediod Algorithm on Hadoop Cluster
  9. Logic Bug Detection and Localization Using Symbolic Quick Error Detection
  10. Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data
  11. A Micro-video Recommendation System Based on Big Data
  12. Twitter data analysis and visualizations using the R language on top of the Hadoop platform
  13. QoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analytics
  14. Traffic-aware Task Placement with Guaranteed Job Completion Time for Geo-distributed Big Data
  15. Online Data Deduplication for In-Memory Big-Data Analytic Systems
  16. Novel Common Vehicle Information Model (CVIM) for Future Automotive Vehicle Big Data Marketplaces
  17. Holistic Perspective of Big Data in Healthcare
  18. Focusing on a Probability Element: Parameter Selection of Message Importance Measure in Big Data
  19. CryptMDB: A Practical Encrypted MongoDB over Big Data
  20. Cost Aware Cloudlet Placement for Big Data Processing at the Edge
  21. Big-Data-Driven Network Partitioning for Ultra-Dense Radio Access Networks
  22. Big Data Set Privacy Preserving through Sensitive Attribute-based Grouping
  23. Big Data Driven Information Diffusion Analysis and Control in Online Social Networks
  24. Big Data Analytics of Geosocial Media for Planning and Real-Time Decisions
  25. An Approximate Search Framework for Big Data
  26. A Reliable Task Assignment Strategy for Spatial Crowdsourcing in Big Data Environment
  27. A Queuing Method for Adaptive Censoring in Big Data Processing
  28. Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud
  29. A Profile-Based Big Data Architecture for Agricultural Context
  30. Review Based Service Recommendation for Big Data
  31. Big Data Challenges in Smart Grid IoT (WAMS) Deployment
  32. A data mining framework to analyze road accident data
  33. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
  34. Big data, big knowledge: big data for personalised healthcare
  35. Deduplication on Encrypted Big Data in Cloud
  36. Processing Geo-Dispersed Big Data in an Advanced MapReduce Framework
  37. Recent Advances in Autonomic Provisioning of Big Data Applications on Clouds
  38. Privacy Preserving Data Analysis in Mental Health Research
  39. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store
  40. Performance Analysis of Scheduling Algorithms for Dynamic Workflow Applications
  41. PaWI: ParallelWeighted Itemset Mining by means of MapReduce
  42. Building a Big Data Analytics Service Framework for Mobile Advertising and Marketing
  43. Secure Sensitive Data Sharing on a Big Data Platform
  44. Load Balancing for Privacy-Preserving Access to Big Data in Cloud
  45. Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
  46. MRPrePost-A parallel algorithm adapted for mining big data
  47. Privacy Preserving Data Analytics for Smart Homes
  48. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates
  49. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
  50. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
  51. Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework
  52. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application

Networking & Network Security

  1. Two Step Verification System of Highly Secure Social Media: Possible to Breach the Security
  2. Two Step Verification System of Highly Secure Social Media: Possible to Breach the Security
  3. Salty Secret: Let Us Secretly Salt the Secret
  4. Network-level Performance Enhancement in WirelessNanosensor Networks through Multi-layer Modifications
  5. Keystroke/Mouse Usage Based Emotion Detection and User Identification
  6. Health Data Integration with Secured Record Linkage
  7. ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN
  8. Application Specific Tunneling Protocol Selection for Virtual Private Networks
  9. A Profile-Based Big Data Architecture for Agricultural Context
  10. IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND USING SOCKET PROGRAMMING
  11. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
  12. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
  13. An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach
  14. An adjunct hash neighbor in 4way MANETS to share data efficiently
  15. Secure Distributed Deduplication Systems with Improved Reliability
  16. Honeywords: Making Password-Cracking Detectable
  17. A Secure Group Key Management Scheme for Sensor Networks
  18. Maximizing P2P File Access Availability in mobile Ad Hoc Networks though Replication for Efficient File Sharing
  19. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
  20. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
  21. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
  22. Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
  23. Search Me If You Can: Privacy-preserving Location Query Service
  24. Routing in Wireless Sensor Network using Fuzzy based Trust Model
  25. Privacy Preserving Cloud-based Computing Platform (PPCCP) for using Location Based Services
  26. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
  27. Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
  28. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
  29. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

Data Analytics / Data Mining / Web Mining

  1. A Public Opinion Keyword Vector for Social Sentiment Analysis Research
  2. A Framework for Sentiment Analysis with Opinion Mining of Hotel Reviews
  3. Get To The Point: Summarization with Pointer-Generator Networks
  4. Monitoring vehicle speed using GPS and catagrizing driver using datamining approach
  5. Segmenting customers with Data Mining Techniques.
  6. Incremental Semi-Supervised Clustering Ensemble for High Dimensional Data Clustering
  7. Cricket data Analysis & Prediction
  8. Clustering Data Streams Based on Shared Density Between Micro-Clusters
  9. Track Summary Report for the Data Exploration in the Web 3.0 Age (DEW) Track
  10. Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets
  11. Implementation of Data Mining Techniques in Upcoding Fraud Detection in the Monetary Domains
  12. Authenticated Outlier Mining for Outsourced Databases
  13. An Improved Vertical Algorithm for Frequent Itemset Mining from Uncertain Database
  14. A Survey on Political Event Analysis in Twitter.
  15. A Non-Parametric Algorithm for DiscoveringTriggering Patterns of Spatio-Temporal Event Types
  16. A Cypher Query based NoSQL Data Mining on Protein Datasets using Neo4j Graph Database
  17. Chronic kidney disease analysis using data mining classification techniques
  18. Gene Selection by Sample Classification using k Nearest Neighbor and Meta-heuristic Algorithms
  19. Outlier detection techniques for network attacks.
  20. Distributed Storage Design for Encrypted Network Intrusion Record (DSeNiR)
  21. Distributed Storage Design for Encrypted Network Intrusion Record (DSeNiR)
  22. Time Table Generation
  23. Invoice Generator
  24. Faculty Feedback And Growth Analyser
  25. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
  26. Suspect Verification Based on Indian Law System
  27. Mining Partially-Ordered Sequential Rules Common to Multiple Sequences
  28. Mining High Utility Patterns in One Phase without Generating Candidates
  29. TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets
  30. A Compendium for Prediction of Success of a Movie Based Upon Different Factors
  31. Canopy Clustering Based K Strange Point Detection.
  32. Automated Discovery of Small Business Domain Knowledge Using Web Crawling and Data Mining
  33. Comparitive Analysis of K-Means and Fuzzy C Menas on Thiroid Disease
  34. The Classification Techniques on Medical Data to Predict Heart Disease
  35. Improved Techniques for Sentiment Analysis on Social Network.
  36. Enriched Content Mining For Web Applications
  37. Text Mining-Supported Information Extraction
  38. Dynamic Query Forms for Database Queries
  39. Automatic Medical Disease Treatment System Using Datamining
  40. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
  41. Automatic Itinerary Planning for Traveling Services
  42. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
  43. Secure Data Mining in Cloud using Homomorphic Encryption
  44. Keyword Query Routing
  45. RuleGrowth: Mining Sequential Rules Common to Several Sequences by Pattern-Growth
  46. The Role of Apriori Algorithm for Finding the Association Rules in Data Mining
  47. Secure Mining of Association Rules in Horizontally Distributed Databases
  48. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets In cloud
  49. Efficient Mining of Both Positive and Negative Association Rules

Wireless Sensor Network

  1. Efficient Sensor Node Authentication in Wireless Integrated Sensor Networks Using Virtual Certificate Authority
  2. Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks
  3. Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information
  4. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
  5. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
  6. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
  7. Fault Node Recovery Algorithm for a Wireless Sensor Network

Distributed & Parallel

  1. Secure Distributed Deduplication Systems with Improved Reliability
  2. A Secure Anti-Collusion Data Sharing Scheme for Dynamic groups in the cloud
  3. Data Lineage in Malicious Environments

Mobile Computing

  1. Certificate Revocation in MANET Using clustering
  2. A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information
  3. Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using uncertain Reasoning
  4. A Temporal Packet Marking Detection scheme against MIRA Attack in MANET

DotNet Projects

Cloud Computing

  1. CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures
  2. Scalable and secure of personal health records in cloud computing using Attribute-based encryption
  3. Data Integrity Proofs in Cloud Storage
  4. Rethinking Vehicular Communications: Merging VANET with cloud computing
  5. A Self-tuning Failure Detection Scheme for Cloud Computing Service
  6. Collaboration-Based Cloud Computing Security Management Framework
  7. Framework of a national level electronic health record system
  8. STAR: A proposed architecture for cloud computing applications
  9. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
  10. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
  11. Next Generation Cloud Computing Architecture.

Network Security

  1. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
  2. Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic
  3. A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
  4. Enhanced Security for Online Exams Using Group Cryptography.
  5. Credit Card Fraud Detection Using Hidden Markov Model
  6. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
  7. Data Leakage Detection
  8. An Elliptic Curve Cryptography Based on Matrix Scrambling Method.

Wireless Sensor Network

  1. An Ant Colony Optimization Approach for Maximizing the Lifetime of Heterogeneous Wireless Sensor Networks
  2. Maximizing Lifetime Vector in Wireless Sensor Networks
  3. Security in Wireless Sensor Networks with Public Key Techniques.
  4. On maximizing the Lifetime of WSN using virtual backbone scheduling
  5. The Cluster head Chaining Scheme considering scalability of the WSN.
  6. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.

Web Mining / Data Mining

  1. Adaptive Provisioning of Human Expertise in Service-oriented Systems
  2. Association rule- extracting knowledge using Market Basket Analysis.
  3. A Collaborative Decentralized Approach to Web Search

Android Projects

GPS, GSM, Bluetooth & GPRS

  1. Location tracking using Sms Based on Android Mobile.
  2. Industrial Automation on android phone by using Bluetooth, GPRS GPS
  3. Mobile Travel Guide – Smart way to Travel
  4. Mobile Location Alarm
  5. An Efficient Approach for Mobile Asset Tracking Using Contexts
  6. Public Safety
  7. Bluetooth Chating on Android
  8. Bus Tracking.
  9. Child tracking system on android phone by using Bluetooth, GSM, GPS and finger scanner
  10. Android on Mobile Devices: An Energy Perspective.
  11. Remote billing and control system for warehouses in asset tracking and theft control using android phone by using Bluetooth,GSM,GPRS and RFID device .
  12. Child tracking system on android phone by using Bluetooth, GSM, GPS and finger scanner
  13. Friend Mapper on Mobiles - Friend Locator
  14. Location based wireless manager for android phone
  15. Physical object tracking for android.
  16. Android based online traffic update system.
  17. Vehicle tracking or asset tracking system on android phone by using Bluetooth, GSM, GPRS and RFID device.
  18. Voice based content search from android phone.
  19. GPS based outdoor tracking system.
  20. Vehicle automation system android phone by using CAN, Bluetooth, GSM,GPS and finger scanner
  21. Vehicle theft control system android phone by using Bluetooth, GSM, GPS and finger scanner
  22. Irrigation control system android phone by using Bluetooth, GSM, and GPS for farmers for efficient use of water, power and crop planning.
  23. Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor
  24. Constructing an intelligent travel information platform based on Location Base Service.
  25. Mitter – Bitter Monitoring System Using Android Smartphone’s
  26. Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population
  27. A spoken dialogue smartphone application for “text and walk/drive”
  28. Research on Mobile Location Service Design Based on Android.
  29. On Design of Mobile Agent Based Location Service for Geographic Routing
  30. Personal information guide - a platform with location based service for mobile powered e-commerce.

Cloud Computing

  1. MCC-OSGi: An OSGi-based mobile cloud service model
  2. MCC-OSGi: An OSGi-based mobile cloud service model
  3. An OpenMP Compiler for Efficient Use of Distributed Scratchpad Memory in MPSoCs
  4. Daily life activity tracking application for smart homes using android smartphone
  5. Cloud to Device Push Messaging on Android
  6. An OpenMP Compiler for Efficient Use of Distributed Scratchpad Memory in MPSoCs

Surveillance Applications

  1. On the Use of Mobile Phones for accessing confidential Web Services (IEEE 2012).
  2. Implementation of Smart Video Surveillance System for Capturing photos using Android based Phones with SMS notification (IEEE 2012).

Medical Applications

  1. Work in progress — A smartphone application as a teaching tool in undergraduate nursing education
  2. A smartphone application of alcohol resilience treatment for behavioral self-control training
  3. Planning and Development of an Electronic Health Record Client Based on the Android Platform

Image Processing Applications

  1. Android Screen Capturing and Converting
  2. Energy and latency impact of outsourcing decisions in mobile image processing.

What is Computer Science Engineering?

Computer Science engineering deals with design, implementation, and management of information system of both software & hardware processes. A computer scientist specializes in theory of computation and design of computational systems. Computer engineering or Computer Science engineering integrates several disciplines such as Information Technology, Electrical and Electronics Engineering, Software Design, etc. The engineers are mainly involved in the development of software and hardware systems of various aspects of computing. The engineers not only focus on how computers work but also integrate into larger scheme of things.

Benefit of Computer Science Engineering

Amongst all the engineering branches, computer science has been found to be the most popular choice of students because options of projects on CSE are wide open. This branch of engineering is perceived to be popular due to its research scopes (bio, mechanics, neuro-science, etc) and is known to be challenging while offering good career opportunities and remuneration. Computer science & engineering has been the most sought after course in the past few years and in the current one too.

Career opportunity in Computer Science Engineer

By doing final year projects in CSE you are eligible to work in embedded systems, database management, IT, embedded systems, Telecommunication, computer hardware & software implementation & maintenance, multimedia, web designing, gaming, and almost all other industries in this sector.

Note that the computer industry has witnessed such phenomenal growth in recent years that IT majors like Infosys & TCS have been the major recruiters across all other branches in engineering colleges of the country.

Explore our ideas on IEEE Projects for CSE, projects for CSE students, mini projects for CSE students or take help on your idea.