• Application Projects
  • Biomedical Engg
  • Cloud Computing
  • Cryptography
  • Cybernetic
  • Data Mining
  • DB knowledge & Data Application
  • Dependable & Secure Computing
  • E-Learning
  • Enquiry
  • Finger Prints Authentication
  • Grid Computing
  • Image Processing
  • Information forensics and security
  • Intelligent System
  • Internet Computing
  • Knowledge & Data Engineering
  • Mobile Computing
  • Mobile Technology
  • Multimedia
  • Networking & Network Security
  • Parallel and Distributed System
  • Pattern Analysis & Machine Intelligence
  • Systems, Man, and Cybernetics Society
  • Visualization & Computer graphics
  • Web Conference
  • Web Intelligence & Intelligent Agent Tech
  • Web Security and privacy
  • Web Service
  • Wireless Communication
  • Wishlist
  • IEEE Student Projects our major support for our students. More than 90% educational industry follow the IEEE journals for their project & thesis work. In past 9 years we support IEEE Student Projects for our academic students. Student project center chennai Student project center chennai
  • IEEE is a highly professional standard among other journals. Various members are associated with IEEE under various domains. They are motivated a community through conferences, publication and standards, technologies.
  • IEEE Projects creation based on software and hardware which is to be used by engineering students (CSE, IT, ECE & EEE) Software oriented projects highly motivated to the students for easiest preparation and gather somewhat newer in technologies, algorithms, techniques and methods.
  • We handled more than 100+ IEEE papers under various domains in an effective way. We support engineering students to do IEEE student projects. We provide you various recent IEEE papers for students.
  • We support IEEE papers with various technologies and we also implement IEEE papers in matlab, java, Dot net, embedded, VLSI, J2EE and J2ME based on students interest and papers concepts.


  • Understand abstract.
  • Evaluate project scope.
  • Evaluate project scope.
  • Proposing new system based on drawback.
  • Compute result.



S.No Title
1 Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional Space
2 Efficient Filtering Algorithms for Location-Aware Publish/Subscribe
3 Disease Inference from Health-Related Questions via Sparse Deep Learning
4 Real-Time City-Scale Taxi Ridesharing
5 A Proximity-aware Interest-clustered P2P File Sharing System
6 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
7 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
8 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
9 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
10 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds
11 A Hybrid Cloud Approach for Secure Authorized Deduplication
12 Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing
13 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
14 Tracking Message Spread in Mobile Delay Tolerant Networks
15 A privacy-preserving framework for managing mobile ad requests and billing information
16 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
17 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
18 Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage
19 E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks


S.No Title
1 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
2 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
3 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
4 Cost-Effective Authentic and Anonymous Data Sharing with
5 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm
6 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
7 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
8 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
9 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
10 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
11 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
12 Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
13 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
14 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing


S.No Title
1 FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Environments
2 Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage
3 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters
4 BDCaM: Big Data for Context-aware Monitoring – A Personalized Knowledge Discovery Framework for Assisted Healthcare
5 An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm


S.No Title
1 EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
2 A Location- and Diversity-aware News Feed System for Mobile Users
3 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
4 Privacy-Preserving Relative Location Based Services for Mobile Users
5 Smartphone-Based Wound Assessment System for Patients with Diabetes
6 User Privacy and Data Trustworthiness in Mobile Crowd Sensing
7 SPE: Security and Privacy Enhancement Framework for Mobile Devices
8 Providing Privacy-Aware Incentives in Mobile Sensing Systems
9 Privacy-Preserving Location Sharing Services for Social Networks
10 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
11 PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
12 A Shoulder Surfing Resistant Graphical Authentication System
13 An Exploration of Geographic Authentication Schemes
14 DroidDetector: Android Malware Characterization and Detection Using Deep Learning
15 DroidDetector: Android Malware Characterization and Detection Using Deep Learning
16 SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones