Engineering Projects

Final Year Projects for Engineering Students

           Best Way To Build Final Year Engineering Projects

Final year engineering projects help you to explore and strengthen the understanding of fundamentals through the practical application of theoretical concepts.

JAVA IEEE 2017-18 Best Projects
S.No Project Title Front End Back End Domain
1 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Jsp,Html,CSS My-Sql cloud with security
2 Collaborative Filtering-Based Recommendation of Online Social Voting Jsp,Html,CSS My-Sql Data Mining
3 Continuous Top – K Monitoring Document Stream Jsp,Html,CSS My-Sql Data Mining
4  Detecting Mobile Malicious Webpages in Real Time Jsp,Html,CSS My-Sql Mobile Computing
5  Detecting Stress Based on Social Interactions in Social Networks Jsp,Html,CSS My-Sql Data Miningwith E-Commerce
6 Efficient Clue-based Route Search on Road Networks Jsp,Html,CSS My-Sql Data Mining with Graph Technology
7 Energy-Efficient Query Processing in Web Search Engines Swings,AWT,Socket Programming Internet Web Mining With Security
8 Identity Based Private Matching over Outsourced Encrypted Jsp,Html,CSS My-Sql cloud with security
9 Mining Competators from large scale un structured Data sets Jsp,Html,CSS My-Sql Mining with Graph Theory
10 NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media Jsp,Html,CSS My-Sql Information Security
11 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers Swings,AWT,Socket Programming Ms-Access Wireless Sensor Networks & Mobile Computing
12 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks Swings,AWT,Socket Programming Ms-Access Wireless Sensor Networks & Mobile Computing
13 Search Rank Fraud and Malware Detection in Google Play Jsp,Html,CSS My-Sql Mining with E-commerce
14  SocialQ&A An Online Social Network Based Question and Answer System Jsp,Html,CSS My-Sql Web Mining With Security
15  Twitter Trends Manipulation A First Look Inside the Security Jsp,Html,CSS My-Sql information security
16 Two Cloud Secure Database for Numeric Related SQL Range Queries with Privacy Preserving Jsp,Html,CSS My-Sql cloud with security
17  A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption Swings,AWT,Socket Programming Ms-Access Mobile Computing & WSN
18 SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors Jsp,Html,CSS My-Sql Information Security
19 Energy-Efficient Query Processing in Web Search Engines Jsp,Html,CSS My-Sql Web Mining With Security
20 Network Capability in Localizing Node Failures via End-to-End Path Measurements Swings,AWT,Socket Programming Ms-Access Wireless Sensor Networks
21 Efficient and Privacy preserving Min and k-th Min Computations in Mobile Sensing Systems Swings,AWT,Socket Programming Ms-Access Network Security
22  Large-scale Location Prediction for Web Pages Jsp,Html,CSS My-Sql Mining with Graph Theory
23 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Jsp,Html,CSS My-Sql Information Security with Medical Data
24 Fast Phrase Search for Encrypted Cloud Storage Jsp,Html,CSS My-Sql Cloud Computing
25 Generating Query Facets using Knowledge Bases Jsp,Html,CSS My-Sql Data Mining
26 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets Jsp,Html,CSS My-Sql DM& DW
27  My Privacy My Decision Control of Photo Sharing on Online Social Networks Jsp,Html,CSS My-Sql Information Security(Real Time)
28  A Lightweight Secure Data Sharing Scheme Jsp,Html,CSS My-Sql Mobile Computing with Security
29 A Novel Efficient Remote Data Possession Jsp,Html,CSS My-Sql cloud with security
30 Achieving secure, universal, and fine-grained Jsp,Html,CSS My-Sql Information Security
31 Identity-Based Data Outsourcing Jsp,Html,CSS My-Sql information security
32  Identity-based Remote Data Integrity Checking Jsp,Html,CSS My-Sql network security
33 Provably Secure Key-Aggregate Cryptosystems Jsp,Html,CSS My-Sql Network Security
34  SWEET Serving the Web by Jsp,Html,CSS My-Sql Network Security
35  SUPERMAN Security Using Pre-Existing Swings,AWT,Socket Programming My-sql Network Security
36 Securing Cloud Data under Key Exposure Jsp,Html,CSS My-Sql Information Security
37 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Jsp,Html,CSS My-Sql Information Security
38 On the Security of Data Access Control Jsp,Html,CSS My-Sql Data Mining  with security
39 Dynamic Facet Ordering for Faceted Jsp,Html,CSS My-sql Data Mining
40 Efficient Keyword-aware Representative Travel Route  Recommendation Jsp,Html,CSS My-Sql Data Mining with Graph Technology
41 Securing Aggregate Queries for DNA Databases Jsp,Html,CSS my-sql BIO informatics with Big Data Analysis
42 Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme Jsp,Html,CSS My-Sql Information Security with Cloud
43 Analysis of users’ behaviour in structured e-commerce websites Jsp,Html,CSS My-Sql Data Mining and Data Warehouse(DMDW)
44 Attribute based secure deduplication Jsp,Html,CSS My-Sql Cloud Computing
45 Customer-Satisfaction-profit-maximization Jsp,Html,CSS My-Sql Data Mining and Data Warehouse(DMDW)
46  Deduplication with Dynamic Ownership Management Jsp,Html,CSS My-Sql Information Security
47 Qosrecomendation in cloud services Jsp,Html,CSS My-Sql Information Security
48 Resource Renting for Periodical Cloud Workflow Applications Jsp,Html,CSS My-Sql Network Security
49 RRAC_Robust and Auditable Access Control with Multiple Jsp,Html,CSS My-Sql Networks & Security
50 Two-Factor Data Security Protection Mechanism for Cloud Storage System Jsp,Html,CSS My-Sql Information Security
51 Aspect-level Influence Discovery from Graphs Jsp,Html,CSS My-Sql Data Mining with Graph Technology
52 Topic-Oriented Exploratory Search Based on an Indexing Network Jsp,Html,CSS My-Sql Software Engineering/AI
53 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Jsp,Html,CSS My-Sql Cloud Computing
54  Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization Jsp,Html,CSS My-Sql Software Engineering/AI
55 Keyword Search with Access Control over Encrypted Cloud Data Jsp,Html,CSS my-sql Information Security with Cloud
56 Privacy Protection based Access Control Scheme in Cloud-based Services Jsp,Html,CSS my-sql Information Security with Cloud
57 SeDaSC Secure Data Sharing in Clouds Jsp,Html,CSS my-sql Information Security with Cloud
58  Detecting Stress Based on Social Interactions in Social Networks Jsp,Html,CSS my-sql Information Security with Web Mining
59 Efficient Keyword-aware Representative Travel Route Recommendation Jsp,Html,CSS my-sql Mining with Graph Theory
60 GALLOP: GlobAL feature fused LOcation Prediction for Different Check-in Scenarios Jsp,Html,CSS my-sql Mining with Graph Theory
61 Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis Jsp,Html,CSS My-Sql information Security
62 A Shoulder Surfing Resistant Graphical Authentication System Jsp,Html,CSS My-Sql information Security
63 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System Jsp,Html,CSS my-Sql,Live Cloud Server Secure Mining
64 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder Jsp,Html,CSS My-sql Information Security
65 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Jsp,Html,CSS My-Sql Information Security
66 An Overlay Architecture for Throughput Optimal Multipath Routing Swings,AWT,Socket Programming Ms-Access Networking
67 Privacy Protection based Access Control Scheme in Cloud-based Services Jsp,Html,CSS My-Sql Cloud With Security
JAVA PROJECT TITLES (CSE and IT)
S.No Project Title Domain Front End Back End
1 Traffic Pattern-Based Content Leakage
Detection for Trusted Content
Delivery Networks
Distributed and Parallel Systems JSP,HTML,CSS My-SQL Server
2 Continuous and Transparent User Identity
Verification for Secure Internet Services
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
3 Key Updating for Leakage Resiliency With
Application to AES Modes of Operation
Secure Computing/Information Security Java Swings,AWT My-SQL Server
4 CDA Generation and Integration for Health
Information Exchange Based on Cloud
Computing System
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
5 Conditional Identity-Based Broadcast Proxy
Re-Encryption and Its Application to Cloud Email
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
6 Conjunctive Keyword Search With Designated
Tester and Timing Enabled Proxy Re-Encryption
Function for E-Health Clouds
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
7 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
8 Dual-Server Public-Key Encryption With Keyword
Search for Secure Cloud Storage
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
9 Dynamic and Public Auditing with Fair Arbitration
for Cloud Data
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
10 Fine-Grained Two-Factor Access Control for
Web-Based Cloud Computing Services
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
11 Geometric Range Search on Encrypted Spatial Data Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,Google Maps
12 Identity-Based Encryption with Cloud
Revocation Authority and Its Applications
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
13 Real-Time Semantic Search Using Approximate
Methodology for Large-Scale Storage Systems
Distributed and Parallel Systems JSP,HTML,CSS My-SQL Server
14 Secure Optimization Computation Outsourcing
in Cloud Computing: A Case Study
of Linear Programming
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
15 A Modified Hierarchical Attribute-Based Encryption Access Control
Method for Mobile Cloud Computing
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
16 DeyPoS: Deduplicatable Dynamic Proof of
Storage for Multi-User Environments
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,LIVE CLOUD SERVER(DRIVEHQ)
17 Automatically Mining Facets for Queries
from Their Search Results
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
18 Nearest Keyword Set Search in Multi-Dimensional Datasets Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
19 Rating Prediction based on Sentiment Text reviews Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
20 Sentiment Embeddings with Applications
to Sentiment Analysis
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
21 A Stable Approach for Routing Queries in
Unstructured P2P Networks
Networking Java Swings,AWT RMI as Back End Data Base
22 STAMP: Enabling Privacy-Preserving Location
Proofs for Mobile Users
Networking Java Swings,AWT MY-SQL,RMI,Socket Programming
23 Energy and Memory Efficient Clone Detection
in Wireless Sensor Networks
Networking Java Swings,AWT MY-SQL,RMI,Socket Programming
24 EPLQ: Efficient Privacy-Preserving Location-Based
Query Over Outsourced Encrypted Data
IOT JSP,HTML,CSS My-SQL Server,Google Maps
25 A Hop-by-Hop Routing Mechanism
for Green Internet
Secure Computing/Information Security Java Swings,AWT Bank.XLS Data set,Socket Programming
26 Continuous Answering Holistic Queries over
Sensor Networks
Distributed and Parallel Systems Java Swings,AWT MYSQL,RMI,Socket Programming
27 Data Lineage in Malicious Environments Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
28 FRoDO: Fraud Resilient Device
for Off-Line Micro-Payments
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
29 Resolving Multi-party Privacy Conflicts in Social
Media
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
30 Profiling Online Social Behaviors for
Compromised Account Detection
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
31 User-Service Rating Prediction by Exploring
Social Users’ Rating Behaviors
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
32 Mapping Bug Reports to Relevant Files:
A Ranking Model, a Fine-Grained Benchmark,
and Feature Evaluation
Software Engineering JSP,HTML,CSS My-SQL Server,BUGS Data Set
33 Answering Approximate Queries Over XML Data Fuzzy Systems JSP,HTML,CSS My-SQL Server,XML Files
34 Towards Effective Bug Triage with Software
Data Reduction Techniques
Software Engineering JSP,HTML,CSS My-SQL Server,BUGS Data Set
35 A Scalable Approach for Content-Based Image
Retrieval in Peer-to-Peer Networks
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
36 A Secure Anti-Collusion Data Sharing Scheme Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
37 A Shoulder Surfing Resistant Graphical Authentication System Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
38 An Efficient Privacy-Preserving Ranked Keyword Search Method Secure Computing/Information Security JSP,HTML,CSS My-SQL Server,DRIVEHQ LIVE CLOUD SERVER
39 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
40 Booster in High Dimensional Data Classification Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
41 Contributory Broadcast Encryption with Efficient
Encryption and Short Ciphertexts
Networking Java Swings,AWT My-SQL Server
42 Crowdsourcing for Top-K Query Processing over Uncertain Data Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
43 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
44 Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach Networking Java Swings,AWT My-SQL Server,Socket Programming
45 Domain-Sensitive Recommendation with User-Item Subgroup Analysis Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
46 Dynamic Job Ordering and Slot Configurations
for MapReduce Workloads
Secure Computing/Information Security Java Swings,AWT My-SQL Server,Socket Programming
47 Efficient Algorithms for Mining Top-K High Utility Itemsets Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server ,Products Data Set
48 Efficient Cache-Supported Path Planning on Roads Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server ,Google Maps
49 Enabling Cloud Storage Auditing with Verifiable
Outsourcing of Key Updates
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
50 Identity-Based Encryption with Cloud Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
51 Identity-Based Proxy-Oriented Data Uploading Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
52 iPath Path Inference in Wireless Sensor Networks Wireless Sensor Networks Java Swings,AWT My-Sql Server
53 kNNVWC An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering Data Mining and Data Engineering JSP,HTML,CSS MySql Server
54 Leveraging Data Deduplication to Improve the
Performance of Primary Storage Systems in the
Cloud
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
55 A Locality Sensitive Low-Rank Model
for Image Tag Completion
Image Processing JSP,HTML,CSS My-SQL Server
56 Location Aware Keyword Query Suggestion
Based on Document Proximity
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
57 Malware Detection in
Cloud Computing Infrastructures
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
58 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval – Copy Image Processing JSP,HTML,CSS My-SQL Server
59 Opportunistic Routing With Congestion Diversity in Wireless Sensor Networks Java Swings,AWT My-SQL Server
60 On Traffic-Aware Partition and Aggregation in
MapReduce for Big Data Applications
Distributed and Parallel Systems Java Swings,AWT My-SQL Server
61 Quantifying Political Leaning from Tweets,
Retweets, and Retweeters
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
62 Relevance Feedback Algorithms Inspired By
Quantum Detection
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
63 Secure Data Sharing in Cloud Computing Using
Revocable-Storage Identity-Based Encryption
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
64 Shadow Attacks based on Password Reuses:
A Quantitative Empirical Analysis
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
65 TMACS: A Robust and Verifiable Threshold Multi-Authority
Access Control System in Public Cloud Storage
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server
66 Tag Based Image Search by Social Re-ranking Image Processing JSP,HTML,CSS My-SQL Server
67 Top-k Dominating Queries on Incomplete Data Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
68 Two-Factor Data Security Protection Mechanism
for Cloud Storage System
Secure Computing/Information Security JSP,HTML,CSS My-SQL Server ,DriveHQ Live Cloud Server
69 Using Hashtag Graph-based Topic Model to
Connect Semantically-related Words without
Co-occurrence in Microblogs
Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
70 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks Wireless Sensor Networks Java Swings,AWT Ms-Access
71 Detecting Malicious Facebook Applications Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
72 Discovery of Ranking Fraud for Mobile Apps Data Mining and Data Engineering JSP,HTML,CSS My-SQL Server
73 Passive IP Traceback: Disclosing the Locations
of IP Spoofers From Path Backscatter
Information Security Java Swings,AWT My-SQL Server
74 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Information Security Java Swings,AWT My-SQL Server
75 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks Information Security Java Swings,AWT My-SQL Server
76 Effective Key Management in Dynamic Wireless Sensor Networks Wireless Sensor Networks Java Swings,AWT MS-ACCESS
77 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Cloud Computing JSP,HTML,CSS My-SQL Server
78 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Wireless Sensor Networks Java Swings,AWT RMI as Back End Data Base
79 Real-Time Detection of Traffic From Twitter Stream Analysis Wireless Sensor Networks JSP,HTML,CSS My-SQL Server
80 Secure Distributed Deduplication Systems with Improved Reliability Wireless Sensor Networks Java Swings,AWT My-SQL Server
81 SmartCrawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces Information Security Java Swings,AWT Internet as Back End
82 Software Puzzle A Countermeasure to Resource Inflated Denial of Service Attacks Information Security Java Swings,AWT My-SQL Server /MS-Access
83 Steganography Using Reversible Texture Synthesis Information Security Java Swings,AWT Video/Audio/Images as Back -End

How do you choose a project topic?

  1. brainstorm for ideas.
  2. choose a topic that will enable you to read and understand the literature.
  3. ensure that the topic is manageable and that material is available.
  4. make a list of key words.
  5. be flexible.
  6. define your topic as a focused research question.
  7. research and read more about your topic.

Is final year project important?

FINAL YEAR PROJECT AN IMPORTANT ELEMENT IN THE INTEGRATION OF KNOWLEDGE. … In this context, the Final Year Project plays a crucial role in the teaching-learning process.