The Sun Technologies Training formats are flexible, We have trained thousands of students


IEEE Projects and Application Projects for B.Tech & M.Tech Students


We create a professional websites & Apps which best suit your needs target audience.


Download The Sun Techonologies Brochures, Magazines & Video Tutorials

IEEE Project Titles

.NET Technology 

Domain: Cloud Computing

»   Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
»   Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
»   Consistency as a Service: Auditing Cloud Consistency
»   Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
»   Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
»   Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
»   Identity-Based Distributed Provable Data Possession in Multi- Cloud Storage
»   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
»   Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
»   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
»   Scalable Distributed Service Integrity Attestation for Software-asa- Service Clouds

Domain: Knowledge and Data Engineering

»   A Cocktail Approach for Travel Package Recommendation
»   An Empirical Performance Evaluation of Relational Keyword Search Techniques
»   LARS*: An Efficient and Scalable Location-Aware Recommender System
»   Product Aspect Ranking and Its Applications
»   Secure Mining of Association Rules in Horizontally Distributed Databases
»   Supporting Privacy Protection in Personalized Web Search
»   TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
»   Typicality-Based Collaborative Filtering Recommendation

Domain: Mobile Computing

»   A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
»   Autonomous Mobile Mesh Networks
»   DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks
»   Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
»   Preserving Location Privacy in Geosocial Applications

Domain: Parallel & Distributed Systems

»   A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
»   A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
»   An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
»   Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
»   Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
»   Multicast Capacity in MANET with Infrastructure Support
»   Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
»   Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing

Java Technology 

Domain: Cloud Computing

»   A Hybrid Cloud Approach for Secure Authorized Deduplication
»   A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
»   A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
»   Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
»   Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
»   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
»   Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
»   PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
»   Towards Differential Query Services in Cost-Efficient Clouds

Domain : Knowledge and Data Engineering

»   Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
»   BestPeer++ A Peer-to-Peer Based Large-Scale Data Processing Platform
»   Data Mining with Big Data
»   Dealing With Concept Drifts in Process Mining
»   Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
»   Efficient Prediction of Difficult Keyword Queries over Databases
»   Facilitating Document Annotation Using Content and Querying Value
»   Fast Nearest Neighbor Search with Keywords
»   Keyword Query Routing
»   Privacy-Preserving and Content-Protecting Location Based Queries
»   Security Evaluation of Pattern Classifiers under Attack
»   Supporting Privacy Protection in Personalized Web Search
»   Towards Online Shortest Path Computation

Domain: Mobile Computing

»   An Incentive Framework for Cellular Traffic Offloading
»   Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
»   Efficient Authentication for Mobile and Pervasive Computing
»   Friendbook A Semantic-based Friend Recommendation System for Social Networks
»   Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

Domain: Parallel & Distributed Systems

»   Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
»   Exploiting Service Similarity for Privacy in Location-Based Search Queries
»   LocaWard A Security and Privacy Aware Location-Based Rewarding System
»   On False Data-Injection Attacks against Power System State Estimation Modeling and Countermeasures
»   RRE: A Game-Theoretic Intrusion Response and Recovery Engine
»   Securing Broker-Less PublishSubscribe Systems Using Identity-Based Encryption
»   SOS A Distributed Mobile Q&A System Based on Social Networks
»   The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Eva
»   The Design and Evaluation of An Information Sharing System for Human Networks
»   Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
»   Secure Outsourced Attribute-based Signatures