Our Projects and IEEE Papers on JAVA

CLOUD COMPUTING

 

  1. Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid
  2. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
  3. Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
  4. Attribute- Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  5. Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centres
  6. Customer- Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
  7. A Cross Tenant Access Control(CTAC)Model for Cloud Computing : Formal Specification and Verification
  8. A New Service Mechanism for Profit Optimization of a Cloud Provider and its Users
  9. A Novel Efficient Remote Data Possessing Checking Protocol in Cloud Storage
  10. A semi automatic and trustworthy scheme for continuous cloud service certification
  11. VPSearch : Achieving Verifiability for Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data
  12. Energy-Aware Load Balancing and Application Scaling for the Cloud Ecosystem
  13. Fast Phrase Search for Encrypted for Cloud Storage
  14. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
  15. Keyword Search with Access Controller over Encrypted Cloud Data
  16. Knowledge-Enhanced Mobile Video Broadcasting Framework With Cloud Support
  17. Enabling semantic search based on single keyword
  18. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
  19. Privacy-Protection Based Access Control Scheme in Cloud-Based services
  20. Privacy-Preserving Multi-keyword Top-k Similarity Search over Encrypted Data
  21. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
  22. Provable Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing in the Cloud
  23. RAAC : Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
  24. Resource renting for periodical cloud workflow applications
  25. Securing Cloud Data Under Key Exposure
  26. SeDaSC : Secure Data Sharing in Clouds
  27. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
  28. TAFC : Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
  29. TES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud
  30. Temporal Task Scheduling With Constrained Service Delay for Profit Maximization in Hybrid Clouds
  31. Two-Cloud Secure Database for Numeric –related SQL Range Queries With Privacy Preserving
  32. Fuzzy identity based data integrity auditing for reliable cloud storge system.
  33. SecRBAC: Secure data in the Clouds
  34. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
  35. A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing
  36. A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing
  37. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds
  38. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
  39. iParker—A New Smart Car-Parking System Based on Dynamic Resource Allocation and Pricing
  40. EvacSys: A Cloud-Based Service for emergency
  41. Automatically Enforcing Security SLAs in the Cloud
  42. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
  43. A Hybrid Cloud Approach for Secure Authorized Deduplication
  44. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
  45. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute Based Encryption
  46. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
  47. Enabling Cloud Storage Auditing with Key-Exposure Resistance
  48. Identity-based Encryption with Outsourced Revocation in Cloud Computing
  49. Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
  50. Cloud bassed multimedia content protection system

BIG DATA      

 

  1. Efficient Processing of Skyline Queries Using MapReduce
  2. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
  3. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
  4. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
  5. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  6. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
  7. On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications
  8. The SP Theory of Intelligence: Distinctive Features and Advantages
  9. A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data
  10. Protection of Big Data Privacy
  11. Sentiment Analysis of Top Colleges in India Using Twitter Data
  12. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
  13. Phoenix: A MapReduce Implementation With New Enhancements
  14. Research Directions for Engineering Big Data Analytics Software
  15. Secure sensitive data sharing on a big data platform
  16. A Hierarchical Distributed ProcessingFramework for Big Image Data

DATA MINING

 

1.      Analyzing Sentiments in One Go :A Supervised Joint Topic Modelling Approach

2.      Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

3.      Sentiment Analysis of Indian Movie Review with various Feature Selection Techniques

4.      Predicting Student Actions in a Procedural Training Environment

5.      Detecting Stress Based on Social Interactions in Social Networks

6.      I-Injection : Toward Effective Collaborative Filtering Using Uninteresting items

7.      PPRank : Economically Selecting Initial Users for influence Maximization in Social Networks

8.      SociRank : Identifying and Ranking Prevalent News Topics Using Social Media Factors

9.      Query Reorganization Algorithms for Efficient Boolean Information Filtering

10.  Computing Semantic Similarity of Concepts in Knowledge Graphs

11.  Explaining Missing Answers to Top-k SQL Queries

12.  User-Centric Similarity Search

13.  Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

14.  Mining frequent route patterns based on personal trajectory abstraction

15.  RAPARE : A Generic Strategy for Cold-Start Rating Prediction Problem

16.  Collaborative Filtering-Based Recommendation of Online Social Voting

17.  Efficient Keyword-aware Representative Travel Route Recommendation

18.  DRIMUX : Dynamic Rumor Influence Minimization with User Experience in Social Networks

19.  Query Reorganization Algorithms for Efficient Boolean Information Filtering

20.  Towards Real-Time, Country-Level  Location Classification of Worldwide Tweets

21.  Cloud workflow scheduling with deadlines and time slot availability

22.  Analyzing the Hydro climatic Teleconnections of Summer Monsoon Rainfall in Kerala, India, Using Multivariate Empirical Mode Decomposition and Time-Dependent Intrinsic Correlation

23.  K Nearest Neighbor Joins for Big Data on Map Reduce: a Theoretical and Experiment

24.  SPIRIT: A Tree Kernel-based Method for Topic Person Interaction Detection

25.  Mining User-Aware Rare Sequential Topic Patterns in Document Streams

26.  Efficient Algorithms for Mining Top-K High Utility Item sets

27.  A Survey of Task Allocation and Load Balancing in Distributed Systems

28.  Resolving Multi-Party Privacy Conflicts in Social Media

NETWORK SECURITY

 

1.      Structural Vulnerability Assessment ofCommunity-based Routing in Opportunistic Networks

2.      Evaluation of web Security Mechanism Using Vulnerability & Attack Injection

3.      My Privacy- My decision: Control of Photo Sharing on Online Social Networks

4.      Detection of False Data Injection Attacks in smart Grid Communication System

IMAGEPROCESSING

 

1.      Robust Face Recognition with Kernelized Locality-Sensitive Group

2.      Sparsity Representation

3.      MuLoG, or How to apply Gaussian denoisers to multi-channel SAR speckle reduction?

4.      DeepFix: A Fully Convolutional Neural Network for predicting Human Eye Fixations

5.      Multimodal Similarity Gaussian Process Latent Variable Model

6.      Ocular Recognition for Blinking Eyes

7.      Piecewise-stationary motion modeling and iterative smoothing to track heterogeneous particle motions in dense environments

8.      300 FPS Salient Object Detection via Minimum Directional Contrast

9.      Multimodal Biometrics for user authentication

10.  Automatic Semantic Face Recognition

11.  Motion Detection Application Using Web Camera

12.  Detection of Plant Leaf Disease Using Image Processing Approach

13.  Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain

14.  Reversible Data Hiding in Encrypted Images Based on Progressive Recovery

15.  Agricultural plant Leaf Disease Detection Using Image Processing

16.  Steganography Using Reversible Texture Synthesis

17.  Reversible Data Hiding in Encrypted Images with Distributed Source Encoding

18.   One-time Password for Biometric Systems: Disposable Feature Templates

19.     Effective and Efficient Global Context Verification for Image Copy Detection
20.     Face Recognition Using Sparse Fingerprint Classification Algorithm
21.     Enhanced Password Processing Scheme Based on Visual Cryptography and OCR
22.     Image Re-ranking based on Topic Diversity
23.     Semi-Supervised Image-to-Video Adaptation for Video Action Recognition

24.     Accurate Detection and Recognition of Dirty Vehicle Plate Numbers for High-Speed Applications

25.     My Privacy My Decision: Control of Photo Sharing on Online Social Networks

26.     A Hierarchical Approach for Rain or Snow Removing in A Single Color Image

27.     Automatic Detection of Red Light Running Using Vehicular Cameras

28.     PassBYOP: Bring Your Own Picture for Securing Graphical Passwords

29.     Single Sample Face Recognition Based on LPP Feature Transfer

30.     A Shoulder Surfing Resistant Graphical Authentication System

31.     Reversible Data Hiding in Encrypted Images Based on Progressive Recovery

32.     Reversible Data Hiding in Encrypted Images With Distributed Source Encoding

33.     Phoenix: A Image MapReduce Implementation With New Enhancements

34.     2DCrypt: Image Scaling and Cropping in Encrypted Domains

35.     Multilevel Network Security Combining Cryptography and Steganography on ARM Platform

36.     Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

37.     Prevention of Phishing Attacks in Voting System using Visual Cryptography

 

WEB SECURITY

1.      Multi-party secret key agreement over state-dependent wireless broadcast channels

2.      Someone in Your Contact List: Cued Recall-Based Textual Passwords
3.      Authorship Attribution for Social Media Forensics
4.      NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

5.      My Privacy My Decision: Control of Photo Sharing on Online Social Networks

6.      One-time Password for Biometric Systems: Disposable Feature Templates

7.      Enhanced Password Processing Scheme Based on Visual Cryptography and OCR

8.      Effective and Efficient Global Context Verification for Image Copy Detection

9.      One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications

10.  Fast Detection of Transformed Data Leaks

11.  Secure Auditing and Deduplicating Data in Cloud

12.  Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

13.  Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

14.  FRAppE :Detecting Malicious Facebook Application

15.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

16.  An Exploration of Geographic Authentication Schemes
17.  Dummy-Based User Location Anonymization under Real-World Constraints
18.  Privacy-Preserving Location Sharing Services for Social Networks
19.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
20.  PRISM: PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
21.  A Shoulder Surfing Resistant Graphical Authentication System
22.  Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
INTERNET of THINGS (IoT)

1.      Blind Aid Stick: Hurdle Recognition, Simulated Perception, Android Integrated Voice Based Cooperation via GPS Along With Panic Alert System

2.      Botnets and Internet of Things Security
3.      Child Safety Wearable Device
4.      Poster Abstract: Data-Centric IoT Services Provisioning in Fog-Cloud Computing Systems
5.      An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies
6.      A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
7.      IOT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
8.      Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems
9.      A Micro-Location Based Dynamic Device-Oriented Control System for IOT Applications
10.  Event-Aware Framework for Dynamic Services Discovery and Selection in the Context of Ambient Intelligence and Internet of Things
11.  IoT based Home Security through Digital Image Processing Algorithms
12.  Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
13.  SMART LIBRARY MANAGEMENT SYSTEM USING RFID TECHNOLOGY
14.  An Internet-of-Things Enabled Connected Navigation System for Urban Bus Riders
15.  ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
16.  The Internet of Things for South African Tourism

17.  Cloud Based Web Application Supporting Vehicle Toll Payment System
18.  HIVE: Home Automation System for Intrusion Detection
19.  Fog Computing May Help to Save Energy in Cloud Computing
20.  Effective Ways to Use Internet of Things in the Field of Medical and Smart Health Care
21.  A Conceptual Framework for IoT-based Healthcare System using Cloud Computing

22.  Emerging Security Mechanisms for Medical Cyber Physical Systems

23.  Designing a Secure Exam Management System (SEMS) for M-Learning Environments

24.  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

25.  Mobile attendance using Near Field Communication and One-Time Password

26.  Context-Aware Mobile Cloud Computing and Its Challenges
27.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
28.  Monitoring of School Kids Using Android Devices and Near Field Communication (NFC)
29.  Intelligent Hands Free Speech based SMS System on Android
30.  Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions

31.  An Online Security Protocol for NFC Payment
32.  RISE: Role-based Internet of Things Service Environment
33.  Real-Time Locating Systems Using Active RFID for Internet of Things
ANDROID PROJECTS

1.   A Classroom Scheduling Service for Smart Classes

2.   GeoMoB – A Geo Location based browser for secured Mobile Banking
3.   Child Safety Wearable Device
4.   Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System

5.   A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

6.   Privacy-Preserving Location-Proximity for Mobile Apps

7.   Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
8.   Privacy-Preserving Location-Proximity for Mobile Apps

9.   IoT based Home Security through Digital Image Processing Algorithms
10.  ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
11.  A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

12.  Effective ways to use Internet of Things in the field of medical and smart health care

13.  Cloud Based Web Application Supporting Vehicle Toll Payment System
14.  An Internet-of-Things Enabled Connected Navigation System for Urban Bus Riders
15.  Emerging Security Mechanisms for Medical Cyber Physical Systems

16.  Designing a Secure Exam Management System (SEMS) for M-Learning Environments

17.  Shake Unlock: Securely Transfer Authentication States between Mobile Devices

18.  Dummy-Based User Location Anonymization Under Real-World Constraints
19.  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones
20.  Mobile attendance using Near Field Communication and One-Time Password
21.  Context-Aware Mobile Cloud Computing and Its Challenges
22.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
23.  Monitoring of School Kids Using Android Devices and Near Field Communication (NFC)
24.  Intelligent Hands Free Speech based SMS System on Android
25.  Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions

26.  An Online Security Protocol for NFC Payment

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s