Java Projects for IS,CS-IEEE Projects

CLOUD COMPUTING

  1. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
  2. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
  3. An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
  4. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy
  5. Catch You if You Misbehave Ranked Keyword Search Results Verification in Cloud Computing
  6. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
  7. Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
  8. Efficient-Traceable-Authorization-Search-System-for-Secure-Cloud-Storage
  9. Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
  • Normal cloud model-based algorithm for multi-attribute trusted cloud service selection
  • Privacy Aware Data Deduplication for Side Channel in Cloud Storage
  • Provably-secure-and-lightweight-identity-based-authenticated-data-sharing-protocol-for-cyber-physical-cloud-environment
  • Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
  • Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
  • SEPDP- Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
  • Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid
  • Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
  • Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
  • Attribute- Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  • Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centres

DATA MINING

  1. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
  2. Collaboratively Tracking Interests for User Clustering in Streams of Short Texts
  3. Heterogeneous Information Network Embedding for Recommendation
  4. Learning Customer Behaviors for Effective Load Forecasting
  5. NAIS – Neural Attentive Item Similarity Model for Recommendation
  6. Opinion Aspect Relations in Cognizing Customer Feelings via Reviews
  7. Secure Attribute-Based Signature Scheme with Multiple Authorities for Block-chain in Electronic Health Records Systems
  8. Semantic Clustering-Based Deep Hypergraph Model for Online Reviews Semantic Classification in Cyber-Physical-Social Systems
  9. String Similarity Search – A Hash-Based Approach
  • Analyzing Sentiments in One Go :A Supervised Joint Topic Modelling Approach
  • Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method
  • Sentiment Analysis of Indian Movie Review with various Feature Selection Techniques
  • Predicting Student Actions in a Procedural Training Environment
  • Detecting Stress Based on Social Interactions in Social Networks
  • I-Injection : Toward Effective Collaborative Filtering Using Uninteresting items

MACHINE LEARNING

  1. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
  2. Heterogeneous Information Network Embedding for Recommendation
  3. Learning Customer Behaviors for Effective Load Forecasting
  4. Opinion Aspect Relations in Cognizing Customer Feelings via Reviews
  5. Secure Attribute-Based Signature Scheme with Multiple Authorities for Block-chain in Electronic Health Records Systems
  6. NetSpam A Network-Based Spam Detection Framework for Reviews in Online Social Media
  7. Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
  8. Twitter analytics sentiment analysis
  9. Towards real time country level location classification of worldwide Tweets
  • Real time tweets classification for daily news and followers
  • Collaborative Filtering-Based Recommendation of Online Social Voting
  • DRIMUX : Dynamic Rumor Influence Minimization with User Experience in Social Networks

WEB MINING

  1. Achieving Data Truthfulness and Privacy Preservation in Data Markets
  2. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
  3. Analyzing and Detecting Money-Laundering Accounts in Online Social Networks
  4. Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
  5. Semi-Supervised Spam Detection in Twitter Stream
  6. NetSpam A Network-Based Spam Detection Framework for Reviews in Online Social Media
  7. Top-k Critical Vertices Query on Shortest Path

 

NETWORKING

  1. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
  2. Net Spam: a Network-based Spam Detection Framework for Reviews in Online Social Media
  3. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
  4. A Multilevel Access Control Scheme for Data Security in Transparent Computing
  5. Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
  6. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
  7. Fast-Geo: Efficient Geometric Range Queries on Encrypted Spatial Data
  8. Transactional Behavior Verification in Business Process as a Service Configurations
  9. Data-driven faulty node detection scheme for Wireless Sensor Networks
  • SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
  • An Overlay Architecture for Throughput Optimal Multipath Routing
  • Face Change: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks with Fine-Grained Control
  • Network Capability in Localizing Node Failures via End-to-End Path Measurements
  • Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network
  • Routing in Accumulative Multi-Hop Networks

WIRELESS NETWORKING

 

  1. Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
  2. Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function
  3. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
  4. Energy Efficient Clustering Algorithm for Multi-hop Wireless Sensor Network Using Type-2 Fuzzy logic
  5. E2HRC: An Energy Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
  6. Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
  7. SUPERMAN Security Using Pre Existing Routing for Mobile Ad hoc Networks
  8. Malware Propagations in Wireless Ad Hoc Networks
  9. CANS Towards Congestion Adaptive and Small Stretch Emergency Navigation with WSN

 

NETWORK SECURITY

 

  1. Structural Vulnerability Assessment ofCommunity-based Routing in Opportunistic Networks
  2. Evaluation of web Security Mechanism Using Vulnerability & Attack Injection
  3. My Privacy- My decision: Control of Photo Sharing on Online Social Networks
  4. Detection of False Data Injection Attacks in smart Grid Communication System

 

IMAGE PROCESSING

 

  1. Robust Face Recognition with Kernelized Locality-Sensitive Group
  2. Sparsity Representation
  3. MuLoG, or How to apply Gaussian denoisers to multi-channel SAR speckle reduction?
  4. DeepFix: A Fully Convolutional Neural Network for predicting Human Eye Fixations
  5. Multimodal Similarity Gaussian Process Latent Variable Model
  6. Ocular Recognition for Blinking Eyes
  7. Piecewise-stationary motion modeling and iterative smoothing to track heterogeneous particle motions in dense environments
  8. 300 FPS Salient Object Detection via Minimum Directional Contrast
  9. Multimodal Biometrics for user authentication
  • Automatic Semantic Face Recognition
  • Motion Detection Application Using Web Camera
  • Detection of Plant Leaf Disease Using Image Processing Approach
  • Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain
  • Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
  • Agricultural plant Leaf Disease Detection Using Image Processing
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s