MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS

Size: px
Start display at page:

Download "MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS"

Transcription

1 S NO MODAInnovations BIG DATA / HADOOP: 1 SOCIALQ&A: AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM 2 PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING 3 NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA 4 EFFICIENT PROCESSING OF SKYLINE QUERIES USING MAPREDUCE 5 FIDOOP-DP: DATA PARTITIONING IN FREQUENT ITEMSET MINING ON HADOOP CLUSTERS 6 EFFICIENT PROCESSING OF SKYLINE QUERIES USING MAPREDUCE 7 PRACTICAL PRIVACY-PRESERVING MAPREDUCE BASED K-MEANS CLUSTERING OVER LARGESCALE DATASET USER-CENTRIC SIMILARITY SEARCH SECURE BIG DATA STORAGE AND SHARING SCHEME FOR CLOUD TENANTS 8 EFFICIENT RECOMMENDATION OF DE-IDENTIFICATION POLICIES USING MAPREDUCE 9 HIERARCHY-CUTTING MODEL BASED ASSOCIATION SEMANTIC FOR ANALYZING DOMAIN TOPIC ON THE WEB 10 LARGE-SCALE MULTI-MODALITY ATTRIBUTE REDUCTION WITH MULTI-KERNEL FUZZY ROUGH SETS 11 A SECURE AND VERIFIABLE ACCESS CONTROL SCHEME FOR BIG DATA STORAGE IN CLOUDS QUESTION QUALITY ANALYSIS AND PREDICTION IN COMMUNITY QUESTION ANSWERING 12 SERVICES WITH COUPLED MUTUAL REINFORCEMENT 13 FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING MAPREDUCE 14 SENTIMENT ANALYSIS OF TOP COLLEGES USING TWITTER DATA 15 THE SP THEORY OF INTELLIGENCE: DISTINCTIVE FEATURES AND ADVANTAGE 16 ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS 17 A PARALLEL PATIENT TREATMENT TIME PREDICTION ALGORITHM AND ITS APPLICATIONS IN HOSPITAL QUEUING-RECOMMENDATION IN A BIG DATA ENVIRONMENT 18 PROTECTION OF BIG DATA PRIVACY IOT / INTERNET OF THINGS: 1 BLIND AID STICK: HURDLE RECOGNITION,SIMULATED PERCEPTION,ANDROID INTEGRATED VOICE BASED COOPERATION VIA GPS ALONG WITH PANIC ALERT SYSTEM."

2 2 BOTNETS AND INTERNET OF THINGS SECURITY 3 CHILD SAFETY WEARABLE DEVICE 4 CITYGUARD: AWATCHDOG FOR SAFETY-AWARE CONFLICT DETECTION IN SMART CITIES 5 DEMO ABSTRACT: SIMULATING CONFLICT DETECTION IN HETEROGENEOUS SERVICES OF A SMART CITY 6 POSTER ABSTRACT: DATA-CENTRIC IOT SERVICES PROVISIONING IN FOG-CLOUD COMPUTING SYSTEMS 7 AFTER-THE-FACT LEAKAGE-RESILIENT IDENTITY-BASED AUTHENTICATED KEY EXCHANGE 8 AN NFC FEATURED THREE LEVEL AUTHENTICATION SYSTEM FOR TENABLE TRANSACTION AND ABRIDGMENT OF ATM CARD BLOCKING INTRICACIES 9 SELF-POWERED ZIGBEE WIRELESS SENSOR NODES FOR RAILWAY CONDITION MONITORING 10 TOWARDS SAFER ROADS THROUGH COOPERATIVE HAZARD AWARENESS AND AVOIDANCE IN CONNECTED VEHICLES 11 A PROVABLY SECURE GENERAL CONSTRUCTION FOR KEY EXCHANGE PROTOCOLS USING SMART CARD AND PASSWORD 12 IOT SENTINEL: AUTOMATED DEVICE-TYPE IDENTIFICATION FOR SECURITY ENFORCEMENT IN IOT 13 WEARABLE 2.0: ENABLING HUMAN-CLOUD INTEGRATION IN NEXT GENERATION HEALTHCARE SYSTEMS 14 CLOUD BASED WEB APPLICATION SUPPORTING VEHICLE TOLL PAYMENT SYSTEM 15 EFFECTIVE WAYS TO USE INTERNET OF THINGS IN THEFIELD OF MEDICAL AND SMART HEALTH CARE 16 THE INTERNET OF THINGS FORSOUTH AFRICAN TOURISM 17 AN IOT-AWARE ARCHITECTURE FOR SMARTHEALTHCARE SYSTEMS 18 A LOW COST WEB BASED REMOTE MONITORING SYSTEM WITH BUILT-IN SECURITY FEATURE FOR VULNERABLE ENVIRONMENTS 19 A RECONFIGURABLE SMART SENSOR INTERFACE FOR INDUSTRIAL WSN AND HUMAN HEALTH MONITORING IN IOT ENVIRONMENT 20 A RECONFIGURABLE SMART SENSOR INTERFACE FOR INDUSTRIAL WSN IN IOT ENVIRONMENT 21 DESIGN OF A WSN PLATFORM FOR LONG-TERM ENVIRONMENTAL MONITORING FOR IOT APPLICATIONS 22 IMPLEMENTATION OF A WEB OF THINGS BASED SMART GRIDTO REMOTELY MONITOR AND CONTROL RENEWABLE ENERGY SOURCES 23 WIFI FOR VEHICULAR COMMUNICATION SYSTEMS

3 24 A NON-INVASIVE REMOTE HEALTH MONITORING SYSTEM USING VISIBLE LIGHT COMMUNICATION WEB SECURITY: 1 MULTI-PARTY SECRET KEY AGREEMENT OVER STATE-DEPENDENT WIRELESS BROADCAST CHANNELS 2 SOMEONE IN YOUR CONTACT LIST: CUED RECALL-BASED TEXTUAL PASSWORDS 3 AUTHORSHIP ATTRIBUTION FOR SOCIAL MEDIA FORENSICS 4 A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM. 5 DUMMY-BASED USER LOCATION ANONYMIZATION UNDER REAL-WORLD CONSTRAINTS 6 PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS 7 STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS 8 PRISM: PRIVACY-AWARE INTEREST SHARING AND MATCHING IN MOBILE SOCIAL NETWORKS 9 AN EXPLORATION OF GEOGRAPHIC AUTHENTICATION SCHEMES 10 REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON PROGRESSIVE RECOVERY NETWORKING: 1 STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS 2 FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS 3 TOWARD OPTIMUM CROWDSENSING COVERAGE WITH GUARANTEED PERFORMANCE 4 PRISM: PRIVACY-AWARE INTEREST SHARING AND MATCHING IN MOBILE SOCIAL NETWORKS 5 JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 6 SOFTWARE DEFINED NETWORKING WITH PSEUDONYM SYSTEMS FOR SECURE VEHICULARCLOUDS 7 AN ENHANCED AVAILABLE BANDWIDTH ESTIMATION TECHNIQUE FOR AN END-TO-END NETWORK PATH 8 PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS 9 A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS 10 IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS 11 OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS 12 SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS NETWORKS

4 13 LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS 14 SMARTCRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WE 15 A NOVEL AND LIGHTWEIGHT SYSTEM TO SECURE WIRELESS MEDICAL SENSOR NETWORKS CIPHER X RAY 16 A TWO STAGE DEANONYMIZATION ATTACK AGAINST ANONYMIZED SOCIAL NETWORKS 17 AN IMPROVED CLUSTERING ALGORITHM BASED ONK-MEANS AND HARMONY SEARCH OPTIMIZATION 18 A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS VAMPIRE ATTACKS 19 MOBILE RELAY CONFIGURATION IN DATA - INTENSIVE WIRELESS SENSOR NETWORKS 20 M-PRIVACY FOR COLLABRATIVE DATA PUBLISHING 21 AMPLE:AN ADAPTIVE TRAFFIC ENGINEERING SYSTEM BASED ON VIRTUAL ROUTING TOPOLOGIES 22 AUTOMATIC RECONFIGURATION FOR LARGE SCALE RELIABLE FOR STORAGE SYSTEM 23 AVMON. 24 P2PPROXY. 25 BIDIRECTIONAL ROUTING ALGORITHUM 26 CREDIT CARD FRAUD DETECTION USING HIDDEM M,ARKOV MODEL. 27 EFFICIENT BROADCASTING WITH GURENTEED COVERAGE IN MOBILE ADHOC NETWORK. 28 ONLINE HANDWRITTEN SCRIPT RECOGNITION. 29 A FULLY DISTRIBUTED PROACTIVELY SECURE THRESHOLD MULTISIGNATURE SCHEME. 30 NETWORK MONITORING MANAGEMENT 31 A BIDIRECTIONAL ROUTING ABSTRACTION FOR ASYMMETRIC MOBILE AD HOC NETWORKS 32 AN ACKNOWLEDGEMENT APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS 33 A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS 34 VAMPIRE ATTACKS 35 MOBILE RELAY CONFIGURATION IN DATA - INTENSIVE WIRELESS SENSOR NETWORKS 36 M-PRIVACY FOR COLLABRATIVE DATA PUBLISHING 37 AMPLE:AN ADAPTIVE TRAFFIC ENGINEERING SYSTEM BASED ON VIRTUAL ROUTING TOPOLOGIES 38 AUTOMATIC RECONFIGURATION FOR LARGE SCALE RELIABLE FOR STORAGE SYSTEM

5 39 AVMON. 40 P2PPROXY. 41 BIDIRECTIONAL ROUTING ALGORITHUM 42 CREDIT CARD FRAUD DETECTION USING HIDDEM M,ARKOV MODEL. 43 EFFICIENT BROADCASTING WITH GURENTEED COVERAGE IN MOBILE ADHOC NETWORK. 44 ONLINE HANDWRITTEN SCRIPT RECOGNITION. 45 A FULLY DISTRIBUTED PROACTIVELY SECURE THRESHOLD MULTISIGNATURE SCHEME. 46 NETWORK MONITORING MANAGEMENT 47 A BIDIRECTIONAL ROUTING ABSTRACTION FOR ASYMMETRIC MOBILE AD HOC NETWORKS 48 AN ACKNOWLEDGEMENT APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS CLOUD COMPUTING: 1 COST MINIMIZATION ALGORITHMS FOR DATA CENTER MANAGEMENT 2 ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD 3 EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCHAND- BOUND HEURISTICS 4 IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS 5 PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS 6 RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE 7 LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS 8 A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION 9 A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS 10 A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE 11 A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS 12 OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS 13 IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE

6 14 PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING 15 TWO-FACTOR DATA ACCESS CONTROL WITH EFFICIENT REVOCATION FOR MULTIAUTHORITY CLOUD STORAGE SYSTEMS 16 VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS 17 PRACTICAL PRIVACY-PRESERVING MAPREDUCE BASED K-MEANS CLUSTERING OVER LARGESCALEDATASET 18 FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES 19 E-SCHOOL TECHNO BUS BASED ON CLOUD COMPUTING SERVICES 20 ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS 21 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 22 AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD 23 DIFFERENTIALLY PRIVATE ONLINE LEARNING FOR CLOUD-BASED VIDEO RECOMMENDATION WITH MULTIMEDIA BIG DATA IN SOCIAL NETWORKS 24 SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING 25 DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE. 26 DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS 27 DROPS: DIVISION AND REPLICATION OF DATA INCLOUD FOR OPTIMAL PERFORMANCE AND SECURITY 28 PHOENIX: A MAPREDUCE IMPLEMENTATION WITH NEWENHANCEMENTS 29 A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD 30 AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING 31 AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD 32 CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM 33 CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING 34 CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES 35 CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD

7 36 CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE- ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS 37 DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD 38 DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE 39 DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA 40 ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES 41 FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES 42 IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS 43 PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINEGRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD 44 REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS 45 SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITYBASED ENCRYPTION 46 SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING 47 TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE 48 A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING 49 A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION 50 CHARM A COST EFFICIENT MULTI CLOUD DATA HOSTING SCHEME WITH HIGH AVAILABILITY 51 AUDITFREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE BASED ENCRYPTION WEB MINING/DATA MINING: 1 POINT-OF-INTEREST RECOMMENDATION FOR LOCATION PROMOTION IN LOCATION-BASED SOCIAL NETWORKS 2 NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA 3 SOCIALQ&A: AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM 4 MODELING URBAN BEHAVIOR BY MINING GEOTAGGED SOCIAL DATA 5 A WORKFLOW MANAGEMENT SYSTEM FOR SCALABLE DATA MINING ON CLOUDS

8 6 FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING MAPREDUCE 7 SENTIMENT ANALYSIS OF TOP COLLEGES IN INDIA USING TWITTER DATA 8 INVERTED LINEAR QUADTREE: EFFICIENT TOP K SPATIAL KEYWORD SEARCH 9 TRUTH DISCOVERY IN CROWDSOURCED DETECTION OF SPATIAL EVENTS 10 SPORE: A SEQUENTIAL PERSONALIZED SPATIAL ITEM RECOMMENDER SYSTEM 11 FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS 12 A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS 13 AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS 14 BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION ALGORITHM 15 CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION 16 CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDINGS 17 CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER 18 CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA 19 EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS 20 DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS 21 MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS 22 NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS 23 RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS 24 LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY 25 USING HASHTAG GRAPH-BASED TOPIC MODEL TO CONNECT SEMANTICALLY-RELATED WORDS WITHOUT CO-OCCURRENCE IN MICROBLOGS 26 QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS 27 PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY 28 SURVEY ON VIGILANCE OF INSTANT MESSAGES INSOCIAL NETWORKS USING TEXT MININGTECHNIQUES AND ONTOLOGY 29 A NOVEL PIPELINE APPROACH FOR EFFICIENT BIG DATA BROADCASTINGENTITY LINKING WITH A KNOWLEDGE BASE: ISSUES, TECHNIQUES, AND SOLUTIONS. 30 ENTITY LINKING WITH A KNOWLEDGE BASE ISSUES TECHNIQUES AND SOLUTIONS

9 31 SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY 32 LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES 33 A META-TOP-DOWN METHOD FOR LARGE-SCALE HIERARCHICAL CLASSIFICATION 34 SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY 35 ADVANCE MINING OF TEMPORAL HIGH UTILITY ITEMSET 36 SLICING A NEW APPROACH TO PRIVACY PRESERVING DATA PUBLISHING 37 FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS 38 DISEASE PREDICTION 39 FAST DATA RETRIEVAL FROM DATABASES BEYOND THE DATABASE DIMENSIONS 40 C-TREND: TEMPORAL CLUSTER GRAPHS FOR IDENTIFYING AND VISUALIZING TRENDS IN MULTI ATTRIBUTE TRANSACTIONAL DATA 41 A SIGNATURE-BASED INDEXING METHOD FOR EFFICIENT CONTENTBASED RETRIEVAL OF RELATIVETEMPORAL PATTERNS 42 HIDING SENSITIVE ASSOCIATION RULES WITH LIMITED SIDE EFFECTSEVENTUAL CLUSTERER: 43 A MODULAR APPROACH TO DESIGNING HIERARCHICAL CONSENSUS. IMAGE PROCESSING: 1 ONE-TIME PASSWORD FOR BIOMETRIC SYSTEMS: DISPOSABLE FEATURE TEMPLATES 2 EFFECTIVE AND EFFICIENT GLOBAL CONTEXT VERIFICATION FOR IMAGE COPY DETECTION 3 FACE RECOGNITION USING SPARSE FINGERPRINT CLASSIFICATION ALGORITHM 4 A NEW RULE FOR COST REASSIGNMENT IN ADAPTIVE STEGANOGRAPHY 5 PASSFRAME: GENERATING IMAGE-BASED PASSWORDS FROM EGOCENTRIC VIDEOS 6 ENHANCED PASSWORD PROCESSING SCHEME BASED ON VISUAL CRYPTOGRAPHY AND OCR 7 FINGERPRINT RECOGNITION OF YOUNG CHILDREN 8 FULLY INCREMENTING VISUAL CRYPTOGRAPHY FROM A SUCCINCT NON-MONOTONIC STRUCTURE 9 SOMEONE IN YOUR CONTACT LIST: CUED RECALL-BASED TEXTUAL PASSWORDS 10 PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDS 11 A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM 12 SINGLE SAMPLE FACE RECOGNITION BASED ON LPP FEATURE TRANSFER

10 13 REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON PROGRESSIVE RECOVERY 14 REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE WITH DISTRIBUTED SOURCE ENCODING 15 A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION 16 A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS 17 LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH 18 ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL 19 TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING 20 AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES 21 SUPER RESOLUTION BASED INPAINTING 22 2D IMAGE MORPHING 23 NOISE REDUCTION BY FUZZY IMAGE FILTERING 24 FACE RECOGNITION USING EIGEN VALUES 25 NOISE REDUCTION BY USING FUZZY IMAGE FILTERING ANDROID : 1 A CLASSROOM SCHEDULING SERVICE FOR SMART CLASSES 2 COOPERATIVE QUERY ANSWER AUTHENTICATION SCHEME OVER ANONYMOUS SENSING DATA 3 GEOMOB A GEO LOCATION BASED BROWSER FOR SECURED MOBILE BANKING 4 KNOWLEDGE-ENHANCED MOBILE VIDEO BROADCASTING (KMV-CAST) FRAMEWORK WITH CLOUD SUPPORT 5 EFFICIENT AND PRIVACY-PRESERVING MIN AND K-TH MIN COMPUTATIONS IN MOBILE SENSING SYSTEMS 6 A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING 7 PRIVACY-PRESERVING LOCATION-PROXIMITY FOR MOBILE APPS 8 MONET: A USER-ORIENTED BEHAVIOR-BASED MALWARE VARIANTS DETECTION SYSTEM FOR ANDROID 9 EFFICIENT MULTI-FACTOR AUTHENTICATED KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS 10 MY PRIVACY MY DECISION: CONTROL OF PHOTO SHARING ON ONLINE SOCIAL NETWORKS 11 P-LINT: A PERMISSION SMELL DETECTOR FOR ANDROID APPLICATIONS 12 SEARCHING TRAJECTORIES BY REGIONS OF INTEREST

11 13 ZAPDROID: MANAGING INFREQUENTLY USED APPLICATIONS ON SMARTPHONES 14 PRIVACY AND SECURE MEDICAL DATA TRANSMISSION AND ANALYSIS FOR WIRELESS SENSING HEALTHCARE SYSTEM 15 DUMMY-BASED USER LOCATION ANONYMIZATION UNDER REAL WORLD CONSTRAINTS 16 SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES 17 MOBILE ATTENDANCE USING NEAR FIELD COMMUNICATION AND ONE-TIME PASSWORD 18 CONTEXT-AWARE MOBILE CLOUD COMPUTING AND ITS CHALLENGES 19 STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS ANDROID BASED APPLICATION : 1 ANDROID MEETS LED BULBS IN SMART-HOME AUTOMATION. 2 GREEN HOUSE MONITORING AND CONTROL USING SMART PHONE. 3 ANDROID BASED DEVICE CONTROL. 4 ANDROID BASED HOME AUTOMATION.

PROJECT LIST

PROJECT LIST Real time training provided by experts from Microsoft,VMware & Top MNCs. Complete corporate style of training and 100% clean working projects Contact :9738928926 Website :www.hopelight.in Address : MG

More information

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST 2017-18 IEEE 2017-18 SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST TECHNOFIST a leading academic project s providing company established in Bangalore since 2007. With perfect infrastructure,

More information

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST IEEE 2017-18 2017-18 SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST TECHNOFIST a leading academic project s providing company established in Bangalore since 2007. With perfect infrastructure,

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

IEEE 2017 SOFTWARE PROJECT TITLES

IEEE 2017 SOFTWARE PROJECT TITLES 2017 IEEE 2017 SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST TECHNOFIST a leading academic project s providing company established in Bangalore since 2007. With perfect infrastructure,

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

IEEE Project Titles

IEEE Project Titles www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification

More information

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword

More information

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions DATA MINING 1. ITDDM01 Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowd sourcing 2. ITDDM02 An Approach for Building Efficient and Accurate Social Recommender Systems using Individual

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Latest IEEE IOT based projects

Latest IEEE IOT based projects Latest IEEE 2017-18 IOT based projects 1) BLIND AID STICK: HURDLE RECOGNITION, SIMULATED PERCEPTION, ANDROID INTEGRATED VOICE BASED COOPERATION VIA GPS ALONG WITH PANIC ALERT SYSTEM Evolution of technology

More information

NET M.TECH IEEE TITLES

NET M.TECH IEEE TITLES 2017 2018.NET M.TECH IEEE TITLES S.NO TITLES DOMAIN 1. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories 2. Securing Aggregate Queries For DNA Databases 3. Fast Phrase Search

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015-2016 JAVA IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 JAVA Project Titles Domain Lang/Year 1 JPJ1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 JPJ1502 A

More information

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2017-2018 JAVA IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2017-18 JAVA Project Titles Domain Lang/Year 1 JPJ1701 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal

More information

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc IEEE REAL TIME PROJECTS& TRAINING GUIDE SOFTWARE & EMBEDDED www.makefinalyearproject.com PROJECTS TITLES FOR ACADEMIC YEAR 2018-2019 #19, MN Complex,

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects NCCT SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS in various Domains Latest Projects #109, 2 nd Floor, Bombay Flats, Nungambakkam High Road Nungambakkam High Road, Chennai 600034 Above IOB, Next

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company) Intranet Mailing System Intrusion Detection System M-banking Mobi-Thesaurus Mobile Video Archive Mobile i Broker Android Projects Mobiminder: Location Based Reminder on Mobiles Mobi Travel Guide Friend

More information

JAVA M.TECH IEEE TITLES

JAVA M.TECH IEEE TITLES 2017 2018 JAVA M.TECH IEEE TITLES S.NO TITLES DOMAIN 1. Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers 2. A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

Elysium Technologies Private Limited::IEEE Final year Project

Elysium Technologies Private Limited::IEEE Final year Project Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM List of Seminars SE 1 SE 2 SE 3 SE 4 SE 5 SE 6 SE 7 SE 8 SE 9 SE 10 SE 11 SE 12 SE 13 SE 14 SE 15 SE 16 SE 17 SE 18 SE 19 SE 20 SE 21 SE 22 SE 23 SE 24 SE 25 SMS ENCRYPTION Cloud Computing Learning A KEYLESS

More information

EMBEDDED SYSTEMS 2017 IEEE PROJECT

EMBEDDED SYSTEMS 2017 IEEE PROJECT EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

Privacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S.

Privacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S. Chapman & Hall/CRC Data Mining and Knowledge Discovery Series Introduction to Privacy-Preserving Data Publishing Concepts and Techniques Benjamin C M Fung, Ke Wang, Ada Wai-Chee Fu, and Philip S Yu CRC

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

JAVA IEEE Android Projects

JAVA IEEE Android Projects 1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World Constraints Abstract: According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,

More information

Android Application Project

Android Application Project Android Application Project Our Project Domains Android Application Cloud Computing Web Security IoT Data Mining / Web Mining BigData Hadoop Networking Arduino Image Processing Raspberry Pi Embedded Arduino

More information

Sl.No Project Title Year

Sl.No Project Title Year Sl.No Project Title Year WSN(Wireless Sensor ) 1 Distributed Topology Control With Lifetime Extension Based on Non-Cooperative Game for Wireless Sensor 2 Intercept Behavior Analysis of Industrial Wireless

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

B.TECH/M.TECH MINOR/MAJOR PROJECT

B.TECH/M.TECH MINOR/MAJOR PROJECT 1 B.TECH/M.TECH MINOR/MAJOR PROJECT CSE/IT Project list of JAVA/ANDROID: New Patient Registry Management system MySQL Database Management Using Java Restaurant Billing Management System Library Management

More information

Contents. Part I Setting the Scene

Contents. Part I Setting the Scene Contents Part I Setting the Scene 1 Introduction... 3 1.1 About Mobility Data... 3 1.1.1 Global Positioning System (GPS)... 5 1.1.2 Format of GPS Data... 6 1.1.3 Examples of Trajectory Datasets... 8 1.2

More information

Networking Cyber-physical Applications in a Data-centric World

Networking Cyber-physical Applications in a Data-centric World Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday

More information

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin

More information

WEB APPLICATION. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

WEB APPLICATION. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System 2016-2017 APPLICATION Projects @ JP infotech S.NO Project Code 2016-2017 APPLICATION PROJECT Titles Type Coding Lang. WEB APPLICATION 1 JPJA1601 Airline Reservation System 2 JPJA1602 Building web applications

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Securing Multiple Mobile Platforms

Securing Multiple Mobile Platforms Securing Multiple Mobile Platforms CPU-based Multi Factor Security 2010 Security Workshop ETSI 2010 Security Workshop Navin Govind Aventyn, Inc. Founder and CEO 1 Mobile Platform Security Gaps Software

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc IEEE REAL TIME PROJECTS& TRAINING GUIDE SOFTWARE & EMBEDDED www.makefinalyearproject.com PROJECTS TITLES FOR ACADEMIC YEAR 2018-2019 #19, MN Complex,

More information

A Cloud Based Intrusion Detection System For Android Smartphones

A Cloud Based Intrusion Detection System For Android Smartphones A Cloud Based Intrusion Detection System For Android Smartphones malware and their most indicative features based on (1) the simulation of known A cloud-based intrusion detection system that relies on

More information

An Implementation of Fog Computing Attributes in an IoT Environment

An Implementation of Fog Computing Attributes in an IoT Environment An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into

More information

Multimedia Security: So What s the Big Deal?

Multimedia Security: So What s the Big Deal? Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:

More information

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY?

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in

More information

New Trends in Database Systems

New Trends in Database Systems New Trends in Database Systems Ahmed Eldawy 9/29/2016 1 Spatial and Spatio-temporal data 9/29/2016 2 What is spatial data Geographical data Medical images 9/29/2016 Astronomical data Trajectories 3 Application

More information

Innovative M-Tech projects list IEEE papers

Innovative M-Tech projects list IEEE papers Innovative M-Tech projects list IEEE-2013-14 papers 1. Analysis and Practical Considerations in Implementing Multiple Transmitters for Wireless Power Transfer via Coupled Magnetic Resonance (IEEE 2014)

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING

INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING CS 7265 BIG DATA ANALYTICS INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING * Some contents are adapted from Dr. Hung Huang and Dr. Chengkai Li at UT Arlington Mingon Kang, PhD Computer Science,

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan Vehicular Cloud Computing: A Survey Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan OUTLINE OF TOPICS INTRODUCETION AND MOTIVATION TWO-TIER VEHICULAR

More information

About Me. Bio: Research Interests:

About Me. Bio: Research Interests: About Me Bio: Sr. Staff Researcher, Core Networks R&D, Huawei Tech USA, 2010.10~ to date Asst Prof, HK Polytechnic Univ, CTO, Mudi Tech, 2008.04~2010.09 Senior, Senior Staff, and then Principal Staff Researcher,

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Sybil Attack Detection in Mobile Adhoc Network

Sybil Attack Detection in Mobile Adhoc Network Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

More information

Big Data Using Hadoop

Big Data Using Hadoop IEEE 2016-17 PROJECT LIST(JAVA) Big Data Using Hadoop 17ANSP-BD-001 17ANSP-BD-002 Hadoop Performance Modeling for JobEstimation and Resource Provisioning MapReduce has become a major computing model for

More information

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Hybrid Communication CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Contents Project Overview Hybrid Communication Concepts Services Enabled by Hybrid Communication

More information

MODAInnovations Complete Academic Project Solutions

MODAInnovations Complete Academic Project Solutions MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

System Support for Internet of Things

System Support for Internet of Things System Support for Internet of Things Kishore Ramachandran (Kirak Hong - Google, Dave Lillethun, Dushmanta Mohapatra, Steffen Maas, Enrique Saurez Apuy) Overview Motivation Mobile Fog: A Distributed

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Innovative M-Tech projects list

Innovative M-Tech projects list 1 Technologies: Innovative M-Tech projects list 1. ARM-7 TDMI - LPC-2148 2. Image Processing 3. MATLAB Embedded 4. GPRS Mobile internet 5. Touch screen. IEEE 2012-13 papers 6. Global Positioning System

More information

CSE / IT IEEE PROJECT LIST

CSE / IT IEEE PROJECT LIST CSE / IT IEEE 2014 PROJECT LIST DOMAIN: CLOUD COMPUTING DOT NET 1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud - 2)

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information