0% found this document useful (0 votes)
76 views11 pages

It & Cse Projects

The document contains abstracts from papers across several domains: big data, cloud computing, data mining, network security, networking, machine learning, software engineering, and cognitive radio networks. Specifically, it provides short 1-2 sentence summaries of papers related to these topics without providing full details on the papers' content or conclusions.

Uploaded by

Sanjay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views11 pages

It & Cse Projects

The document contains abstracts from papers across several domains: big data, cloud computing, data mining, network security, networking, machine learning, software engineering, and cognitive radio networks. Specifically, it provides short 1-2 sentence summaries of papers related to these topics without providing full details on the papers' content or conclusions.

Uploaded by

Sanjay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

BIG DATA

1. Robust Big Data Analytics for Electricity Price Forecasting in the Smart Grid
2. Searchable and Verifiable Data Protection Scheme for Scholarly Big Data
3. Handling Big Data Using a Data-Aware HDFS and Evolutionary Clustering Technique
4. Transfer to Rank for Top-N Recommendation
5. T-PCCE: Twitter Personality based Communicative Communities Extraction System for
Big Data
6. Collaboratively Tracking Interests for User Clustering in Streams of Short Texts
7. Lightweight Indexing and Querying Services for Big Spatial Data
8. Maximum Data-resolution Efficiency for Fog-Computing Supported Spatial Big Data
Processing in Disaster Scenarios
9. CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
10. Deep Irregular Convolutional Residual LSTM for Urban Traffic Passenger Flows
Prediction
11. Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data
12. PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing

CLOUD COMPUTING

1. Key Management Scheme for Secure Channel Establishment in Fog Computing


2. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword
Guessing Attacks for Cloud Storage
3. Privacy Preserving Searchable Encryption with Finegrained Access Control
4. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information
Hiding for Secure Cloud Storage
5. Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of
Things
6. Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
7. Two-Server Delegation of Computation on Label- Encrypted Data
8. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud
Computing
9. Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
10. Block chain-Based Public Integrity Verification for Cloud Storage against Procrastinating
Auditors
11. Outsourced Decentralized Multi-authority Attribute Based Signature and Its Application
in IOT

DATA MINING

1. Achieving Data Truthfulness and Privacy Preservation in Data Markets


2. Multi-Party High-Dimensional Data Publishing under Differential Privacy
3. Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based
Recommendation
4. Member Behavior in Dynamic Online Communities: Role Affiliation Frequency Model
5. Real-Time Ambulance Redeployment: A Data-Driven Approach
6. Secure and Efficient Skyline Queries on Encrypted Data
7. Voice of Charity: Prospecting the Donation Recurrence & Donor Retention in
Crowdfunding
8. Finding Optimal Skyline Product Combinations under Price Promotion
9. Privacy-Preserving User Profile Matching in Social Networks
10. Trust Relationship Prediction in Alibaba E-Commerce Platform
11. CMBPR: Category-Aided Multi-Channel Bayesian Personalized Ranking for Short Video
Recommendation
12. STPR: A Personalized Next Point-of-Interest Recommendation Model with Spatio-
Temporal Effects Based on Purpose Ranking
13. Senti Diff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter
Sentiment Analysis
14. Translation-Based Sequential Recommendation for Complex Users on Sparse Data
15. Cleaning Data with Forbidden Item sets
16. Predicting Consumption Patterns with Repeated and Novel Events
17. Exploring Hierarchical Structures for Recommender Systems
18. Structure Based User Identification across Social Networks
19. Leveraging Conceptualization for Short-Text Embedding
20. A Topic Modeling Approach for Traditional Chinese Medicine Prescriptions
21. Authenticating Aggregate Queries over Set-Valued Data with Confidentiality
22. RNN-DBSCAN: A Density-based Clustering Algorithm using Reverse Nearest Neighbor
Density Estimates
23. Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data
24. A Comprehensive Study on Social Network Mental Disorders Detection via Online
Social Media Mining
25. MetaFlow: a Scalable Metadata Lookup Service for Distributed File Systems in Data
Centers
26. Local and Global Structure Preservation for Robust Unsupervised Spectral Feature
Selection
27. A Novel Association Rule Mining Method of Big Data for Power Transformers State
Parameters Based on Probabilistic Graph Model
28. Using Data Mining to Predict Hospital Admissions from the Emergency Department
29. Corporate Communication Network and Stock Price Movements: Insights From Data
Mining
30. Frequent Itemsets Mining with Differential Privacy over Large-scale Data
31. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis
32. Answering Natural Language Questions by Subgraph Matching over Knowledge Graphs
33. Workload Management in Database Management Systems: A Taxonomy
34. Ultra High-Dimensional Nonlinear Feature Selection for Big Biological Data
35. Credit Card Fraud Detection Using AdaBoost and Majority Voting
36. Adversarial Deep Learning Models with Multiple Adversaries
37. Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables
38. Block Design-based Key Agreement for Group Data Sharing in Cloud Computing
NETWORK SECURITY

1. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information
Hiding for Secure Cloud Storage
2. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud
Storage
3. Anonymous Single Sign-on with Proxy Re-Verificationorithm Based on Traffic
Prediction
4. Secure Key Agreement and Key Protection for Mobile Device User Authentication
5. A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and
Lightweight Cryptographic Algorithms
6. Authentication by Encrypted Negative Password
7. Enabling Efficient and Geometric Range Query With Access Control Over Encrypted
Spatial Data
8. Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authentication
in VANETs
9. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information
Hiding for Secure Cloud Storage.
10. Secure Key Agreement and Key Protection for Mobile Device User Authentication.
11. Private Link: Privacy-Preserving Integration and Sharing of Datasets
12. LPPA: Lightweight Privacy-preserving Authentication from Efficient Multi-key Secure
Outsourced Computation for Location-based Services in VANETSL
13. Secure Approximate String Matching for Privacy-Preserving Record Linkage
14. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud
Storage.
15. Trust-Based Collaborative Privacy Management in Online Social Networks
16. Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search
Engine
17. Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in
Social Networks
NETWORKING

1. Optimal File Dissemination and Beam forming for Cache-Enabled C-RANs


2. Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network
3. Secure and Efficient Privacy-Preserving Cipher text Retrieval in Connected Vehicular
Cloud Computing
4. Integrated Authentication and Key Agreement Framework for Vehicular Cloud
Computing
5. Multi-Context Integrated Deep Neural Network Model for Next Location Prediction
6. Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With
the Named Data Architecture
7. A Service-Oriented Deployment Policy of End-to-End Network Slicing Based on
Complex Network Theory
8. TDMA-Based Cooperative NC MAC Scheme for Two-Way Relaying Networks
9. Localized Fault Tolerant and Connectivity Restoration Algorithms in Mobile Wireless
Ad Hoc Network
10. QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor
Networks

MACHINE LEARNING

1. Automatic Question Tagging with Deep Neural Networks


2. Detecting Malicious Social Bots Based on Click stream Sequences
3. Collaborative Filtering-based Electricity Plan Recommender System
4. Leveraging Product Characteristics for Online Collusive Detection in Big Data
Transactions
5. New Development of Online Retail in China and the Associated (Accounting) Challenges
6. Real-Time Change Point Detection with application to Smart Home Time Series Data
SOFTWARE ENGINEERING

1. Employee Management and Work Performance Measurement System


2. Intelligent Detection for Cyber Phishing Attacks using Fuzzy Rule-Based System
3. Smart Public Transport System Using Android Application
4. A Study on Association Rule Mining Algorithms Used in Web Usage Mining
5. BSIOTR Info: An Android Application for College Campus
6. Vehicle Repair and Puncture Service App
7. Optimal Solution for Searching Availability of Blood in Blood Banks using Smart Blood
Finder App
8. Company Entrance Surveillance System
9. Web Based Question Paper Setting System Satisfying Predefined Course Outcomes
10. PHP Syntactic Analyser and Comparer with Document Comparison
11. Smart Health Monitoring System with IOT
12. Path Sensitive Static Analysis of Taint-Style Vulnerabilities in PHP Code
13. PHP Vulnerability Detection Based on Taint Analysis
14. Intelligent and Smart Traffic and Transportation System for Modernization of Cities
15. Design and Implementation of Improved System for College Automation and
Management
16. Design and Implementation of Prototype of Underwater Submarine for Surveillance by
Using GSM Technology
17. A Survey on Entity Extraction from the Web Pages Methodology and Application
18. Online Toll Payment System Based on Optical Character Recognition
19. Designing Autonomous and Dynamic Algorithm for Intelligent Public Transportation
Management System
20. A Web App for Interactive Coding Challenge
COGNITIVE RADIO NETWORK

1. A Contention-Free Reporting Scheme Based MAC Protocol for Cooperative Spectrum


Sensing in Cognitive Radio Networks
2. Maximizing Cognitive Radio Networks Throughput Using Limited Historical Behavior
of Primary Users
3. RARE: A Spectrum Aware Cross-Layer MAC Protocol for Cognitive Radio Ad-Hoc
Networks
4. TDMA-Based Cooperative NC MAC Scheme for Two-Way Relaying Networks
5. Joint Resource Allocation for Wireless Energy Harvesting Enabled Sensor Networks

HETEROGENEOUS NETWORK

1. Green Heterogeneous Networks via an Intelligent Sleep/Wake-up Mechanism and D2D


Communications

MANET

1. An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in


MANETs
2. Retransmission DBTMA Protocol with Fast Retransmission Strategy to Improve the
Performance of MANETs
3. Socially Aware Trust Framework for Multimedia Delivery in D2D Cooperative
Communication

NETWORK SECURTIY

1. Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack


2. Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for
Mobile Ad-Hoc Networks in Industrial IOT
3. Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor
Networks
4. Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor
Networks for Networked Systems
5. A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical
Network
6. A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless
Sensor Networks

VANET

1. An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular


Ad Hoc Networks
2. An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and
Associated Reliable Routing Scheme
3. An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
4. Efficient Data Dissemination for Urban Vehicular Environments
5. On the End-to-End Delay in a One-Way VANET
6. Kalman Prediction-Based Neighbor Discovery and Its Effect on Routing Protocol in
Vehicular Ad Hoc Networks
7. A Concurrent Transmission Based Broadcast Scheme for Urban VANETs
8. Building Scalable Cyber-Physical-Social Networking Infrastructure Using IOT and Low
Power Sensors
9. Bidirectional LiFiAttocell Access Point Slicing Scheme
10. SLIDE: A Straight Line Conflict Detection and Alerting Algorithm for Multiple
Unmanned Aerial Vehicles
11. Efficient Access Control for Broadband Power Line Communications in Home Area
Networks
12. SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined
Networks
13. Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With
the Named Data Architecture
14. SDN-Enabled Social-Aware Clustering in 5G-VANET Systems
15. TMED: A Spider Web-Like Transmission Mechanism for Emergency Data in Vehicular
Ad Hoc Networks
16. Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular
Ad hoc Networks
17. Efficient Privacy-preserving Scheme for Real-time Location Data in Vehicular Ad-hoc
Network
18. Real-Time Path Planning in Urban Area via VANET-Assisted Traffic Information
Sharing

WIRELESS SENSOR NETWORK

1. An efficient WSN based solution for border surveillance


2. A Wake-Up Radio-Based MAC Protocol for Autonomous Wireless Sensor Networks
3. CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless
Sensor Networks Using Multi-Sinks
4. A Robust Load Balancing and Routing Protocol for Intra-Car Hybrid Wired/Wireless
Networks
5. Robust Targets Coverage for Energy Harvesting Wireless Sensor Networks
6. Joint Position and Travel Path Optimization for Energy Efficient Wireless Data
Gathering Using Unmanned Aerial Vehicles
7. A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
8. Prediction-Based Delay Optimization Data Collection Algorithm for Underwater
Acoustic Sensor Networks
9. A Wake-Up Radio-Based MAC Protocol for Autonomous Wireless Sensor Networks
10. Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Mobility-Assisted
Localization in Wireless Sensor Networks
11. A Side lobe and Energy Optimization Array Node Selection Algorithm for Collaborative
Beamforming in Wireless Sensor Networks
12. Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks
13. Wireless Power Transfer and Data Collection in Wireless Sensor Networks
14. Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless
Sensor Networks
15. Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless
Sensor Networks
16. A Cooperative Clustering Protocol With Duty Cycling for Energy Harvesting Enabled
Wireless Sensor Networks
17. HE-MAC: Harvest-Then-Transmit Based Modified EDCF MAC Protocol for Wireless
Powered Sensor Networks
18. Hierarchical Clustering-Task Scheduling Policy in Cluster-Based Wireless Sensor
Networks
19. Energy Aware Multi-Hop Routing Protocol for WSNs
20. A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs
21. Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks

IOT

1. Smart Poultry Farm Incorporating GSM and IOT


2. System Designing and Plototyping on IOT for a Factory
3. IOT Based Poultry House Monitoring
4. An Educational IOT-based Indoor Environment Monitoring System
5. Web Monitoring And Speed Control Of Solar Based Bldc Motor With IOT
6. Fish Talk: An IOT-Based Mini Aquarium System
7. Design and Implementation of an IOT based Automated Agricultural Monitoring and
Control System
8. Development of Smart Cooking Stove: Harvesting Energy from the Heat, Gas Leakage
Detection and IOT Based Notification System
9. Designing and Implementing Resilient IOT Applications in the Fog: A Smart Home Use
Case
10. A Smart Home Automation and Metering System using Internet of Things (IOT)
11. Smart Water Management in Agricultural Land Using IOT
12. IOT Based Express-Lanes for Autonomous Vehicle
13. Smart Water Management System using the Microcontroller ZR16S08 as IOT Solution
14. A low-cost monitoring system for maximum power point of a photovoltaic system using
IOT technique
15. IOT and CloudBased Energy Monitoring and Simulation Platform
16. The development of IOT-wetting front detector (IOT-WFD) for efficient Irrigation
management and decision support system
17. Green Resource Allocation based on Deep Reinforcement Learning in Content-Centric
IOT
18. An IOT-based Sag Monitoring System for Overhead Transmission Lines
19. Privacy Ensured e-Healthcare for Fog-Enhanced IOT Based Applications
20. Smart Waste Collection Monitoring and Alert System via IOT
21. Infrastructure Monitoring and Operation for Smart Cities based on IOT system
22. Analysis of Smart helmets and Designing an IOT based smart helmet: A cost effective
solution for Riders
23. A Voice Based One Step Solution for Bulk IOT Device Onboarding
24. Design of a Two-Tier WSN-based IOT Surveillance System with Cloud Integration
25. IOT Application for Real-Time Monitoring of Solar Home Systems Based on Arduino
26. Smart Contract-Based Access Control for the Internet of Things
27. Internet of Things Monitoring System of Modern Eco-Agriculture Based on Cloud
Computing
28. Improving supply chain visibility using IOT-internet of things
29. A Combination of Astable Multivibrator and Microcontroller for Thermistor-Based
Temperature Measurement Over Internet
30. Forest Fire Alerting System With GPS Co-ordinates Using IOT
31. Real Time Bus Tracking and Location Updation System
32. An Automated Waste Control Management System (AWCMS) by Using Arduino
33. Smart Power Monitoring System Using IOT
34. Gas Level Detection and Automatic Booking Using IOT
35. Charging Station for E-Vehicle using Solar with IOT
36. Investigation on Carbon Monoxide Monitoring and Alert System for Vehicles
37. IOT-based Intelligent Waste Bin

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy