Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

1) Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews

2) Privacy Preservation of Mobile Users


3) Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm
4) User Behaviour Prediction of Social Hotspots Based on Multimessage Interaction and
Neural Network
5) DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
6) Med-Donate
7) Private and Secured Medical Data Transmission and Analysis for Wireless Sensing
Healthcare
8) A Disruption Tolerant Architecture based on MQTT for IoT Applications
9) Agent Based Biometric Authentication Mechanism to Ensure Functionality and
Comparing with AES Algorithm to Access the Cloud in a Secured Environment
10) An Approach for Enhancing Security of Cloud Data using Cryptography and
Steganography with E-LSB Encoding Technique
11) Sarcasm Detection Based on Text & Emoticons
12) Online Student Lecturer Communication App
13) Enhancing Cyber Security in Modern Internet of things (IoT) Using Intrusion Prevention
Algorithm for IoT (IPAI)
14) A Novel Clustering Technique for Efficient Clustering of Big Data in Hadoop Ecosystem
15) Paperless Office
16) Spammer Identification in Social networks based on Gaussian Mixture model
17) A Secure G-Cloud-Based Framework for Government Healthcare Services
18) ANALYSIS OF ANDROID APPLICATIONS USING BIG DATA ANALYTICS
19) Fast and Communication-Efficient Algorithm for Distributed Support Vector Machine
Training
20) A Credibility Analysis System for Assessing Information on Twitter
21) Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus
Mechanism
22) Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
23) Distributed Channel Access, Relay Selection and Time Assignment for QoE-Aware
Relay Networks

You might also like