This document lists 23 potential research paper topics related to various domains including security, privacy, cloud computing, healthcare, social networks, big data, internet of things, and machine learning. The topics focus on issues like extremist groups, privacy preservation, secure file storage, user behavior prediction, performance and security in cloud computing, medical data transmission, disruption tolerant architectures, biometric authentication, cryptography techniques, sarcasm detection, online communication apps, intrusion prevention algorithms, clustering big data, paperless offices, spam identification, government healthcare services, android app analysis, distributed machine learning, assessing information credibility, blockchain systems, IP traceback, and quality of experience in relay networks.
This document lists 23 potential research paper topics related to various domains including security, privacy, cloud computing, healthcare, social networks, big data, internet of things, and machine learning. The topics focus on issues like extremist groups, privacy preservation, secure file storage, user behavior prediction, performance and security in cloud computing, medical data transmission, disruption tolerant architectures, biometric authentication, cryptography techniques, sarcasm detection, online communication apps, intrusion prevention algorithms, clustering big data, paperless offices, spam identification, government healthcare services, android app analysis, distributed machine learning, assessing information credibility, blockchain systems, IP traceback, and quality of experience in relay networks.
This document lists 23 potential research paper topics related to various domains including security, privacy, cloud computing, healthcare, social networks, big data, internet of things, and machine learning. The topics focus on issues like extremist groups, privacy preservation, secure file storage, user behavior prediction, performance and security in cloud computing, medical data transmission, disruption tolerant architectures, biometric authentication, cryptography techniques, sarcasm detection, online communication apps, intrusion prevention algorithms, clustering big data, paperless offices, spam identification, government healthcare services, android app analysis, distributed machine learning, assessing information credibility, blockchain systems, IP traceback, and quality of experience in relay networks.
1) Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
2) Privacy Preservation of Mobile Users
3) Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm 4) User Behaviour Prediction of Social Hotspots Based on Multimessage Interaction and Neural Network 5) DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security 6) Med-Donate 7) Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare 8) A Disruption Tolerant Architecture based on MQTT for IoT Applications 9) Agent Based Biometric Authentication Mechanism to Ensure Functionality and Comparing with AES Algorithm to Access the Cloud in a Secured Environment 10) An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique 11) Sarcasm Detection Based on Text & Emoticons 12) Online Student Lecturer Communication App 13) Enhancing Cyber Security in Modern Internet of things (IoT) Using Intrusion Prevention Algorithm for IoT (IPAI) 14) A Novel Clustering Technique for Efficient Clustering of Big Data in Hadoop Ecosystem 15) Paperless Office 16) Spammer Identification in Social networks based on Gaussian Mixture model 17) A Secure G-Cloud-Based Framework for Government Healthcare Services 18) ANALYSIS OF ANDROID APPLICATIONS USING BIG DATA ANALYTICS 19) Fast and Communication-Efficient Algorithm for Distributed Support Vector Machine Training 20) A Credibility Analysis System for Assessing Information on Twitter 21) Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism 22) Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter 23) Distributed Channel Access, Relay Selection and Time Assignment for QoE-Aware Relay Networks