Cloud computing
Branch: Computer Science
Topic: cloud computing
Python | |||
DST KT C 01 | Point-of-interest Recommendation for Location Promotion in Location-based Social Networks | 2018 | |
DST KT C 02 | Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests | 2018 | |
DST KT C 03 | Computer Vision and Machine Learning for Viticulture Technology | 2018 | |
DST KT C 04 | A novel method for implementing Artificial Intelligence, Cloud and Internet of Things in Robots | 2018 | |
DST KT C 05 | The ODNI-OUSD(I) Xpress Challenge: An Experimental Application of Artificial Intelligence Techniques to National Security Decision Support | 2018 | |
DST KT C 06 | Artificial Intelligence, Rationality, and the World Wide Web | 2018 | |
DST KT C 07 | Data Classification with Deep Learning using Tensorflow | 2017 | |
Cloud Computing | |||
DST KT C 01 | Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage | 2018 | |
DST KT C 02 | Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN and Priority | 2018 | |
DST KT C 03 | A Hierarchical Receding Horizon Algorithm for QoS-driven control of Multi-IaaS Applications | 2018 | |
DST KT C 04 | Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data | 2018 | |
DST KT C 05 | Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data | 2018 | |
DST KT C 06 | Karma: Cost-effective Geo-replicated Cloud Storage with Dynamic Enforcement of Causal Consistency | 2018 | |
DST KT C 07 | RIAL: Resource Intensity Aware Load Balancing in Clouds | 2017 | |
DST KT C 08 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | 2016 | |
DST KT C 09 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing | 2016 | |
DST KT C 010 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | 2015 | |
DST KT C 011 | Provable Multicopy Dynamic Data Possession in Cloud Computing Systems | 2015 | |
DST KT C 012 | Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds | 2014 | |
DST KT C 013 | PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System | 2014 | |
DST KT C 014 | Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation | 2014 | |
DST KT C 015 | Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage | 2014 | |
DST KT C 016 | A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud | 2013 | |
DST KT C 017 | CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring | 2013 | |
DST KT C 018 | QoS Ranking Prediction for Cloud Services | 2013 | |
DST KT C 019 | A Load Balancing Model Based on Cloud Partitioning for the Public Cloud | 2013 | |
DST KT C 020 | Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption | 2013 | |
Data Mining | |||
DST KT C 01 | Untangling Blockchain: A Data Processing View of Blockchain Systems | 2018 | |
DST KT C 02 | Correlated Matrix Factorization for Recommendation with Implicit Feedback | 2018 | |
DST KT C 03 | Collaborative Filtering Algorithm Based on Rating Difference and User Interest | 2018 | |
DST KT C 04 | A Framework for Real-Time Spam Detection in Twitter | 2018 | |
DST KT C 05 | NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media | 2018 | |
DST KT C 06 | Heterogeneous Information Network Embedding for Recommendation | 2018 | |
DST KT C 07 | Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design | 2018 | |
DST KT C 08 | FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data | 2017 | |
DST KT C 09 | An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques | 2017 | |
DST KT C 010 | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | 2017 | |
DST KT C 011 | Analysis of users’ behaviour in structured e-commerce websites | 2017 | |
DST KT C 012 | Location Aware Keyword Query Suggestion Based on Document Proximity | 2016 | |
DST KT C 013 | Top-Down XML Keyword Query Processing | 2016 | |
DST KT C 014 | Nearest Keyword Set Search in Multi-Dimensional Datasets | 2016 | |
DST KT C 015 | DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud | 2016 | |
DST KT C 016 | A Novel Recommendation Model Regularized with User Trust and Item Ratings | 2016 | |
DST KT C 017 | Resolving Multi-Party Privacy Conflicts in Social Media | 2016 | |
Networking & Network Security | |||
DST KT C 01 | Information Network Risk Assessment Based on AHP and Neural Network | 2018 | |
DST KT C 02 | Mining network stream data for self learning networks | 2018 | |
DST KT C 03 | A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks | 2018 | |
DST KT C 04 | ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN | 2017 | |
DST KT C 05 | A Stable Approach for Routing Queries in Unstructured P2P Networks | 2016 | |
DST KT C 06 | Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks | 2015 | |
DST KT C 07 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | 2015 | |
DST KT C 08 | Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks | 2015 | |
DST KT C 09 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | 2015 | |
DST KT C 010 | Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design | 2015 | |
Big Data | |||
DST KT C 01 | Cloud Centric Authentication for Wearable Healthcare Monitoring System | 2018 | |
DST KT C 02 | Logic Bug Detection and Localization Using Symbolic Quick Error Detection | 2018 | |
DST KT C 03 | Map Reduce Programming Model for Parallel K-Mediod Algorithm on Hadoop Cluster | 2018 | |
DST KT C 04 | Research on Reliability Evaluation of Big Data System | 2018 | |
DST KT C 05 | Smart Governance through Big data: Digital Transformation of Public Agencies | 2018 | |
DST KT C 06 | Online Data Deduplication for In-Memory Big-Data Analytic Systems | 2017 | |
DST KT C 07 | Big Data Set Privacy Preserving through Sensitive Attribute-based Grouping | 2017 | |
DST KT C 08 | Designing Self-Tuning Split-Map-Merge Applications for High Cost-Efficiency in the Cloud | 2017 | |
DST KT C 09 | H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jobs | 2016 | |
DST KT C 010 | A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment | 2016 | |
DST KT C 011 | A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud | 2015 | |
DST KT C 012 | Data Mining with Big Data | 2014 | |
DST KT C 013 | A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud | 2014 | |
Mobile Computing | |||
DST KT C 01 | Advanced Query Processing and its Optimization for Mobile Computing Environment | 2018 | |
DST KT C 02 | Mobile Privacy Protection Enhanced with Multi-access Edge Computing | 2018 | |
DST KT C 03 | Energy Consumption in Hand-Held Mobile Communication Devices: A Comparative Study | 2018 | |
DST KT C 04 | Hotspot-based Resource Sharing System for Mobile Ad hoc Networks | 2018 | |
DST KT C 05 | Effect of Queueing Delay and Service Discrimination on Offloading Performance in Two-Class Mobile Edge Computing Systems | 2018 | |
DST KT C 06 | Wormhole Attack Detection Algorithms in Wireless Network Coding Systems | 2015 | |
DST KT C 07 | User-Defined Privacy Grid System for Continuous Location-Based Services | 2015 | |
DST KT C 08 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | 2015 | |
Secure Computing | |||
DST KT C 01 | Privacy Protection for Wireless Medical Sensor Data | 2016 | |
DST KT C 02 | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 2016 | |
DST KT C 03 | Data Lineage in Malicious Environments | 2016 | |
DST KT C 04 | A Computational Dynamic Trust Model for User Authorization | 2015 | |
DST KT C 05 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | 2015 | |
DST KT C 06 | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers | 2015 | |
Web Application | |||
DST KT C 01 | Travel and Tourism Management System | Non-IEEE | |
DST KT C 02 | Car Pooling | Non-IEEE | |
DST KT C 03 | College Management System | Non-IEEE | |
DST KT C 04 | Online Grievance Management | Non-IEEE | |
DST KT C 05 | Insurance Policy for Vehicle and Bodily Injured Liability | Non-IEEE | |
DST KT C 06 | Career Calling | Non-IEEE | |
DST KT C 07 | Online Ticket Reservations | Non-IEEE | |
DST KT C 08 | Mobile patient management system | Non-IEEE | |
DST KT C 09 | Automatic Time Table Generator | Non-IEEE | |
DST KT C 010 | Online Pharmacy | Non-IEEE | |
DST KT C 011 | E- Health Care | Non-IEEE | |
DST KT C 012 | Resume Building | Non-IEEE | |
DST KT C 013 | Crime Record Management System | Non-IEEE | |
DST KT C 014 | Multi Banking Transaction System | Non-IEEE | |
DST KT C 015 | Online Student Portal | Non-IEEE | |
Android Application | |||
DST KT C 01 | Employee Task Reminder | ||
DST KT C 02 | Expense Tracker | ||
DST KT C 03 | Mobile Application Interface to Register Citizen Complaint | ||
DST KT C 04 | Student and Faculty Chatting App | ||
DST KT C 05 | Android Weather Application | ||
DST KT C 06 | Smart Alumni Discovery | ||
DST KT C 07 | Mobile super market | ||
DST KT C 08 | Mobile patient management system |