Projects (DotNet Based) - 2016


S. No. Project Title Journal / Year Abstract Base Paper
1 A Credibility Analysis System for Assessing Information on Twitter IEEE 2016 ClickHere ClickHere
2 A Forecasting Methodology for Workload Forecasting in Cloud Systems IEEE 2016 ClickHere ClickHere
3 A Recommendation System to Facilitate Business Process Modeling IEEE 2016 ClickHere ClickHere
4 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing IEEE 2016 ClickHere ClickHere
5 Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates IEEE 2016 ClickHere ClickHere
6 Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems IEEE 2016 ClickHere ClickHere
7 Cloud workflow scheduling with deadlines and time slot availability IEEE 2016 ClickHere ClickHere
8 Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation IEEE 2016 ClickHere ClickHere
9 Democratic Diffusion Aggregation for Image Retrieval IEEE 2016 ClickHere ClickHere
10 Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates IEEE 2016 ClickHere ClickHere
11 Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding IEEE 2016 ClickHere ClickHere
12 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing IEEE 2016 ClickHere ClickHere
13 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud IEEE 2016 ClickHere ClickHere
14 Incremental Consolidation of Data-Intensive Multi-flows IEEE 2016 ClickHere ClickHere
15 Mining Health Examination Records — A Graph-based Approach IEEE 2016 ClickHere ClickHere
16 Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns IEEE 2016 ClickHere ClickHere
17 Optimal Shipping Strategy and Return Service Charge Under No-Reason Return Policy in Online Retailing IEEE 2016 ClickHere ClickHere
18 Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation IEEE 2016 ClickHere ClickHere
19 PiCode: a New Picture-Embedding 2D Barcode IEEE 2016 ClickHere ClickHere
20 Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud IEEE 2016 ClickHere ClickHere
21 Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme IEEE 2016 ClickHere ClickHere
22 Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases IEEE 2016 ClickHere ClickHere
23 Privacy-Preserving Outsourced Media Search IEEE 2016 ClickHere ClickHere
24 Privacy-Preserving Selective Aggregation of Online User Behavior Data IEEE 2016 ClickHere ClickHere
25 Probabilistic Flood Mapping Using Synthetic Aperture Radar Data IEEE 2016 ClickHere ClickHere
26 User Preference Learning for Online Social Recommendation IEEE 2016 ClickHere ClickHere
27 Providing User Security Guarantees in Public Infrastructure Clouds IEEE 2016 ClickHere ClickHere
28 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys IEEE 2016 ClickHere ClickHere
29 Query Reorganisation Algorithms for Efficient Boolean Information Filtering IEEE 2016 ClickHere ClickHere
30 Reversible Data Hiding in Encrypted Images by Reversible Image Transformation IEEE 2016 ClickHere ClickHere
31 Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps IEEE 2016 ClickHere ClickHere
32 Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis IEEE 2016 ClickHere ClickHere
33 TagBook: A Semantic Video Representation without Supervision for Event Detection IEEE 2016 ClickHere ClickHere
34 Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound IEEE 2016 ClickHere ClickHere