top of page






Detecting Malicious URLs via a Keyword-based Convolutional Gated-recurrent-unit Neural Network

  • On Proactive, Transparent, and Verifiable Ethical Reasoning for Robots

  • A Lightweight and Efficient Secure Hybrid RSA (SHRSA) Messaging Scheme With Four-Layered Authentication Stack

  • Detection of fake online reviews using semi-supervised and supervised learning

  • Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse Balanced Support Vector Machine

  • Serendipity—A Machine-Learning Application for Mining Serendipitous Drug Usage from Social Media

  • Crop Yield Prediction and Efficient use of Fertilizers

  • Point-of-interest Recommendation for Location Promotion in Location-based Social Networks

  • Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests

  • Computer Vision and Machine Learning for Viticulture Technology

  • A novel method for implementing Artificial Intelligence, Cloud and Internet of Things in Robots

  • The ODNI-OUSD(I) Xpress Challenge: An Experimental Application of Artificial Intelligence Techniques to National Security Decision Support

  • Artificial Intelligence, Rationality, and the World Wide Web

  • Data Classification with Deep Learning using Tensorflow

  • NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for the Internet of Things

  • From Cloud Down to Things: An Overview of Machine Learning in the Internet of Things

  • A Provably-Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for the Internet of Things Deployment

  • Dynamic Load-Balancing Vertical Control for a Large-Scale Software-Defined Internet of Things

  • Multimedia Data Throughput Maximization in Internet-of-Things System Based on Optimization of Cache-Enabled UAV

  • Machine learning-based network vulnerability analysis of industrial internet of things

  • Internet of Spatial Things: A New Reference Model with Insight Analysis

  • A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks

  • Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things

JAVA(Android Applications)
  • Android Based Self Attendance System Using OTP

  • Cab Booking Android Application

  • Android Food Order and Delivery App

  • Android General Knowledge Chatbot

  • Android Paper Free Document Sharing App Project

  • Android Graphical Image Password Project

  • Android Women Safety App

  • Android Help Assistance near Me

  • Employee Task Reminder

  • Expense Tracker

  • Mobile Application Interface to Register Citizen Complaint

  • Student and Faculty Chatting App

  • Android Weather Application

  • Smart Alumni Discovery

  • Mobile super market

  • Mobile patient management system

JAVA(Cloud Computing)
  • Fog Computing as a Complementary Approach to Cloud Computing

  • SLA-Based Agile VM Management in Cloud & Datacenter

  • Efficient Task Scheduling for Applications on Clouds

  • A Simple and Secured Cryptography System of Cloud Computing

  • A Novel Predictive Resource Allocation Framework for Cloud Computing

  • Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

  • Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN, and Priority

  • A Hierarchical Receding Horizon Algorithm for QoS-driven control of Multi-IaaS Applications

  • Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data

  • Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data

  • Karma: Cost-effective Geo-replicated Cloud Storage with Dynamic Enforcement of Causal Consistency

  • RIAL: Resource Intensity Aware Load Balancing in Clouds

  • Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

  • Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

  • Audit-Free Cloud Storage via Deniable Attribute-based Encryption

  • Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

  • Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

  • PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

  • Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

  • Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

  • A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

  • CAM: Cloud-Assisted Privacy-Preserving Mobile Health Monitoring

  • QoS Ranking Prediction for Cloud Services

  • A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

  • Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

JAVA(Data Mining)
  • Big Data Analytics and Mining for Effective Visualization and Trends Forecasting of Crime Data

  • Medical Data Stream Distribution Pattern Association Rule Mining Algorithm Based on Density Estimation

  • Data-Pattern Enabled Self-Recovery Low-Power Storage System for Big Video Data

  • A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With IoT

  • Frequent Pattern Mining on Time and Location Aware Air Quality Data

  • Untangling Blockchain: A Data Processing View of Blockchain Systems

  • Correlated Matrix Factorization for Recommendation with Implicit Feedback

  • Collaborative Filtering Algorithm Based on Rating Difference and User Interest

  • A Framework for Real-Time Spam Detection in Twitter

  • NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

  • Heterogeneous Information Network Embedding for Recommendation

  • Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design

  • FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

  • An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

  • Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach

  • Analysis of users’ behaviour in structured e-commerce websites

  • Location Aware Keyword Query Suggestion Based on Document Proximity

  • Top-Down XML Keyword Query Processing

  • Nearest Keyword Set Search in Multi-Dimensional Datasets

  • DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

  • A Novel Recommendation Model Regularized with User Trust and Item Ratings

  • Resolving Multi-Party Privacy Conflicts in Social Media

JAVA(Networking & Network Security)
  • A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning

  • Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning

  • Hierarchical Edge Cloud Enabling Network Slicing for 5G Optical Fronthaul

  • Information Network Risk Assessment Based on AHP and Neural Network

  • Mining network stream data for self-learning networks

  • A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks

  • ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN

  • A Stable Approach for Routing Queries in Unstructured P2P Networks

  • Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks

  • Maximizing P2P File Access Availability in Mobile Ad Hoc Networks through Replication for Efficient File Sharing

  • Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

  • Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

JAVA(Big Data)
  • Big Data Quality Framework: Pre-Processing Data in Weather Monitoring Application

  • Stocks Analysis and Prediction Using Big Data Analytics

  • A Probability-based Model for Big Data Security in Smart City

  • Adaptive Learning Model and Implementation Based on Big Data

  • Accurate marking method of network attacking information based on big data analysis

  • Cloud-Centric Authentication for Wearable Healthcare Monitoring System

  • Logic Bug Detection and Localization Using Symbolic Quick Error Detection

  • Map Reduce Programming Model for Parallel K-Mediod Algorithm on Hadoop Cluster

  • Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks

  • Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks

  • Network Traffic Classification Using Correlation Information

  • A Data Fusion Technique for Wireless Ranging Performance Improvement

  • EAACK—A Secure Intrusion-Detection System for MANETs

  • A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

  • Efficient Algorithms for Neighbor Discovery in Wireless Networks

  • FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

  • Measu-Routing: A Framework for Routing Assisted Traffic  Monitoring

  • Measuring Multipath Routing in the Internet IEEE

  • Design and implementation of TARF: a trust aware routing  framework for wsns

  • An Authentication Code Against Pollution Attacks in Network  Coding

  • AMPLE: An adaptive traffic engineering system based on  virtual routing topologies

  • Providing end to end secure communications in wireless sensor  networks

  • Analysis of Shortest Path Routing for Large Multi-Hop Wireless  Networks

  • Jamming-Aware Traffic Allocation for Multiple- Path Routing Using Portfolio Selection

  • Dynamic query forms for database queries

  • Automatic extraction of top-k lists from the web

  • Sampling online social network

  • Secure Mining of Association Rules in Horizontally Distributed Databases

  • SUSIE Search using services and information extraction

  • Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

  • Scalable Learning of Collective behavior

  • Data leakage detection

  • A Survey of Indexing Techniques for Scalable Record Linkage  and Deduplication

  • Organizing user search histories

  • One Size Does Not Fit All: Towards User-and Query-Dependent Ranking For Web Databases

  • Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

  • Trust-Based Optimal Routing in MANET’S

  • Topology control in mobile ad-hoc networks with cooperative   communications

  • Continuous Neighbor Discovery in Asynchronous Sensor Networks

  • Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability

  • Exploiting Service Similarity for Privacy in Location-Based Search Queries

  • privacy-preserving multi-keyword ranked search over encrypted cloud data

  • Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

  • Data integrity and data dynamics with secure storage service in the cloud

  • Privacy-Preserving Public Auditing for Secure Cloud Storage

  • Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

  • Load Rebalancing for Distributed File Systems in Clouds

  • Cloud data production for masses

  • Efficient similarity search over encrypted data

  • Efficient audit service outsourcing for data integrity in clouds

  • Towards Secure and Dependable Storage Services in Cloud Computing

bottom of page