How AI, OpenAI, and ChatGPT impact business and software.
Cse dot net java & android
1.
Academic Projects for
CSE (2013-2014)
We will develop your ideas and your papers also,
For any Further information call-9603150547
e-mail visionsolutions.9@gmail.com
2.
DOTNET
DATA MINING
1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data. [SMS001]
2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002]
3.A Novel Profit Maximizing Metric for Measuring Classification Performance of
Customer Churn Prediction Models. [SMS003]
4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004]
5.Dynamic Query Forms for Database Queries. [SMS005]
6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006]
7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled
Data Warehouse. [SMS007]
8. Clustering
Sentence-Level
Text
Using
a
Novel
Fuzzy
Relational
Clustering
Algorithm. [SMS008]
9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009]
10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010]
NETWORKING AND NETWORK SECURITY
11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011]
12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless
Mesh Network. [SMS012]
13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming
Systems. [SMS013]
14.Diffusion Dynamics of Network Technologies With Bounded Rational Users:
Aspiration-Based Learning. [SMS014]
15.Delay-Based Network Utility Maximization. [SMS015]
16.Answering “What-If” Deployment and Configuration Questions With WISE:
Techniques and Deployment Experience. [SMS016]
17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless
Networks. [SMS017]
3.
18.A
Rank
Correlation
Based
Detection
against
Distributed
Reflection
DoS
Attacks. [SMS018]
CLOUD COMPUTING
19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019]
20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020]
21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS021]
22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems. [SMS022]
23.CloudMoV: Cloud-based Mobile Social TV. [SMS023]
24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024]
25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing
Networks. [SMS025]
MOBILE COMPUTING
26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead
in Mobile Ad Hoc Networks. [SMS026]
27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027]
28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users. [SMS028]
29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating
System. [SMS029]
30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in
Mobile Ad Hoc Networks. [SMS030]
31.On
Quality
of
Monitoring
for
Multi-channel
Wireless
Infrastructure
Networks. [SMS031]
32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032]
33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033]
34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users. [SMS034]
4.
35.EMAP:
Expedite
Message
Authentication
Protocol
for
Vehicular
Ad
Hoc
Networks. [SMS035]
PARALLEL DISTRIBUTED SYSTEMS
36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036]
37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037]
38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038]
39.GKAR:
A
Novel
Geographic
K-Anycast
Routing
for
Wireless
Sensor
Networks. [SMS039]
40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment. [SMS040]
41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing
Clouds. [SMS041]
42.BAHG:
Back-Bone-Assisted
Hop
Greedy
Routing
for
VANET’s
City
Environments. [SMS042]
43.ASAP:
An
Adaptive
Sampling
Approach
to
Data
Collection
in
Sensor
Networks. [SMS043]
44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem
and Its Efficient Parallelization. [SMS044]
45.A General Framework for Efficient Continuous Multidimensional Top-k Query
Processing in Sensor Networks. [SMS045]
SERVICECOMPUTING
46.Privacy-EnhancedWebServiceComposition. [SMS046]
47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
InformationSharing. [SMS047]
48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems. [SMS048]
5.
49.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection. [SMS049]
50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS050]
IMAGEPROCESSING
51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database
and a Comprehensive Evaluation. [SMS051]
6.
JAVA
DATA MINING
1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data.[SMS001]
2.A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data.[SMS002]
3.A Novel Profit Maximizing Metric for Measuring Classification Performance of
Customer Churn Prediction Models.[SMS003]
4.A Survey of XML Tree Patterns.[SMS004]
5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005]
6.Dynamic Personalized Recommendation on Sparse Data.[SMS006]
7.Mining
User
Queries
with
Markov
Chains:
Application
to
Online
Image
Retrieval.[SMS007]
8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008]
9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009]
10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and RuleBased Model.[SMS010]
11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011]
12.M-Privacy for Collaborative Data Publishing.[SMS012]
13.Comparable Entity Mining from Comparative Questions.[SMS013]
14.Spatial Approximate String Search.[SMS014]
15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled
Data Warehouse.[SMS015]
NETWORKING AND NETWORK SECURITY
16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016]
17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless
Mesh Networks.[SMS017]
18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging
Quality.[SMS018]
7.
19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming
Systems.[SMS019]
20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020]
21.Diffusion Dynamics of Network Technologies With Bounded Rational Users:
Aspiration-Based Learning.[SMS021]
22.Answering “What-If” Deployment and Configuration Questions With WISE:
Techniques and Deployment Experience.[SMS022]
23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless
Networks.[SMS023]
24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks.[SMS024]
25.A
Rank
Correlation
Based
Detection
Resources
for
against
Distributed
Reflection
DoS
Attacks.[SMS025]
26.Optimizing
Cloud
Delivering
IPTV
Services
through
Virtualization.[SMS026]
27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027]
CLOUD COMPUTING
28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028]
29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029]
30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030]
31.Cloud computing for mobile users can offloading compution save energy.[SMS031]
32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032]
33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS033]
34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social
Video Sharing in the Clouds.[SMS034]
35.CloudMoV: Cloud-based Mobile Social TV.[SMS035]
36.QoS Ranking Prediction for Cloud Services.[SMS036]
37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]
8.
38.Collaboration
in
Multicloud
Computing
Environments:
Framework
and
Security Issues.[SMS038]
39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039]
40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040]
MOBILE COMPUTING
41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead
in Mobile Ad Hoc Networks.[SMS041]
42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042]
43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043]
44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks.[SMS044]
45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in
Mobile Ad Hoc Networks.[SMS045]
46.On
Quality
of
Monitoring
for
Multi-channel
Wireless
Infrastructure
Networks.[SMS046]
47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047]
48.A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications.[SMS048]
49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users.[SMS049]
50.EMAP:
Expedite
Message
Authentication
Protocol
for
Vehicular
Ad
Hoc
Mobile
Ad
Hoc
Networks.[SMS050]
51.Adaptive
Position
Update
for
Geographic
Routing
in
Networks.[SMS051]
52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052]
53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053]
54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference
Cancellation.[SMS054]
55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]
9.
PARALLEL DISTRIBUTED SYSTEMS
56.Covering Points of Interest with Mobile Sensors.[SMS056]
57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057]
58.Analysis of Distance-Based Location Management in Wireless Communication
Networks.[SMS058]
59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks.[SMS059]
60.Error-Tolerant
Resource
Allocation
and
Payment
Minimization
for
Cloud
System.[SMS060]
61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS061]
62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment.[SMS062]
63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing
Clouds.[SMS063]
64.BAHG:
Back-Bone-Assisted
Hop
Greedy
Routing
for
VANET’s
City
Environments.[SMS064]
65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065]
66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy
Preserving of Intermediate Datasets in Cloud.[SMS066]
67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS067]
68.ASAP:
An
Adaptive
Sampling
Approach
to
Data
Collection
in
Sensor
Networks.[SMS068]
69.Detection
and
Localization
of
Multiple
Spoofing
Attackers
in
Wireless
Networks.[SMS069]
70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing.[SMS070]
10.
SERVICE COMPUTING
71.Privacy-Enhanced Web Service Composition.[SMS071]
72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems.[SMS072]
73.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection.[SMS073]
SECURE COMPUTING
74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074]
75.Secure
Encounter-based
Mobile
Social
Networks
Tradeoffs.[SMS075]
76.Two tales of privacy in online social networks.[SMS076]
Requirements
Designs
and
11.
ANDROID
DATA MINING
1.Finding
Rare
Classes
Active
Learning
with
Generative
and
Discriminative
Models. [SMS001]
2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia . [SMS002]
3.A Survey of XML Tree Patterns. [SMS003]
4.Anonymization of Centralized and Distributed Social Networks by Sequential
Clustering . [SMS004]
5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005]
6.Region-Based Foldings in Process Discovery. [SMS006]
7.Ranking on Data Manifold with Sink Points. [SMS007]
8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled
Data Warehouse. [SMS008]
CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009]
10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS010]
11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems. [SMS011]
12.
CloudMoV: Cloud-based Mobile Social TV. [SMS012]
12.
MOBILE COMPUTING
13.
Discovery
and
Verification
of
Neighbor
Positions
in
Mobile
Ad
Hoc
Networks. [SMS013]
14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating
System. [SMS014]
15.SSD
A
Robust
RF
Location
Fingerprint
Addressing
Mobile
Devicesa
Heterogeneity. [SMS015]
16.A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications. [SMS016]
17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017]
PARALLEL DISTRIBUTED SYSTEMS
18.Distributed
Web
Systems
Performance
Forecasting
Using
Turning
Bands
Method. [SMS018]
19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS019]
20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks. [SMS020]
21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks. [SMS021]
22.Analysis of Distance-Based Location Management in Wireless Communication
Networks. [SMS022]
13.
SERVICE COMPUTING
23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS023]
24.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection. [SMS024]
25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS025]