0% found this document useful (0 votes)
17 views7 pages

Real-Time Research Projects List

The document lists various research titles related to digital technology, social networks, data privacy, and security. Topics include digital harassment recognition, resource allocation, electric vehicle management, and fraud detection in mobile applications. The titles reflect a focus on enhancing user privacy, improving e-commerce experiences, and addressing cybersecurity challenges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views7 pages

Real-Time Research Projects List

The document lists various research titles related to digital technology, social networks, data privacy, and security. Topics include digital harassment recognition, resource allocation, electric vehicle management, and fraud detection in mobile applications. The titles reflect a focus on enhancing user privacy, improving e-commerce experiences, and addressing cybersecurity challenges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

S.

NO TITLES
1. Recognition Of Digital Harassment On Web-Based Social Channels
2. Social Context Image Recommendation With Hierarchical Attention
3. Resourceful And Employable Click Fraud Identification For Handheld Applications
4. Proficient Allocation Of Resources And Time Arrangement
5. Catalyzing Electric Mobility Recharge Management System For Electric Vehicles
6. Advancing Confidentiality In IOT Health Assistances Utilizing Fog Computing
7. Optimizing App Alerts For A Superior E-Commerce Experience
8. Transformation Of Encryption With Identity-Based Approach For Versatile Encrypted
Data Sharing In Public Cloud
9. Transaction Exchange Liability Adverse To Deceitful Big Data Consumers And
Retailers
10. Search Rank Fraud and Malware Detection in Google Play
11. Boosting Confidentiality In Digital Image Sharing On Social Platforms With Trust-
Based Approach
12. Attacking and Protecting Data Privacy in Edge Cloud Collaborative Inference Systems
13. Cognizant Biometric Recognition With Efficiency And Privacy Protection
14. Developing Ensured And Effective Bio-Security
15. Corruption control through budget maintenance
16. Survey On Social Media Posts Posses Stress Or Stress Less Post Detection
17. Attribute Identification Of Campus Based College Attendee Using Data Mining
18. Protected Information Migration And Removal Via Enumeration Blooming Filter In
Cloud-Based Computing
19. Movie Recommendation System Using Sentiment Analysis From Micro Blogging
Data
20. Safeguarding User Information In Contextual Social Networks
21. Crime Analysis Mapping, Intrusion Detection - Using Data Mining
22. Optimizing Video Request Routing in Mobile Networks with Built-in Content Caching
23. Developing Ensured And Effective Bio-Security
24. Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective
25. Efficient And Deployable Click Fraud Detection for Mobile Applications
26. E-Commerce: Cold-Start Product Recommendation
27. Resolving Multi-party Privacy Conflicts in Social Media
28. A Taxonomy of Fake News Classification Techniques
29. Authentication by Encrypted Negative Password
30. Provable Multi copy dynamic data possession in cloud computing system
31. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-
Commerce Websites
32. Web-Based Sports Arena Booking hub
33. What Do Your Friends Think Efficient Polling Methods for Networks Using
Friendship Paradox
34. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud
Data Centers
35. SPCSS Social Network Based Privacy-Preserving Criminal Suspects Sensing
36. Interest Based E-commerce and Users Purchase intention on social network platforms
37. Suicidal ideation detection A Review of Machine Learning Methods and Applications
38. Accountable Proxy Re-Encryption for Secure Data Sharing
39. Intelligent Recognition of multi model human activities for personal health care
40. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game
Model
41. Digital Tunes online web application
42. A Sentiment Polarity Categorization technique
43. A Hierarchical Attention Model for Social Contextual Image Recommendation
44. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical
Measures
45. Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy
from External Applications
46. Tourist Digital Sight Book
47. A Comprehensive Study on Social Network Mental Disorders Detection via Online
Social Media Mining
48. A System to Filter Unwanted Messages from OSN User Walls
49. Block-chain Based Accounts Payable Platform for Goods Trade
50. image click password generation
51. Health Monitoring on social media over Time
52. Product Suggestion for Online shopping Word-of-Mouth Scenario
53. Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search
Engine
54. Virtual shopping through Webcam
55. Travel Direction Recommendation Model Based on Photos of User Social Network
Profile
56. Connection social media e-commerce
57. Securing Data in Internet of Things (IOT) Using Cryptography and Steganography
Techniques
58. Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing
59. Detecting Mobile Malicious Web Pages in Real Time
60. Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage
61. Forest Management System
62. Hospital Detail and appointment
63. Scalable Content-Aware Collaborative Filtering for Location Recommendation
64. HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based
on Heterogeneous Information Network
65. Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement
Scheme with Enhanced Security Provision
66. Cloud Raid -Defecting Distributes Concurrency Bugs Via Loong Mining And
Enhancement
67. Eclipse: Preserving Differential Location Privacy Against Long-Term Observation
Attacks
68. Predicting Hot Events in the Early Period through Bayesian Model for Social
Networks
69. Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
70. A Block-chain-based Approach for Drug Traceability in Healthcare Supply Chain
71. Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-
physical Systems
72. Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval
73. Benchmarking Image Retrieval Diversification Techniques for social media
74. A Practical attribute-based document collection Hierarchical Encryption Scheme in
Cloud Computing
75. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game
Model
76. Detecting Pickpocket Suspects from Large-Scale Public Transit Records
77. Behavioral Model for Live Detection of Apps Based Attack
78. Evaluating Public Anxiety for Topic-based Communities in Social Networks
79. Intelligent Distribution of Fresh Agricultural Products in Smart City
80. Cyber security Awareness in Online Education: A Case Study Analysis
81. Search Rank Fraud and Malware Detection in Google Play
82. Filtering Instagram Hash Tags Through Crowd Tagging And The Hits Algorithm
83. Risk Assessment in Social Networks based on User Anomalous Behaviors
84. Spammer Detection and Fake User Identification on Social Networks
85. Travel direction recommendation model based on photos of user social network profile
86. SpADe: Multi-Stage Spam Account Detection for Online Social Networks
87. Detect DUI: An In-Car Detection System for Drink Driving and BACs
88. Social Engineering Attacks Prevention: A Systematic Literature Review
89. False-Data-Injection Attacks on Remote Distributed Consensus Estimation
90. On detecting route hijacking attack in opportunistic mobile network
91. Mobile computing- Smart Edge-Based Driver Drowsiness Detection in Mobile
Crowdsourcing
92. A Developer Centered Bug Prediction Model
93. Detecting mobile Malicious webpages in Realtime
94. Online Recruitment Platform
95. A secure and private location proof generation and verification framework
96. Training portal system
97. Truth-seeker The largest social media Ground Truth Dataset for Real or Fake content
98. Identifying and Mitigating Fake User Accounts in Online Social Networks
99. Secure location with others
100. Cashless Society Managing Privacy and Security in the Technological Age
101. Agri Traceability System
102. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
103. University Admissions and Enrollment System
104. Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages
105. Achieving Secure and Efficient Dynamic
106. Active online learning for social media analysis
107. Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
108. Detection of fake online reviews using semi-supervised and supervised learning
109. An Efficient Cipher-text Index Retrieval Scheme
110. A Safe G-Cloud-Based Structure for Public Health Services
111. Co Detect: Financial Fraud Detection With Anomaly Feature Detection
112. Prefix Based Fast Mining of Closed Sequential Patterns
113. Protecting Your Shopping Preference With Differential Privacy
114. Secure Authenticated Key Management
115. Using Data Mining to Predict Hospital
116. Comparable Entity Mining from Comparative Questions
117. Sensitive Label Privacy Protection on Social Network Data
118. Property Rental Management System
119. Urgent Care Transport Services
120. Student Information and Enrollment System
121. Pharmaceutical Inventory Management
122. A Workflow Management System
123. Digital Movie Rating and Recommendation Engine
124. Two-Factor Data Security Protection Mechanism For Cloud Storage System
125. Chaotic Searchable Encryption for Mobile Cloud Storage
126. Digital Fee Payment Solution
127. Online Product Quantization
128. Event Reserve Web Application
129. Canteen Management System
130. Professional Services Directory
131. Bug Reporting and Resolution System
132. Image Steganography Hidden Information
133. SBI Online Banking App
134. My Privacy My Decision: Photo Sharing On Online Social Networks
135. Guest Services Management System
136. Detecting Malicious Face book Applications
137. Delay Analysis and Optimality of Scheduling
138. Online Flight Reservation Platform
139. Online Voting System for Election
140. Cloth Donate Recycle System
141. Coffee Shop Management System
142. Network Discovery and security analysis
143. Railway Route Optimization
144. Privacy-Preserving Electricity Theft Detection based on Decentralized
145. Social media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial
146. Feature Selection Algorithms For Predicting Students Academic Performance Using
Data Mining Technique
147. Using Data Mining to Predict Hospital Admissions From the Emergency Department
148. Personality aware product Recommendation System based on user Interest mining and
Meta-path discovery
149. Behavior model for live detection of APPs based attack
150. Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data
Dynamics
151. Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter
Security and Fairness
152. A Real Time Firewall Policy Rule Set Anomaly Free Mechanism
153. Detect DUI: An In-Car Detection System for Drink Driving and BACs
154. Trust-Based Privacy-Preserving Photo Sharing In Online Social Net
155. The Social Media break-Up: Psycho-Behavioral Measures And Implications
156. Composite Behavioral Modeling For Identity Theft Detection In Online Social
Networks
157. An Efficient Feedback Control Mechanism for Positive/Negative Information Spread
in Online Social Networks
158. Trustworthiness Assessment of Users in Social Reviewing Systems
159. Global-Aware Ranking Deep Metric Learning For Remote Sensing Image Retrieval
160. Dynamic Control of Fraud Information Spreading in Mobile Social Networks
161. Authentication by Encrypted Negative Password
162. Decentralized Based Trust Management Protocol For The Internet Of Things
163. Decentralized As A Cyber Defense: Opportunities, Applications, And Challenges
164. Mutual Authentication Method to Secure the Electric Vehicles TPMS
165. A Secure based autonomous decentralized online social network
166. Hidden Cipher text Policy Attribute-Based
167. Dynamic Rumer Influence Minimization With The User Experience In Social
Networks
168. Bully net Unmasking Cyberbullies on Social Networks
169. Efficiently Processing Spatial and Keyword Queries in Indoor Venues (1)
170. Secure Intrusion Recognition Network For An Irregular Covert System
171. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
172. A System to Filter Unwanted Messages from OSN User Walls
173. Dynamic Resource Allocation using Virtual Machines

You might also like