M.Phil Project Titles and Abstract


S.NoProject CodeProject Title
1DM17NXT01A Novel Recommendation Model Regularized with User Trust and Item Ratings
2DM17NXT02Automatically Mining Facets for Queries from Their Search Results
3DM17NXT03Booster in High Dimensional Data Classification
4DM17NXT04Building an intrusion detection system using a filter-based feature selection algorithm
5DM17NXT05Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
6DM17NXT06Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
7DM17NXT07Crowdsourcing for Top-K Query Processing over Uncertain Data
8DM17NXT08Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
9DM17NXT09Domain-Sensitive Recommendation with User-Item Subgroup Analysis
10DM17NXT10Efficient Algorithms for Mining Top-K High Utility Itemsets
11DM17NXT11Efficient Cache-Supported Path Planning on Roads
12DM17NXT13Nearest Keyword Set Search in Multi-Dimensional Datasets
13DM17NXT14Rating Prediction based on Social Sentiment from Textual Reviews
14DM17NXT15Location Aware Keyword Query Suggestion Based on Document Proximity
15DM17NXT16Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
16DM17NXT17Quantifying Political Leaning from Tweets, Retweets, and Retweeters
17DM17NXT18Relevance Feedback Algorithms Inspired By Quantum Detection
18DM17NXT19Sentiment Embeddings with Applications to Sentiment Analysis
19DM17NXT20Top-Down XML Keyword Query Processing
20DM17NXT21TopicSketch: Real-time Bursty Topic Detection from Twitter
21DM17NXT22Top-k Dominating Queries on Incomplete Data
22DM17NXT24A Mixed Generative-Discriminative Based Hashing Method
23DM17NXT25Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1CC17NXT01A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2CC17NXT02A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3CC17NXT03An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
4CC17NXT04An Efficient Privacy-Preserving Ranked Keyword Search Method
5CC17NXT05CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
6CC17NXT06Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
7CC17NXT07Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
8CC17NXT08Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9CC17NXT09Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
10CC17NXT10DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11CC17NXT11Flexible Wildcard Searchable Encryption System
12CC17NXT12Dynamic and Public Auditing with Fair Arbitration for Cloud Data
13CC17NXT13Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
14CC17NXT14Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
15CC17NXT15Efficient and generalized geometric range search on encrypted spatial data in the cloud
16CC17NXT16Identity-Based Encryption with Cloud Revocation Authority and Its Applications
17CC17NXT17Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
18CC17NXT18Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
19CC17NXT19Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
20CC17NXT20Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
21CC17NXT21Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
22CC17NXT22TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
23CC17NXT23A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
24CC17NXT24DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
25CC17NXT25Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
26CC17NXT26SecRBAC: Secure data in the Clouds
27CC17NXT27Dynamic and Public Auditing with Fair Arbitration for Cloud Data
28CC17NXT28Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
29CC17NXT29Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
30CC17NXT30Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
1NP17NXT01A Stable Approach for Routing Queries in Unstructured P2P Networks
2NP17NXT02iPath: Path Inference in Wireless Sensor Networks
3NP17NXT03Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
4NP17NXT04Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
5NP17NXT05STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
6NP17NXT06Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
7NP17NXT07T-VMI: Trusted Virtual Machine Introspection in Cloud Environments
8NP17NXT08Detecting Malicious Facebook Applications
9NP17NXT09FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
10NP17NXT10Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
11NP17NXT11Resolving Multi-party Privacy Conflicts in Social Media
12NP17NXT12Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
13NP17NXT13Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services
14NP17NXT14Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
15NP17NXT15Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
16NP17NXT16A Hop-by-Hop Routing Mechanism for Green Internet
17NP17NXT17Continuous Answering Holistic Queries over Sensor Networks
18NP17NXT18Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
19NP17NXT19Analysis of Minimum Interaction Time for Continuous Distributed Interactive Computing
20NP17NXT20Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage
1IP17NXT01A Locality Sensitive Low-Rank Model for Image Tag Completion
2IP17NXT02A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
3IP17NXT03Learning of Multimodal Representations with Random Walks on the Click Graph
4IP17NXT04Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
5IP17NXT05Tag Based Image Search by Social Re-ranking
6IP17NXT06A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures
7IP17NXT07Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption
8IP17NXT08Fingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis
9IP17NXT09Automatic ear detection and feature extraction using Geometric Morphometrics and convolutional neural networks
10IP17NXT10Iris Recognition Based on Human-Interpretable Features
11IP17NXT11Suspecting Less and Doing Better: New Insights on Palmprint Identification for Faster and More Accurate Matching
12IP17NXT12Aging Face Recognition: A Hierarchical Learning Model Based on Local Patterns Selection
13IP17NXT13Complementary Cohort Strategy for Multimodal Face Pair Matching
14IP17NXT14Facial Sketch Synthesis Using Two-dimensional Direct Combined Model-based Face-Specific Markov Network
15IP17NXT15Class-wise Sparse and Collaborative Patch Representation for Face Recognition
16IP17NXT16Local-Gravity-Face (LG-face) for Illumination-Invariant and Heterogeneous Face Recognition
17IP17NXT17Robust Point Set Matching for Partial Face Recognition
18IP17NXT18Intelligent system for modeling the wear-and-tear dynamics of steelmaking converter lining
19IP17NXT19Frequency divergence image: A novel method for action recognition
20IP17NXT20A semantic content based recommendation system for cross-lingual news