Professional Documents
Culture Documents
Sc |
IEEE
REAL TIME PROJECTS& TRAINING GUIDE
SOFTWARE & EMBEDDED
www.makefinalyearproject.com
IGTJP002 Machine Learning and Deep Learning Method For Cyber Security(IEEE-
2018)
Chronic Kidney Disease (CKD) is one of the worldwide public health problems
due to the costly treatment of its end stage and high possibility of death. As
such, World Health Organization (WHO) has reported that South East Asia
and the Americas witness the highest annual rate (around 1.4%) of
population with this disease, from the comparison among six regions in 2012.
In Thailand, approximately 17. 5% of adult population is identified as having
CKD. Furthermore, the number of new patients increases yearly, while there
are some limitations of obtaining public health insurance; such as free or low
cost prescription, lack of the necessary medical equipment and medical
reimbursement limit. As the expense for dialysis is about 1,500 baht per
session and 4,500 baht per week, patients have to cover the expense over
medical reimbursement limit.
Currently, most computer systems use user IDs and passwords as the login
patterns to authenticate users. However, many people share their login
patterns with coworkers and request these coworkers to assist co-tasks,
thereby making the pattern as one of the weakest points of computer
security. Insider attackers, the valid users of a system who attack the system
internally, are hard to detect since most intrusion detection systems and
firewalls identify and isolate malicious behaviors launched from the outside
world of the system. Hence an audit based framework is required on valid
users to identify suspicious behavior done by other users using credentials of
the user.
IGTJP008 Corporate Communication Network and Stock Price Movements Insights
From Data Mining(IEEE-2018)
IGTJP010 Web Media and Stock Markets A Survey and Future Directions from a Big
Data Perspective(IEEE-2018)
The world wide web can be viewed as a repository of opinions from users
spread across various websites and networks, and today’s citizens look up
reviews and opinions to judge movies, visit forums to debate about Films and
acting. With this explosion in the volume of and reliance on user reviews and
opinions, directors and producers face the challenge of automating the
analysis of such big amounts of data (user reviews, opinions, sentiments).
Armed with these results, directors can enhance their Movie and tailor
experience for the customer. Similarly, policy makers can analyze these posts
to get instant and comprehensive feedback. This project is the outcome of
our research in gathering opinion and review data from popular portals,
movie websites, forums or social networks; and processing the data using the
rules of natural language and grammar to find out what exactly was being
talked about in the user's review and the sentiments that people are
expressing. Our approach diligently scans every line of data, and generates a
cogent summary of every review (categorized by aspects) along with various
graphical visualizations. A novel application of this approach is helping out
Movie directors in gauging response.
In the project the current research themes within the Software Engineering
field is performed by identifying the key topics that academics are
researching and publishing today. Secondly it is to investigate the
application of Natural Language Processing (NLP) techniques to
automatically extract those themes by parsing the papers published thus
far in 2015, notably applying a clustering technique to identify the key
collections of papers.
In the work the application provides the flexibility to collect offline reviews
(text data set) as well as online reviews from pre set of websites using Web
Crawler algorithm. The current approach also provides the concept of
features. The features can be described as follows food quality, delivery
time, cost and package cleanness. The next sequence is to determine the
sentiments namely Positive Polarity, Negative Polarity by dividing the
reviews into sentences and then computing the polarities per review and
per feature, also the polarities across reviews are added together to obtain
Food app based polarity. Once the food app based polarity and re obtained
then the food apps are ranked based on Positive Polarity Maximum,
Negative Polarity Minimum.
IGTJP023 A Novel Recommendation Model Regularized with User Trust and Item
Ratings
The last few years have witnessed the emergence and evolution of a
vibrant research stream on a large variety of online social media network
(SMN) platforms. Recognizing anonymous, yet identical users among
multiple SMNs is still an intractable problem. Clearly, cross-platform
exploration may help solve many problems in social computing in both
theory and applications. Since public profiles can be duplicated and easily
impersonated by users with different purposes, most current user
identification resolutions, which mainly focus on text mining of users’
public profiles, are fragile. Some studies have attempted to match users
based on the location and timing of user content as well as writing style.
However, the locations are sparse in the majority of SMNs, and writing
style is difficult to discern from the short sentences of leading SMNs such
as Sina Microblog and Twitter. Moreover, since online SMNs are quite
symmetric, existing user identification schemes based on network
structure are not effective. The real-world friend cycle is highly individual
and virtually no two users share a congruent friend cycle. Therefore, it is
more accurate to use a friendship structure to analyze cross-platform
SMNs. Since identical users tend to set up partial similar friendship
structures in different SMNs, we proposed the Friend Relationship-Based
User Identification (FRUI) algorithm. FRUI calculates a match degree for all
candidate User Matched Pairs (UMPs), and only UMPs with top ranks are
considered as identical users. We also developed two propositions to
improve the efficiency of the algorithm. Results of extensive experiments
demonstrate that FRUI performs much better than current network
structure-based algorithms.
With 20 million installs a day , third-party apps are a major reason for the popularity
and addictiveness of Facebook. Unfortunately, hackers have realized the potential of
using apps for spreading malware and spam. The problem is already significant, as
we find that at least 13% of apps in our dataset are malicious. So far, the research
community has focused on detecting malicious posts and campaigns. In this paper,
we ask the question given a Facebook application, can we determine if it is malicious?
Our key contribution is in developing FRAppE—Facebook’s Rigorous Application
Evaluator— arguably the first tool focused on detecting malicious apps on Facebook.
To develop FRAppE, we use information gathered by observing the posting behavior
of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a
set of features that help us distinguish malicious apps from benign ones. For example,
we find that malicious apps often share names with other apps, and they typically
request fewer permissions than benign apps. Second, leveraging these distinguishing
features, we show that FRAppE can detect malicious apps with 99.5% accuracy, with
no false positives and a low false negative rate (4.1%). Finally, we explore the
ecosystem of malicious Facebook apps and identify mechanisms that these apps use
to propagate. Interestingly, we find that many apps collude and support each other;
in our dataset, we find 1,584 apps enabling the viral propagation of 3,723 other apps
through their posts. Long-term, we see FRAppE as a step towards creating an
independent watchdog for app assessment and ranking, so as to warn Facebook users
before installing apps.
As deep web grows at a very fast pace, there has been increased interest in
techniques that help efficiently locatedeep-web interfaces. However, due to
the large volume of web resources and the dynamic nature of deep web,
achieving widecoverage and high efficiency is a challenging issue. We
propose a two-stage framework, namely SmartCrawler, for
efficientharvesting deep web interfaces. In the first stage, SmartCrawler
performs site-based searching for center pages with the help ofsearch
engines, avoiding visiting a large number of pages. To achieve more accurate
results for a focused crawl, SmartCrawlerranks websites to prioritize highly
relevant ones for a given topic. In the second stage, SmartCrawler achieves
fast in-sitesearching by excavating most relevant links with an adaptive link-
ranking. To eliminate bias on visiting some highly relevantlinks in hidden
web directories, we design a link tree data structure to achieve wider
coverage for a website. Our experimentalresults on a set of representative
domains show the agility and accuracy of our proposed crawler framework,
which efficientlyretrieves deep-web interfaces from large-scale sites and
achieves higher harvest rates than other crawlers.
This evolution brings great convenience but also increases the probability
of exposing passwords to shoulder surfing attacks. Attackers can observe
directly or use external recording devices to collect users’ credentials. To
overcome this problem, we proposed a novel authentication system Pass
Matrix, based on graphical passwords to resist shoulder surfing attacks.
With a one-time valid login indicator and circulative horizontal and vertical
bars covering the entire scope of pass-images, Pass Matrix offers no hint
for attackers to figure out or narrow down the password even they conduct
multiple camera-based attacks. We also implemented a Pass Matrix
prototype on Android and carried out real user experiments to evaluate its
memorability and usability. From the experimental result, the proposed
system achieves better resistance to shoulder surfing attacks while
maintaining usability.
Fraudulent behaviors in Google Play, the most popular Android app market,
fuel search rank abuse and malware proliferation. To identify malware,
previous work has focused on app executable and permission analysis. In
this paper, we introduce FairPlay, a novel system that discovers and
leverages traces left behind by fraudsters, to detect both malware and apps
subjected to search rank fraud. FairPlay correlates review activities and
uniquely combines detected review relations with linguistic and behavioral
signals gleaned from Google Play app data (87K apps, 2.9M reviews, and
2.4M reviewers, collected over half a year), in order to identify suspicious
apps. FairPlay achieves over 95% accuracy in classifying gold standard
datasets of malware, fraudulent and legitimate apps. We show that 75% of
the identified malware apps engage in search rank fraud. FairPlay discovers
hundreds of fraudulent apps that currently evade Google Bouncer’s
detection technology. FairPlay also helped the discovery of more than 1,000
reviews, reported for 193 apps, that reveal a new type of “coercive” review
campaign users are harassed into writing positive reviews, and install and
review other apps.
IGTJP034 Trust-based Service Management for Social Internet of Things Systems
Partners Address:
RAJAJINAGAR: JAYANAGAR:
#531, 63rd Cross, No 346/17, Manandi Court,
12th Main, after sevabhai hospital, 3rd Floor, 27th Cross,
5th Block, Rajajinagar, Jayanagar 3rd Block East,
Bangalore-10. Bangalore - 560011,
Landmark: Near Bashyam circle. Landmark: Near BDA Complex.