Skip to main content

SOFTWARE PROJECT TITLES




IEEE 2017-2018 JAVA/DOTNET/NS2 PROJECTS

CLOUD COMPUTING

MICI17-001.Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data. (May 2017).
MICI17-002.Fast Phrase Search for Encrypted Cloud Storage. (May 2017).
MICI17-003.Partial Utility-Driven Scheduling for Flexible SLA and Pricing Arbitration in Clouds
MICI17-004.Securing Cloud Data under Key Exposure
MICI17-005.Privacy Protection based Access Control Scheme in Cloud-based Services
MICI17-006. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
MICI17-007.A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users(June 2017)
MICI17-008.Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks(June 2017)
MICI17-009.Application-Aware Big Data Deduplication in Cloud Environment
MICI17-010.Virtual Machine Migration Planning in Software-Defined Networks
MICI17-011.Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances
MICI17-012.A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
MICI17-013.Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks
MICI17-014.Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
MICI17-015.Privacy-Preserving Location-Proximity for Mobile Apps
MICI17-016.Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data
MICI17-017.Resource provisioning for task-batch based workflows with deadlines in public clouds
MICI17-018.Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things


DATA MINING

MICI17-001.Probabilistic Models For Ad View ability Prediction On The Web. (May 2017).
MICI17-002.Mining Competitors from Large Unstructured Datasets.(May 2017).
MICI17-003.GALLOP: GlobAL feature fused LOcation Prediction for Different Check-in Scenarios.(May 2017)
MICI17-004. Efficient Clue-based Route Search on Road Networks(May 2017)

MICI17-005.Microscopic and Macroscopic spatio-temporal Topic Models for Check-in Data.(May 2017)

MICI17-006.Large-scale Location Prediction for Web Pages(May 2016).

MICI17-007.Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction(May 2017).

MICI17-008.Discrete Nonnegative Spectral Clustering(May 2017)

MICI17-009.Managing Temporal Constraints with Preferences: Representation, Reasoning, and Querying(May 2017)
MICI17-010.Facilitating Time Critical Information Seeking in Social Media(May 2017)
MICI17-011.Stochastic Blockmodeling and Variational Bayes Learning for Signed Network Analysis
MICI17-012.Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
MICI17-013.Big Search in Cyberspace
MICI17-014.Supervised Taxonomies—Algorithms and Applications
MICI17-015.l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
MICI17-016.Towards Real-Time, Country-Level Location Classification of Worldwide Tweets
MICI17-017.Differentially Private Data Publishing and Analysis: a Survey
MICI17-018.Scalable Algorithms for CQA Post Voting Prediction
MICI17-019.Adaptive ensembling of semi-supervised clustering solutions
MICI17-020.A Multi-objective Optimization Approach for Question Routing in Community Question Answering Sevices
MICI17-021.User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective(Feb -2017)
MICI17-022.Search Rank Fraud and Malware Detection in Google Play(Feb -2017)
MICI17-023.SAP: Improving Continuous Top-K Queries Over Streaming Data(Feb 2017)
MICI17-024.Data-Driven Answer Selection in Community QA Systems(Feb 2017)
MICI17-025.Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach(Feb 2017)
MICI17-026.Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach(Feb 2017).
MICI17-027.Energy-efficient Query Processing in Web Search Engines
MICI17-028.Online Multi-task Learning Framework for Ensemble Forecasting
MICI17-029.Privacy-Preserving Selective Aggregation of Online User Behavior Data
MICI17-030.Privacy protection based access control scheme in cloud-based services
MICI17-031.Continuous Top-k Monitoring on Document Streams
MICI17-032.Dynamic Facet Ordering for Faceted Product Search Engines


NETWORKING

MICI17-001.An Overlay Architecture for Throughput Optimal Multipath Routing(May 2017)

MICI17-002.Routing in Accumulative Multi-Hop Networks(May 2017)
MICI17-003.Coding for Improved Throughput Performance in Network Switches(May 2017)
MICI17-004.Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol(May 2017)
MICI17-005.A Scalable Framework for Wireless Distributed Computing(May 2017)
MICI17-006.Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels
MICI17-007.Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems
MICI17-008.Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
MICI17-009.A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails
MICI17-010.On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design
MICI17-011.When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
MICI17-012.Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks


NETWORK SECURITY & SECURE COMPUTING

MICI17-001 .Security Implications of Permission Models in Smart-Home Application Frameworks.


MOBILE COMPUTING

MICI17-001.Searching Trajectories by Regions of Interest
MICI17-002.Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
MICI17-003. A Classroom Scheduling Service for Smart Classes
MICI17-004.Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
MICI17-005. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
MICI17-006.Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
MICI17-007.Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy
WIRELESS SENSOR NETWORKS

MICI17-001.Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks


SERVICE COMPUTING

MICI17-001.Resource renting for periodical cloud workflow applications
MICI17-002.Time Dependent Pricing for Large-scale Mobile Networks of Urban Environment: Feasibility and Adaptability
MICI17-003.TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
MICI17-004. Resource renting for periodical cloud workflow applications

KNOWLEDGE AND DATA ENGINEERING

MICI17-001.Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
MICI17-002.Explaining Missing Answers to Top-k SQL Queries
MICI17-003.Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
MICI17-004. Continuous Top-k Monitoring on Document Streams
MICI17-005.Generating Query Facets using Knowledge Bases
MICI17-006.PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
MICI17-007. Influence Maximization in Trajectory Databases
MICI17-008.An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
MICI17-009.Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
MICI17-010.Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data

DEPENDABLE AND SECURE COMPUTING

MICI17-001.A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
MICI17-002.Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
MICI17-003.Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
MICI17-004.Fault-Tolerant Adaptive Routing in Dragonfly Networks
MICI17-005.On the Security of a Variant of ElGamal Encryption Scheme
MICI17-006.Optimal Spot-Checking for Collusion Tolerance  in Computer Grids
-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
MICI17-007.Privacy-Preserving Aggregate Queries for Optimal Location Selection
MICI17-008.Design and Implementation of the Ascend Secure Processor
MICI17-009.Efficient Delegated Private Set Intersection on Outsourced Private Datasets
MICI17-001.Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
MICI17-010.Privacy-Aware Caching in Information-Centric Networking
MICI17-011.Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

IMAGE PROCESSING

MICI17-001.Temporal Dependent Rate-Distortion Optimization for Low-Delay Hierarchical Video Coding.
MICI17-002.Scalable Image Coding Based on Epitomes
MICI17-003.Image Re-ranking based on Topic Diversity
MICI17-004.Coherent Semantic-visual Indexing for Large-scale Image Retrieval in the Cloud
MICI17-005.Learning the image processing pipeline
MULTIMEDIA

MICI17-001.Optimal Representations for Adaptive Streaming in Interactive Multi-View Video Systems
MICI17-002.Structure-Preserving Image Super-resolution via Contextualized Multi-task Learning
MICI17-003.Visual Tracking via Nonnegative Multiple Coding
MICI17-004.Image Based Appraisal of Real Estate Properties
MICI17-005.Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing
PARALLEL AND DISTRIBUTED SYSTEM

MICI17-001.The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems

SERVICE COMPUTING, COMPUTERS, IOT

MICI17-001.TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
MICI17-002.Transactional Behavior Verification in Business Process as a Service Configuration
MICI17-003.FogRoute: DTN-based Data Dissemination Model in Fog Computing
MICI17-004.PatternBased Design and Verification of Secure Service Compositions
MICI17-005.LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing
MICI17-006.Resource Allocation in Vehicular Cloud Computing Systems with MICI17-007.Heterogeneous Vehicles and Roadside Units
MICI17-008.Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions

SOFTWARE ENGINEERING

MICI17-001.A Formal Specification and Verification Framework for Timed Security Protocols
MICI17-002.A Survey of Recent Trends in Testing Concurrent Software Systems

INFORMATION FORENSICS AND SECURITY

MICI17-001.Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
MICI17-002.Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
MICI17-003.A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
MICI17-004. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
MICI17-005.RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
MICI17-006.Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
MICI17-007.Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
MICI17-008.Image origin classification based on social network provenance
MICI17-009.Person Identification by Keystroke Dynamics using Pairwise User Coupling
MICI17-010.Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property

INTELLIGENT TRANSPORTATION SYSTEMS
MICI17-001.EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
SECURITY COMPUTING
MICI17-001.FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
MICI17-002.Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
MICI17-003.Cloud Data Auditing Techniques with a Focus on Privacy and Security
BIG DATA
MICI17-001.Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
MICI17-002.Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
MICI17-003.Visual Analysis of Multiple Route Choices based on General GPS Trajectories
MICI17-004.Survey on Improving Data Utility in Differentially Private Sequential Data Publishing
MICI17-005.Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing
MICI17-006.Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
MICI17-007.A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context
MICI17-008.Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure
MICI17-009.Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
MICI17-010.Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data
MICI17-011.Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing
MICI17-012.Efficient Recommendation of De-identification Policies using Map Reduce
MICI17-013.NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
MICI17-014.A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
MICI17-015.Heterogeneous Data Storage Management with Deduplication in Cloud Computing





PROJECT TITLES 2016-2017

BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
2. Self-Healing in Mobile Networks with Big Data
3. Secure Sensitive Data Sharing on a Big Data Platform
4. Big Data, Big Knowledge: Big Data for Personalized Healthcare
5. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
6. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
7. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
8. Differentially Private Frequent Itemset Mining via Transaction Splitting
9. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
10. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
11. Fast Best-Effort Pattern Matching in Large Attributed Graphs








JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
12. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
13. Online Subgraph Skyline Analysis Over Knowledge Graphs
14. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
15. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
16. ID2S Password-Authenticated Key Exchange Protocols
17. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
18. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
19. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
20. Crawling Hidden Objects with kNN Queries
21. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
22. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
23. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
24. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
25. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
26. Nearest Keyword Set Search in Multi-dimensional Datasets
27. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
28. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
29. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
30. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
31. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
32. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
33. Tag Based Image Search by Social Re-ranking
34. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
35. A Locality Sensitive Low-Rank Model for Image Tag Completion


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
36. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
37. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
38. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
39. Authentication of Smartphone Users Using Behavioral Biometrics
40. An Exploration of Geographic Authentication Schemes
41. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
42. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
43. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
44. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
45. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
46. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
47. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
48. Intelligent Hands Free Speech based SMS System on Android














CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
49. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
50. Mobile cloud support for semantic enriched speech recognition in social care
51. Distributing secret sharing approach with cheater prevention based on QR code
52. Design of Secure Location and Message Sharing System for Android Platform
53. The impact of cloud technology on the automation of businesses
54. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
55. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
























ANDOROID JSON PHP
ANDROID- JSON - PHP
56. Rescue Management System
57. Android Army - Military Apps
58. Android Beauty Parlor
59. Android E Municipality
60. ANDROID NURSE AID
61. Android Customer Care ANDROID, PHP JSON, MySQL






























Dot Net IEEE 2016-17
IEEE Transactions on Computers
62. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
63. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
64. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
65. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
66. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
67. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
68. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
69. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
70. Steganalysis Features for Content-Adaptive JPEG Steganography
71. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
72. PiCode: a New Picture-Embedding 2D Barcode
73. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
74. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
75. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
76. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
77. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
78. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
79. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
80. Cloud workflow scheduling with deadlines and time slot availability
81. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
82. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
83. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
84. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
85. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
86. Democratic Diffusion Aggregation for Image Retrieval




ASP.NET MVC Framework
ASP.NET MVC Framework Project
87. Towards Effective Bug Triage with Software Data Reduction Techniques
88. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
89. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
90. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
91. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
92. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
93. Proof of retrievability with public verifiability resilient against related-key attacks
94. Secure Anonymous Key Distribution Scheme for Smart Grid
95. Converses For Secret Key Agreement and Secure Computing
96. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds

https://spring-source.blogspot.in/

Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION ABSTRACT Many visual applications have benefited from the outburst of web images, yet the imprecise and incomplete tags arbitrarily provided by users, as the thorn of the rose, may hamper the performance of retrieval or indexing systems relying on such data. In this paper, we propose a novel locality sensitive low-rank model for image tag completion, which approximates the global nonlinear model with a collection of local linear models. To effectively infuse the idea of locality sensitivity, a simple and effective pre-processing module is designed to learn suitable representation for data partition, and a global consensus regularizer is introduced to mitigate the risk of overfitting. Meanwhile, low-rank matrix factorization is employed as local models, where the local geometry structures are preserved for the low-dimensional representation of both tags and samples. Extensive empirical evaluations conducted on three

LIFI

LIFI Prof . Harald Haas is a technology of high brightness light emitting diodes(LED).It is bidirectional ,high speed and fully networked wireless communication.    LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. However, LiFi bulbs are outfitted with a   chip   that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED bulbs and received by photoreceptors. LiFi's early developmental models were capable of 150 megabits-per-second ( Mbps ). Some commercial kits enabling that speed have been released. In the lab, with stronger LEDs and different technology, researchers have enabled 10   gigabits -per-second (Gbps), which is faster than   802.11ad .  Benefits of LiFi: ·         Higher speeds than  Wi-Fi . ·         10000 times the frequency  spectrum  of radio. ·         More secure because data cannot be intercepted without a clear line of si