It is the scientific and practical approach to computation and its applications and the systematic study of the feasibility, structure, expression, and mechanization of the methodical procedures (or algorithms) that underlie the acquisition, representation, processing, storage, communication of, and access to, information. An alternative, more succinct definition of computer science is the study of automating algorithmic processes that scale.
In this concept, we are doing projects in the following areas:
Big Data is a phrase used to mean a massive volume of both structured and unstructured data that is so large it is difficult to process using traditional database and software techniques. In most enterprise scenarios the volume of data is too big or it moves too fast or it exceeds current processing capacity. Big Data has the potential to help companies improve operations and make faster, more intelligent decisions. The data is collected from a number of sources including emails, mobile devices, applications, databases, servers and other means. This data, when captured, formatted, manipulated, stored and then analyzed, can help a company to gain useful insight to increase revenues, get or retain customers and improve operations.
MATT003-Fast and Parallel Trust Computing Scheme Based on Big Data Analysis For Collaboration Cloud Service(IEEE-2018)
The domain name net is a generic top-level domain (gTLD) used in the Domain Name System of the Internet. The name is derived from the word network, indicating it was originally intended for organizations involved in networking technologies, such as Internet service providers and other infrastructure companies. However, restrictions were never enforced and the domain is now a general purpose namespace. It is still popular with network operators and the advertising sector and it is often treated as an alternative to com.
MATT002-Blockchain-based Traceability in Agri-Food Supply Chain Management: A Practical Implementation(IEEE 2018)
MATT005-Blockchain as a Service for IoT(IEEE 2017)
Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers “write once, run anywhere” (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation.
MATT002-A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing(IEEE 2017)
MATT003-Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage(IEEE 2018)
MATT004-A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing (IEEE 2018)
MATT006-An Efﬁcient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data.(IEEE 2018)
MATT008-Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols(IEEE 2018)
MATT010-Energy Efficient Scheduling of Servers with Multi Sleep Modes for Cloud Data Center(IEEE 2018)
Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets. In addition, Google has further developed Android TV for televisions, Android Auto for cars, and Wear OS for wrist watches, each with a specialized user interface. Variants of Android are also used on game consoles, digital cameras, PCs and other electronics.
MATT001-CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages(IEEE 2018)
MATT002-A Secure Transaction Scheme With Certiﬁcateless Cryptographic Primitives for IoT-Based Mobile Payments (IEEE 2018)
MATT004-MADAM: Effective and Efﬁcient Behavior-based Android Malware Detection and Prevention(IEEE 2017)
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.
MATT007-Associative Search through Formal Concept Analysis in Criminal Intelligence Analysis(IEEE 2018)
MATT002-NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media(IEEE 2017)