Domain Name
|
Topics Name
|
IOT
|
-
Development and Integration of HEMS with an Advanced Smart Metering Infrastructure.
|
|
-
Intuitive IOT-based H2U Healthcare System for Elderly People.
|
|
-
Design and Implementation of an SMS Based Home Security System.
|
|
-
Time scheduling management and barcode reading in public transportation
|
|
-
Home Automation with voice Speech reorganization
|
|
-
EEG Signal emotion based.
|
|
-
IOT based Noise pollution monitoring in Urban and Rural areas Sound monitoring in important zones like schools, hospitals, residential, factory etc.. in real time.
|
Mobile app
|
-
Intelligent Hands Free Speech based SMS System on Android.
|
|
-
An Efficient Approach towards Privacy Preservation and Collusion Resistance Attendance System.
|
|
-
A Smartphone App Framework for Segmented Cancer Care Coordination.
|
|
-
On using Emoticons and Lingoes for Hiding Data in SMS.
|
|
-
A Solution for Employee Security in Corporate Cabs.
|
|
-
A New Concept of Blood Bank Management System using Cloud Computing for Rural Area (INDIA).
|
|
-
Analyzing Ad Library Updates in Android Apps.
|
|
-
Android Blood Bank.
|
|
-
Dissipation of Waste using Dynamic Perception and Alarming System: A Smart City Application.
|
|
-
On using Emoticons and Lingoes for Hiding Data in SMS.
|
|
-
A Real-time Detection and Warning of Cardiovascular Disease LAHB for a Wearable Wireless ECG Device.
|
|
-
An Android-based Mechanism for Energy Efficient Localization depending on Indoor / Outdoor Context.
|
|
-
Distributed Communication System for Emergencies.
|
|
-
Context based access control system (app Security)
|
|
-
Accident tracker System
|
|
-
Spam Msg Detection in whatsapp
|
Data mining
|
-
Integrating Sensor Devices in a Service Oriented Framework: A Retail Environment Case Study.
|
|
-
Data Collection in Multi-Application Sharing Wireless Sensor Networks.
|
|
-
GD Clustering
|
|
-
Smart Hospital
|
|
-
Current Research software them Text Mining
|
|
-
Twitter (Text Mining)
|
|
-
Document clustering
|
|
-
Search engine (Text mining)
|
|
-
Entity Linking with a Knowledge Base:
Issues, Techniques, and Solutions
|
|
-
k-Nearest Neighbour Classification over Semantically Secure Encrypted Relational Data
|
|
-
PAGE: A Partition Aware Engine for Parallel Graph Computation
|
|
-
Query Aware Determinization of Uncertain Objects
|
|
-
Rule-Based Method for Entity Resolution
|
|
-
Secure Distributed Deduplication Systems with Improved Reliability
|
|
-
Towards Effective Bug Triage with Software Data Reduction Techniques
|
Image processing
|
-
An Attribute-assisted Reranking Model for Web Image Search
|
|
-
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labelled Images
|
|
-
Detection and Rectification of Distorted Fingerprints
|
|
-
Learning to Rank Image Tags with Limited Training Examples
|
|
-
Steganography Using Reversible Texture Synthesis
|
|
-
Interactive Tangible Word Game.
|
|
-
Retail environment.
|
Desktop app
|
-
An Efficient Approach towards Privacy Preservation and Collusion Resistance Attendance System.
|
|
-
An Elective Course Suggestion System Developed in Computer Engineering Department Using Fuzzy Logic.
|
Web App
|
-
Online Remote Accessible Laboratory (O.R.A.L.)
|
|
-
Open Source Resume (OSR): A Visualization Tool for Presenting OSS Biographies of Developers.
|
|
-
First Steps Towards Curriculum Development Decisions From Raw Educational Data.
|
|
-
Government Information Management System Design based on B/S Mode.
|
|
-
Real Time Vehicle Fleet Management and Security System.
|
|
-
A Systematic Literature Review of Assessment Tools For Programming Assignments.
|
|
-
Lesson learning for small Kids.(images n video)
|
Networking
|
-
VANET
|
|
-
Shopping IP
|
|
-
Authenticated Key Exchange Protocols for Parallel network file system
|
|
-
Automatic Test Packet Generation
|
|
-
Generating Searchable Public-Key Cipher texts
with Hidden Structures for Fast Keyword Search
|
|
-
Network security situation elements fusion method based on ontology
|
|
-
A Computational Dynamic Trust Model for
User Authorization
|
Cloud computing
|
-
Key aggregation
|
|
-
Regenerating Code
|
|
-
Matchmaking
|
|
-
Web Crawling
|
|
-
Profit maximization
|
|
-
Keyword Search skim
|
|
-
CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
|
|
-
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
|
|
-
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
|
|
-
Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
|
|
-
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute-Based Encryption
|
|
-
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
|
|
-
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
|
|
-
Enabling Cloud Storage Auditing with Key-Exposure Resistance
|
|
-
Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
|
|
-
Identity-based Encryption with Outsourced Revocation in Cloud Computing
|
|
-
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
|
|
-
OPOR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
|
|
-
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
|
|
-
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
|
|
-
Reactive Resource Provisioning Heuristics for Dynamic Dataflow on Cloud Infrastructure
|
|
-
Reducing Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup History and Cache Knowledge
|
|
-
Secure Auditing and Deduplicating Data in Cloud
|
|
-
Secure Distributed Deduplication Systems with Improved Reliability
|
|
-
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
|
|
-
Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
|
Mobile Computing
|
-
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
|
|
-
Optimum Power Allocation in Sensor Networks for Active Radar Applications
|
1 Comments
Great Article
ReplyDeleteCyber Security Projects for CSE Students
JavaScript Training in Chennai
Project Centers in Chennai
JavaScript Training in Chennai