Personal Information
Organization / Workplace
Vellore Area, India India
Tags
2016 me projects with future enhancement
2016 ieee ns2 projects
2016 ieee java projects
2016 ieee matlab projects
2016 ieee power electronics projects
2016 ieee dotnet projects
bulk ieee projects 2016
2016 ieee embedded projects
2016 ieee projects
2016 ieee eee projects
2016 ieee robotics projects
2016 ieee android projects
ieee 2016 projects in vellore
ieee projects latest for cse
ieee project centers in vellore
latest ieee java project titles
2015 multimedia projects
latest ieee dot project titles
ieee projects in vellore
2015 matlab projects
2015 – 2016 ieee java project titles
2015 – 2016 ieee dot project titles
2014 – 2015 ieee dot project titles
latest ieee projects for cse 2015
2014 ieee projects list for be btech final year pr
2015 struts and anglurjs
2015 bigdata project
2015 application projects
2015 mobile wireless networks
list of 2015 ieee paper projects
2015 dot net list
2015 php projects
2015 cloudsim projects
2015 android project
2014 – 2015 ieee java project titles
ieee project vellore
best ieee project center in vellore
ieee 2016 projects for cse
2016 ieee cse projects
2016 ieee it projects
cloud computing
best project center in vellore
free download project documentation
easy way to get projects
free download project abstract
ieee project 2013-2014
networking
multimedia
parallel and distributed system-networking
mobile computing
mobile computing-wireless communication
network security
knowledge and engineering -datamining
image processing
grid computing
parallel and distributed system with security comp
international conference
ieeeproject in parellel and distribution
data mining
final year projects
main projects
project title 2015 best project center in vellore
non-ieee projects
ieee projects
mini projects
big data ieeeproject 2014
ieeeproject 2014
ieee java projects 2014.
python new project titles
big data
machine learning with ai 2022
ieee project 2022
project management
ai project titles 2023
latest project title 2022
cloud computing project 2022
ns projects 2022
2022 ieee projects at vellore
2022 mat lab projects
machine learning title 2022
wireless sensor networks
latest mphil thesis titles..
ieee cloud computing 2022
2022 project tiltes
2022 projects at vellore
ns 2 project 2022 titles
2022 python titles
2022 project titles
ieeeproject in datamining
ai title 2022
machine learning
data science title in 2022
ieee cloud machine learing 202
ieee best project center in vellore
cloud computing project title
ieeeproject in mobile computing
deep learning
blockchain title in 2022
python titles
2022 ieee big data titles
2022 cloud titles
2022 projects titles
python
2022 project tiles
python 2022 project title
artificial intelligence
censoring in big data processing
framework
raspberry pi
deep learning techniques
wireless sensor network
real time project 2016
ieee java projects 2014
transactions
project
convolutional neural networks
smart cities
2023 python projects
2022 new titles
machine learning new titles
2022 python titles in vellore
2022 data mining titles
ns2 project titles in 2022
ai projects
scalable and secure of personal
matrix scrambling method
an elliptic curve cryptography
software-defined
a time efficient approach
general model
online and offline data
polynomial interpolation
fractal image compression
medical image fusion
t
incidents in swimming pools
intrusion detection
best project center at vellore
2017 latest project titles in big data
latest project titles.
resilient device for off-line micro-payments
efficient encryption and short ciphertexts
contributory broadcast encryption
contributory broadcast encryption with efficient e
identity based proxy-oriented data uploading
identity based proxy-oriented data uploading and r
protecting your right verifiable attribute based k
distributed and adaptive medium access control for
routing path identification in manet with ftr ahp
optimal reliable routing path identification in ma
resisting blackhole attacks on manets
node identification based on node grouping in mane
top k query processing and malicious node identifi
top k query processing
medium access control for fully connected mobile a
traffic load adaptive medium access control
traffic load adaptive medium access control for fu
social activity planning with quality guarantee
a comprehensive study on willingness maximization
a kind of novel it’s based on space air-ground b
novel it’s based on space air-ground big-data
a mixed generative discriminative based hashing me
a mixed generative discriminative
recommendation model regularized with user trust a
data mining project titles
steganography using reversible texture synthesis
stealthy attacks in wireless ad hoc networks detec
protecting location privacy in sensor networks aga
ieee project 2014
machine-learned
lstm
fraudulent cryptocurrency
prediction
ensemble
projects
dl
ddos
distributed denial of service
sdn
software-defined networking
botnet attacks
detecting and mitigating
abnormal action
campus abnormal
behavior recognition
temporal segment transformers
group
programming
cnns
trusted third-party
fdia
computation performance
privacy-enhancing
attack detection in smart grid
false data injection
applications
cross-silo federated learning
ieee projects 2023
phenotypic numerical type
bi-lstm
convolution neural network
key semantic features
multiple features
dynamic fusion
agricultural text classificati
od flows
feature
adaptive
affn
fusion networks
adaptive feature
metro systems
passenger flow prediction
origin-destination
unlawful activities
payments
machine learning (ml)
ensemble stacking model
bitcoin transactions
fraud detection
a new framework
https sites
internet of things (iot).
cyber security
2023 ai projects
measurement approach
iot frameworks
heartbleed-like attacks
ieee project 2023
cmlm
machine learning approach
early detection
using statistical model
cardiac intensive care unit
newborn babies
cardiac arrest
genetic algorithms
optimization techniques
‘‘critical thinking’’
recurrent neural networks
fuzzy approach
multi-stage machine learning
cyber-hate detection
faster region-based
firearms monitoring
training
ai projects new
python ieee projects
2023 ieee projects
2023 ai titles
machine learning project
2023 ieee project
deep feature retrieval
photographing guidance
photo helper
data science titles 20023
new application titles 2023
data science 2023
machine learning & ai projects
encryption scheme
query processing with strong privacy protection fo
ciphertech policy attribute
traceable and revocable cipher
theft detection in online soci
identity theft detection
online social networks
composite behavioral modelin
integrity verification scheme
blockchain-based cloud data
scheme with high efficiency
data integrity verification
blockchain-based cloud
blockchain-based certificate
blockchain with ai
blockchain machine learning
blockchain transparency
block chain certificate
blockchain
block hunter federated
federated learning
block hunter
iiot networks
blackchain iiot
block chain lraning
iiot network
blockchain-based iiot networks
cyber threat hunting
block hunter federated learn
matlap project
2022 new ieee titles
a two-fold machine
network security title 2022
2022 ieee new titles
ieee project ai
new titles ieee project
ai project titles 2022
low cost projects
ieee networking titles 2022
networking project 2022
big data titles 2022
big data project tilte in 2022
2022 titles for machine learni
ieee latest project title 2022
ieee latest projects
ieee cloud
ieee cloud computing project
ai networking
ieee cloud networking projects
information security
information technology
ieee matlab projects
ieee java projects
matlab
social network
ai new project titles
ieee project isp
ieee best project center
ai 2022 project title
ieee project aritifical intell
project title for 2022
ieee project best in vellore
ieee project for python
project title for iot 2022
ieee project iot
ieee project center in vellore
workflow applications
gorithms for dynamic
performance analysis
mining by means of mapreduce
pa wi parallelweighted itemset
outlier detection techniques for network attacks
min-min and priority (2)
optimization of tasks in cloud computing based on
autoscaling in energy harvesting
online learning for offloading
memory big-data analytic systems
online data deduplication
on the security of dataaccess control for multiaut
mechanism for shared cloud data service
on the security of a public auditing
information model (cvim) for future automotive veh
novel common vehicle
enhancement in wireless nanosensor networks throug
network level performance
algorithm for cloud computing throughput optimizat
multi objective tasks scheduling
using gps and catagrizing driver using datamining
monitoring approach vehicle s
mining partially ordered sequential rules common t
phase without generating candidates
mining high utility patterns in one
availability in mobile ad hoc networks though repl
maximizing p2 p file access
map reduce programming model for parallel k mediod
logic bug detection and localization using symboli
linked semantic model for information resource ser
data dynamics in cloud storage (2)
delegatable proofs of storage
lightweight and privacy preserving
clustering ensemble for high dimensional data clus
incremental semi supervised
monetary domains
upcoding fraud
flow control
cloud security
caa
password cracking
honeywords
holistic perspective
healthcare
secured record linkage
health data integration
get to the point summarization with pointer genera
sample classification using k nearest neighbor and
gene selection
importance measure in big data
element parameter selection of message
focusing on a probability
flexible container based computing platform on clo
and revocable data access control for multi author
efficient
expressive
cloud computing applications
star a proposed architecture
computing using attribute based encryption
attribute based encryption
vanet with cloud computing
rethinking vehicular communications
torage security in cloud
privacy preserving public
over encrypted cloud data
privacy preserving multi-keyword
computing next generation
next generation
multiple-path routing using portfolio selection
jamming aware traffic allocation
(hids) using fuzzy logic
hybrid intrusion detection
health record system
framework of a national level electronic
using group cryptography
enhanced security for online exams
hidden markov model
credit card fraud detection
management framework
collaboration based cloud computing
characterizing system dependability
cda a cloud dependability analysis
computing service
a self tuning failure detection
detection on user browsing behaviors
a large scale hidden semi
cooperative message authentication
a distributed key management
frequent itemset mining from uncertain database
an improved vertical algorithm
detecting errors in big sensor data on cloud
image forgery
illumination description
gradient
an authenticated trust and reputation calculation
hierarchical long
short term memory network
cyberattack
an anomalous behavior detection model in cloud com
finding inconsistency
unstructured text
security information
gap finder
an approximate search framework for big data
coded servers
optimal file
retrieval scheme
private information
new capacity
adaptive encrypted cloud storage model
deduplication in cloud
cross-domain big data
achieving efficient and privacy preserving
security framework
access control by signature
reversible data hiding
encrypted images
secret sharing
multiple data-hiders
data on cloud
detecting errors in big sensor
ct and mri scans
intermediate loss
3d super-resolution
analysis in twitter.
a survey on political
neural networks
single image
3 d iris scanner
system in wireless mane ts to increase the perform
a study on secure intrusion detection
under similarity rule
data imputation
enriching data
noise reduction
huge noise
high accuracy
heuristics
discretization
explanation
deep feature
text clustering
cloud network
decision mechanism
algorithm
privacy-preserving
dag
tax risk assessment
combining network
diverse accuracy rates
cleaning uncertain data
foreign keys
data integration
bayesian networks
defogging method for traffic monitoring videos
video analytics for traffic monitoring
k means and fuzzy c-means clustering algorithm
tumor detection in brain mri image
jpeg-compressed digital
towards practical self embedding
using particle swarm
technique for qrs complex
ocal adaptive sensitivity
subsense a universal change detection
watermarking technique using matlab
study and analysis of robust
image set based face recognition
simultaneous feature and dictionary
wavelet column transform of host image
robust watermarking by svd
sliding windows
robust and fast detection
local binary patterns
retinal disease screenin
tutoring applications
prosody modification of speech
based k means clustering
optimizing image segmentation
nsct and focused area detection
multifocus image fusion
shearlet transform
image processing on ct scan
lung cancer detection using digital
combination methods
lossless image compression technique
recognition using feature fusion
k nearest correlated neighbor classification for i
detection
infant cry analysis
omputed tomography images
image quality improvement
using neural networks
human activity recognition
image and gabor wavelet
gait recognition
unified framework
scheme for sensor networks
a secure group key management
preserving spectral quality
fusion of pan images ms
data stream
survey on multi label
regular language
secure cloud storage
efficient computing resource
mobile edge-cloud computing networks
algorithm in cloud computing
symbiotic organism
dynamic resource
green cloud computing
cloud server
attribute-based
network based image processing
flower classification using neural
scheme in cloud storage environments
a secure client side deduplication
orest fire surveillance
fire detection
secure data sharing
revocable storage identity
data environment
crowdsourcing in big
strategy for spatial
a reliable task assignment
efficient protection
auto-encoder
cloud intrusion detection
support vector machine
a queuing method for adaptive
vector for social sentiment analysis research
a public opinion keyword
images using fusion technique
improvement based haze
agricultural context
a profile based big data
medical testbed
cloud colonography
access privileges for cloud storage
flexible delegation
based access control scheme
scalable attribute-based
system based on big data
a micro video recommendation
underwater images using fusion technique
improvement based haze removal
image fusion methods
comparison of pixel level
diagnostics
neurological diagnostics
secure authorized deduplication
a hybrid cloud approach
hsv color spaces
color iris recognition dct vs.
collaboration framework
cognitive service
opinion mining of hotel reviews
a framework for sentiment analysis
hybrid clustering technique
brain tumor segmentation
analyze road accident data
a data mining framework
embedding for face recognition
dimensional neighborhood
using neo4j graph database
sql data mining on protein datasets
a cypher query based
invariant face recognition
feedforward network
success of a movie based upon different factors
a compendium for prediction
dark channel prior
image dehazing algorithm
mitigating the risk of customer
a big data clustering algorithm
cb cr space.
watermarking scheme
olor transformations
image transmission technique via
animal behavior analysis
image denoising algorithms
spatial and iwt domai
video steganography
structural information adjustment
wavelet transform
pet and mri brain image fusion
svd and shear let transform
brain tumor patterns
image processing techniques
detect tumor region
brain segmentation
depth analysis
xor encryption
finite dimensional channel
very large antenna arrays
multicell multiuser mimo uplink
cognitive radio networks
spectrum sensing of interleaved
probing in cognitive radio
sharp spectrum
large multi-user mimo systems
per antenna constant envelope
interference cancellation
cognitive multiple access channels
ergodic sum rate maximization for fading
mimo system with spectral efficiency constraint
energy efficiency optimization
mimo technique
chaos communication
lte uplink transmission
ber analysis in wavelet
opportunistic spectrum access environments
coexistence strategy i
bandwidth reservation
mimo sc fdma systems
random access in ofdm-based cognitive radio networ
subcarrier collisions
in femto-cells lte-a based networks
interference avoidance
low complexity cyclostationary spectrum
task assignment algorithm for cognitive radio netw
cooperative spectrum sensing scheme
machine learning for smart cities
smart cloud based parking system
raspberry pi.
tracking and counting
real time vehicle detection
deep neural network.
leaf disease detection using knn
monitoring system using visual behavior and machin
converting to speech and text for visually impaire
auto image description
vector machine (svm).
oriented gradients (hog)
object tracking with raspberry pi
animal intrusion detection using cnn
smart farmland for crop prevention
raspberry pi and power management using ai.
io t based smart energy
filtering system using raspberry pi
indoor intrusion detection
video surveillance systems
identification in networked
efficient face detection
automated vision based
automated vision based surveillance
dumb and deaf people using ai.
portable assistive device for blind
fruit recognition &
calorie estimation based on raspberry pi.
linear wireless sensor networks
mobile sensors
wireless
spin with cluster
secure spin with cluster for data
cluster in spin for data
section of node density
random walk based approach
qos aware geographic opportunistic
opportunistic routing algorithm
new hierarchical stable election protocol
wsn an analysis
leveraging sdn
power aware olsr
gray hole and black-hole attacks in wireless senso
implementing energy efficient technique
vehicular networks
hierarchical adaptive trust establishment
global energy balance.
wireless ad hoc networks (2)
energy efficient reliable
node disjoint multipath routing
energy efficient detection
large scale sensor networks
efficient route update
expansion ratio
efficient data center flow scheduling
mobile nodes
wsn
effects of mobility on latency
cognitive radio sensor networks
improve energy efficiency
dynamic channel access
aodv routing algorithm
collaborative blackhole attack on manet
detecting and avoiding of worm
data aggregation techniques
maximum lifetime in ws ns
shortest path overhearing tree
performance analysis based on nonlinear red
congestion control scheme
scheduling in uws ns
collision free anycast transmission
routing protocol in manet
innovative approach of hds2
improvement on leach protocol.
mobile wireless sensor networks
n efficient cluster tree based data collection sch
urban sensor networks
autonomic in network query processing
data services with multi-network access
achieving high performance
coordination mechanism for wsan.
trust based secured
improve the reliability of shuffle exchange networ
novel resource scheduling approach
forgery and packet drop attacks
detecting provenance
lightweight secure scheme
wireless sensor network.
fault tolerant approach
latest new titles
ieee project 2020 new titles
android
simulation project titles for ns2 2017 2018
ieee best project center at vellore
ieee latest project titles 2017 2018
ieee projects in ns2
ieee project tiles for ns2 2017 2018
ieee projects latest for cse 2017 2018
ieee project titles 2017 2018
ieee 2017 titles wsn
ieee projects 2017 2018
ieee project titles for wsn
ieee project titles for wlreless sensor network
ns 2 simulator projects titles 2017 2018
ieee projects titles networking 2017 2018
ieee 2017 2018 titles
ieee project titles in ns2
ieee project for cse 2017 2018
matlab image processsing titles 2017 2018
matlab projects
best image processing titles
ieee 2017 2018 matlap project
ieee project 2017 2018
best project in data mining
2017 latest project in data mining
ieee projects 2017 for cse
elascity quantitive of calculating cloud computing
congestion detection and propagation
2017 ieee matlab projects
congestion detection and propagation in urban area
adaptive quality of-service-based routing for vehi
ant colony optimization
quality of-service-based routing for vehicular ad
sleep/wake-up scheduling
scheduling approach for wireless sensor networks
adaptive sleepwake up scheduling approach
a self adaptive sleepwake up scheduling approach f
map reduce algorithm
scalable data chunk similarity
a scalable data chunk similarity based compression
reconstruction of facial structures
ieee project image processing
facial structures from 2d images for cosmetic surg
3d reconstruction of facial structures from 2d ima
big data project 2017
ieee projects for big data
2017 project titles for big data
mobile sensor deployment
vulnerabilities of voronoi based approaches
vulnerabilities of voronoi based approaches to mob
voronoi based approaches to mobile sensor deployme
visual exploration of changes in passenger flows a
mega city metro network
passenger flows and tweets on mega city metro netw
visual exploration of changes in passenger flows
hardware performance counter to detect d dos attac
brain behavio r based adaptive
adaptive intrusion detection in networks
brain behavio r based adaptive intrusion detection
diplocloud
rdf data in the cloud
diplocloud efficient and scalable management of rd
diplocloud efficient and scalable management
exchange based on cloud computing system
cdc generation integration for health
health information exchange based on cloud computi
cdc generation integration for health information
nomaly and community detection
botnet detection
detection based on anomaly and community detection
botnet detection based on anomaly and community de
bluetooth based employee mobile tracking
bluetooth based employee mobile tracking using and
employee mobile tracking using android application
mobile tracking using android application
detection from blood samples
automated malaria detection from blood samples
blood samples using image processing
automated malaria detection from blood samples usi
automated malaria detection
audio based puzzle gaming for blind people
blind people
puzzle gaming for blind people
audio based puzzle gaming
arduino based lpg gas monitoring &
automatic cylinder booking with alert system
lpg gas monitoring
high and similar between sql and nosql systems
nosql (not only sql)
mitigation of nosql injections
analysis and mitigation of nosql injections
analysis and mitigation
dynamic threshold
location prediction
a novel method called location-based delivery (lbd
short message format
tracking system using location prediction
location tracking accuracy
dynamic threshold for minimizing sms delivery
a tracking system using location prediction and dy
nference attack on browsing history of twitter use
public click analytics and twitter metadata
android malware detection
malware detection and prevention
madam effective and efficient behavior based andro
frodo fraud resilient device for off-line
frodo fraud resilient device
fraud resilient device for off-line micro-payments
frodo fraud resilient device for off-line micro-pa
droid detector android malware characterization
malware characterization and detection using deep
characterization and detection using deep learning
droid detector android malware detection using dee
droid detector android malware characterization an
encryption with efficient encryption and short cip
smartphone users using behavioral biometrics
users using behavioral biometrics
authentication of smartphone users using behaviora
authentication of smartphone users
an exploration of geographic authentication scheme
an exploration of geographic
geographic authentication schemes
fault analysis of obfuscated smartphone malware
alterdroid differential fault analysis of obfuscat
differential fault analysis of obfuscated smartpho
obfuscated smartphone malware
alterdroid differential fault analysis
top k query processing and malicious node
malicious node identification based on node groupi
randomness from routing metadata in ad hoc network
routing metadata in ad hoc networks
secret common randomness
secret common randomness from routing metadata in
path identification in manet with ftr ahp model
optimal reliable routing path identification
joker a novel opportunistic routing protocol pdf
joker a novel opportunistic routing protocol doc
novel opportunistic routing protocol
distributed and adaptive medium access control
medium access control for internet of-things-enabl
internet of-things-enabled mobile networks
dynamic adaptation of contention windowin wireless
distributed dynamic adaptation of contention windo
contention windowin wireless networks
d2 d delay aware distributed dynamic adaptation of
colluding nodes in manets
a game theoretic approach on resource allocation
a game theoretic approach on resource allocation w
resource allocation with colluding nodes in manets
using hash tag graph based topic model
emantically-related words without co-occurrence in
using hash tag graph based topic model to connect
to connect semantically-related words without co-o
top down xml keyword query processing
top down xml keyword query processing pdf
top down xml keyword query processing doc
parallel mining of frequent sequences
probabilistic static load balancing of parallel mi
probabilistic static load balancing
load balancing of parallel mining of frequent sequ
nearest keyword set search in multi dimensional da
nearest keyword set search
set search in multi dimensional datasets
efficient algorithms for mining top k high utility
recommendation with user-item subgroup analysis
domain sensitive recommendation with user-item sub
clustering data streams based on shared density be
shared density between micro clusters
clustering data streams based on shared density
data streams based on shared density between micro
booster in high dimensional data classification do
high dimensional data classification
booster in high dimensional data classification pd
booster in high dimensional data classification
automatically mining facets for queries from their
automatically mining facets
a novel recommendation model regularized
a novel recommendation model regularized with user
model regularized with user trust and item ratings
willingness maximization for social activity plann
public auditing with fair arbitration for cloud da
dynamic and public auditing
fair arbitration for cloud data
dynamic and public auditing with fair arbitration
auditing with verifiable outsourcing of key update
verifiable outsourcing of key updates
enabling cloud storage auditing
enabling cloud storage auditing with verifiable ou
access control for web-based cloud computing servi
web-based cloud computing services
fine grained two-factor access control for web-bas
fine grained two-factor access control
flexible and fine grained
flexible and fine grained attribute-based data sto
fine grained attribute-based data storage in cloud
attribute-based data storage in cloud computing
follow me cloud when cloud services
cloud services follow mobile users
follow me cloud when cloud services follow mobile
search on encrypted spatial data
geometric range search on encrypted spatial data p
geometric range search on encrypted spatial data d
geometric range search on encrypted
geometric range search on encrypted spatial data
identity based encryption
identity based encryption with cloud revocation au
encryption with cloud revocation authority and its
cloud revocation authority and its applications
data uploading and remote data integrity checking
remote data integrity checking in public cloud
model driven development patterns
model driven development patterns for mobile servi
development patterns for mobile services in cloud
mobile services in cloud of things
fine-grained owner-enforced search authorization
attribute based keyword search with fine-grained o
public infrastructure clouds
user security guarantees in public infrastructure
providing user security guarantees
providing user security guarantees in public infra
large-scale storage systems
approximate methodology for large-scale storage sy
real time semantic search using approximate method
secure data sharing in cloud computing using revoc
revocable storage identity-based encryption
cloud computing using revocable storage identity-b
tmacs a robust and verifiable threshold multi auth
video stream analysis in clouds an object detectio
video stream analysis
fine-grained owner-enforced search authorization 2
adaptive medium access control for internet of-thi
resisting blackhole attack
resisting blackhole attacks on manets doc
study on willingness maximization for social activ
space air-ground big-data 2016 ieee android proje
discriminative based hashing method
mphil thesis
thesis titles 2016
2016 thesis titles
recent thesis titles
mphil thesis titles
2016 ieee dot project titles
ns2 project titles
dot net project titles
2016 android project projects
php project titles
java projects title
2016 ieee projects list for be btech final year pr
list of 2016 ieee paper projects
2016 projects titles
2016 application projects titles
latest ieee projects for cse 2016
2016 ieee java project titles
android project titles
2016 cloudsim projects titles
2016 bigdata project titles
a scalable and reliable matching service for conte
abstract
wireless biosensing using silver
wearable sensors for human activity monitoring
throughput and delay analysis for converge cast wi
space-efficient verifiable secret sharing using po
project title 2015 best project center in vellorei
smart lighting system iso/iec/ieee 21451 compatibl
single image super-resolution based on gradient pr
scalable and secure sharing of personal health
road edge recognition using the stripe hough trans
revealing the trace of high-quality jpeg compressi
recent advances in wearable sensors for health mon
query aware determinization of uncertain
prt embedded micro-heaters for optimum temperature
privacy preservingdelegatedaccesscontrolinpubliccl
privacy preserving public auditing for secure clou
passivity and stability of human
passive and semi-passive wireless temperature and
optimum power allocation in sensor networks for ac
optimization-based motion planning in joint space
optimal stochastic location updates in mobile ad h
on quality of monitoring for multi channel wireles
on quality of monitoring for multi
occlusion-based cooperative transport with a swarm
nonparametric technique based high
network assisted mobile computing with optimal upl
negative information for occlusion reasoning in dy
minimum bandwidth reservations for periodic stream
local broadcast algorithms in ad hoc networks
intra-vehicle networks: a review
hop by-hoproutinginwirelessmeshnetworkswithbandwid
homomorphic authentication with random masking tec
hierarchical and networked vehicle surveillance in
fast release/capture sampling in large-scale senso
energy-aware load balancing and application scalin
electrical impedance tomography for artificial sen
efficient audit service outsourcing for data integ
design of a mobile charging service for electric v
design and experimental validation of novel force
data collection in multi
cost minimizing dynamic migration of content
cooperative downloads in vehicular environments
combiningefficiencyfidelityandflexibilityin 150511
blood pulsation measurement using linearly polariz
an attribute
an approach of reliable data transmission with ran
an algorithm for the automatic analysis of signals
a smart sensor network for sea water quality monit
a secure and dynamic multi
a runtime integrity monitoring framework for real
a practical wireless attack on the connected car a
a methodology for visually lossless jpeg2000 compr
a method for uncertainty assessment of passive sun
a low power temperature to frequency converter for
a high reliability wearable device for elderly fal
mobile comp
project abstract
ieee project 2014-2015
project 2015
a cooperative train control model for energy savin
dot net
optimal scheduling of shifts and breaks using empl
web image re-ranking using query-specific semantic
uniform embedding for efficient jpeg steganography
traffic pattern-based content leakage detection fo
sos: a distributed mobile q&a system based on soci
secure deduplication-with-efficient-and-reliable-c
secure and efficient data transmission for cluster
quality assessment of stereoscopic 3 d image compr
qos aware geographic opportunistic routing in wire
privacy preserving multi-keyword ranked search ove
panda public auditing for shared data with efficie
online payment system using steganography and visu
on false data injection attacks against power syst
modeling of speaking rate influences on mandarin s
model-based edge detector for spectral imagery usi
locaward a security and privacy aware location bas
locaward: a security and privacy aware location-ba
link quality aware code dissemination in wireless
keyword query routing
improved evolutionary algorithm design for the pro
identity based distributed provable data possessio
governing software process improvements in globall
exploiting service similarity for privacy in locat
enabling trustworthy service evaluation in service
efficient instant-fuzzy search with proximity rank
designing truthful spectrum double auctions with
d2p distributed dynamic pricing policy in smart gr
cooperative caching for efficient data access in d
cooperation versus multiplexing multicast scheduli
cognitive cooperative random access for multicast
certificateless remote anonymous authentication
behavioral malware detection in delay tolerant net
behavior rule specification-based intrusion detect
attribute based encryption with privacy preserving
analyzing critical decision-based processes
an ontology-based hybrid approach to activity
a secure client side deduplication scheme in cloud
a scientometric analysis of cloud computing litera
tradeoff between reliability and security in multi
signature searching in a networked collection of f
security evaluation of pattern classifiers under a
secure mining-of-association-rules-in-horizontally
secure ordered bucketization
sane-semantic-aware-namespacein-ultra-large-scale-
product aspect ranking and its applications
peer-assisted-vod-systems-an-efficientmodeling-fra
cross-layer approach for minimizing routing disrup
cooperative-key-agreement-for-wireless-networking
a system for denial-of-service attack detection ba
ieeeproject in multimedia
free download project abstract.
ieeeproject in cloud computing
ieee project document.
ieee project cloud computing
ieee project cloud computing.
See more
Presentations
(1)Documents
(563)Likes
(6)A data mining framework to analyze road accident data
Shakas Technologies
•
3 years ago
A compendium for prediction of success of a movie based upon different factors
Shakas Technologies
•
3 years ago
Python
Shakas Technologies
•
3 years ago
Automatic Wireless Health Monitoring System In Hospitals For Patients
Edgefxkits & Solutions
•
9 years ago
License Plate Recognition System
Hira Rizvi
•
10 years ago
ATPG Methods and Algorithms
Deiptii Das
•
12 years ago
Personal Information
Organization / Workplace
Vellore Area, India India
Tags
2016 me projects with future enhancement
2016 ieee ns2 projects
2016 ieee java projects
2016 ieee matlab projects
2016 ieee power electronics projects
2016 ieee dotnet projects
bulk ieee projects 2016
2016 ieee embedded projects
2016 ieee projects
2016 ieee eee projects
2016 ieee robotics projects
2016 ieee android projects
ieee 2016 projects in vellore
ieee projects latest for cse
ieee project centers in vellore
latest ieee java project titles
2015 multimedia projects
latest ieee dot project titles
ieee projects in vellore
2015 matlab projects
2015 – 2016 ieee java project titles
2015 – 2016 ieee dot project titles
2014 – 2015 ieee dot project titles
latest ieee projects for cse 2015
2014 ieee projects list for be btech final year pr
2015 struts and anglurjs
2015 bigdata project
2015 application projects
2015 mobile wireless networks
list of 2015 ieee paper projects
2015 dot net list
2015 php projects
2015 cloudsim projects
2015 android project
2014 – 2015 ieee java project titles
ieee project vellore
best ieee project center in vellore
ieee 2016 projects for cse
2016 ieee cse projects
2016 ieee it projects
cloud computing
best project center in vellore
free download project documentation
easy way to get projects
free download project abstract
ieee project 2013-2014
networking
multimedia
parallel and distributed system-networking
mobile computing
mobile computing-wireless communication
network security
knowledge and engineering -datamining
image processing
grid computing
parallel and distributed system with security comp
international conference
ieeeproject in parellel and distribution
data mining
final year projects
main projects
project title 2015 best project center in vellore
non-ieee projects
ieee projects
mini projects
big data ieeeproject 2014
ieeeproject 2014
ieee java projects 2014.
python new project titles
big data
machine learning with ai 2022
ieee project 2022
project management
ai project titles 2023
latest project title 2022
cloud computing project 2022
ns projects 2022
2022 ieee projects at vellore
2022 mat lab projects
machine learning title 2022
wireless sensor networks
latest mphil thesis titles..
ieee cloud computing 2022
2022 project tiltes
2022 projects at vellore
ns 2 project 2022 titles
2022 python titles
2022 project titles
ieeeproject in datamining
ai title 2022
machine learning
data science title in 2022
ieee cloud machine learing 202
ieee best project center in vellore
cloud computing project title
ieeeproject in mobile computing
deep learning
blockchain title in 2022
python titles
2022 ieee big data titles
2022 cloud titles
2022 projects titles
python
2022 project tiles
python 2022 project title
artificial intelligence
censoring in big data processing
framework
raspberry pi
deep learning techniques
wireless sensor network
real time project 2016
ieee java projects 2014
transactions
project
convolutional neural networks
smart cities
2023 python projects
2022 new titles
machine learning new titles
2022 python titles in vellore
2022 data mining titles
ns2 project titles in 2022
ai projects
scalable and secure of personal
matrix scrambling method
an elliptic curve cryptography
software-defined
a time efficient approach
general model
online and offline data
polynomial interpolation
fractal image compression
medical image fusion
t
incidents in swimming pools
intrusion detection
best project center at vellore
2017 latest project titles in big data
latest project titles.
resilient device for off-line micro-payments
efficient encryption and short ciphertexts
contributory broadcast encryption
contributory broadcast encryption with efficient e
identity based proxy-oriented data uploading
identity based proxy-oriented data uploading and r
protecting your right verifiable attribute based k
distributed and adaptive medium access control for
routing path identification in manet with ftr ahp
optimal reliable routing path identification in ma
resisting blackhole attacks on manets
node identification based on node grouping in mane
top k query processing and malicious node identifi
top k query processing
medium access control for fully connected mobile a
traffic load adaptive medium access control
traffic load adaptive medium access control for fu
social activity planning with quality guarantee
a comprehensive study on willingness maximization
a kind of novel it’s based on space air-ground b
novel it’s based on space air-ground big-data
a mixed generative discriminative based hashing me
a mixed generative discriminative
recommendation model regularized with user trust a
data mining project titles
steganography using reversible texture synthesis
stealthy attacks in wireless ad hoc networks detec
protecting location privacy in sensor networks aga
ieee project 2014
machine-learned
lstm
fraudulent cryptocurrency
prediction
ensemble
projects
dl
ddos
distributed denial of service
sdn
software-defined networking
botnet attacks
detecting and mitigating
abnormal action
campus abnormal
behavior recognition
temporal segment transformers
group
programming
cnns
trusted third-party
fdia
computation performance
privacy-enhancing
attack detection in smart grid
false data injection
applications
cross-silo federated learning
ieee projects 2023
phenotypic numerical type
bi-lstm
convolution neural network
key semantic features
multiple features
dynamic fusion
agricultural text classificati
od flows
feature
adaptive
affn
fusion networks
adaptive feature
metro systems
passenger flow prediction
origin-destination
unlawful activities
payments
machine learning (ml)
ensemble stacking model
bitcoin transactions
fraud detection
a new framework
https sites
internet of things (iot).
cyber security
2023 ai projects
measurement approach
iot frameworks
heartbleed-like attacks
ieee project 2023
cmlm
machine learning approach
early detection
using statistical model
cardiac intensive care unit
newborn babies
cardiac arrest
genetic algorithms
optimization techniques
‘‘critical thinking’’
recurrent neural networks
fuzzy approach
multi-stage machine learning
cyber-hate detection
faster region-based
firearms monitoring
training
ai projects new
python ieee projects
2023 ieee projects
2023 ai titles
machine learning project
2023 ieee project
deep feature retrieval
photographing guidance
photo helper
data science titles 20023
new application titles 2023
data science 2023
machine learning & ai projects
encryption scheme
query processing with strong privacy protection fo
ciphertech policy attribute
traceable and revocable cipher
theft detection in online soci
identity theft detection
online social networks
composite behavioral modelin
integrity verification scheme
blockchain-based cloud data
scheme with high efficiency
data integrity verification
blockchain-based cloud
blockchain-based certificate
blockchain with ai
blockchain machine learning
blockchain transparency
block chain certificate
blockchain
block hunter federated
federated learning
block hunter
iiot networks
blackchain iiot
block chain lraning
iiot network
blockchain-based iiot networks
cyber threat hunting
block hunter federated learn
matlap project
2022 new ieee titles
a two-fold machine
network security title 2022
2022 ieee new titles
ieee project ai
new titles ieee project
ai project titles 2022
low cost projects
ieee networking titles 2022
networking project 2022
big data titles 2022
big data project tilte in 2022
2022 titles for machine learni
ieee latest project title 2022
ieee latest projects
ieee cloud
ieee cloud computing project
ai networking
ieee cloud networking projects
information security
information technology
ieee matlab projects
ieee java projects
matlab
social network
ai new project titles
ieee project isp
ieee best project center
ai 2022 project title
ieee project aritifical intell
project title for 2022
ieee project best in vellore
ieee project for python
project title for iot 2022
ieee project iot
ieee project center in vellore
workflow applications
gorithms for dynamic
performance analysis
mining by means of mapreduce
pa wi parallelweighted itemset
outlier detection techniques for network attacks
min-min and priority (2)
optimization of tasks in cloud computing based on
autoscaling in energy harvesting
online learning for offloading
memory big-data analytic systems
online data deduplication
on the security of dataaccess control for multiaut
mechanism for shared cloud data service
on the security of a public auditing
information model (cvim) for future automotive veh
novel common vehicle
enhancement in wireless nanosensor networks throug
network level performance
algorithm for cloud computing throughput optimizat
multi objective tasks scheduling
using gps and catagrizing driver using datamining
monitoring approach vehicle s
mining partially ordered sequential rules common t
phase without generating candidates
mining high utility patterns in one
availability in mobile ad hoc networks though repl
maximizing p2 p file access
map reduce programming model for parallel k mediod
logic bug detection and localization using symboli
linked semantic model for information resource ser
data dynamics in cloud storage (2)
delegatable proofs of storage
lightweight and privacy preserving
clustering ensemble for high dimensional data clus
incremental semi supervised
monetary domains
upcoding fraud
flow control
cloud security
caa
password cracking
honeywords
holistic perspective
healthcare
secured record linkage
health data integration
get to the point summarization with pointer genera
sample classification using k nearest neighbor and
gene selection
importance measure in big data
element parameter selection of message
focusing on a probability
flexible container based computing platform on clo
and revocable data access control for multi author
efficient
expressive
cloud computing applications
star a proposed architecture
computing using attribute based encryption
attribute based encryption
vanet with cloud computing
rethinking vehicular communications
torage security in cloud
privacy preserving public
over encrypted cloud data
privacy preserving multi-keyword
computing next generation
next generation
multiple-path routing using portfolio selection
jamming aware traffic allocation
(hids) using fuzzy logic
hybrid intrusion detection
health record system
framework of a national level electronic
using group cryptography
enhanced security for online exams
hidden markov model
credit card fraud detection
management framework
collaboration based cloud computing
characterizing system dependability
cda a cloud dependability analysis
computing service
a self tuning failure detection
detection on user browsing behaviors
a large scale hidden semi
cooperative message authentication
a distributed key management
frequent itemset mining from uncertain database
an improved vertical algorithm
detecting errors in big sensor data on cloud
image forgery
illumination description
gradient
an authenticated trust and reputation calculation
hierarchical long
short term memory network
cyberattack
an anomalous behavior detection model in cloud com
finding inconsistency
unstructured text
security information
gap finder
an approximate search framework for big data
coded servers
optimal file
retrieval scheme
private information
new capacity
adaptive encrypted cloud storage model
deduplication in cloud
cross-domain big data
achieving efficient and privacy preserving
security framework
access control by signature
reversible data hiding
encrypted images
secret sharing
multiple data-hiders
data on cloud
detecting errors in big sensor
ct and mri scans
intermediate loss
3d super-resolution
analysis in twitter.
a survey on political
neural networks
single image
3 d iris scanner
system in wireless mane ts to increase the perform
a study on secure intrusion detection
under similarity rule
data imputation
enriching data
noise reduction
huge noise
high accuracy
heuristics
discretization
explanation
deep feature
text clustering
cloud network
decision mechanism
algorithm
privacy-preserving
dag
tax risk assessment
combining network
diverse accuracy rates
cleaning uncertain data
foreign keys
data integration
bayesian networks
defogging method for traffic monitoring videos
video analytics for traffic monitoring
k means and fuzzy c-means clustering algorithm
tumor detection in brain mri image
jpeg-compressed digital
towards practical self embedding
using particle swarm
technique for qrs complex
ocal adaptive sensitivity
subsense a universal change detection
watermarking technique using matlab
study and analysis of robust
image set based face recognition
simultaneous feature and dictionary
wavelet column transform of host image
robust watermarking by svd
sliding windows
robust and fast detection
local binary patterns
retinal disease screenin
tutoring applications
prosody modification of speech
based k means clustering
optimizing image segmentation
nsct and focused area detection
multifocus image fusion
shearlet transform
image processing on ct scan
lung cancer detection using digital
combination methods
lossless image compression technique
recognition using feature fusion
k nearest correlated neighbor classification for i
detection
infant cry analysis
omputed tomography images
image quality improvement
using neural networks
human activity recognition
image and gabor wavelet
gait recognition
unified framework
scheme for sensor networks
a secure group key management
preserving spectral quality
fusion of pan images ms
data stream
survey on multi label
regular language
secure cloud storage
efficient computing resource
mobile edge-cloud computing networks
algorithm in cloud computing
symbiotic organism
dynamic resource
green cloud computing
cloud server
attribute-based
network based image processing
flower classification using neural
scheme in cloud storage environments
a secure client side deduplication
orest fire surveillance
fire detection
secure data sharing
revocable storage identity
data environment
crowdsourcing in big
strategy for spatial
a reliable task assignment
efficient protection
auto-encoder
cloud intrusion detection
support vector machine
a queuing method for adaptive
vector for social sentiment analysis research
a public opinion keyword
images using fusion technique
improvement based haze
agricultural context
a profile based big data
medical testbed
cloud colonography
access privileges for cloud storage
flexible delegation
based access control scheme
scalable attribute-based
system based on big data
a micro video recommendation
underwater images using fusion technique
improvement based haze removal
image fusion methods
comparison of pixel level
diagnostics
neurological diagnostics
secure authorized deduplication
a hybrid cloud approach
hsv color spaces
color iris recognition dct vs.
collaboration framework
cognitive service
opinion mining of hotel reviews
a framework for sentiment analysis
hybrid clustering technique
brain tumor segmentation
analyze road accident data
a data mining framework
embedding for face recognition
dimensional neighborhood
using neo4j graph database
sql data mining on protein datasets
a cypher query based
invariant face recognition
feedforward network
success of a movie based upon different factors
a compendium for prediction
dark channel prior
image dehazing algorithm
mitigating the risk of customer
a big data clustering algorithm
cb cr space.
watermarking scheme
olor transformations
image transmission technique via
animal behavior analysis
image denoising algorithms
spatial and iwt domai
video steganography
structural information adjustment
wavelet transform
pet and mri brain image fusion
svd and shear let transform
brain tumor patterns
image processing techniques
detect tumor region
brain segmentation
depth analysis
xor encryption
finite dimensional channel
very large antenna arrays
multicell multiuser mimo uplink
cognitive radio networks
spectrum sensing of interleaved
probing in cognitive radio
sharp spectrum
large multi-user mimo systems
per antenna constant envelope
interference cancellation
cognitive multiple access channels
ergodic sum rate maximization for fading
mimo system with spectral efficiency constraint
energy efficiency optimization
mimo technique
chaos communication
lte uplink transmission
ber analysis in wavelet
opportunistic spectrum access environments
coexistence strategy i
bandwidth reservation
mimo sc fdma systems
random access in ofdm-based cognitive radio networ
subcarrier collisions
in femto-cells lte-a based networks
interference avoidance
low complexity cyclostationary spectrum
task assignment algorithm for cognitive radio netw
cooperative spectrum sensing scheme
machine learning for smart cities
smart cloud based parking system
raspberry pi.
tracking and counting
real time vehicle detection
deep neural network.
leaf disease detection using knn
monitoring system using visual behavior and machin
converting to speech and text for visually impaire
auto image description
vector machine (svm).
oriented gradients (hog)
object tracking with raspberry pi
animal intrusion detection using cnn
smart farmland for crop prevention
raspberry pi and power management using ai.
io t based smart energy
filtering system using raspberry pi
indoor intrusion detection
video surveillance systems
identification in networked
efficient face detection
automated vision based
automated vision based surveillance
dumb and deaf people using ai.
portable assistive device for blind
fruit recognition &
calorie estimation based on raspberry pi.
linear wireless sensor networks
mobile sensors
wireless
spin with cluster
secure spin with cluster for data
cluster in spin for data
section of node density
random walk based approach
qos aware geographic opportunistic
opportunistic routing algorithm
new hierarchical stable election protocol
wsn an analysis
leveraging sdn
power aware olsr
gray hole and black-hole attacks in wireless senso
implementing energy efficient technique
vehicular networks
hierarchical adaptive trust establishment
global energy balance.
wireless ad hoc networks (2)
energy efficient reliable
node disjoint multipath routing
energy efficient detection
large scale sensor networks
efficient route update
expansion ratio
efficient data center flow scheduling
mobile nodes
wsn
effects of mobility on latency
cognitive radio sensor networks
improve energy efficiency
dynamic channel access
aodv routing algorithm
collaborative blackhole attack on manet
detecting and avoiding of worm
data aggregation techniques
maximum lifetime in ws ns
shortest path overhearing tree
performance analysis based on nonlinear red
congestion control scheme
scheduling in uws ns
collision free anycast transmission
routing protocol in manet
innovative approach of hds2
improvement on leach protocol.
mobile wireless sensor networks
n efficient cluster tree based data collection sch
urban sensor networks
autonomic in network query processing
data services with multi-network access
achieving high performance
coordination mechanism for wsan.
trust based secured
improve the reliability of shuffle exchange networ
novel resource scheduling approach
forgery and packet drop attacks
detecting provenance
lightweight secure scheme
wireless sensor network.
fault tolerant approach
latest new titles
ieee project 2020 new titles
android
simulation project titles for ns2 2017 2018
ieee best project center at vellore
ieee latest project titles 2017 2018
ieee projects in ns2
ieee project tiles for ns2 2017 2018
ieee projects latest for cse 2017 2018
ieee project titles 2017 2018
ieee 2017 titles wsn
ieee projects 2017 2018
ieee project titles for wsn
ieee project titles for wlreless sensor network
ns 2 simulator projects titles 2017 2018
ieee projects titles networking 2017 2018
ieee 2017 2018 titles
ieee project titles in ns2
ieee project for cse 2017 2018
matlab image processsing titles 2017 2018
matlab projects
best image processing titles
ieee 2017 2018 matlap project
ieee project 2017 2018
best project in data mining
2017 latest project in data mining
ieee projects 2017 for cse
elascity quantitive of calculating cloud computing
congestion detection and propagation
2017 ieee matlab projects
congestion detection and propagation in urban area
adaptive quality of-service-based routing for vehi
ant colony optimization
quality of-service-based routing for vehicular ad
sleep/wake-up scheduling
scheduling approach for wireless sensor networks
adaptive sleepwake up scheduling approach
a self adaptive sleepwake up scheduling approach f
map reduce algorithm
scalable data chunk similarity
a scalable data chunk similarity based compression
reconstruction of facial structures
ieee project image processing
facial structures from 2d images for cosmetic surg
3d reconstruction of facial structures from 2d ima
big data project 2017
ieee projects for big data
2017 project titles for big data
mobile sensor deployment
vulnerabilities of voronoi based approaches
vulnerabilities of voronoi based approaches to mob
voronoi based approaches to mobile sensor deployme
visual exploration of changes in passenger flows a
mega city metro network
passenger flows and tweets on mega city metro netw
visual exploration of changes in passenger flows
hardware performance counter to detect d dos attac
brain behavio r based adaptive
adaptive intrusion detection in networks
brain behavio r based adaptive intrusion detection
diplocloud
rdf data in the cloud
diplocloud efficient and scalable management of rd
diplocloud efficient and scalable management
exchange based on cloud computing system
cdc generation integration for health
health information exchange based on cloud computi
cdc generation integration for health information
nomaly and community detection
botnet detection
detection based on anomaly and community detection
botnet detection based on anomaly and community de
bluetooth based employee mobile tracking
bluetooth based employee mobile tracking using and
employee mobile tracking using android application
mobile tracking using android application
detection from blood samples
automated malaria detection from blood samples
blood samples using image processing
automated malaria detection from blood samples usi
automated malaria detection
audio based puzzle gaming for blind people
blind people
puzzle gaming for blind people
audio based puzzle gaming
arduino based lpg gas monitoring &
automatic cylinder booking with alert system
lpg gas monitoring
high and similar between sql and nosql systems
nosql (not only sql)
mitigation of nosql injections
analysis and mitigation of nosql injections
analysis and mitigation
dynamic threshold
location prediction
a novel method called location-based delivery (lbd
short message format
tracking system using location prediction
location tracking accuracy
dynamic threshold for minimizing sms delivery
a tracking system using location prediction and dy
nference attack on browsing history of twitter use
public click analytics and twitter metadata
android malware detection
malware detection and prevention
madam effective and efficient behavior based andro
frodo fraud resilient device for off-line
frodo fraud resilient device
fraud resilient device for off-line micro-payments
frodo fraud resilient device for off-line micro-pa
droid detector android malware characterization
malware characterization and detection using deep
characterization and detection using deep learning
droid detector android malware detection using dee
droid detector android malware characterization an
encryption with efficient encryption and short cip
smartphone users using behavioral biometrics
users using behavioral biometrics
authentication of smartphone users using behaviora
authentication of smartphone users
an exploration of geographic authentication scheme
an exploration of geographic
geographic authentication schemes
fault analysis of obfuscated smartphone malware
alterdroid differential fault analysis of obfuscat
differential fault analysis of obfuscated smartpho
obfuscated smartphone malware
alterdroid differential fault analysis
top k query processing and malicious node
malicious node identification based on node groupi
randomness from routing metadata in ad hoc network
routing metadata in ad hoc networks
secret common randomness
secret common randomness from routing metadata in
path identification in manet with ftr ahp model
optimal reliable routing path identification
joker a novel opportunistic routing protocol pdf
joker a novel opportunistic routing protocol doc
novel opportunistic routing protocol
distributed and adaptive medium access control
medium access control for internet of-things-enabl
internet of-things-enabled mobile networks
dynamic adaptation of contention windowin wireless
distributed dynamic adaptation of contention windo
contention windowin wireless networks
d2 d delay aware distributed dynamic adaptation of
colluding nodes in manets
a game theoretic approach on resource allocation
a game theoretic approach on resource allocation w
resource allocation with colluding nodes in manets
using hash tag graph based topic model
emantically-related words without co-occurrence in
using hash tag graph based topic model to connect
to connect semantically-related words without co-o
top down xml keyword query processing
top down xml keyword query processing pdf
top down xml keyword query processing doc
parallel mining of frequent sequences
probabilistic static load balancing of parallel mi
probabilistic static load balancing
load balancing of parallel mining of frequent sequ
nearest keyword set search in multi dimensional da
nearest keyword set search
set search in multi dimensional datasets
efficient algorithms for mining top k high utility
recommendation with user-item subgroup analysis
domain sensitive recommendation with user-item sub
clustering data streams based on shared density be
shared density between micro clusters
clustering data streams based on shared density
data streams based on shared density between micro
booster in high dimensional data classification do
high dimensional data classification
booster in high dimensional data classification pd
booster in high dimensional data classification
automatically mining facets for queries from their
automatically mining facets
a novel recommendation model regularized
a novel recommendation model regularized with user
model regularized with user trust and item ratings
willingness maximization for social activity plann
public auditing with fair arbitration for cloud da
dynamic and public auditing
fair arbitration for cloud data
dynamic and public auditing with fair arbitration
auditing with verifiable outsourcing of key update
verifiable outsourcing of key updates
enabling cloud storage auditing
enabling cloud storage auditing with verifiable ou
access control for web-based cloud computing servi
web-based cloud computing services
fine grained two-factor access control for web-bas
fine grained two-factor access control
flexible and fine grained
flexible and fine grained attribute-based data sto
fine grained attribute-based data storage in cloud
attribute-based data storage in cloud computing
follow me cloud when cloud services
cloud services follow mobile users
follow me cloud when cloud services follow mobile
search on encrypted spatial data
geometric range search on encrypted spatial data p
geometric range search on encrypted spatial data d
geometric range search on encrypted
geometric range search on encrypted spatial data
identity based encryption
identity based encryption with cloud revocation au
encryption with cloud revocation authority and its
cloud revocation authority and its applications
data uploading and remote data integrity checking
remote data integrity checking in public cloud
model driven development patterns
model driven development patterns for mobile servi
development patterns for mobile services in cloud
mobile services in cloud of things
fine-grained owner-enforced search authorization
attribute based keyword search with fine-grained o
public infrastructure clouds
user security guarantees in public infrastructure
providing user security guarantees
providing user security guarantees in public infra
large-scale storage systems
approximate methodology for large-scale storage sy
real time semantic search using approximate method
secure data sharing in cloud computing using revoc
revocable storage identity-based encryption
cloud computing using revocable storage identity-b
tmacs a robust and verifiable threshold multi auth
video stream analysis in clouds an object detectio
video stream analysis
fine-grained owner-enforced search authorization 2
adaptive medium access control for internet of-thi
resisting blackhole attack
resisting blackhole attacks on manets doc
study on willingness maximization for social activ
space air-ground big-data 2016 ieee android proje
discriminative based hashing method
mphil thesis
thesis titles 2016
2016 thesis titles
recent thesis titles
mphil thesis titles
2016 ieee dot project titles
ns2 project titles
dot net project titles
2016 android project projects
php project titles
java projects title
2016 ieee projects list for be btech final year pr
list of 2016 ieee paper projects
2016 projects titles
2016 application projects titles
latest ieee projects for cse 2016
2016 ieee java project titles
android project titles
2016 cloudsim projects titles
2016 bigdata project titles
a scalable and reliable matching service for conte
abstract
wireless biosensing using silver
wearable sensors for human activity monitoring
throughput and delay analysis for converge cast wi
space-efficient verifiable secret sharing using po
project title 2015 best project center in vellorei
smart lighting system iso/iec/ieee 21451 compatibl
single image super-resolution based on gradient pr
scalable and secure sharing of personal health
road edge recognition using the stripe hough trans
revealing the trace of high-quality jpeg compressi
recent advances in wearable sensors for health mon
query aware determinization of uncertain
prt embedded micro-heaters for optimum temperature
privacy preservingdelegatedaccesscontrolinpubliccl
privacy preserving public auditing for secure clou
passivity and stability of human
passive and semi-passive wireless temperature and
optimum power allocation in sensor networks for ac
optimization-based motion planning in joint space
optimal stochastic location updates in mobile ad h
on quality of monitoring for multi channel wireles
on quality of monitoring for multi
occlusion-based cooperative transport with a swarm
nonparametric technique based high
network assisted mobile computing with optimal upl
negative information for occlusion reasoning in dy
minimum bandwidth reservations for periodic stream
local broadcast algorithms in ad hoc networks
intra-vehicle networks: a review
hop by-hoproutinginwirelessmeshnetworkswithbandwid
homomorphic authentication with random masking tec
hierarchical and networked vehicle surveillance in
fast release/capture sampling in large-scale senso
energy-aware load balancing and application scalin
electrical impedance tomography for artificial sen
efficient audit service outsourcing for data integ
design of a mobile charging service for electric v
design and experimental validation of novel force
data collection in multi
cost minimizing dynamic migration of content
cooperative downloads in vehicular environments
combiningefficiencyfidelityandflexibilityin 150511
blood pulsation measurement using linearly polariz
an attribute
an approach of reliable data transmission with ran
an algorithm for the automatic analysis of signals
a smart sensor network for sea water quality monit
a secure and dynamic multi
a runtime integrity monitoring framework for real
a practical wireless attack on the connected car a
a methodology for visually lossless jpeg2000 compr
a method for uncertainty assessment of passive sun
a low power temperature to frequency converter for
a high reliability wearable device for elderly fal
mobile comp
project abstract
ieee project 2014-2015
project 2015
a cooperative train control model for energy savin
dot net
optimal scheduling of shifts and breaks using empl
web image re-ranking using query-specific semantic
uniform embedding for efficient jpeg steganography
traffic pattern-based content leakage detection fo
sos: a distributed mobile q&a system based on soci
secure deduplication-with-efficient-and-reliable-c
secure and efficient data transmission for cluster
quality assessment of stereoscopic 3 d image compr
qos aware geographic opportunistic routing in wire
privacy preserving multi-keyword ranked search ove
panda public auditing for shared data with efficie
online payment system using steganography and visu
on false data injection attacks against power syst
modeling of speaking rate influences on mandarin s
model-based edge detector for spectral imagery usi
locaward a security and privacy aware location bas
locaward: a security and privacy aware location-ba
link quality aware code dissemination in wireless
keyword query routing
improved evolutionary algorithm design for the pro
identity based distributed provable data possessio
governing software process improvements in globall
exploiting service similarity for privacy in locat
enabling trustworthy service evaluation in service
efficient instant-fuzzy search with proximity rank
designing truthful spectrum double auctions with
d2p distributed dynamic pricing policy in smart gr
cooperative caching for efficient data access in d
cooperation versus multiplexing multicast scheduli
cognitive cooperative random access for multicast
certificateless remote anonymous authentication
behavioral malware detection in delay tolerant net
behavior rule specification-based intrusion detect
attribute based encryption with privacy preserving
analyzing critical decision-based processes
an ontology-based hybrid approach to activity
a secure client side deduplication scheme in cloud
a scientometric analysis of cloud computing litera
tradeoff between reliability and security in multi
signature searching in a networked collection of f
security evaluation of pattern classifiers under a
secure mining-of-association-rules-in-horizontally
secure ordered bucketization
sane-semantic-aware-namespacein-ultra-large-scale-
product aspect ranking and its applications
peer-assisted-vod-systems-an-efficientmodeling-fra
cross-layer approach for minimizing routing disrup
cooperative-key-agreement-for-wireless-networking
a system for denial-of-service attack detection ba
ieeeproject in multimedia
free download project abstract.
ieeeproject in cloud computing
ieee project document.
ieee project cloud computing
ieee project cloud computing.
See more