LIST OF CSE & IT PROJECTS 20211
ANDROID
Antennas
Detecting Malicious URLs via a Keyword-based Convolutional Gated-recurrent-unit Neural Network
-
On Proactive, Transparent, and Verifiable Ethical Reasoning for Robots
-
A Lightweight and Efficient Secure Hybrid RSA (SHRSA) Messaging Scheme With Four-Layered Authentication Stack
-
Detection of fake online reviews using semi-supervised and supervised learning
-
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse Balanced Support Vector Machine
-
Serendipity—A Machine-Learning Application for Mining Serendipitous Drug Usage from Social Media
-
Crop Yield Prediction and Efficient use of Fertilizers
-
Point-of-interest Recommendation for Location Promotion in Location-based Social Networks
-
Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests
-
Computer Vision and Machine Learning for Viticulture Technology
-
A novel method for implementing Artificial Intelligence, Cloud and Internet of Things in Robots
-
The ODNI-OUSD(I) Xpress Challenge: An Experimental Application of Artificial Intelligence Techniques to National Security Decision Support
-
Artificial Intelligence, Rationality, and the World Wide Web
-
Data Classification with Deep Learning using Tensorflow
-
NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for the Internet of Things
-
From Cloud Down to Things: An Overview of Machine Learning in the Internet of Things
-
A Provably-Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for the Internet of Things Deployment
-
Dynamic Load-Balancing Vertical Control for a Large-Scale Software-Defined Internet of Things
-
Multimedia Data Throughput Maximization in Internet-of-Things System Based on Optimization of Cache-Enabled UAV
-
Machine learning-based network vulnerability analysis of industrial internet of things
-
Internet of Spatial Things: A New Reference Model with Insight Analysis
-
A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks
-
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
-
Android Based Self Attendance System Using OTP
-
Cab Booking Android Application
-
Android Food Order and Delivery App
-
Android General Knowledge Chatbot
-
Android Paper Free Document Sharing App Project
-
Android Graphical Image Password Project
-
Android Women Safety App
-
Android Help Assistance near Me
-
Employee Task Reminder
-
Expense Tracker
-
Mobile Application Interface to Register Citizen Complaint
-
Student and Faculty Chatting App
-
Android Weather Application
-
Smart Alumni Discovery
-
Mobile super market
-
Mobile patient management system
-
Fog Computing as a Complementary Approach to Cloud Computing
-
SLA-Based Agile VM Management in Cloud & Datacenter
-
Efficient Task Scheduling for Applications on Clouds
-
A Simple and Secured Cryptography System of Cloud Computing
-
A Novel Predictive Resource Allocation Framework for Cloud Computing
-
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
-
Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN, and Priority
-
A Hierarchical Receding Horizon Algorithm for QoS-driven control of Multi-IaaS Applications
-
Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data
-
Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data
-
Karma: Cost-effective Geo-replicated Cloud Storage with Dynamic Enforcement of Causal Consistency
-
RIAL: Resource Intensity Aware Load Balancing in Clouds
-
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
-
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
-
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
-
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
-
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
-
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
-
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
-
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
-
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
-
CAM: Cloud-Assisted Privacy-Preserving Mobile Health Monitoring
-
QoS Ranking Prediction for Cloud Services
-
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
-
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
-
Big Data Analytics and Mining for Effective Visualization and Trends Forecasting of Crime Data
-
Medical Data Stream Distribution Pattern Association Rule Mining Algorithm Based on Density Estimation
-
Data-Pattern Enabled Self-Recovery Low-Power Storage System for Big Video Data
-
A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With IoT
-
Frequent Pattern Mining on Time and Location Aware Air Quality Data
-
Untangling Blockchain: A Data Processing View of Blockchain Systems
-
Correlated Matrix Factorization for Recommendation with Implicit Feedback
-
Collaborative Filtering Algorithm Based on Rating Difference and User Interest
-
A Framework for Real-Time Spam Detection in Twitter
-
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
-
Heterogeneous Information Network Embedding for Recommendation
-
Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design
-
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
-
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
-
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
-
Analysis of users’ behaviour in structured e-commerce websites
-
Location Aware Keyword Query Suggestion Based on Document Proximity
-
Top-Down XML Keyword Query Processing
-
Nearest Keyword Set Search in Multi-Dimensional Datasets
-
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
-
A Novel Recommendation Model Regularized with User Trust and Item Ratings
-
Resolving Multi-Party Privacy Conflicts in Social Media
-
A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning
-
Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning
-
Hierarchical Edge Cloud Enabling Network Slicing for 5G Optical Fronthaul
-
Information Network Risk Assessment Based on AHP and Neural Network
-
Mining network stream data for self-learning networks
-
A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks
-
ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN
-
A Stable Approach for Routing Queries in Unstructured P2P Networks
-
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
-
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks through Replication for Efficient File Sharing
-
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
-
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
-
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
-
Big Data Quality Framework: Pre-Processing Data in Weather Monitoring Application
-
Stocks Analysis and Prediction Using Big Data Analytics
-
A Probability-based Model for Big Data Security in Smart City
-
Adaptive Learning Model and Implementation Based on Big Data
-
Accurate marking method of network attacking information based on big data analysis
-
Cloud-Centric Authentication for Wearable Healthcare Monitoring System
-
Logic Bug Detection and Localization Using Symbolic Quick Error Detection
-
Map Reduce Programming Model for Parallel K-Mediod Algorithm on Hadoop Cluster
-
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks
-
Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
-
Network Traffic Classification Using Correlation Information
-
A Data Fusion Technique for Wireless Ranging Performance Improvement
-
EAACK—A Secure Intrusion-Detection System for MANETs
-
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
-
Efficient Algorithms for Neighbor Discovery in Wireless Networks
-
FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems
-
Measu-Routing: A Framework for Routing Assisted Traffic Monitoring
-
Measuring Multipath Routing in the Internet IEEE
-
Design and implementation of TARF: a trust aware routing framework for wsns
-
An Authentication Code Against Pollution Attacks in Network Coding
-
AMPLE: An adaptive traffic engineering system based on virtual routing topologies
-
Providing end to end secure communications in wireless sensor networks
-
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
-
Jamming-Aware Traffic Allocation for Multiple- Path Routing Using Portfolio Selection
-
Dynamic query forms for database queries
-
Automatic extraction of top-k lists from the web
-
Sampling online social network
-
Secure Mining of Association Rules in Horizontally Distributed Databases
-
SUSIE Search using services and information extraction
-
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
-
Scalable Learning of Collective behavior
-
Data leakage detection
-
A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
-
Organizing user search histories
-
One Size Does Not Fit All: Towards User-and Query-Dependent Ranking For Web Databases
-
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
-
Trust-Based Optimal Routing in MANET’S
-
Topology control in mobile ad-hoc networks with cooperative communications
-
Continuous Neighbor Discovery in Asynchronous Sensor Networks
-
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
-
Exploiting Service Similarity for Privacy in Location-Based Search Queries
-
privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
-
Data integrity and data dynamics with secure storage service in the cloud
-
Privacy-Preserving Public Auditing for Secure Cloud Storage
-
Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
-
Load Rebalancing for Distributed File Systems in Clouds
-
Cloud data production for masses
-
Efficient similarity search over encrypted data
-
Efficient audit service outsourcing for data integrity in clouds
-
Towards Secure and Dependable Storage Services in Cloud Computing