http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'data'

Page  1 1

Updates found with 'data'

IEEE 2016 -2017 BIG DATA ANDROID DOTNET JAVA TITLESBIG DATA1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce.ss2. Self-Healing in Mobile Networks with Big Data.ANDROID1. An Exploration of Geographic Authentication Schemes.2. Intelligent Hands Free Speech based SMS System on Android.3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.4. Privacy-Preserving Location Sharing Services for Social Networks.5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones.6. A Shoulder Surfing Resistant Graphical Authentication System.7. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies.8. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.9. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions..NET1. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing3. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing4. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal5. Cloud workflow scheduling with deadlines and time slot availability6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data7. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems8. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates9. Identity-Based Encryption with Cloud Revocation Authority and Its Applications10. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud11. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection12. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud13. Providing User Security Guarantees in Public Infrastructure Clouds14. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys15. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation16. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage17. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption18. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps19. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis20. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets DetectionJAVA1. A Locality Sensitive Low-Rank Model for Image Tag Completion2. A Shoulder Surfing Resistant Graphical Authentication System3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments4. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search5. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage6. Mining User-Aware Rare Sequential Topic Patterns in Document Streams7. Mitigating Cross-Site Scripting Attacks with a Content Security Policy8. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases10. SecRBAC: Secure data in the Clouds11. Tag Based Image Search by Social Re-rankingCLOUD COMPUTING1. Cost Minimization for Rule Caching in Software Defined Networking.2. Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow.3. Data Plane and Control Architectures for 5G Transport Networks.4. HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks.5. SDN-based Application Framework for Wireless Sensor and Actor Networks.6. Geo-Social Distance-based Data Dissemination for Socially Aware Networking.7. An Open-Source Wireless Mesh Networking Module for Environmental Monitoring.8. Hybrid IP/SDN networking: open implementation and experiment management tools.9. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.10. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System.NETWORK SECUIRTY1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing.DATA MINING1. Systematic Determination of Discrepancies Across Transient Stability Software Packages.2. Identification of Type 2 Diabetes Risk Factors Using Phenotypes Consisting of Anthropometry and Triglycerides based on Machine Learning.3. Teaching Network Security With IP Darkspace Data.4. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.5. Mining High Utility Patterns in One Phase without Generating Candidates.6. An Improved String-Searching Algorithm and Its Application in Component Security Testing.
Send Enquiry
Read More
IEEE 2016 -2017 Embedded System Projects TitlesS.No Project Title Code1. Coexistence of ZigBee-Based WBAN and Wi-Fi for Health Telemonitoring Systems Wireless2. A Novel Wireless Multifunctional Electronic Current Transformer based on ZigBee-based Communication Wireless3. Configurable ZigBee-based control system for people with multiple disabilities in smart homes Wireless4. ZigBee network system for observing operating activities of work vehicles Wireless5. Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure Wireless6. A Mobile ZigBee Module in a Traffic Control System ` Wireless7. Energy Efficient Outdoor Light Monitoring and Control Architecture Using Embedded System Wireless8. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Wireless9. Energy-Efficient Intelligent Street Lighting System Using Traffic-Adaptive Control Wireless10. Development of a distributed disaster data and human life sign probe system Wireless11. Design and implementation of a home automation system for smart grid applications Wireless12. Milk products monitoring system with arm processor for early detection of microbial activity ARM13. Micro grid demonstration gateway for players communication and load monitoring and management Wireless14. WiFACT -- Wireless Fingerprinting Automated Continuous Training Wireless15. Lightweight Mashup Middleware for Coal Mine Safety Monitoring and Control Automation Wireless16. A smart wearable system for sudden infant death syndrome monitoring General17. Exoskeleton robots for upper-limb rehabilitation Robotics18. Wearable Camera- and Accelerometer-Based Fall Detection on Portable Devices GSM & GPS19. Innovation in Underwater Robots: Biologically Inspired Swimming Snake Robots Robotics20. GPS based autonomous vehicle navigation and control system GSM & GPS21. Real-Time Driving Monitor System: Combined Cloud Database with GPS IoT22. AgriSys: A smart and ubiquitous controlled-environment agriculture system IoT23. Building Smart Cities Applications using IoT andCloud-based Architectures IoT24. An IoT-based system for collision detection on guardrails IoT25. A vision-based teleoperation method for a robotic arm with 4 degrees of freedom Robotics26. Gesture control of drone using a motion controller Robotics27. Development of the Mobile Robot with a Robot Arm Robotics28. Milk products monitoring system with arm processor for early detection of microbial activity ARM29. Controller Area Network Assisted Grid Synchronization of a Microgrid With Renewable Energy Sources and Storage Electrical30. A Real-Time Embedded System for Monitoring of Cargo Vehicles, Using Controller Area Network (CAN) CAN31. Wireless biosensing network for drivers' health monitoring Biomedical32. Android4Auto: A proposal for integration of Android in vehicle infotainment systems Android33. A pulse measurement and data management system based on Arduino platform and Android device Android34. Remote control and instrumentation of Android devices Android35. “AUTOBOOK” The Messaging Machines (Using GSM and Arduino) Arduino36. Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS GSM & GPS37. Bank Locker Security System Using RFID and GSM Technology GSM38. Design of Entrapment Escalation using GSM for Elevators GSM39. Distribution Line Fault Detection & GSM Module Based Fault Signaling System Electrical40. GSM & PIR Based Advanced Antitheft Security System Security 41. LPG Gas Weight and Leakage Detection System Using GSM GSM42. Android Based Women Tracking System Using GPS and GSM GSM & GPS43. Trespass Prevention System Using IOT IoT44. Automatic Vehicle Accident Detection and Rescue System GSM & GPS45. Design and Implementation of Integrated Mobile Operated Remote Vehicle IoT46. A Wearable Device for Continuous Detection and Screening of Epilepsy during Daily Life IoT47. Review of Automatic Detection and control of Disease for Grape Field Gen48. Environmental Condition Monitoring System for the Industries Gen49. Security Management Access Control System Gen50. Design and Development of Embedded based System for Monitoring Industrial and Environmental Parameters for Analyzing the Health of Human beings Gen51. Visual Surveillance Using Absolute Difference Motion Detection System Raspberry pi52. Automatic Irrigation System Using Internet of Things IoT53. Design of Embedded Irrigation System by Using WSN Wireless54. Vehicle Accident Prevention Using Assistant Braking System Gen55. Smart Transport Database Management System Gen56. Accident Alert Using ZIGBEE and GPS Wireless57. Controlling the Home Appliances Remotely Through Web Application Using ZIGBEE Wireless58. An optimized solar traffic control and alert system using wireless sensor networks Wireless59. Biometric Recognition Technique for ATM System Security60. Light Weight Access Control System for Constrained IOT Devices IoT61. Design of Prototype Model for Home Automation Using Wireless Sensor Networks Wireless62. Automated Sensor Network For Monitoring and Detection of Impurity In Drinking Water System General63. Automated Smart Trolley with Smart Billing Using Arduino Gene64. Embedded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor ARM65. Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor ARM66. Implementation of Embedded Web Server Using TCP/IP Protocol with Raspberry PI Raspberry PI67. Designing of Cleaning Robot Robot68. An Analysis of Network-Based Control System Using Controller Area Network (CAN) Protocol CAN69. Identify the Deterioration in Pipe by Using Wheel Operated Robot Robot70. RFID -G Based Navigation System For Visually Impaired To Work at Industry Gen71. New Generation ATM Terminal Services NFC72. A Wireless Sensor Interface for the Quantification of Tremor Using Off the Shelf Components Wireless73. Design and Implementation of Low-Cost SMS Based Monitoring System of Distribution Transformers GSM74. An Integrated Cloud-Based Smart Home Management System with Community Hierarchy Automation75. Home Outlet and LED Array Lamp Controlled by a Smartphone with a Hand Gesture Recognition Gesture76. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Bio-medical77. Smart Real-Time Healthcare Monitoring and Tracking System using GSM/GPS Technologies Bio-medical78. The Design of Building Fire Monitoring System Based on ZigBee-WiFi Networks Wireless
Send Enquiry
Read More
IEEE 2016 - 2017 Matlab Image Processing TitlesS.No Project Titles 1. Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain 2. Double-Tip Arte fact Removal from Atomic Force Microscopy Images 3. Quaternion Collaborative and Sparse Representation With Application to Color Face Recognition 4. Multi-Level Canonical Correlation Analysis for Standard-Dose PET Image Estimation 5. Weakly Supervised Fine-Grained Categorization with Part-Based Image Representation 6. Robust Visual Tracking via Convolutional Networks without Training 7. Context-based prediction filtering of impulse noise images 8. Predicting the Forest Fire Using Image Processing 9. A Review Paper on detection of Glaucoma using Retinal Fundus Images 10. Performance Analysis of Filters on Complex Images for Text Extraction through Binarization 11. Automated Malaria Detection from Blood Samples Using Image Processing 12. Learning Invariant Color Features for Person Re-Identification 13. A Diffusion and Clustering-based Approach for Finding Coherent Motions and Understanding Crowd Scenes 14. Automatic Design of Color Filter Arrays in The Frequency Domain 15. Learning Iteration-wise Generalized Shrinkage-Thresholding Operators for Blind Deconvolution 16. Image Segmentation Using Parametric Contours With Free Endpoints 17. CASAIR: Content and Shape-Aware Image Retargeting and Its Applications 18. Texture classification using Dense Micro-block Difference 19. Statistical performance analysis of a fast super-resolution technique using noisy translations 20. Trees Leaves Extraction In Natural Images Based On Image segmentation and generating Its plant details
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016-2017 A PERFORMANCE DEGRADATION TOLERABLE CACHE DESIGN BY EXPLOITING MEMORY HIERARCHIES ABSTRACT: Performance degradation tolerance (PDT) has been shown to be able to effectively improve the yield, reliability, and lifetime of an electronic product. The focus of PDT is on the particular performance degrading faults (pdef) that only incur some performance degradation of a system without inducing any computation errors. The basic idea is that as long as the defective chips containing only the pdef can provide acceptable performance for some applications, they may still be marketable. Critical issues of PDT to be addressed include the portion of the pdef in a faulty chip and their induced performance degradation. For a typical cache design, most of the possible faults are not pdef. In this brief, we propose a cache redesign method, called PDT cache, where all functional faults in the data-storage cells of a cache (major part of the cache) can be transformed into pdef. By transforming this large number of faults into pdef, a faulty cache becomes much more likely to be still marketable. The proposed design exploits the existing hardware resources and the inherent error resilience scheme to reduce the incurred hardware overhead. The logic synthesis results show that the incurred hardware overhead is only 6.29% for a 32-kB cache. We also evaluate the induced performance degradation under various fault densities using the CPU2000 and CPU2006 benchmark programs. The results show that for a 32-kB cache design, when the fault density is <1%, only 0.31% performance degradation is incurred. In addition, the scalability of the PDT cache is also evaluated. The results show that a smaller hardware overhead is required for a larger cache, and the performance degradation is independent of the cache associativity and can even be smaller for a
Send Enquiry
Read More
Page 1 1