SNO | Technology | PROJECT TITLES | Cost(INR) |
---|---|---|---|
1 | CLOUD COMPUTING | V-Matrix-Based Scalable Data Aggregation Scheme in WSN | 7000Buy Now |
2 | CLOUD COMPUTING | Dynamic Demand Prediction and Allocation in Cloud Service Brokerage | 7000Buy Now |
3 | CLOUD COMPUTING | Towards AI-Powered Multiple Cloud Management | 7000Buy Now |
4 | CLOUD COMPUTING | A Fog-centric Secure Cloud Storage Scheme | 7000Buy Now |
5 | CLOUD COMPUTING | A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality | 7000Buy Now |
6 | CLOUD COMPUTING | An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage | 7000Buy Now |
7 | CLOUD COMPUTING | CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data | 7000Buy Now |
8 | CLOUD COMPUTING | Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud | 7000Buy Now |
9 | CLOUD COMPUTING | Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments | 7000Buy Now |
10 | CLOUD COMPUTING | Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing | 7000Buy Now |
11 | CLOUD COMPUTING | FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things | 7000Buy Now |
12 | CLOUD COMPUTING | Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing | 7000Buy Now |
13 | CLOUD COMPUTING | The Soft Underbelly of Cloud Security | 7000Buy Now |
14 | CLOUD COMPUTING | Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage | 7000Buy Now |
15 | CLOUD COMPUTING | Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing | 7000Buy Now |
16 | CLOUD COMPUTING | An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers | 7000Buy Now |
17 | CLOUD COMPUTING | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | 7000Buy Now |
18 | CLOUD COMPUTING | Efficient Traceable Authorization Search System for Secure Cloud Storage | 7000Buy Now |
19 | CLOUD COMPUTING | CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics | 7000Buy Now |
20 | CLOUD COMPUTING | Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing | 7000Buy Now |
21 | CLOUD COMPUTING | Towards Shared Ownership in the Cloud | 7000Buy Now |
22 | CLOUD COMPUTING | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment | 7000Buy Now |
23 | CLOUD COMPUTING | HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems | 7000Buy Now |
24 | DATA MINING | Discovering Canonical Correlations between Topical and Topological Information in Document Networks | 7000Buy Now |
25 | DATA MINING | Emotion Recognition on Twitter: Comparative Study and Training a Unison Model | 7000Buy Now |
26 | DATA MINING | Comments Mining With TF-IDF: The Inherent Bias and Its Removal | 7000Buy Now |
27 | DATA MINING | Complementary Aspect-based Opinion Mining | 7000Buy Now |
28 | DATA MINING | Opinion_Aspect Relations in Cognizing Customer Feelings via Reviews | 7000Buy Now |
29 | DATA MINING | Profit Maximization for Viral Marketing in Online Social Networks: Algorithms and Analysis | 7000Buy Now |
30 | DATA MINING | Scalable Content-Aware Collaborative Filtering for Location Recommendation | 7000Buy Now |
31 | DATA MINING | A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining | 7000Buy Now |
32 | DATA MINING | The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing | 7000Buy Now |
33 | DATA MINING | Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective | 7000Buy Now |
34 | DATA MINING | Automated Phrase Mining from Massive Text Corpora | 7000Buy Now |
35 | DATA MINING | Frequent Itemsets Mining with Differential Privacy over Large-scale Data | 7000Buy Now |
36 | DATA MINING | Highlighter: automatic highlighting of electronic learning documents | 7000Buy Now |
37 | DATA MINING | A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings | 7000Buy Now |
38 | DATA MINING | A Weighted Frequent Itemset MiningAlgorithm for Intelligent Decisionin Smart Systems | 7000Buy Now |
39 | DATA MINING | An Efficient Method for High Quality andCohesive Topical Phrase Mining | 7000Buy Now |
40 | DATA MINING | Collective List-Only Entity Linking:A Graph-Based Approach | 7000Buy Now |
41 | DATA MINING | Entity Linking: A Problem to Extract Corresponding Entity with Knowledge Base | 7000Buy Now |
42 | DATA MINING | Improving Instance Selection Methods For Big DataClassification | 7000Buy Now |
43 | DATA MINING | A Novel Load Image Profile-Based Electricity Load Clustering Methodology | 7000Buy Now |
44 | DATA MINING | NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding | 7000Buy Now |
45 | DATA MINING | Network Representation Learning Enhanced Recommendation Algorithm | 7000Buy Now |
46 | DATA MINING | DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction | 7000Buy Now |
47 | DATA MINING | Motion Based Inference of Social Circles via Self-Attention and Contextualized Embedding | 7000Buy Now |
48 | DATA MINING | Composition Context-Based Web Services Similarity Measure | 7000Buy Now |
49 | DATA MINING | Neural Binary Representation Learning for Large-Scale Collaborative Filtering | 7000Buy Now |
50 | DATA MINING | Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model | 7000Buy Now |
51 | DATA MINING | A Hierarchical Attention Model for Social Contextual Image Recommendation | 7000Buy Now |
52 | DATA MINING | Visualizing Three-Dimensional Ocean Eddies in Web Browsers | 7000Buy Now |
53 | DATA MINING | A Query-based Framework for Searching, Sorting, and Exploring Data Ensembles | 7000Buy Now |
54 | DATA MINING | BD2K Training Coordinating Center's ERuDIte: the Educational Resource Discovery Index for Data Science | 7000Buy Now |
55 | DATA MINING | A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps | 7000Buy Now |
56 | DATA MINING | Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis | 7000Buy Now |
57 | DATA MINING | Old and Young Users White Space Preferences for Online News Web Pages | 7000Buy Now |
58 | DATA MINING | A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding | 7000Buy Now |
59 | DATA MINING | Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based Demand Response | 7000Buy Now |
60 | SECURE COMPUTING | Traffic Analysis Attack for Identifying Users Online Activities | 7000Buy Now |
61 | SECURE COMPUTING | Coverless Information Hiding Method Based on Web Text | 7000Buy Now |
62 | SECURE COMPUTING | LBOA: Location-Based Secure Outsourced Aggregation in IoT | 7000Buy Now |
63 | SECURE COMPUTING | Looking Back! Using Early Versions of Android Apps as Attack Vectors | 7000Buy Now |
64 | SECURE COMPUTING | Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications | 7000Buy Now |
65 | SECURE COMPUTING | Cloud Centric Authentication for Wearable Healthcare Monitoring System | 7000Buy Now |
66 | BLOCKCHAIN TECHNOLOGY | PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management | 7000Buy Now |
67 | BLOCKCHAIN TECHNOLOGY | Blockchain for AI: Review and Open Research Challenges | 7000Buy Now |
68 | BLOCKCHAIN TECHNOLOGY | Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors | 7000Buy Now |
69 | PATTERN ANALYSIS AND MACHINE INTELLIGENCE | Towards Efficient U-Nets: A Coupled and Quantized Approach | 7000Buy Now |
70 | BIG DATA | Comparison of Swam Intelligence Clustering Algorithms for Analysis of Big Data in Healthcare | 7000Buy Now |
71 | BIG DATA | Effective and Efficient Content Redundancy Detection of Web Videos | 7000Buy Now |
72 | BIG DATA | Incorporating Data Context to Cost-Effectively Automate End-to-End Data Wrangling | 7000Buy Now |
73 | BIG DATA | Sentiment Analysis of Comment Texts Based on BiLSTM | 7000Buy Now |
74 | BIG DATA | Data Interpolation and Reconstruction | 7000Buy Now |
75 | BIG DATA | Big Data and Collaboration Research | 7000Buy Now |
76 | BIG DATA | Large-Margin Regularized Softmax Cross-Entropy Loss | 7000Buy Now |
77 | INTERNET OF THINGS(IOT) | Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality | 7000Buy Now |
78 | INTERNET OF THINGS(IOT) | Approximate Data Aggregation in Sensor Equipped IoT Networks | 7000Buy Now |
79 | INTERNET OF THINGS(IOT) | Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks | 7000Buy Now |
80 | INTERNET OF THINGS(IOT) | Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment | 7000Buy Now |
81 | INTERNET OF THINGS(IOT) | Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things | 7000Buy Now |
82 | INTERNET OF THINGS(IOT) | Review of Standard Ontologies for the Web of Things | 7000Buy Now |
83 | PATTERN ANALYSIS AND MACHINE INTELLIGENCE | Towards Efficient U-Nets: A Coupled and Quantized Approach | 7000Buy Now |
84 | SOCIAL NETWORK,IMAGE PROCESSING | A Hybrid Approach to Service Recommendation Based on Network Representation Learning | 7000Buy Now |
85 | SOCIAL NETWORK,IMAGE PROCESSING | Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model | 7000Buy Now |
86 | SOFTWARE ENGINEERING,SERVICE COMPUTING | Platform-Independent Dynamic Taint Analysis for JavaScript | 7000Buy Now |
87 | SOFTWARE ENGINEERING,SERVICE COMPUTING | Scheduling Real Time Security Aware tasks in Fog Networks | 7000Buy Now |
88 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Epistasis Analysis Using an Improved Fuzzy C-means-based Entropy Approach | 7000Buy Now |
89 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Intelligent Security Planning for Regional Distributed Energy Internet | 7000Buy Now |
90 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Fuzzy Bag-of-Words Model for Document Representation | 7000Buy Now |
91 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Efficient kNN Classification With Different Numbers of Nearest Neighbors | 7000Buy Now |
92 | CYBERSECURITY | A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense | 7000Buy Now |
93 | CYBERSECURITY | A Practical Public Key Encryption Scheme Based on Learning Parity with Noise | 7000Buy Now |
94 | CYBERSECURITY | Clustering by Local Gravitation | 7000Buy Now |
95 | CYBERSECURITY | Credit card fraud detection using AdaBoost and majority voting | 7000Buy Now |
96 | CYBERSECURITY | FraudFind: Financial Fraud Detection by Analyzing Human Behavior | 7000Buy Now |
97 | MOBILE COMPUTING | Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency Situations | 7000Buy Now |
98 | FUZZY SYSTEMS,MACHINE LEARNING | Bayesian Nonparametric Learning for Hierarchical and Sparse Topics | 7000Buy Now |
99 | SOCIAL NETWORK | Analyzing and Detecting Money-Laundering Accounts in Online Social Networks | 7000Buy Now |