| SNO | Technology | PROJECT TITLES | Cost(INR) |
|---|---|---|---|
| 1 | CLOUD COMPUTING | V-Matrix-Based Scalable Data Aggregation Scheme in WSN | 7000Buy Now |
| 2 | CLOUD COMPUTING | Dynamic Demand Prediction and Allocation in Cloud Service Brokerage | 7000Buy Now |
| 3 | CLOUD COMPUTING | Towards AI-Powered Multiple Cloud Management | 7000Buy Now |
| 4 | CLOUD COMPUTING | A Fog-centric Secure Cloud Storage Scheme | 7000Buy Now |
| 5 | CLOUD COMPUTING | A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality | 7000Buy Now |
| 6 | CLOUD COMPUTING | An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage | 7000Buy Now |
| 7 | CLOUD COMPUTING | CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data | 7000Buy Now |
| 8 | CLOUD COMPUTING | Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud | 7000Buy Now |
| 9 | CLOUD COMPUTING | Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments | 7000Buy Now |
| 10 | CLOUD COMPUTING | Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing | 7000Buy Now |
| 11 | CLOUD COMPUTING | FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things | 7000Buy Now |
| 12 | CLOUD COMPUTING | Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing | 7000Buy Now |
| 13 | CLOUD COMPUTING | The Soft Underbelly of Cloud Security | 7000Buy Now |
| 14 | CLOUD COMPUTING | Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage | 7000Buy Now |
| 15 | CLOUD COMPUTING | Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing | 7000Buy Now |
| 16 | CLOUD COMPUTING | An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers | 7000Buy Now |
| 17 | CLOUD COMPUTING | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | 7000Buy Now |
| 18 | CLOUD COMPUTING | Efficient Traceable Authorization Search System for Secure Cloud Storage | 7000Buy Now |
| 19 | CLOUD COMPUTING | CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics | 7000Buy Now |
| 20 | CLOUD COMPUTING | Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing | 7000Buy Now |
| 21 | CLOUD COMPUTING | Towards Shared Ownership in the Cloud | 7000Buy Now |
| 22 | CLOUD COMPUTING | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment | 7000Buy Now |
| 23 | CLOUD COMPUTING | HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems | 7000Buy Now |
| 24 | DATA MINING | Discovering Canonical Correlations between Topical and Topological Information in Document Networks | 7000Buy Now |
| 25 | DATA MINING | Emotion Recognition on Twitter: Comparative Study and Training a Unison Model | 7000Buy Now |
| 26 | DATA MINING | Comments Mining With TF-IDF: The Inherent Bias and Its Removal | 7000Buy Now |
| 27 | DATA MINING | Complementary Aspect-based Opinion Mining | 7000Buy Now |
| 28 | DATA MINING | Opinion_Aspect Relations in Cognizing Customer Feelings via Reviews | 7000Buy Now |
| 29 | DATA MINING | Profit Maximization for Viral Marketing in Online Social Networks: Algorithms and Analysis | 7000Buy Now |
| 30 | DATA MINING | Scalable Content-Aware Collaborative Filtering for Location Recommendation | 7000Buy Now |
| 31 | DATA MINING | A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining | 7000Buy Now |
| 32 | DATA MINING | The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing | 7000Buy Now |
| 33 | DATA MINING | Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective | 7000Buy Now |
| 34 | DATA MINING | Automated Phrase Mining from Massive Text Corpora | 7000Buy Now |
| 35 | DATA MINING | Frequent Itemsets Mining with Differential Privacy over Large-scale Data | 7000Buy Now |
| 36 | DATA MINING | Highlighter: automatic highlighting of electronic learning documents | 7000Buy Now |
| 37 | DATA MINING | A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings | 7000Buy Now |
| 38 | DATA MINING | A Weighted Frequent Itemset MiningAlgorithm for Intelligent Decisionin Smart Systems | 7000Buy Now |
| 39 | DATA MINING | An Efficient Method for High Quality andCohesive Topical Phrase Mining | 7000Buy Now |
| 40 | DATA MINING | Collective List-Only Entity Linking:A Graph-Based Approach | 7000Buy Now |
| 41 | DATA MINING | Entity Linking: A Problem to Extract Corresponding Entity with Knowledge Base | 7000Buy Now |
| 42 | DATA MINING | Improving Instance Selection Methods For Big DataClassification | 7000Buy Now |
| 43 | DATA MINING | A Novel Load Image Profile-Based Electricity Load Clustering Methodology | 7000Buy Now |
| 44 | DATA MINING | NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding | 7000Buy Now |
| 45 | DATA MINING | Network Representation Learning Enhanced Recommendation Algorithm | 7000Buy Now |
| 46 | DATA MINING | DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction | 7000Buy Now |
| 47 | DATA MINING | Motion Based Inference of Social Circles via Self-Attention and Contextualized Embedding | 7000Buy Now |
| 48 | DATA MINING | Composition Context-Based Web Services Similarity Measure | 7000Buy Now |
| 49 | DATA MINING | Neural Binary Representation Learning for Large-Scale Collaborative Filtering | 7000Buy Now |
| 50 | DATA MINING | Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model | 7000Buy Now |
| 51 | DATA MINING | A Hierarchical Attention Model for Social Contextual Image Recommendation | 7000Buy Now |
| 52 | DATA MINING | Visualizing Three-Dimensional Ocean Eddies in Web Browsers | 7000Buy Now |
| 53 | DATA MINING | A Query-based Framework for Searching, Sorting, and Exploring Data Ensembles | 7000Buy Now |
| 54 | DATA MINING | BD2K Training Coordinating Center's ERuDIte: the Educational Resource Discovery Index for Data Science | 7000Buy Now |
| 55 | DATA MINING | A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps | 7000Buy Now |
| 56 | DATA MINING | Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis | 7000Buy Now |
| 57 | DATA MINING | Old and Young Users White Space Preferences for Online News Web Pages | 7000Buy Now |
| 58 | DATA MINING | A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding | 7000Buy Now |
| 59 | DATA MINING | Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based Demand Response | 7000Buy Now |
| 60 | SECURE COMPUTING | Traffic Analysis Attack for Identifying Users Online Activities | 7000Buy Now |
| 61 | SECURE COMPUTING | Coverless Information Hiding Method Based on Web Text | 7000Buy Now |
| 62 | SECURE COMPUTING | LBOA: Location-Based Secure Outsourced Aggregation in IoT | 7000Buy Now |
| 63 | SECURE COMPUTING | Looking Back! Using Early Versions of Android Apps as Attack Vectors | 7000Buy Now |
| 64 | SECURE COMPUTING | Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications | 7000Buy Now |
| 65 | SECURE COMPUTING | Cloud Centric Authentication for Wearable Healthcare Monitoring System | 7000Buy Now |
| 66 | BLOCKCHAIN TECHNOLOGY | PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management | 7000Buy Now |
| 67 | BLOCKCHAIN TECHNOLOGY | Blockchain for AI: Review and Open Research Challenges | 7000Buy Now |
| 68 | BLOCKCHAIN TECHNOLOGY | Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors | 7000Buy Now |
| 69 | PATTERN ANALYSIS AND MACHINE INTELLIGENCE | Towards Efficient U-Nets: A Coupled and Quantized Approach | 7000Buy Now |
| 70 | BIG DATA | Comparison of Swam Intelligence Clustering Algorithms for Analysis of Big Data in Healthcare | 7000Buy Now |
| 71 | BIG DATA | Effective and Efficient Content Redundancy Detection of Web Videos | 7000Buy Now |
| 72 | BIG DATA | Incorporating Data Context to Cost-Effectively Automate End-to-End Data Wrangling | 7000Buy Now |
| 73 | BIG DATA | Sentiment Analysis of Comment Texts Based on BiLSTM | 7000Buy Now |
| 74 | BIG DATA | Data Interpolation and Reconstruction | 7000Buy Now |
| 75 | BIG DATA | Big Data and Collaboration Research | 7000Buy Now |
| 76 | BIG DATA | Large-Margin Regularized Softmax Cross-Entropy Loss | 7000Buy Now |
| 77 | INTERNET OF THINGS(IOT) | Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality | 7000Buy Now |
| 78 | INTERNET OF THINGS(IOT) | Approximate Data Aggregation in Sensor Equipped IoT Networks | 7000Buy Now |
| 79 | INTERNET OF THINGS(IOT) | Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks | 7000Buy Now |
| 80 | INTERNET OF THINGS(IOT) | Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment | 7000Buy Now |
| 81 | INTERNET OF THINGS(IOT) | Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things | 7000Buy Now |
| 82 | INTERNET OF THINGS(IOT) | Review of Standard Ontologies for the Web of Things | 7000Buy Now |
| 83 | PATTERN ANALYSIS AND MACHINE INTELLIGENCE | Towards Efficient U-Nets: A Coupled and Quantized Approach | 7000Buy Now |
| 84 | SOCIAL NETWORK,IMAGE PROCESSING | A Hybrid Approach to Service Recommendation Based on Network Representation Learning | 7000Buy Now |
| 85 | SOCIAL NETWORK,IMAGE PROCESSING | Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model | 7000Buy Now |
| 86 | SOFTWARE ENGINEERING,SERVICE COMPUTING | Platform-Independent Dynamic Taint Analysis for JavaScript | 7000Buy Now |
| 87 | SOFTWARE ENGINEERING,SERVICE COMPUTING | Scheduling Real Time Security Aware tasks in Fog Networks | 7000Buy Now |
| 88 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Epistasis Analysis Using an Improved Fuzzy C-means-based Entropy Approach | 7000Buy Now |
| 89 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Intelligent Security Planning for Regional Distributed Energy Internet | 7000Buy Now |
| 90 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Fuzzy Bag-of-Words Model for Document Representation | 7000Buy Now |
| 91 | FUZZY SYSTEM,INDUSTRIAL INFORMATICS | Efficient kNN Classification With Different Numbers of Nearest Neighbors | 7000Buy Now |
| 92 | CYBERSECURITY | A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense | 7000Buy Now |
| 93 | CYBERSECURITY | A Practical Public Key Encryption Scheme Based on Learning Parity with Noise | 7000Buy Now |
| 94 | CYBERSECURITY | Clustering by Local Gravitation | 7000Buy Now |
| 95 | CYBERSECURITY | Credit card fraud detection using AdaBoost and majority voting | 7000Buy Now |
| 96 | CYBERSECURITY | FraudFind: Financial Fraud Detection by Analyzing Human Behavior | 7000Buy Now |
| 97 | MOBILE COMPUTING | Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency Situations | 7000Buy Now |
| 98 | FUZZY SYSTEMS,MACHINE LEARNING | Bayesian Nonparametric Learning for Hierarchical and Sparse Topics | 7000Buy Now |
| 99 | SOCIAL NETWORK | Analyzing and Detecting Money-Laundering Accounts in Online Social Networks | 7000Buy Now |