S.No |
Name |
1 |
Blockchain Based Management for Organ Donation and Transplantation |
2 |
Enhancing Organ Donor Matching and Transparency with Aadhar Based Registration |
3 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
4 |
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
5 |
Verifiable and Multi Keyword Searchable Attribute Based Encryption Scheme for Cloud Storage |
6 |
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing |
7 |
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT |
8 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
9 |
Performance and power consumption evaluation in smart phone based image processing for medical applications |
10 |
Filtering Instagram hash tags through crowd tagging and the HITS algorithm |
11 |
Cloud Data Protection for the Masses |
12 |
Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras |
13 |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
14 |
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques |
15 |
Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine |
16 |
Predicting Cyber bullying on Social Media in the Big Data Era Using Machine Learning Algorithms |
17 |
Online Public Shaming on Twitter Detection Analysis and Mitigation |
18 |
Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
19 |
Hate Speech on Twitter A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection |
20 |
Follow But No Track Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
21 |
Detecting Malicious Social Bots Based on Clickstream Sequences |
22 |
DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction |
23 |
Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud |
24 |
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage |
25 |
Automated Phrase Mining from Massive Text Corpora |
26 |
An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers |
27 |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
28 |
A Credibility Analysis System for Assessing Information on Twitter |
29 |
Authentication by Encrypted Negative Password |
30 |
ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks |
31 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
32 |
Two tales of privacy in online social networks |
33 |
Then and Now On The Maturity of the Cybercrime Markets |
34 |
SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces |
35 |
Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme |
36 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
37 |
Providing ranking for web urls based on user feedbacks |
38 |
Profiling Online Social Behaviors for Compromised Account Detection |
39 |
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
40 |
Privacy-Preserving and Content-Protecting Location Based Queries |
41 |
Personalized Geo-Specific Tag Recommendation for Photos on Social Websites |
42 |
Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks |
43 |
On the Security of Data Access Control for Multiauthority Cloud Storage Systems |
44 |
My Privacy My Decision Control of Photo Sharing on Online Social Networks |
45 |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing |
46 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage |
47 |
Identity Based Encryption with Outsourced Revocation in Cloud Computing |
48 |
FRAppE Detecting Malicious Facebook Applications |
49 |
FOCS Fast Overlapped Community Search |
50 |
EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
51 |
Effective Key Management in Dynamic Wireless Sensor Networks |
52 |
EAACK—A Secure Intrusion-Detection System for MANETs |
53 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
54 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
55 |
DROPS Division and Replication of Data in Cloud for Optimal Performance and Security |
56 |
Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network |
57 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
58 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
59 |
Cloud Computing Security From Single to Multi-Clouds |
60 |
Building an intrusion detection system using a filter-based feature selection algorithm |
61 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
62 |
An Incentive Framework for Cellular Traffic Offloading |
63 |
An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks |
64 |
A System to Filter Unwanted Messages from OSN User Walls |
65 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
66 |
A Novel Security Scheme for Online Banking Based on Virtual Machine |
67 |
A New Algorithm for Inferring User Search Goals with Feedback Sessions |
68 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
69 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
70 |
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
71 |
A Cocktail Approach for Travel Package Recommendation |
72 |
User Vitality Ranking and Prediction in Social Networking Servicesa Dynamic Network Perspective |
73 |
Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks |
74 |
Toward Shared Ownership in the Cloud |
75 |
The Server Provisioning Problem for Continuous Distributed Interactive Applications |
76 |
Tag Based Image Search by Social Re-ranking |
77 |
SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
78 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
79 |
SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors |
80 |
SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud |
81 |
Securing Aggregate Queries for DNA Databases |
82 |
Secure Range Search over Encrypted Uncertain loT Outsourced Data |
83 |
SDE A Novel Clustering Framework Based on Sparsity-Density Entropy |
84 |
Resource renting for periodical cloud workflow applications |
85 |
RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem |
86 |
QoS Recommendation in Cloud Services |
87 |
Profiling Online Social Behaviors for Compromised Account Detection |
88 |
PrivacyProtectionAccessControlScheme |
89 |
Privacy Characterization and Quantification in Data Publishing |
90 |
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
91 |
NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media |
92 |
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud |
93 |
Mitigating Cross-Site Scripting Attacks with a Content Security Policy |
94 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
95 |
Joint Optimization of Multicast Energy in Delay Constrained Mobile WSNs |
96 |
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage |
97 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
98 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
99 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
100 |
Ghost Riders Sybil Attacks on Crowdsourced Mobile Mapping Services |
101 |
Generating Query Facets using Knowledge Bases |
102 |
FRoDO Fraud Resilient Device for Off-Line Micro-Payments |
103 |
Frequent Itemsets Mining with Differential Privacy over Large-scale Data |
104 |
FraudFind Financial Fraud Detection by Analyzing Human Behavior |
105 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
106 |
Fast Phrase Search for Encrypted Cloud Storage |
107 |
EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
108 |
Enhancing Information Resilience in Disruptive Information-Centric Networks |
109 |
Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks |
110 |
Efficient Keyword-aware Representative Travel Route Recommendation |
111 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
112 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
113 |
Distributed Faulty Node Detection in Delay Tolerant Networks Design and Analysis |
114 |
DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
115 |
Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach |
116 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
117 |
CryptCloud+ Secure and Expressive Data Access Control for Cloud Storage |
118 |
CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING |
119 |
Crawling Hidden Objects with kNN Queries |
120 |
CoDetect Financial Fraud Detection with Anomaly Feature Detection |
121 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
122 |
Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites |
123 |
Block Design-based Key Agreement for Group Data Sharing in Cloud Computing |
124 |
Automatically Mining Facets for Queries from Their Search Results |
125 |
Audience Behavior Mining Integrating TV Ratings with Multimedia Conten |
126 |
Aspect-level Influence Discovery from Graphs |
127 |
Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach |
128 |
Analysis of users behaviour in structured e-commerce websites |
129 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
130 |
Active Trust Secure and Trustable Routing in Wireless Sensor Network Networks |
131 |
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks |
132 |
Achieving Data Truthfulness and Privacy Preservation in Data Markets |
133 |
A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
134 |
A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense |
135 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
136 |
A Hybrid Approach for Detecting Automated Spammers in Twitter |
137 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing Formal Specification and Verification |
138 |
A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn |
139 |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
140 |
Secure Data Sharing In Cloud Computing Using Revocable-Storage Identity-Based Encryption |
141 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
142 |
A Shoulder Surfing Resistant Graphical Authentication System |
143 |
SocialQ&A An Online Social Network Based Question and Answer System |
144 |
Using Data Mining to Predict Hospital Admissions from the Emergency Department |
145 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys (Big Data) |
146 |
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers (NETWORKING) |
147 |
Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis with Co-Occurrence Data |
148 |
Fast Nearest Neighbor Search with Keywords |
149 |
Identity Based Data Outsourcing with Comprehensive Auditing in Clouds |
150 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
151 |
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach (KNOWLEDGE AND DATA ENGINEERING) |
152 |
iPath Path Inference in Wireless Sensor Networks |
153 |
SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces (SERVICES COMPUTING) |
154 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems (PARALLEL AND DISTRIBUTED SYSTEMS) |
155 |
Continuous Answering Holistic Queries over Sensor Networks(PARALLEL AND DISTRIBUTED SYSTEMS) |
156 |
FRAppE Detecting Malicious Facebook Applications (NETWORKING) |
157 |
Search Me If You Can Privacy-preserving Location Query Service (MOBILE COMPUTING) |
158 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach (MOBILE COMPUTING) |
159 |
An Incentive Framework for Cellular Traffic Offloading(MOBILE COMPUTING) |
160 |
Privacy-Preserving and Content-Protecting Location Based Queries (KNOWLEDGE AND DATA ENGINEERING) |
161 |
Location Aware Keyword Query Suggestion Based on Document Proximity (KNOWLEDGE AND DATA ENGINEERING) |
162 |
Resolving Multi-party Privacy Conflicts in Social Media (KNOWLEDGE AND DATA ENGINEERING) |
163 |
FOCS Fast Overlapped Community Search (KNOWLEDGE AND DATA ENGINEERING) |
164 |
DiploCloud Efficient and Scalable Management of RDF Data in the Cloud |
165 |
Automatically Mining Facets for Queries from Their Search Results (KNOWLEDGE AND DATA ENGINEERING) |
166 |
A Cocktail Approach for Travel Package Recommendation (KNOWLEDGE AND DATA ENGINEERING) |
167 |
EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data (INTERNET OF THINGS) |
168 |
Geometric Range Search on Encrypted Spatial Data (INFORMATION Forensics and Security) |
169 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Computers) |
170 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email (Computers) |
171 |
Building an intrusion detection system using a filter-based feature selection algorithm (Computers) |
172 |
Identity Based Encryption with Cloud Revocation Authority and Its Applications (Cloud Computing) |
S.No |
Name |
1 |
CBD Cyberbullying Detection |
2 |
Interview Insight Hub |
3 |
Placement Cell Management System |
4 |
A voice-based prescription generating system |
5 |
Shuffling Algorithm based Dynamic Question Paper generation |
6 |
User Defined Spam Filtering Through Mail Server |
7 |
Ticket Reservation System in Indian Airlines |
8 |
Automated Detecting Spammers in social media |
9 |
Online Notice Board |
10 |
College Event Management System |
11 |
online grocery shopping |
12 |
Content-Based Image Retrieval System |
13 |
implementation of tambola game using node js |
14 |
Web-Pharmaceuticals |
15 |
Web Enabled Books Management Tool |
16 |
Warehouse Management System |
17 |
Voiced Based Encryption |
18 |
Visitors Management |
19 |
Visa Processing Information System |
20 |
View the City |
21 |
Vehicle Identification System |
22 |
Uplifting Of Farmer through Connected Ecosystem |
23 |
University Admission System |
24 |
Transport plus |
25 |
Online Construction and Cost Calculator |
26 |
Online College Voting |
27 |
Online Asset Management System |
28 |
Multi Keyword Ranked Search |
29 |
Freelancers Job Consultancies |
30 |
Institute Explorer |
31 |
Improving the Customer Relationship Management Using Data Mining |
32 |
Hr Sla’s For Hr Department |
33 |
Hr Manager |
34 |
Hospital Management System |
35 |
Help Desk |
36 |
Guest Hose Management System |
37 |
Govt Scheme Management System |
38 |
Government Medical Schemes |
39 |
Forest Resource Sales and Maintenance Automation |
40 |
Filtering Unwanted Messages from Online Social Networks |
41 |
Examination Results and Notifications |
42 |
E-Solution Provider |
43 |
Employee Resource Management Systems |
44 |
Employee Performance and Recognition Portal |
45 |
Employee Leave Management |
46 |
E-Tendering System |
47 |
E - Wheelz |
48 |
Digital Steganography |
49 |
DIGITAL LIBRARY MANAGEMENT SYSTEM |
50 |
Digital Data Security through Water Marking |
51 |
Dashboard To Track Medical Records Of Patients In Government Hospitals |
52 |
Online Courier Service Management System |
53 |
College Incubation and Innovation Cell |
54 |
City Vehicle and Traffic Control System |
55 |
Citizen Card Maintenance for E-Governess |
56 |
Captcha as Graphical Password Authentication System |
57 |
Bug Tracking For Improving Software Reliability |
58 |
Book Resale with Lending and Donation |
59 |
Automobile trailing system |
60 |
An Online Social Network Based Question And Answer System |
61 |
108 - Public Health Emergency Services |
62 |
Employee Payroll Management System |
63 |
SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY |
64 |
MAINTENANCE OF DATABASE OF BENEFICIARIES OF GOVERNEMENT MEDICAL SCHEMES |
65 |
Spear phishing detection |
66 |
WEB BASED COLLEGE FORUM |
67 |
DRUG ADDICTION COUNSELING AND GUIDENCE SYSTEM |
68 |
Bug Tracking for Improving Software Reliability |
69 |
Improving the customer relationship management Using Data Mining |
70 |
GOOGLE MAPS BASED EVENT MANAGEMENT SYSTEM |
71 |
Film Success Prediction |
72 |
TRAVELS MANAGEMENT SYSTEM |
73 |
Online Pharmacy Performance Finder on User Ratings |
74 |
online Blood Bank and Blood Donor Management System |
75 |
Driving School Student Management System |
76 |
COLLEGE EVENT CALENDAR |
77 |
Online College Magazine |
78 |
comprehensive analysis of security algorithm in cloud computing |
79 |
MEASURING CLINICAL HEALTH DATABASE SIMILARITY USING CLUSTERING AND CLASSIFICATION |
80 |
Training and Placement system |
S.No |
Name |
1 |
Aerial Image Segmentation with Class-wise Analysis and Visualization |
2 |
Intelligent Video Interview Analysis System for Enhancing Interview Skills and Performance |
3 |
DentScan-Cavity Detection & Diagnostic Reporting System |
4 |
Mock Interview Platform for Enhanced Performance |
5 |
AI-Powered Address Matching for Accurate Postal Delivery Enhancing Efficiency with Fuzzy Logic |
6 |
Handwritten English Character and Digit (0-9) Recognition Using Deep Learning |
7 |
Real-Time Earthquake Prediction Using Machine Learning and Geospatial Analytics |
8 |
Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques |
9 |
Fast and Lightweight Encryption for Image Data Protection |
10 |
A Novel LSTM-CNN Framework for Detecting and Mitigating Botnet Attacks in Software-Defined Networks |
11 |
A Lightweight Image Encryption Algorithm Based on Secure Key Generation |
12 |
Predicting cattle diseases using symptom-based machine learning |
13 |
Deep Learning-Based Parkinsons Disease Detection Using ResNet50A-Web Application |
14 |
Early Detection Method for Parkinsons disease Using Deep Ensemble Learning on MRI Dataset |
15 |
WEATHER PREDICTION |
16 |
Fraud Detection on E-Commerce Transactions Using Machine Learning Technique |
17 |
College Event Management System using MongoDB |
18 |
Traffic Signs Recognition |
19 |
AI-Enhanced Mental Health Support system |
20 |
Content-Based Image Retrieval System |
21 |
READEASE EMPOWERING DYSLEXIA |
22 |
Automated Multi-Language Video Subtitle Generation with English Translation |
23 |
MediBot Drug Recommendations system |
24 |
Deep Learning-based Auto Accident Detection and Alert System |
25 |
Large Language Model (LLM) for Blog Article Generator with both text and images |
26 |
Detecting Suspicious Activities in Exam Halls to Prevent Cheating |
27 |
AI-Assisted Search for Identifying Missing Persons by Facial Recognition |
28 |
Intelligent Social Distancing Enforcement for Health Security |
29 |
Secured E-voting system based on iris identification |
30 |
Educational Certificate Verification System Using Blockchain |
31 |
Cervical Spine Fracture Detection Using Deep Neural Networks |
32 |
Video-Text Retrieval Using Deep Learning |
33 |
Secure and Transparent Donation Platform with Blockchain |
34 |
Language Detection Using Machine Learning |
35 |
Automatic Timetable Generator Using Python |
36 |
Cough Sound Diagnostics for Lung Infection Identification |
37 |
Malware Classification Is Used To Distinguish Unique Types of Malware from Each Other |
38 |
An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning |
39 |
Voice-Based Email System for Visually Impaired Individuals to Access and Send Emails |
40 |
Graphical Password to prevent Shoulder Surfing |
41 |
Classifying Fake News Articles Using Natural Language Processing |
42 |
A Controllable False Data Injection Attack for a Cyber Physical System |
43 |
Movie Recommendation System Using Collaborative Filtering |
44 |
ONLINE DIGITAL CHEQUE CLEARANCE AND VERIFICATION SYSTEM |
45 |
Cyber Attack Detection Model (CADM) Based on Machine Learning |
46 |
Spammer Detection and Fake User Identification on Social Networks |
47 |
Currency Detection For Visually Impaired |
48 |
Automatic Text Transcribes and Summarize From Length Audio |
49 |
Generating Synthetic Images from textual description using GAN |
50 |
Smart Suspect Tracker Using ML |
51 |
Image forgery detection based on fusion of lightweight deep learning model |
52 |
End-to-end Conversion Speed Analysis of an FPT AI-based Text-to-Speech Application |
53 |
Machine Learning Methods For Calories Measurement of Fruits and Vegetables |
54 |
Skin Disease Classification using Convolutional Neural Network |
55 |
Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles |
56 |
Recognition of Handwritten Textual Annotations using Tesseract Open Source OCR Engine |
57 |
Vehicle Detection and Speed Tracking using OpenCv |
58 |
Diabetes Prediction Using Machine Learning Algorithm |
59 |
Social Media and Misleading Information in a Democracy A Mechanism Design Approach |
60 |
Heart Disease Prediction |
61 |
Real Time Object detection and Recognition Using Deep Learning |
62 |
Rainfall Prediction using Machine Learning |
63 |
Sign language recognition to text and voice using Cnn |
64 |
Image Based Question and Answering System |
65 |
RESUME BUILDER |
66 |
Drug Recommendation System based on Sentiment Analysis of Drug Reviews using Machine Learning |
67 |
Driver drowsiness monitoring system using visual behavior and machine learning |
68 |
Facial Recognition for Crime Detection |
69 |
Gender and Age classification using CNN |
70 |
Machine learning techniques for cyber attacks detection in network |
71 |
Stationary Manageement System |
72 |
DocEnTr-An End-to-End Document Image Enhancement Transformer |
73 |
Phishing Website Detection Using Machine Learning Algorithm |
74 |
IPL MATCH PREDICTION |
75 |
Disease Prediction using Machine Learning |
76 |
Online Food Ordering System |
77 |
Automatic Shadow Detection in Image Using Adaptive Thresholding Segmentation |
78 |
Identifying those responsible for stealing the credit cards risk management |
79 |
Finding the principal components in Software Defects using randomized PCA |
80 |
Clustering News Headlines using k-means and Hierarchical algorithm |
81 |
Serendipitous Drug Usage In Social Media |
82 |
personalized recommendataion of social images by constrcuting a user interest tree with deep features and tag trees |
83 |
machine learning based error detection and dell design optimisation in signal intergrity application |
84 |
Hitboost survival analysis via a multi-output gradient boosting decision tree method |
85 |
Efficient vertical mining of high average utility itemset based on novel upper bonds |
86 |
classified different users with mulitple instance learning from social network data |
87 |
block chain a a game charnger for securing iot data |
88 |
assessing the effectiveness of riparian restoration projects using landsat and preception data from the cloud computing application |
89 |
A Generic Human Machine Annotation Framework Based on Dynamic Cooperative Learning |
90 |
Securing ATM Transactions using Face Recognition |
91 |
Estimate the Height Weight and BMI from Face Using Machine Learning |
92 |
TwitPersonality-Computing Personality Traits from Tweets Using Word Embeddings and Supervised Learning |
93 |
personality prediction based on twitter tweets using machine learning algorithms |
94 |
Fault Detection and Isolation in Industrial Processes Using Deep Learning Approaches |
95 |
Number Plate Recognition by using ML algorithm |
96 |
Blockchain-based Electronic Voting System with Special Ballot and Block Structures that Complies with Indonesian Principle of Voting |
97 |
SUPERMARKET SALES ANALYSIS |
98 |
user ratings and reviews based fraud app detection in google playstore |
99 |
Mark It For Down Article Maker |
100 |
EMOTION DETECTION FROM LIVE CAMERA USING CNN |
101 |
Solving Nurse Scheduling Problem Using Constraint Programming Technique |
102 |
Facial Movements Based Mouse Cursor Control for Physically Disabled Individual |
103 |
Detect Fraud App in Google Play Store by Sentiment Analysis |
104 |
Weakly-supervised Deep Embedding for Product Review Sentiment Analysis |
105 |
Toward Better Statistical Validation of Machine Learning-Based Multimedia Quality Estimators |
106 |
Semi-supervised machine learning approach for DDoS detection |
107 |
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning |
108 |
Rich Short Text Conversation Using Semantic-Key-Controlled Sequence Generation |
109 |
Price-based Resource Allocation for Edge Computing A Market Equilibrium Approach |
110 |
Prediction of Crude Oil Prices using Support Vector Regression (SVR) with grid search cross validation algorithm |
111 |
Personalized Affective Feedback to Address Students Frustration in ITS |
112 |
Multi-Traffic Scene Perception Based on Supervised Learning |
113 |
Modeling and Predicting Cyber Hacking Breaches |
114 |
Loan Approval Prediction based on Machine Learning Approach |
115 |
Image Based Appraisal of Real Estate Properties |
116 |
How Data-Driven Entrepreneur Analyzes Imperfect Information for Business Opportunity Evaluation |
117 |
Generating Wikipedia By Summarizing Long Sequences |
118 |
Exploratory Visual Sequence Mining Based on Pattern-Growth |
119 |
Efficient Vertical Mining of High Average-Utility Itemsets Based on Novel Upper-Bounds |
120 |
Designing Cyber Insurance Policies The Role of Pre-Screening and Security Interdependence |
121 |
Deep Learning Applications in Medical Image Analysis |
122 |
Data-Driven Design of Fog-Computing-Aided Process Monitoring System for Large-Scale Industrial Processes |
123 |
Correlated Matrix Factorization for Recommendation with Implicit Feedback |
124 |
Characterizing And Predicting Early Reviewers For Effective Product Marketing On E-Commerce Websites |
125 |
Cancer Scenario in India with Future Perspectives |
126 |
Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling |
127 |
A user-centric machine learning framework for cyber security operations center |
128 |
A Data Mining Based Model For Detection Of Fraudulent Behaviour In Water Consumption |
129 |
A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security |
130 |
Spammer Detection and Fake User Identification on Social Networks |
131 |
Credit card Fraud Detection using Predictive Modeling |
132 |
Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes |
133 |
lung cancer detection |
134 |
Vehicle detection in a Video frame |
135 |
Image Classifier using CNN |
136 |
Vehicle number plate detection |
137 |
A Method for Hybrid Personalized Recommender based on Clustering of Fuzzy User Profiles |