Latest IEEE final year artificial Intelligence projects(AI project) topic ME,BE
Expectation of teacher from student about:-final year artificial intelligence projects
1)student should able to understand how algorithm works
2)it must be linked with real time scenarios eg. Intelligentally identifying sarcasm with the voice type.
3)you must modify some things from previous existing paper in your final year artificial intelligence projects
4)you should be good enough to explain any queries regarding your final year artificial intelligence projects and algorithms . Why specific algorithm is chosen and why not others.
All final year artificial intelligence projects topics are sorted from IEEE to enhance students involvement in this field as future tends to be more ‘ART-FI’
For more other domain projects click here
Algorithms used in artificial intelligence:-
- Linear Regression.
- Logistic Regression.
- Decision Tree.
- SVM (Support Vector Machine with four kernels)
- Naive Bayes.
- KNN (K- Nearest Neighbors)
- K-Means.
- Random Forest.
- CNN(Convolutional neural network)
- ANN(Artificial neural network)
- RNN(recurrent neural network)
Difference between Machine learning and Artificial Intelligence- taken from here
Artificial Intelligence and Machine Learning are the terms of computer science. This article discusses some points on the basis of which we can differentiate between these two terms.
Overview
Artificial Intelligence : The word Artificial Intelligence comprises of two words “Artificial” and “Intelligence”. Artificial refers to something which is made by human or non natural thing and Intelligence means ability to understand or think. There is a misconception that Artificial Intelligence is a system, but it is not a system .AI is implemented in the system. There can be so many definition of AI, one definition can be “It is the study of how to train the computers so that computers can do things which at present human can do better.”Therefore It is a intelligence where we want to add all the capabilities to machine that human contain.
Machine Learning : Machine Learning is the learning in which machine can learn by its own without being explicitly programmed. It is an application of AI that provide system the ability to automatically learn and improve from experience. Here we can generate a program by integrating input and output of that program. One of the simple definition of the Machine Learning is “Machine Learning is said to learn from experience E w.r.t some class of task T and a performance measure P if learners performance at the task in the class as measured by P improves with experiences.”
- Knowledge reasoning.
- Planning.
- Machine learning.
- Natural language processing.
- Computer vision.
- Robotics.
- Artificial general intelligence.
Merits of AI
- 24/7 Availability. Machines don’t require frequent breaks and refreshments as like human beings.
- Day to Day Application.
- Digital Assistance.
- Handling Repetitive Jobs.
- Medical Applications.
- Hazardous Exploration.
- Reduction of Error.
Demerits of AI
- High Cost: Creation of artificial intelligence requires huge costs as they are very complex machines.
- No Replicating Humans: Intelligence is believed to be a gift of nature.
- No Improvement with Experience: Unlike humans, artificial intelligence cannot be improved with experience.
- No Original Creativity:
- Unemployment:
Where to use CNN for final year artificial intelligence projects.
CNN–>Convolution Neural Network (CNN) are particularly useful for spatial data analysis, image recognition, computer vision, natural language processing, signal processing and variety of other different purposes. It is much more powerful compared to the other feedback forward networks for image recognition is the fact that they do not require as much human intervention and parameters as some of the other networks such as MLP do. This is primarily driven by the fact that CNNs have neurons arranged in three dimensions.
In this research, CNN is used, and the accuracy obtained using this Neural Network for epoch=300 and nodes=11 – 80.33 %
For all project Please refer follwing table.
id | name | category | IEEE_year |
---|---|---|---|
1 | Sentiment Analysis of Twitter Data | Artificial Intelligence | 2019 |
2 | Deep Learning-based Job Placement in Distributed Machine Learning Clusters | Artificial Intelligence | 2019 |
3 | Human Behaviour Recognition Using Wifi Channel State Information | Artificial Intelligence | 2019 |
4 | Deep Learning Based Phase Reconstruction for Speaker Separation: A Trigonometric Perspective | Artificial Intelligence | 2019 |
5 | DRL360: 360-degree Video Streaming with Deep Reinforcement Learning | Artificial Intelligence | 2019 |
6 | A Review on Machine Learning Classification Techniques for Plant Disease Detection | Artificial Intelligence | 2019 |
7 | Disentangling Correlated Speaker and Noise for Speech Synthesis via Data Augmentation and Adversarial Factorization | Artificial Intelligence | 2019 |
8 | A Fully Convolutional Neural Network for Complex Spectrogram Processing in Speech Enhancement | Artificial Intelligence | 2019 |
9 | Mobile Robot Navigation based on Deep Reinforcement Learning | Artificial Intelligence | 2019 |
10 | Real-time Credit Card Fraud Detection Using Machine Learning | Artificial Intelligence | 2019 |
11 | An Attention-based Neural Network Approach for Single Channel Speech Enhancement | Artificial Intelligence | 2019 |
12 | Packet-based Network Traffic Classification Using Deep Learning | Artificial intelligence | 2019 |
13 | Phonemic-level Duration Control Using Attention Alignment for Natural Speech Synthesis | Artificial intelligence | 2019 |
14 | Crowd-Robot Interaction: Crowd-Aware Robot Navigation With Attention-Based Deep Reinforcement Learning | Artificial intelligence | 2019 |
15 | Static and Dynamic Malware Analysis Using Machine Learning | Artificial intelligence | 2019 |
16 | Fast Imaging in the Dark by using Convolutional Network | Artificial intelligence | 2019 |
17 | Self-supervised Audio-visual Co-segmentation | Artificial intelligence | 2019 |
18 | Comparison of Machine Learning Methods for Breast Cancer Diagnosis | Artificial intelligence | 2019 |
19 | Randomly Weighted CNNs for (Music) Audio Classification | Artificial intelligence | 2019 |
20 | Artificial Intelligence of Things Wearable System for Cardiac Disease Detection | Artificial intelligence | 2019 |
21 | Multi-speaker Emotional Acoustic Modeling for CNN-based Speech Synthesis | Artificial intelligence | 2019 |
22 | Summary of Research on IT Network and Industrial Control Network Security Assessment | network security | 2019 |
23 | Fully Supervised Speaker Diarization | Artificial intelligence | 2019 |
24 | Real-time machine learning for early detection of heart disease using big data approach | Artificial intelligence | 2019 |
25 | Artificial Intelligence in Future Evolution of Mobile Communication | Artificial intelligence | 2019 |
26 | A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation | network security | 2019 |
27 | Internet of Things for Greenhouse Monitoring System Using Deep Learning and Bot Notification Services | Artificial intelligence | 2019 |
28 | Towards a fully automated and optimized network security functions orchestration | network security | 2019 |
29 | Real-time Speech Enhancement Using an Efficient Convolutional Recurrent Network for Dual-microphone Mobile Phones in Close-talk Scenarios | Artificial intelligence | 2019 |
30 | User Profiling Based on Application-Level Using Network Metadata | network security | 2019 |
31 | A survey on security threats and authentication approaches in wireless sensor networks | network security | 2018 |
32 | Prediction of Heart Disease Using Machine Learning Algorithms. | Artificial intelligence | 2019 |
33 | Research of Computer Network Security Evaluation Based on Backpropagation Neural Network | network security | 2019 |
34 | DioT: A Federated Self-learning Anomaly Detection System for IoT | Artificial intelligence | 2019 |
35 | MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security | network security | 2018 |
36 | Intrusion Detection by Deep Learning with TensorFlow | Artificial intelligence | 2019 |
37 | Network Security Situation Prediction Based on Long Short-Term Memory Network | network security | 2019 |
38 | Improving Wireless Network Security Based On Radio Fingerprinting | network security | 2019 |
39 | Spoofing Attack Detection by Anomaly Detection | Artificial intelligence | 2019 |
40 | Multi-Dimension Threat Situation Assessment Based on Network Security Attributes | network security | 2018 |
41 | AIR: Attentional Intention-Aware Recommender Systems | Artificial intelligence | 2019 |
42 | Research and Implementation of Security Technology in Campus Network Construction | network security | 2019 |
43 | Location-Velocity Attention for Pedestrian Trajectory Prediction | Artificial intelligence | 2019 |
44 | IDS Based Network Security Architecture with TCP/IP Parameters using Machine Learning | network security | 2018 |
45 | Research on Node Routing Security Scheme Based on Dynamic Reputation Value in Content Centric Networks | network security | 2019 |
46 | Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm | network security | 2019 |
47 | Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services | network security | 2018 |
48 | Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module | network security | 2019 |
49 | The Network Security Classified Protection System Construction of Meteorological Observation Center of China Meteorological Administration | network security | 2019 |
50 | Network security testing tools for SMEs (small and medium enterprises) | network security | 2018 |
51 | CSSS: Cyber security simulation service for software defined tactical networks | network security | 2018 |
52 | Complex Networks Monitoring and Security and Fraud Detection for Enterprises | network security | 2019 |
53 | Security Analysis of Open Source Network Access Control in Virtual Networks | network security | 2018 |
54 | IPsec/Firewall Security Policy Analysis: A Survey | network security | 2018 |
55 | Research on key technology of network security situation awareness of private cloud in enterprises | network security | 2018 |
56 | Securing OpenFlow Controller of Software-Defined Networks using Bayesian Network | network security | 2019 |
57 | Performance Evaluation and Analysis of various Network Security tools | network security | 2019 |
58 | Performance Evaluation and Analysis of various Network Security tools | network security | 2020 |
59 | Development of the ELDC and reliability evaluation of composite power system using Monte Carlo method | big data | 2019 |
60 | Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network | network security | 2018 |
61 | Twitter Text Mining for Sentiment Analysis on People’s Feedback about Oman Tourism | big data | 2019 |
62 | Study on a Decision Method for Reconfiguration of Network Security Functions Based on Privilege Transition Graph | network security | 2018 |
63 | Big Data Quality Framework: Pre-Processing Data in Weather Monitoring Application | big data | 2019 |
64 | Real-time machine learning for early detection of heart disease using big data approach | Big data | 2019 |
65 | Research on Campus Network Security Management Technology Based on Big Data | network security | 2019 |
66 | Design and Implementation of a New Intelligent Substation Network Security Defense System | network security | 2019 |
67 | Stock Market Analysis using Supervised Machine Learning | Big data | 2019 |
68 | Wireless Network Security Detection System Design Based on Client | network security | 2018 |
69 | Research on Intrusion Data Mining Algorithm Based on Multiple Minimum Support | Big data | 2019 |
70 | ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control | network security | 2018 |
71 | Combining Machine Learning and Behavior Analysis Techniques for Network Security | network security | 2020 |
72 | Research and Application of Smart Grid Early Warning Decision Platform Based on Big Data Analysis | Big data | 2019 |
73 | A Network Coding Optimization Scheme for Niche Algorithm based on Security Performance | network security | 2019 |
74 | Research on a Pattern-Matching Algorithm for the Network Security System | network security | 2018 |
75 | Study on Deep Unsupervised Learning Optimization Algorithm Based on Cloud Computing | Big data | 2019 |
76 | A Dynamic Prediction Model of Real-Time Link Travel Time Based on Traffic Big Data | Big data | 2019 |
77 | SDX-based security collaboration: Extending the security reach beyond network domains | network security | 2018 |
78 | Stock Prediction Based on LSTM under Different Stability | Big data | 2019 |
79 | Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF Loop | Big data | 2019 |
80 | Deep Learning Based Forecasting in Stock Market with Big Data Analytics | Big data | 2019 |
81 | A New Approach for Scheduling Tasks and/or Jobs in Big Data Cluster | Big data | 2019 |
82 | Early Detection of Network Incident Using Open Security Information | network security | 2018 |
83 | Research on Short-Term Load Forecasting Using XGBoost Based on Similar Days | Big data | 2019 |
84 | An Improved K-means Algorithm Based on Intersection over Union for Network Security | network security | 2019 |
85 | A Study on E-commerce Recommender System Based on Big Data | Big data | 2019 |
86 | Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network | network security | 2018 |
87 | Digital Ant Mechanism and Its Application in Network Security | network security | 2019 |
88 | Integration of Multiple IP Domains in Low-Cost and Security-Oriented Small Networks | network security | 2018 |
89 | Public Perception Based Recommendation System for Cryptocurrency | Big data | 2019 |
90 | Network Security Based on D-S Evidence Theory Optimizing CS-BP Neural Network Situation Assessment | network security | 2018 |
91 | Providing Security in Vehicular Adhoc Network using Cloud Computing by secure key Method | network security | 2018 |
92 | Analysis of Investor Sentiment and Stock Market Volatility Trend Based on Big Data Strategy | Big data | 2019 |
93 | OFMTL-SEC: State-based Security for Software Defined Networks | network security | 2018 |
94 | Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures | network security | 2018 |
95 | Convolutional Recurrent Neural Networks for Text Classification | Big data | 2019 |
96 | Pedestrian Detection and Location Algorithm Based on Deep Learning | Big data | 2019 |
97 | Traffic Light Recognition and Ranging System Based on Machine Vision | Big data | 2019 |
98 | Review on Securing Medical Big Data in Healthcare Cloud | Big data | 2019 |
99 | Dark Data Management as frontier of Information Governance | Big data | 2019 |
100 | Framework of Big data Analysis about IoT-Home-device for supporting a decision making an effective strategy about new product design | Big data | 2019 |
101 | Presto: SQL on Everything | Big data | 2019 |
102 | An Audio Classification Approach Based on Machine Learning | Big data | 2019 |
103 | Traffic Prediction Based on Ensemble Machine Learning Strategies with Bagging and LightGBM | Big data | 2019 |
104 | The Impact of Sentiment Analysis on Social Media to Assess Customer Satisfaction: Case of Rwanda | Big data | 2019 |
105 | Research on Medical Service System Based on Big Data Technology | Big data | 2019 |
106 | Implementing Big Data Lake for Heterogeneous Data Sources | Big data | 2019 |
107 | Big Data Analysis of E-Commerce Based on the Internet of Things | Big data | 2019 |
108 | Big Data Analytics for User Association Characterization in Large-Scale WiFi System | Big data | 2019 |
109 | Big Data Analytics for Higher Education in The Cloud Era | Big data | 2019 |
110 | Design and Implementation of Classroom Attendance System Based on Video Face Recognition | Big data | 2019 |
111 | Towards Federated Learning Approach to Determine Data Relevance in Big Data | Big data | 2019 |
112 | Determining the Intervening Effects of Exploratory Data Analysis and Feature Engineering in Telecoms Customer Churn Modelling | Big data | 2019 |
113 | Big Data Analytics using Machine Learning Techniques | Big data | 2019 |
114 | Construction Method of Domain Knowledge Graph Based on Big Data-driven | Big data | 2019 |
115 | Lameness Detection as a Service: Application of Machine Learning to an Internet of Cattle | Big data | 2019 |
116 | Big Data Quality Framework: Pre-Processing Data in Weather Monitoring Application | Big data | 2019 |
117 | An Effective and Scalable Data Modeling for Enterprise Big Data Platform | Big data | 2019 |
118 | QualiBD: A Tool for Modelling Quality Requirements for Big Data Applications | Big data | 2019 |
119 | Federated Query processing for Big Data in Data Science | Big data | 2019 |
120 | Research on Government Integrity Evaluation Based on Big Data | Big data | 2019 |
121 | Using Big Data for Data Leak Prevention | Big data | 2019 |
122 | Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment | Big data | 2019 |
123 | Research on Real-time Analysis and Hybrid Encryption of Big Data | Big data | 2019 |
124 | City Geospatial Dashboard: IoT and Big Data Analytics for Geospatial Solutions Provider in Disaster Management | Big data | 2019 |
125 | A Big-Data Approach to Defining Breathing Signatures for Identifying Respiratory Disease | Big data | 2019 |
126 | Adaptive Learning Model and Implementation Based on Big Data | Big data | 2019 |
127 | Investigating Random Undersampling and Feature Selection on Bioinformatics Big Data | Big data | 2019 |
128 | BigOptiBase: Big Data Analytics for Base Station Energy Consumption Optimization | Big data | 2019 |
129 | Research on Hotspot and Trend of Online Public Opinion Research in Big Data Environment | Big data | 2019 |
130 | Big Data Analysis on Social Networking | Big data | 2019 |
131 | Research of Flexible Load Analysis of Distribution Network Based on Big Data | Big data | 2019 |
132 | An Approach of Russian Online Learning Behavior Analysis and Mining Based on Big Data | Big data | 2019 |
133 | Big Data Forecasting Model of Indoor Positions for Mobile Robot Navigation Based on Apache Spark Platform | Big data | 2019 |
134 | A Framework for Integrating Big Data Security Into Agricultural Supply Chain | Big data | 2019 |
135 | Research on Medical Service System Based on Big Data Technology | Big data | 2019 |
136 | A New Approach for Scheduling Tasks and/or Jobs in Big Data Cluster | Big data | 2019 |
137 | A Dynamic Prediction Model of Real-Time Link Travel Time Based on Traffic Big Data | Big data | 2019 |
138 | Analysis of the Application of Military Big Data in Equipment Quality Information Management | Big data | 2019 |
139 | Big Data and Safety Management Methods: The Reduction Model of Hot Work Number | Big data | 2019 |
140 | Blockchain: A game changer for securing IoT data | Big data | 2019 |
141 | A High Performance Blockchain Platform for Intelligent Devices | Blockchain | 2018 |
142 | Blockchain: A game changer for securing IoT data | Blockchain | 2018 |
143 | Blockchain: Challenges and applications | Blockchain | 2018 |
144 | Blockchain-based traceability in Agri-Food supply chain management: A practical implementation | Blockchain | 2018 |
145 | Blockchain IoT (BIoT): A New Direction for Solving Internet of Things Security and Trust Issues | Blockchain | 2018 |
146 | Blockchain-Based E-Voting System | Blockchain | 2018 |
147 | Towards secure e-voting using ethereum blockchain | Blockchain | 2018 |
148 | A blockchain-based access control system for cloud storage | Blockchain | 2018 |
149 | Identity-based network security for commercial blockchain services | Blockchain | 2018 |
150 | Blockchain based smart contract for bidding system | Blockchain | 2018 |
151 | Blockchain and smart contract for digital certificate | Blockchain | 2018 |
152 | A Privacy-Aware PKI System Based on Permissioned Blockchains | Blockchain | 2018 |
153 | Blockchain for government services — Use cases security benefits and challenges | Blockchain | 2018 |
154 | Performance Benchmarking and Optimizing Hyperledger Fabric Blockchain Platform | Blockchain | 2018 |
155 | Bitcoin price prediction using machine learning | Blockchain | 2018 |
156 | Smart contracts: security patterns in the ethereum ecosystem and solidity | Blockchain | 2018 |
157 | A Blockchain-based key Management Scheme for Named Data Networking | Blockchain | 2019 |
158 | A Blockchain-Based Energy Trading Platform for Smart Homes in a Microgrid | Blockchain | 2018 |
159 | Blockchain and Internet of Things data provider for smart applications | Blockchain | 2018 |
160 | AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things | Blockchain | 2018 |
161 | Searching an Encrypted Cloud Meets Blockchain: A Decentralized Reliable and Fair Realization | Blockchain | 2018 |
162 | BlocHIE: A BLOCkchain-Based Platform for Healthcare Information Exchange | Blockchain | 2018 |
163 | Blockchain based smart energy trading platform using smart contract | Blockchain | 2018 |
164 | On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing | Blockchain | 2018 |
165 | A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study | Blockchain | 2018 |
166 | A Blockchain Proxy for Lightweight IoT Devices | Blockchain | 2018 |
167 | A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement | Blockchain | 2019 |
168 | Develop Leave Application using Blockchain Smart Contract | Blockchain | 2019 |
169 | Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams | Blockchain | 2019 |
170 | A Secure Healthcare System Design Framework using Blockchain Technology | Blockchain | 2019 |
171 | A Video Surveillance System Based on Permissioned Blockchains and Edge Computing | Blockchain | 2019 |
172 | DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things | Blockchain | 2019 |
173 | TrustChain: Trust Management in Blockchain and IoT Supported Supply Chains | Blockchain | 2019 |
174 | Traceability of counterfeit medicine supply chain through Blockchain | Blockchain | 2019 |
175 | A Study on smart city security policy based on blockchain in 5G Age | Blockchain | 2019 |
176 | Blockchain-Based Management of Video Surveillance Systems | Blockchain | 2019 |
177 | The upcoming Blockchain adoption in Higher-education: requirements and process | Blockchain | 2019 |
178 | Blockchain Based Secure Communication for IoT Devices in Smart Cities | Blockchain | 2019 |
179 | Blockchain-based secure firmware management system in IoT environment | Blockchain | 2019 |
180 | Blockchain Privacy Protection Scheme Based on Aggregate Signature | Blockchain | 2019 |
181 | Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing | Blockchain | 2019 |
182 | Securing Blockchain based Electronic Health Record using Multilevel Authentication | Blockchain | 2019 |
183 | A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities | Blockchain | 2019 |
184 | A Privacy-Preserving E-Commerce System Based on the Blockchain Technology | Blockchain | 2019 |
185 | Using blockchain Technology for Boost Cyber Security | Blockchain | 2019 |
186 | Towards Blockchain-based Electricity Trading System and Cyber Resilient Microgrids | Blockchain | 2019 |
187 | Transactive Energy Management with Blockchain Smart Contracts for P2P Multi-Settlement Markets | Blockchain | 2019 |
188 | Blockchain-based Notarization for Social Media | Blockchain | 2019 |
189 | Smart Contracts Integration between Blockchain and Internet of Things: Opportunities and Challenges | Blockchain | 2019 |
190 | Formal Specification Technique in Smart Contract Verification | Blockchain | 2019 |
191 | Decentralised Image Sharing and Copyright Protection using Blockchain and Perceptual Hashes | Blockchain | 2019 |
192 | Towards a Blockchain-Based Secure Electronic Medical Record for Healthcare Applications | Blockchain | 2019 |
193 | Fake News Detection in Social Media using Blockchain | Blockchain | 2019 |
194 | A Blockchain-based decentralized system to ensure the transparency of organic food supply chain | Blockchain | 2019 |
195 | Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture | Blockchain | 2019 |
196 | Fighting Fake News Propagation with Blockchains | Blockchain | 2019 |
197 | An Efficient Framework for Optimistic Concurrent Execution of Smart Contracts | Blockchain | 2019 |
198 | A Blockchain-based Data Sharing Scheme in The Supply Chain by IIoT | Blockchain | 2019 |
199 | Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture | Blockchain | 2019 |
200 | Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network | Blockchain | 2019 |
201 | A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions | Blockchain | 2020 |
202 | Blockchain Redefining: The Halal Food Sector | Blockchain | 2019 |
203 | Blockchain-Based Real Estate Market: One Method for Applying Blockchain Technology in Commercial Real Estate Market | Blockchain | 2020 |
204 | Formal Verification of Blockchain Smart Contract Based on Colored Petri Net Models | Blockchain | 2019 |
205 | Artificial Intelligence Integrated Blockchain For Training Autonomous Cars | Blockchain | 2019 |
206 | IOT based Electrical Device Surveillance and Control System | IOT | 2019 |
207 | Real-Time Methodology for Improving Cyber Security in Internet of Things Using Edge Computing During Attack Threats | IOT | 2020 |
208 | IOT based Electrical Device Surveillance and Control System | IOT | 2019 |
209 | Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware | IOT | 2019 |
210 | Deep Learning Models for Cyber Security in IoT Networks | IOT | 2019 |
211 | Smart Energy Efficient Home Automation System Using IoT | IOT | 2019 |
212 | Design and Implementation of a Wearable Sensor Network System for IoT-Connected Safety and Health Applications | IOT | 2019 |
213 | Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems | IOT | 2019 |
214 | A Smart Home Appliance Control System for Physically Disabled People | IOT | 2019 |
215 | A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study | IOT | 2019 |
216 | A Blockchain Proxy for Lightweight IoT Devices | IOT | 2019 |
217 | A Development Architecture for the Intelligent Animal Care and Management System Based on the Internet of Things and Artificial Intelligence | IOT | 2019 |
218 | Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams | IOT | 2019 |
219 | IoT-Based Interactive Dual Mode Smart Home Automation | IOT | 2019 |
220 | A Smart Home Automation and Metering System using Internet of Things (IoT) | IOT | 2019 |
221 | A Secure Healthcare System Design Framework using Blockchain Technology | IOT | 2019 |
222 | Automation in Agriculture and IoT | IOT | 2019 |
223 | A Video Surveillance System Based on Permissioned Blockchains and Edge Computing | IOT | 2019 |
224 | DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things | IOT | 2019 |
225 | Artificial Intelligence of Things Wearable System for Cardiac Disease Detection | IOT | 2019 |
226 | TrustChain: Trust Management in Blockchain and IoT Supported Supply Chains | IOT | 2019 |
227 | Real-time machine learning for early detection of heart disease using big data approach | IOT | 2019 |
228 | Internet of Things for Greenhouse Monitoring System Using Deep Learning and Bot Notification Services | IOT | 2019 |
229 | Human Activity Recognition and Prediction Based on Wi-Fi Channel State Information and Machine Learning | IOT | 2019 |
230 | Using Blockchain to Enhance and Optimize IoT-based Intelligent Traffic System | IOT | 2019 |
231 | Blockchain Based Secure Communication for IoT Devices in Smart Cities | IOT | 2019 |
232 | A Deep Learning Facial Expression Recognition based Scoring System for Restaurants | IOT | 2019 |
233 | Blockchain-based secure firmware management system in IoT environment | IOT | 2019 |
234 | CRF: Coexistent Routing and Flooding using WiFi Packets in Heterogeneous IoT Networks | IOT | 2019 |
235 | A Comparitive Analysis on E-Voting System Using Blockchain | IOT | 2019 |
236 | Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing | IOT | 2019 |
237 | Smart Health Monitoring System through IOT | IOT | 2019 |
238 | Deep Reinforcement Learning Based Performance Optimization in Blockchain-Enabled Internet of Vehicle | IOT | 2019 |
239 | Drone Hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and Privacy Threats for the Internet-of-Things | IOT | 2019 |
240 | Multiple UAVs-based Surveillance and Reconnaissance System Utilizing IoT Platform | IOT | 2019 |
241 | Real-Time Speech Recognition for IoT Purpose using a Delta Recurrent Neural Network Accelerato | IOT | 2019 |
242 | A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks | IOT | 2019 |
243 | IoT based Smart Traffic density Control using Image Processing | IOT | 2019 |
244 | A CNN-based Packet Classification of eMBB mMTC and URLLC Applications for 5G | IOT | 2019 |
245 | Machine Learning Application in Predictive Maintenance | IOT | 2019 |
246 | Blockchain Empowered Resource Trading in Mobile Edge Computing and Networks | IOT | 2019 |
247 | Internet of Things in Smart Agriculture: Enabling Technologies | IOT | 2019 |
248 | IoT Based Remote Health Monitoring System for Patients and Elderly People | IOT | 2019 |
249 | A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities | IOT | 2019 |
250 | IoT Based Patient Monitoring System Using ECG Sensor | IOT | 2019 |
251 | IoT based smart garbage monitoring & collection system using WeMos & Ultrasonic sensors | IOT | 2019 |
252 | Domicile - An IoT Based Smart Home Automation System | IOT | 2019 |
253 | Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks | IOT | 2019 |
254 | Human Behavior Prediction Though Noninvasive and Privacy-Preserving Internet of Things (IoT) Assisted Monitoring | IOT | 2019 |
255 | A Literature Study On Machine Learning Fusion With IOT | IOT | 2019 |
256 | Smart Contracts Integration between Blockchain and Internet of Things: Opportunities and Challenges | IOT | 2019 |
257 | EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques | IOT | 2019 |
258 | Arduino Based Smart Energy Meter using GSM | IOT | 2019 |
259 | A Real-Time Mechanical Structures Monitoring System Based On Digital Twin Iot and Augmented Reality | IOT | 2019 |
260 | Healthcare Monitoring System and transforming Monitored data into Real time Clinical Feedback based on IoT using Raspberry Pi | IOT | 2019 |
261 | Big Data Analysis of E-Commerce Based on the Internet of Things | IOT | 2019 |
262 | A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks | IOT | 2019 |
263 | Smart Waste Collection Monitoring and Alert System via IoT | IOT | 2019 |
264 | Smart Waste Management System for Crowded area : Makkah and Holy Sites as a Model | IOT | 2019 |
265 | Design of Smart Helmet for Accident Avoidance | IOT | 2019 |
266 | IoT Devices Security Using RF Fingerprinting | IOT | 2019 |
267 | Token-Based Lightweight Authentication to Secure IoT Networks | IOT | 2019 |
268 | Design of a Smart Independent Smoke Sense System Based on NB-IoT Technology | IOT | 2019 |
269 | Real-time Credit Card Fraud Detection Using Machine Learning | Cloud Computing | 2019 |
270 | Automated Cloud Infrastructure Continuous Integration and Continuous Delivery using Docker with Robust Container Security | Cloud Computing | 2019 |
271 | A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System | Cloud Computing | 2019 |
272 | Study on Deep Unsupervised Learning Optimization Algorithm Based on Cloud Computing | Cloud Computing | 2019 |
273 | Analysis and Evaluation of Kubernetes Based NFV Management and Orchestration | Cloud Computing | 2019 |
274 | Game Theoretical Multi-user Computation Offloading for Mobile-Edge Cloud Computing | Cloud Computing | 2019 |
275 | Docker Swarm and Kubernetes in Cloud Computing Environment | Cloud Computing | 2019 |
276 | Use of Machine Learning in Detecting Network Security of Edge Computing System | Cloud Computing | 2019 |
277 | Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy | Cloud Computing | 2019 |
278 | Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing | Cloud Computing | 2019 |
279 | Study on Deep Unsupervised Learning Optimization Algorithm Based on Cloud Computing | Cloud Computing | 2019 |
280 | Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps | Cloud Computing | 2019 |
281 | A Security Model for the Enhancement of Data Privacy in Cloud Computing | Cloud Computing | 2019 |
282 | Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching | Cloud Computing | 2019 |
283 | Analysis of Educational Data Mining using Classification | Cloud Computing | 2019 |
284 | Movie Recommender System Using K-Means Clustering AND K-Nearest Neighbor | Cloud Computing | 2019 |
285 | Performance Evaluation of Machine Learning Algorithms for Credit Card Fraud Detection | Cloud Computing | 2019 |
286 | Fog Computing as a Complementary Approach to Cloud Computing | Cloud Computing | 2019 |
287 | IoT and Cloud Computing based Smart Water Metering System | Cloud Computing | 2019 |
288 | Cloud of Things (CoT) based Smart Cities | Cloud Computing | 2020 |
289 | Study of Cloud Security in Hyper-scalers | Cloud Computing | 2020 |
290 | A Deep Learning Based Distributed Smart Surveillance Architecture using Edge and Cloud Computing | Cloud Computing | 2019 |
291 | Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques | Cloud Computing | 2019 |
292 | Scalable Pathogen Pipeline Platform (SP^3): Enabling Unified Genomic Data Analysis with Elastic Cloud Computing | Cloud Computing | 2019 |
293 | Privacy-Preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing | Cloud Computing | 2019 |
294 | Towards a Parallel Constraint Solver for Cloud Computing Environments | Cloud Computing | 2019 |
295 | Online Virtual Machine Assignment Using Multi-Armed Bandit in Cloud Computing | Cloud Computing | 2019 |
296 | A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System | Cloud Computing | 2019 |
297 | Comparison of Various Fault Tolerance Techniques for Scientific Workflows in Cloud Computing | Cloud Computing | 2019 |
298 | DLECP: A Dynamic Learning-based Edge Cloud Placement Framework for Mobile Cloud Computing | Cloud Computing | 2019 |
299 | A Novel Predictive Resource Allocation Framework for Cloud Computing | Cloud Computing | 2019 |
300 | Towards Ingestion Processes of Kompsat Data in Open Data Cube on Open Source Cloud Computing Environment | Cloud Computing | 2019 |
301 | A Simple and Secured Cryptography System of Cloud Computing | Cloud Computing | 2019 |
302 | Multi-Objective Resource Mapping and Allocation for Volunteer Cloud Computing | Cloud Computing | 2019 |
303 | Comparison of RBAC and ABAC Security Models for Private Cloud | Cloud Computing | 2019 |
304 | Virtual Machine based Hybrid Auto-Scaling for Large Scale Scientific Workflows in Cloud Computing | Cloud Computing | 2020 |
305 | Powering Hands-on Cybersecurity Practices with Cloud Computing | Cloud Computing | 2019 |
306 | iPrivacy: LWE Enhanced image protection over cloud storage | Cloud Computing | 2020 |
307 | Delivering Data Mining Services in Cloud Computing | Cloud Computing | 2019 |
308 | Block Chain Based Cloud Computing Model on EVM Transactions for Secure Voting | Cloud Computing | 2019 |
309 | Determination of Trustworthiness of Cloud Service Provider and Cloud Customer | Cloud Computing | 2019 |
310 | Data Protection as a Service in the Multi-Cloud Environment | Cloud Computing | 2019 |
311 | An IOT Approach to Vehicle Accident Detection using Cloud Computing | Cloud Computing | 2019 |
312 | Constructing of vulnerability prevention secure model for the cloud computing | Cloud Computing | 2020 |
313 | Research of Fine Grit Access Control Based on Time in Cloud Computing | Cloud Computing | 2019 |
314 | Comparison of Privacy-Preserving Models Based on a Third-Party Auditor in Cloud Computing | Cloud Computing | 2020 |
315 | Multi-level Trust Agreement in Cloud Environment | Cloud Computing | 2019 |
316 | Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review | Cloud Computing | 2020 |
317 | Cloud Computing Task Scheduling Algorithm Based On Improved Genetic Algorithm | Cloud Computing | 2019 |
318 | Network Traffic based Virtual Machine Migration in Cloud Computing Environment | Cloud Computing | 2019 |
319 | Application of Steganography Technique in Cloud Computing | Cloud Computing | 2019 |
320 | Efficient load Balancing algorithm analysis in Cloud Computing | Cloud Computing | 2020 |
321 | A New Proposed Sensor Cloud Architecture Based on Fog Computing for Internet of Things | Cloud Computing | 2019 |
322 | Development of Agricultural Internet of Things Monitoring System Combining Cloud Computing and WeChat Technology | Cloud Computing | 2019 |
323 | Application of Big Data and Machine Learning in Smart Grid and Associated Security Concerns: A Review | machine learning | 2019 |
324 | Blockchain for AI: Review and Open Research Challenges | machine learning | 2019 |
325 | Deep Learning Approach for Intelligent Intrusion Detection System | machine learning | 2019 |
326 | HyperFace: A Deep Multi-Task Learning Framework for Face Detection Landmark Localization Pose Estimation and Gender Recognition | machine learning | 2019 |
327 | Security Testbed for Internet-of-Things Devices | machine learning | 2018 |
328 | Machine Learning Approach-Based Gamma Distribution for Brain Tumor Detection and Data Sample Imbalance Analysis | machine learning | 2018 |
329 | Robust Intelligent Malware Detection Using Deep Learning | machine learning | 2019 |
330 | Review of Smart Meter Data Analytics: Applications Methodologies and Challenges | machine learning | 2018 |
331 | Early Fault Detection of Machine Tools Based on Deep Learning and Dynamic Identification | machine learning | 2018 |
332 | Multi-Classification of Brain Tumor Images Using Deep Neural Network | machine learning | 2019 |
333 | A Multimodal Deep Learning Method for Android Malware Detection Using Various Features | machine learning | 2019 |
334 | CNN-Based Adversarial Embedding for Image Steganography | machine learning | 2019 |
335 | Deep CNN-Based Blind Image Quality Predictor | machine learning | 2019 |
336 | A Churn Prediction Model Using Random Forest: Analysis of Machine Learning Techniques for Churn Prediction and Factor Identification in Telecom Sector | machine learning | 2019 |
337 | Stock Market Trend Prediction Using High-Order Information of Time Series | machine learning | 2019 |
338 | Learning Affective Video Features for Facial Expression Recognition via Hybrid Deep Learning | machine learning | 2019 |
339 | Network Intrusion Detection for IoT Security Based on Learning Techniques | machine learning | 2019 |
340 | Real-Time 3D Hand Pose Estimation with 3D Convolutional Neural Networks | machine learning | 2018 |
341 | A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction | machine learning | 2019 |
342 | Accurate EEG-Based Emotion Recognition on Combined Features Using Deep Convolutional Neural Networks | machine learning | 2019 |
343 | Survey of Attack Projection Prediction and Forecasting in Cyber Security | machine learning | 2018 |
344 | Learning Pose-Aware Models for Pose-Invariant Face Recognition in the Wild | machine learning | 2019 |
345 | Speech Emotion Recognition Using Deep Learning Techniques: A Review | machine learning | 2019 |
346 | Learning Two-Branch Neural Networks for Image-Text Matching Tasks | machine learning | 2018 |
347 | Breast Cancer Detection Using Extreme Learning Machine Based on Feature Fusion With CNN Deep Features | machine learning | 2019 |
348 | Supervised Segmentation of Un-Annotated Retinal Fundus Images by Synthesis | machine learning | 2018 |
349 | TensorFlow-Based Automatic Personality Recognition Used in Asynchronous Video Interviews | machine learning | 2019 |
350 | Detecting Regions of Maximal Divergence for Spatio-Temporal Anomaly Detection | machine learning | 2018 |
351 | Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning | machine learning | 2019 |
352 | Lung and Pancreatic Tumor Characterization in the Deep Learning Era: Novel Supervised and Unsupervised Learning Approaches | machine learning | 2019 |
353 | Evolving Unsupervised Deep Neural Networks for Learning Meaningful Representations | machine learning | 2018 |
354 | Reinforcement Learning Based Routing in Networks: Review and Classification of Approaches | machine learning | 2019 |
355 | Deep Learning Models for Cyber Security in IoT Networks | machine learning | 2019 |
356 | Wasserstein CNN: Learning Invariant Features for NIR-VIS Face Recognition | machine learning | 2018 |
357 | Evolving Unsupervised Deep Neural Networks for Learning Meaningful Representations | machine learning | 2019 |
358 | Lung and Pancreatic Tumor Characterization in the Deep Learning Era: Novel Supervised and Unsupervised Learning Approaches | machine learning | 2019 |
359 | An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things | machine learning | 2018 |
360 | A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints | machine learning | 2019 |
361 | A Predictive Data Feature Exploration-Based Air Quality Prediction Approach | machine learning | 2019 |
362 | Deep Learning for Encrypted Traffic Classification: An Overview | machine learning | 2019 |
363 | Medical Imaging using Machine Learning and Deep Learning Algorithms: A Review | image processing | 2019 |
364 | Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos | machine learning | 2019 |
365 | Detection of Liver Cancer using Image Processing Techniques | image processing | 2019 |
366 | Bacteria Classification using Image Processing and Deep learning | image processing | 2019 |
367 | Image Restoration Using Total Variation Regularized Deep Image Prior | image processing | 2019 |
368 | Spoofing Attack Detection by Anomaly Detection | image processing | 2019 |
369 | Detection Tracking and Classification of Aircraft and Drones in Digital Towers Using Machine Learning on Motion Patterns | image processing | 2019 |
370 | Facial Recognition using Convolutional Neural Networks and Implementation on Smart Glasses | image processing | 2019 |
371 | Fast Convolution Algorithm for Convolutional Neural Networks | image processing | 2019 |
372 | Centroid-based Deep Metric Learning for Speaker Recognition | image processing | 2019 |
373 | Video Action Recognition Via Neural Architecture Searching | image processing | 2019 |
374 | Liver Steatosis Segmentation With Deep Learning Methods | image processing | 2019 |
375 | FuturePose - Mixed Reality Martial Arts Training Using Real-Time 3D Human Pose Forecasting With a RGB Camera | image processing | 2019 |
376 | Car Detection using Unmanned Aerial Vehicles: Comparison between Faster R-CNN and YOLOv3 | image processing | 2019 |
377 | Attention-based Atrous Convolutional Neural Networks: Visualisation and Understanding Perspectives of Acoustic Scenes | image processing | 2019 |
378 | Detection of Liver Cancer using Image Processing Techniques | image processing | 2019 |
379 | Bacteria Classification using Image Processing and Deep learning | image processing | 2019 |
380 | Identification of Plant Disease using Image Processing Technique | image processing | 2019 |
381 | A Pitch-aware Approach to Single-channel Speech Separation | image processing | 2019 |
382 | MID-Fusion: Octree-based Object-Level Multi-Instance Dynamic SLAM | image processing | 2019 |
383 | Semi-supervised Transfer Learning for Convolutional Neural Networks for Glaucoma Detection | image processing | 2019 |
384 | Modified Convolutional Neural Network Architecture Analysis for Facial Emotion Recognition | image processing | 2019 |
385 | Diseases Detection of Various Plant Leaf Using Image Processing Techniques: A Review | image processing | 2019 |
386 | 3D Human Pose Estimation With 2D Marginal Heatmaps | image processing | 2019 |
387 | A Deep Learning RCNN Approach for Vehicle Recognition in Traffic Surveillance System | image processing | 2019 |
388 | Object Detection and Identification Using Vision and Radar Data Fusion System for Ground-Based Navigation | image processing | 2019 |
389 | Video Captioning using Deep Learning: An Overview of Methods Datasets and Metrics | image processing | 2019 |
390 | Deep Learning for Detecting Diseases in Gastrointestinal Biopsy Images | image processing | 2019 |
391 | Fire Detection from Images Using Faster R-CNN and Multidimensional Texture Analysis | image processing | 2019 |
392 | Development of Automated Brain Tumor Identification Using MRI Images | image processing | 2019 |
393 | Machine Learning for Plant Leaf Disease Detection and Classification – A Review | image processing | 2019 |
394 | Improved Gesture Recognition Based on sEMG Signals and TCN | image processing | 2019 |
395 | Scale Pyramid Network for Crowd Counting | image processing | 2019 |
396 | Graph Convolutional Neural Networks For Alzheimer’s Disease Classification | image processing | 2019 |
397 | IoT based Smart Traffic density Control using Image Processing | image processing | 2019 |
398 | Breast Cancer Classification using Capsule Network with Preprocessed Histology Images | image processing | 2019 |
399 | Free-Head Appearance-Based Eye Gaze Estimation on Mobile Devices | image processing | 2019 |
400 | A Novel Framework of Hand Localization and Hand Pose Estimation | image processing | 2019 |
401 | Towards Learned Color Representations for Image Splicing Detection | image processing | 2019 |
402 | Traffic Sign Detection and Recognition using a CNN Ensemble | image processing | 2019 |
403 | Capsule Networks for Brain Tumor Classification Based on MRI Images and Coarse Tumor Boundaries | image processing | 2019 |
404 | Generating Adversarial Examples By Makeup Attacks on Face Recognition | image processing | 2019 |
405 | Early Forest Fire Detection Using Drones and Artificial Intelligence | image processing | 2019 |
406 | Random Forest Oriented Fast QTBT Frame Partitioning | image processing | 2019 |
407 | Lip Reading Deep Network Exploiting Multi-Modal Spiking Visual and Auditory Sensors | image processing | 2019 |
408 | Machine Learning for Position Detection in Football | image processing | 2019 |
409 | Deep Neural Networks for No-Reference Video Quality Assessment | image processing | 2019 |
410 | Enhancing Sound Texture in CNN-based Acoustic Scene Classification | image processing | 2019 |
411 | Multi-attention Network for Thoracic Disease Classification and Localization | image processing | 2019 |
412 | A CNN-Based Image Compression Scheme Compatible with JPEG-2000 | image processing | 2019 |
413 | Shadow Removal Detection and Localization for Forensics Analysis | image processing | 2019 |
414 | A Pipeline for Lung Tumor Detection and Segmentation from CT Scans Using Dilated Convolutional Neural Networks | image processing | 2019 |
415 | Face Landmark-based Speaker-independent Audio-visual Speech Enhancement in Multi-talker Environments | image processing | 2019 |
416 | Blind Motion Deblurring via Inceptionresdensenet by Using GAN Model | image processing | 2019 |
417 | Video Jigsaw: Unsupervised Learning of Spatiotemporal Context for Video Action Recognition | image processing | 2019 |
418 | Unsupervised Deep Transfer Feature Learning for Medical Image Classification | image processing | 2019 |
419 | Deep Learning based Pedestrian Detection at all Light Conditions | image processing | 2019 |
420 | Object Detection in Curved Space for 360-Degree Camera | image processing | 2019 |