IEEE Research Project Titles
Looking for the Perfect Project Idea for Your Final Year Projects? At Nxtlogic, We Provide a Wide Range of Innovative and Practical Topics in Python, Matlab, NS2, NS3, VLSI, R Tool, Android, Java for Engineering Students Across All Branches Like CSE, IT, ECE, EEE, and More. Find the Right Project Idea and Get the Guidance You Need to Complete It Successfully. Let's Make Your Final Year Project a Success!
S.No | Project Code | Artificial Intelligence Project Topics |
---|---|---|
1 | AI1 | A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE |
2 | AI2 | A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS |
3 | AI3 | A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION |
4 | AI4 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
5 | AI5 | A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS |
6 | AI6 | ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD |
7 | AI7 | CLOUD MIGRATION-STEPS AND STRATEGIES FOR MIGRATING APPLICATIONS AND DATA TO THE CLOUD. |
8 | AI8 | CLOUD SECURITY-DISCUSSION OF SECURITY BEST PRACTICES, IDENTITY AND ACCESS MANAGEMENT (IAM), ENCRYPTION, AND COMPLIANCE STANDARDS. |
9 | AI9 | CONCLUSION-A SUMMARY OF THE KEY TAKEAWAYS AND THE ROLE OF CLOUD COMPUTING IN THE DIGITAL TRANSFORMATION OF BUSINESSES. |
10 | AI10 | COST MANAGEMENT-STRATEGIES FOR OPTIMIZING CLOUD COSTS, INCLUDING COST MONITORING, RESOURCE ALLOCATION, AND BUDGETING. |
11 | AI11 | COST MINIMIZATION ALGORITHMS FOR DATA CENTER ALGORITHM |
12 | AI12 | EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCH-AND-BOUND HEURISTICS |
13 | AI13 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
14 | AI14 | HIGH AVAILABILITY AND REDUNDANCY-DISCUSSION OF FAULT TOLERANCE, REDUNDANCY, AND DISASTER RECOVERY IN THE CLOUD. |
15 | AI15 | IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS |
16 | AI16 | IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE |
17 | AI17 | LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS |
18 | AI18 | MONITORING AND MANAGEMENT-TOOLS AND PRACTICES FOR MONITORING CLOUD RESOURCES, MANAGING DEPLOYMENTS, AND TROUBLESHOOTING ISSUES. |
19 | AI19 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR CLOUD COMPUTING APPLICATIONS |
20 | AI20 | OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS |
21 | AI21 | PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS |
22 | AI22 | PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR CLOUD COMPUTING IN MOBILE CLOUD COMPUTING |
23 | AI23 | RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE |
24 | AI24 | SERVERLESS COMPUTING-OVERVIEW OF SERVERLESS COMPUTING AND ITS BENEFITS FOR EVENT-DRIVEN APPLICATIONS. |
25 | AI25 | VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS |
S.No | Project Code | Big Data Project Topics |
---|---|---|
1 | BD1 | A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE |
2 | BD2 | A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS |
3 | BD3 | A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION |
4 | BD4 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
5 | BD5 | A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS |
6 | BD6 | ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD |
7 | BD7 | CLOUD MIGRATION-STEPS AND STRATEGIES FOR MIGRATING APPLICATIONS AND DATA TO THE CLOUD. |
8 | BD8 | CLOUD SECURITY-DISCUSSION OF SECURITY BEST PRACTICES, IDENTITY AND ACCESS MANAGEMENT (IAM), ENCRYPTION, AND COMPLIANCE STANDARDS. |
9 | BD9 | CONCLUSION-A SUMMARY OF THE KEY TAKEAWAYS AND THE ROLE OF CLOUD COMPUTING IN THE DIGITAL TRANSFORMATION OF BUSINESSES. |
10 | BD10 | COST MANAGEMENT-STRATEGIES FOR OPTIMIZING CLOUD COSTS, INCLUDING COST MONITORING, RESOURCE ALLOCATION, AND BUDGETING. |
11 | BD11 | COST MINIMIZATION ALGORITHMS FOR DATA CENTER ALGORITHM |
12 | BD12 | EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCH-AND-BOUND HEURISTICS |
13 | BD13 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
14 | BD14 | HIGH AVAILABILITY AND REDUNDANCY-DISCUSSION OF FAULT TOLERANCE, REDUNDANCY, AND DISASTER RECOVERY IN THE CLOUD. |
15 | BD15 | IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS |
16 | BD16 | IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE |
17 | BD17 | LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS |
18 | BD18 | MONITORING AND MANAGEMENT-TOOLS AND PRACTICES FOR MONITORING CLOUD RESOURCES, MANAGING DEPLOYMENTS, AND TROUBLESHOOTING ISSUES. |
19 | BD19 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR CLOUD COMPUTING APPLICATIONS |
20 | BD20 | OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS |
21 | BD21 | PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS |
22 | BD22 | PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR CLOUD COMPUTING IN MOBILE CLOUD COMPUTING |
23 | BD23 | RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE |
24 | BD24 | SERVERLESS COMPUTING-OVERVIEW OF SERVERLESS COMPUTING AND ITS BENEFITS FOR EVENT-DRIVEN APPLICATIONS. |
25 | BD25 | VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS |
S.No | Project Code | Block Chain Project Topics |
---|---|---|
1 | BLK1 | Pharma Supply Chain System using Smart Contracts |
2 | BLK2 | Evidence Protection System Using Blockchain Technology |
3 | BLK3 | Blockchain Shipment Management Tracking System |
4 | BLK4 | Identifying Fake Products Through A Barcode-Based Blockchain System |
5 | BLK5 | Medical Report Management & Distribution System on Blockchain |
6 | BLK6 | Real Estate Booking System using Smart Contracts |
7 | BLK7 | Trusted Crowdfunding Platform Using a Smart Contract |
8 | BLK8 | Blockchain based Loan Management System with Smart Contracts |
9 | BLK9 | Blockchain Rental Property System with Smart Contracts |
10 | BLK10 | Anti-Money Laundering System using Blockchain |
11 | BLK11 | Blockchain-based Transaction and Settlement System |
12 | BLK12 | Blockchain based Cloud File Sharing System |
13 | BLK13 | Blockchain based Cross Border Payment System |
14 | BLK14 | Blockchain based Merchant Payment System |
15 | BLK15 | Organization Finance Tracking System using Blockchain |
16 | BLK16 | Blockchain based Personal Identity Security System |
17 | BLK17 | Blockchain Tender/Contract Management System in Python |
18 | BLK18 | Blockchain based Disk Space Rental System |
19 | BLK19 | Blockchain Based Crowdfunding Platform |
20 | BLK20 | Blockchain Based Antiques Verification System |
21 | BLK21 | Property Registration Management System using Blockchain |
22 | BLK22 | Patient Data Management System using Blockchain |
23 | BLK23 | Electronic Voting System using Blockchain |
24 | BLK24 | Development of a Secure Cryptocurrency Wallet System with Advanced Blockchain Encryption Techniques for Enhanced User Privacy and Fraud Prevention |
S.No | Project Code | Cloud Computing Project Topics |
---|---|---|
1 | CLD1 | COST MINIMIZATION ALGORITHMS FOR DATA CENTER ALGORITHM |
2 | CLD2 | ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD |
3 | CLD3 | EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCH-AND-BOUND HEURISTICS |
4 | CLD4 | IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS |
5 | CLD5 | PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS |
6 | CLD6 | RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE |
7 | CLD7 | LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS |
8 | CLD8 | A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION |
9 | CLD9 | A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS |
10 | CLD10 | A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE |
11 | CLD11 | A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS |
12 | CLD12 | OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS |
13 | CLD13 | IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE |
14 | CLD14 | PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR cloud computing IN MOBILE CLOUD COMPUTING |
15 | CLD15 | VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS |
16 | CLD16 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
17 | CLD17 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR cloud computing APPLICATIONS |
18 | CLD18 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
19 | CLD19 | High Availability and Redundancy-Discussion of fault tolerance, redundancy, and disaster recovery in the cloud. |
20 | CLD20 | Monitoring and Management-Tools and practices for monitoring cloud resources, managing deployments, and troubleshooting issues. |
21 | CLD21 | Serverless Computing-Overview of serverless computing and its benefits for event-driven applications. |
22 | CLD22 | Cloud Migration-Steps and strategies for migrating applications and data to the cloud. |
23 | CLD23 | Cloud Security-Discussion of security best practices, identity and access management (IAM), encryption, and compliance standards. |
24 | CLD24 | Cost Management-Strategies for optimizing cloud costs, including cost monitoring, resource allocation, and budgeting. |
25 | CLD25 | Conclusion-A summary of the key takeaways and the role of cloud computing in the digital transformation of businesses. |
S.No | Project Code | Cyber Security Project Topics |
---|---|---|
1 | CYS1 | A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System |
2 | CYS2 | A Flexible NTT-Based Multiplier for Post-Quantum Cryptography |
3 | CYS3 | A Research Review of OpenFlow for Datacenter Networking |
4 | CYS4 | A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing |
5 | CYS5 | A Tutorial on the Sequential Sampling Impulse Radar Concept and Selected Applications |
6 | CYS6 | Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives |
7 | CYS7 | An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks |
8 | CYS8 | An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure |
9 | CYS9 | An Ultra-Low Energy Solution for Large-Scale Distributed Audio Monitoring |
10 | CYS10 | AVET: A Novel Transform Function to Improve Cancellable Biometrics Security |
11 | CYS11 | ePoSt: Practical and Client-Friendly Proof of Storage-Time |
12 | CYS12 | Extended Cyclic Codes Sandwiched Between Reed–Muller Codes |
13 | CYS13 | F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection |
14 | CYS14 | Implementation of Risk-Aggregated Substation Testbed Using Generative Adversarial Networks |
15 | CYS15 | IRS-Aided Wireless Communication: From Physics to Channel Modeling and Characterization |
16 | CYS16 | Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems |
17 | CYS17 | Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks |
18 | CYS18 | Next-Generation IoT Devices: Sustainable Eco-Friendly Manufacturing, Energy Harvesting, and Wireless Connectivity |
19 | CYS19 | On the Differential Spectrum and the APcN Property of a Class of Power Functions Over Finite Fields |
20 | CYS20 | Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences |
21 | CYS21 | Physical Layer Security Enhancement via Intelligent Omni-Surfaces and UAV-Friendly Jamming |
22 | CYS22 | Point Cloud Adversarial Perturbation Generation for Adversarial Attacks |
23 | CYS23 | Resilient Load Frequency Control of Multi-Area Power Systems Under DoS Attacks |
24 | CYS24 | Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car |
25 | CYS25 | Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks |
S.No | Project Code | Data Analysis Project Topics |
---|---|---|
1 | DTA1 | City Employee Salary Data Analysis |
2 | DTA2 | Topic Modelling using K-means clustering |
3 | DTA3 | Insurance Pricing Forecast |
4 | DTA4 | Churn Prediction in Telecom |
5 | DTA5 | Predicting Wine Preferences of Customers using Wine Dataset |
6 | DTA6 | Identifying Product Bundles from Sales Data |
7 | DTA7 | Movie Review Sentiment Analysis |
8 | DTA8 | Store Sales Forecasting |
9 | DTA9 | Data Analysis and Visualization using Apache Spark and Zeppelin |
10 | DTA10 | Apache Hive for Real-time Queries and Analytics |
11 | DTA11 | Building a Music Recommendation Engine |
12 | DTA12 | Airline Dataset Analysis |
13 | DTA13 | Analysis of Yelp Dataset Using Hive |
14 | DTA14 | Build a Data Pipeline based on Messaging using PySpark and Hive |
15 | DTA15 | Event Data Analysis |
16 | DTA16 | Building a Job Portal using Twitter Data |
17 | DTA17 | Implementing Slowly Changing Dimensions in a Data Warehouse |
18 | DTA18 | Analyzing CO2 Emissions |
19 | DTA19 | Data Analysis using Clustering |
20 | DTA20 | Exploring the Bitcoin Cryptocurrency Market |
21 | DTA21 | The Android App Market on Google Play |
22 | DTA22 | Real-time Insights from Social Media Data |
23 | DTA23 | Analyze International Debt Statistics |
24 | DTA24 | Functions for Food Price Forecasts |
25 | DTA25 | Development of a Predictive Analytics System for Customer Behavior Using Machine Learning and Statistical Models |
S.No | Project Code | Data Science Project Topics |
---|---|---|
1 | DS1 | COST MINIMIZATION ALGORITHMS FOR DATA CENTER ALGORITHM |
2 | DS2 | ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD |
3 | DS3 | EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCH-AND-BOUND HEURISTICS |
4 | DS4 | IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS |
5 | DS5 | PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS |
6 | DS6 | RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE |
7 | DS7 | LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS |
8 | DS8 | A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION |
9 | DS9 | A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS |
10 | DS10 | A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE |
11 | DS11 | A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS |
12 | DS12 | OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS |
13 | DS13 | IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE |
14 | DS14 | PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR cloud computing IN MOBILE CLOUD COMPUTING |
15 | DS15 | VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS |
16 | DS16 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
17 | DS17 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR cloud computing APPLICATIONS |
18 | DS18 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
19 | DS19 | Model Building-Information on the machine learning models and algorithms used |
20 | DS20 | Data Visualization-Visualizations created to present data and model results |
21 | DS21 | Data Exploration-Summary of exploratory data analysis findings and insights. |
22 | DS22 | Data Sources-Description of the data sources, including URLs or file paths. |
23 | DS23 | Model Validation-Details on cross-validation and testing procedures. |
24 | DS24 | Challenges-Any obstacles or issues encountered during the project. |
25 | DS25 | Conclusion-A summary of the project's outcomes and significance. |
S.No | Project Code | Deep Learning Project Topics |
---|---|---|
1 | DL1 | A Deep Learning Approach to Navigating the Joint Solution Space of Redundant Inverse Kinematics and Its Applications to Numerical IK Computations |
2 | DL2 | Exploring Diverse Feature Extractions for Adversarial Audio Detection |
3 | DL3 | Deep Learning for Predictive Analytics in Reversible Steganography |
4 | DL4 | Solar Cell Busbars Surface Defect Detection Based on Deep Convolutional Neural Network |
5 | DL5 | Team Modeling with Deep Behavioral Cloning for the RoboCup 2D Soccer Simulation League |
6 | DL6 | Bridge Crane Monitoring using a 3D LiDAR and Deep Learning |
7 | DL7 | Computer Vision in Automatic Visceral Leishmaniasis Diagnosis: a Survey |
8 | DL8 | An Assessment of the Effectiveness of Pretrained Neural Networks for Malware Detection |
9 | DL9 | A Hybrid Ensemble Deep Learning Approach for Early Prediction of Battery Remaining Useful Life |
10 | DL10 | STGSA: A Novel Spatial-Temporal Graph Synchronous Aggregation Model for Traffic Prediction |
11 | DL11 | Video Based Mobility Monitoring of Elderly People Using Deep Learning Models |
12 | DL12 | A Deep Learning Receiver for Non-Linear Transmitter |
13 | DL13 | SBSS: Stacking-Based Semantic Segmentation Framework for Very High-Resolution Remote Sensing Image |
14 | DL14 | Enabling All In-Edge Deep Learning: A Literature Review |
15 | DL15 | ScaTE: A Scalable Framework for Self- Supervised Traversability Estimation in Unstructured Environments |
16 | DL16 | Lightweight Multiresolution Feature Fusion Network for Spectral Super-Resolution |
17 | DL17 | Automation of Temperature Measurement in Induction Motors of Hermetic Compressors Based on the Method of Temperature Rise by Resistance |
18 | DL18 | Remaining Useful Life Prediction for Rolling Bearings With a Novel Entropy-Based Health Indicator and Improved Particle Filter Algorithm |
19 | DL19 | Genetic Programming Approach To Detect Hate Speech In Social Media |
20 | DL20 | Severity-Based Hierarchical ECG Classification Using Neural Networks |
21 | DL21 | DotView: A Low-Cost Compact Tactile Sensor for Pressure, Shear, and Torsion Estimation |
22 | DL22 | Unpaired Speckle Extraction for SAR Despeckling |
23 | DL23 | Uncertainty-Incorporated Ice and Open Water Detection on Dual-Polarized SAR Sea Ice Imagery |
24 | DL24 | Wave Propagation Modeling Techniques in Tunnel Environments: A Survey |
25 | DL25 | Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning |
S.No | Project Code | Image Processing Project Topics |
---|---|---|
1 | IMGP1 | Spectral signature for quality assessment of anchovy fish meal (Engraulis Ringens) using Partial Least Squares |
2 | IMGP2 | Determination of Angular Status and Dimensional Properties of Objects for Grasping with Robot Arm |
3 | IMGP3 | MFF-Net: Towards Efficient Monocular Depth Completion With Multi-Modal Feature Fusion |
4 | IMGP4 | A Digital Processing in Memory Architecture Using TCAM for Rapid Learning and Inference Based on a Spike Location Dependent Plasticity |
5 | IMGP5 | Smart Traffic Monitoring Through Pyramid Pooling Vehicle Detection and Filter-Based Tracking on Aerial Images |
6 | IMGP6 | Transformer-Based Named Entity Recognition on Drone Flight Logs to Support Forensic Investigation |
7 | IMGP7 | Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection |
8 | IMGP8 | SA-PatchCore: Anomaly Detection in Dataset With Co-Occurrence Relationships Using Self-Attention |
9 | IMGP9 | Framework for Illumination Estimation and Segmentation in Multi-Illuminant Scenes |
10 | IMGP10 | L-GhostNet: Extract Better Quality Features |
11 | IMGP11 | Graphical and Numerical Study of a Newly Developed Root-Finding Algorithm and Its Engineering Applications |
12 | IMGP12 | A Microvision-Based Motion Measurement System for Nanopositioners Using the Feature-to-Phase Method |
13 | IMGP13 | A Reference-Free Calibration for Ultrafast Spatiotemporally Encoded 2-D NMR Spectroscopy |
14 | IMGP14 | Harmonic Generation and Impact of Phase Matching in Multimodal Multiphoton Microscopy |
15 | IMGP15 | RefractionCorrected Transcranial Ultrasound Imaging Through the Human Temporal Window Using a Single Probe |
16 | IMGP16 | A Novel Near Field Image Reconstruction Method Based on Beamforming Technique for RealTime Passive Millimeter Wave Imaging |
17 | IMGP17 | Image Quality Evaluation in Professional HDRWCG Production Questions the Need for HDR Metrics |
18 | IMGP18 | A ConfounderFree Fusion Network for Aerial Image Scene Feature Representation |
19 | IMGP19 | HighFrequency Endoscopic Ultrasound Imaging With PhaseCorrectedandSum and Coherence Factor Weighting |
20 | IMGP20 | SceneSketcherv2 FineGrained SceneLevel SketchBased Image Retrieval Using Adaptive GCNs |
21 | IMGP21 | A 4D Ultrasound Tomography for Industrial Process Reactors Investigation |
22 | IMGP22 | Image Compression Using StochasticAFD Based Multisignal Sparse Representation |
23 | IMGP23 | A noReference Stereoscopic Image Quality Assessment Network Based on Binocular Interaction and Fusion Mechanisms |
24 | IMGP24 | heoretical Framework to Predict Generalized ContrasttoNoise Ratios of Photoacoustic Images With Applications to Computer Vision |
25 | IMGP25 | CFNet A Cross Fusion Network for Joint Land Cover Classification Using Optical and SAR Images |
S.No | Project Code | IOT Project Topics |
---|---|---|
1 | IO1 | Components of IoT : Sensors and actuators. Connectivity protocols (e.g., Wi-Fi, Bluetooth, Zigbee, LoRa). Edge computing devices. Cloud platforms. |
2 | IO2 | IoT Applications:Smart homes and home automation. Industrial IoT (IIoT) for manufacturing and supply chain. Smart cities and infrastructure. |
3 | IO3 | IoT Security:Challenges and vulnerabilities. Encryption and authentication. |
4 | IO4 | Data Analytics and IoT:Big data and IoT. Data collection and analysis. |
5 | IO5 | IoT Protocols:MQTT, CoAP, HTTP, and other communication protocols. Device management protocols. |
6 | IO6 | RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE |
7 | IO7 | IoT Platforms and Tools: AWS IoT, Microsoft Azure IoT, Google Cloud IoT. Open-source IoT platforms. |
8 | IO8 | IoT Development:Programming languages (Python, C, Java, etc.). IoT development kits (Raspberry Pi, Arduino). |
9 | IO9 | IoT Standards and Organizations:IEEE, IETF, and other standards. Industry alliances and consortia. |
10 | IO10 | IoT and Artificial Intelligence:Machine learning and AI in IoT. Smart decision-making with IoT data. |
11 | IO11 | IoT and Ethics: Privacy and data ownership. Ethical considerations in IoT development. |
12 | IO12 | IoT Challenges and Future Trends:Scalability and interoperability challenges. 5G and its impact on IoT. |
13 | IO13 | IoT in Healthcare:Remote patient monitoring. Medical device connectivity. |
14 | IO14 | IoT in Agriculture:Precision agriculture. IoT sensors for soil and weather monitoring. |
15 | IO15 | IoT in Smart Cities:Traffic management and optimization. Waste management. |
16 | IO16 | IoT in Industry 4.0:Automation and smart manufacturing. Predictive maintenance. |
17 | IO17 | ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR cloud computing APPLICATIONS |
18 | IO18 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
19 | IO19 | High Availability and Redundancy-Discussion of fault tolerance, redundancy, and disaster recovery in the cloud. |
20 | IO20 | Monitoring and Management-Tools and practices for monitoring cloud resources, managing deployments, and troubleshooting issues. |
21 | IO21 | Serverless Computing-Overview of serverless computing and its benefits for event-driven applications. |
22 | IO22 | Cloud Migration-Steps and strategies for migrating applications and data to the cloud. |
23 | IO23 | Cloud Security-Discussion of security best practices, identity and access management (IAM), encryption, and compliance standards. |
24 | IO24 | Cost Management-Strategies for optimizing cloud costs, including cost monitoring, resource allocation, and budgeting. |
25 | IO25 | Conclusion-A summary of the key takeaways and the role of cloud computing in the digital transformation of businesses. |
S.No | Project Code | Machine Learning Project Topics |
---|---|---|
1 | ML1 | Data-Driven Capacity Estimation of Li-Ion Batteries Using Constant Current Charging at Various Ambient Temperatures |
2 | ML2 | Approaches to Overpower Proof-of-Work Blockchains Despite Minority |
3 | ML3 | Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments From a Pragmatic Perspective |
4 | ML4 | Computer Vision on X-Ray Data in Industrial Production and Security Applications: A Comprehensive Survey |
5 | ML5 | Categorical Diversity-Aware Inner Product Search |
6 | ML6 | Graph Neural Network for Air Quality Prediction: A Case Study in Madrid |
7 | ML7 | PANCODE: Multilevel Partitioning of Neural Networks for Constrained Internet-of-Things Devices |
8 | ML8 | A Data Privacy Protection Diagnosis Framework for Multiple Machines Vibration Signals Based on a Swarm Learning Algorithm |
9 | ML9 | GeFL: Gradient Encryption-Aided Privacy Preserved Federated Learning for Autonomous Vehicles |
10 | ML10 | Proactive Random-Forest Autoscaler for Microservice Resource Allocation |
11 | ML11 | Brazilian scientific productivity from a gender perspective during the Covid-19 pandemic: classification and analysis via machine learning |
12 | ML12 | Radiofrequency Signal Levels Predition Using Machine Learning Models |
13 | ML13 | Review of Intelligent Algorithms for Breast Cancer Control: a Latin America Perspective |
14 | ML14 | Machine Learning-Based Online Coverage Estimator (MLOE): Advancing Mobile Network Planning and Optimization |
15 | ML15 | Efficient Bioinspired Feature Selection and Machine Learning Based Framework Using Omics Data and Biological Knowledge Data Bases in Cancer Clinical Endpoint Prediction |
16 | ML16 | Eye-Tracking Image Encoding: Autoencoders for the Crossing of Language Boundaries in Developmental Dyslexia Detection |
17 | ML17 | SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework |
18 | ML18 | Predictive Model Of Employee Attrition Based On Stacking Ensemble Learning |
19 | ML19 | Smart Email Categorization |
20 | ML20 | A Hybrid Convolutional Neural Network Model For Automatic Diabetic Retinopathy Classification From Fundus Images |
21 | ML21 | Classification of Polluted Silicone Rubber Insulators by Using LIBS Assisted Machine Learning Techniques |
22 | ML22 | Machine Learning for Emergency Management: A Survey and Future Outlook |
23 | ML23 | Machine Learning Algorithms for Epilepsy Detection Based on Published EEG Databases: A Systematic Review |
24 | ML24 | Personalization of Control Systems by Policy Update With Improving User Trust |
25 | ML25 | PAC-Bayes Meta-Learning With Implicit Task-Specific Posteriors |
S.No | Project Code | VLSI Projects Project Topics |
---|---|---|
1 | VLSI1 | AxPPA: Approximate Parallel Prefix Adders |
2 | VLSI2 | Low-Complexity Distributed Arithmetic-Based Architecture for Inner-Product of Variable Vectors |
3 | VLSI3 | An Energy-Efficient Binary-Interfaced Stochastic Multiplier Using Parallel Datapaths |
4 | VLSI4 | Exact and Approximate Squarer’s for Error- Tolerant Applications |
5 | VLSI5 | On the Design of Iterative Approximate Floating-Point Multipliers |
6 | VLSI6 | Area-Efficient Parallel Multiplication Units for CNN Accelerators With Output Channel Parallelization |
7 | VLSI7 | A Novel Low-Power Compression Scheme for Systolic Array-Based Deep Learning Accelerators |
8 | VLSI8 | Single Exact Single Approximate Adders and Single Exact Dual Approximate Adders |
9 | VLSI9 | Energy-Efficient Single-Ended Read/Write 10T Near-Threshold SRAM |
10 | VLSI10 | Energy-Efficient Single-Ended Read/Write 10T Near-Threshold SRAM |
11 | VLSI11 | Low-Power Redundant-Transition-Free TSPC Dual-Edge-Triggering Flip-Flop Using Single-Transistor-Clocked Buffer |
12 | VLSI12 | Cascode Cross-Coupled Stage High-Speed Dynamic Comparator in 65 nm CMOS |
13 | VLSI13 | High-Speed Counter With Novel LFSR State Extension |
14 | VLSI14 | k-Degree Parallel Comparison-Free Hardware Sorter for Complete Sorting |
15 | VLSI15 | A DFT-Compatible In-Situ Timing Error Detection and Correction Structure Featuring Low Area and Test Overhead |
16 | VLSI16 | Low Latency SEU Detection in FPGA CRAM With In-Memory ECC Checking |
17 | VLSI17 | Efficient Error Detection for Matrix Multiplication With Systolic Arrays on FPGAs |
18 | VLSI18 | FPGA-Based Configurable and Highly Flexible PAM4 SerDes Simulation System |
19 | VLSI19 | STRAIT: Self-Test and Self-Recovery for AI Accelerator |
20 | VLSI20 | Storage-Based Logic Built-In Self-Test With Partitioned Deterministic Compressed Tests |
21 | VLSI21 | Storage-Based Logic Built-In Self-Test With Cyclic Tests |
22 | VLSI22 | Estimating the Number of Extra Tests During Iterative Test Generation for Single-Cycle Gate-Exhaustive Faults |
23 | VLSI23 | Test Methodology for Defect-Based Bridge Faults |
24 | VLSI24 | Path Unselection for Path Delay Fault Test Generation |
25 | VLSI25 | A New Static Compaction of Deterministic Test Sets |
S.No | Project Code | Embedded Projects Project Topics |
---|---|---|
1 | EMB1 | IoT-Enhanced Transport and Monitoring of Medicine Using Sensors, MQTT, and Secure Short Message Service |
2 | EMB2 | IoT Based Electrical Vehicle Battery Management System with Charge Monitor and Fire Protection |
3 | EMB3 | Advancing Workplace Safety with IoT-Enabled Industrial Monitoring |
4 | EMB4 | Smart Helmet for Riders to Avoid Accidents Using IoT |
5 | EMB5 | IoT-Enabled Advanced Water Quality Monitoring System for Pond Management and Environmental Conservation |
6 | EMB6 | Smart Aquaponics and Hydroponics Monitoring Using IoT |
7 | EMB7 | Car Black Box System for Accident Analysis using IoT |
8 | EMB8 | Development of a Sign Language Translator Based on Gestures-To- Words Using IoT |
9 | EMB9 | IoT-Based Smart Kitchen with Enhanced and Automated Safety Measures |
10 | EMB10 | SDIoTPark : A Data Analytics Framework for Smart Parking Using SDN-Based IoT |
11 | EMB11 | A Smart Bin with Real-Time Monitoring and Garbage Level Tracking Using IoT |
12 | EMB12 | An AI-Based Ventilation KPI Using Embedded IoT Devices |
13 | EMB13 | AI and Digital Twins Transforming Healthcare IoT |
14 | EMB14 | Optimizing Structural Health Monitoring Systems Through Integrated Fog and Cloud Computing Within IoT Framework |
15 | EMB15 | Sewage Water Monitoring and Filtering using Raspberry Pi |
16 | EMB16 | An Evaluation of LoRaWAN and WLAN for IoT-based Photovoltaic Microgrid Monitoring |
17 | EMB17 | Remote Monitoring of Hazardous Environment at Mining Sites Using LoRa Network |
18 | EMB18 | An IoT based Real Time Forest Fire Detection & Alerting System Using LoRa Communication |
19 | EMB19 | LoRa - Powered Smart Agriculture System for Monitoring and Controlling |
20 | EMB20 | Lifi based real time under water board casting from optimal data rates and lower Power consumption |
21 | EMB21 | Outdoor VOCs’ Concentration Monitoring Due to Traffic Emission |
22 | EMB22 | Design and Implementation of RF Based War Spying Robot with Wireless Night Vision Camera |
23 | EMB23 | Implementation of a Wireless Human Hand Gesture Controlled Robotic Arm |
24 | EMB24 | IoT-enabled Moving Wheelchair with Obstacle Detection and Continuous Health Monitoring |
25 | EMB25 | Tracking and Monitoring Cattle's Health using Wireless Sensor Networks |
S.No | Project Code | Mechanical Projects Project Topics |
---|---|---|
1 | Mech1 | 360 degree Tilting ceiling fan |
2 | Mech2 | Abrasive Jet Machine |
3 | Mech3 | Automatic fertilizer mixing machine using PLC |
4 | Mech4 | Automatic Gear milling Machine using proximity sensor |
5 | Mech5 | Automatic Motorized Drilling and Tapping Machine |
6 | Mech6 | Automatic Murukku / String Hopper machine |
7 | Mech7 | Automatic weighing and packing machine with auto rejection |
8 | Mech8 | Banana Fiber Extracting Machine |
9 | Mech9 | Centrifugal spinning machine to produce Nano fiber |
10 | Mech10 | Design and fabrication of domestic incinerator or sanitary napkin crushing and burning disposal Incinerator machine |
11 | Mech11 | Drone Catching Gun / Air powered net Gun |
12 | Mech12 | IOT based material dimension checking and rejection system |
13 | Mech13 | Motorized Hack saw cutting and grinding Machine |
14 | Mech14 | Motorized Pipe/wood Cutting Machine using quick return Mechanism |
15 | Mech15 | Motorized shaper and slotter in a single Machine |
16 | Mech16 | One side hacksaw and another side shaping machine by using scotch yoke mechanism |
17 | Mech17 | Remote controlled Double axis Motorized Crane |
18 | Mech18 | Semi-Automatic Hole Depth Measurement And Pothole Filling machine |
19 | Mech19 | Smart step for children and aged people |
20 | Mech20 | Solar panel cleaning with water spraying machine |
21 | Mech21 | Solar powered soil digging with grass cutter and water spraying vehicle |
22 | Mech22 | Trash Removal system in water bodies/Canals |
23 | Mech23 | Waste Plastic converted into plastic brick / tiles making machine |
24 | Mech24 | Waste plastic converted into power generation |
25 | Mech25 | Water well drilling rig |
S.No | Project Code | Matlab Project Topics |
---|---|---|
1 | MAT1 | Spectral signature for quality assessment of anchovy fish meal (Engraulis Ringens) using Partial Least Squares |
2 | MAT2 | Determination of Angular Status and Dimensional Properties of Objects for Grasping with Robot Arm |
3 | MAT3 | MFF-Net: Towards Efficient Monocular Depth Completion With Multi-Modal Feature Fusion |
4 | MAT4 | A Digital Processing in Memory Architecture Using TCAM for Rapid Learning and Inference Based on a Spike Location Dependent Plasticity |
5 | MAT5 | Smart Traffic Monitoring Through Pyramid Pooling Vehicle Detection and Filter-Based Tracking on Aerial Images |
6 | MAT6 | Transformer-Based Named Entity Recognition on Drone Flight Logs to Support Forensic Investigation |
7 | MAT7 | Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection |
8 | MAT8 | SA-PatchCore: Anomaly Detection in Dataset With Co-Occurrence Relationships Using Self-Attention |
9 | MAT9 | Framework for Illumination Estimation and Segmentation in Multi-Illuminant Scenes |
10 | MAT10 | L-GhostNet: Extract Better Quality Features |
11 | MAT11 | Graphical and Numerical Study of a Newly Developed Root-Finding Algorithm and Its Engineering Applications |
12 | MAT12 | A Microvision-Based Motion Measurement System for Nanopositioners Using the Feature-to-Phase Method |
13 | MAT13 | A Reference-Free Calibration for Ultrafast Spatiotemporally Encoded 2-D NMR Spectroscopy |
14 | MAT14 | Harmonic Generation and Impact of Phase Matching in Multimodal Multiphoton Microscopy |
15 | MAT15 | RefractionCorrected Transcranial Ultrasound Imaging Through the Human Temporal Window Using a Single Probe |
16 | MAT16 | A Novel Near Field Image Reconstruction Method Based on Beamforming Technique for RealTime Passive Millimeter Wave Imaging |
17 | MAT17 | Image Quality Evaluation in Professional HDRWCG Production Questions the Need for HDR Metrics |
18 | MAT18 | A ConfounderFree Fusion Network for Aerial Image Scene Feature Representation |
19 | MAT19 | HighFrequency Endoscopic Ultrasound Imaging With PhaseCorrectedandSum and Coherence Factor Weighting |
20 | MAT20 | SceneSketcherv2 FineGrained SceneLevel SketchBased Image Retrieval Using Adaptive GCNs |
21 | MAT21 | A 4D Ultrasound Tomography for Industrial Process Reactors Investigation |
22 | MAT22 | Image Compression Using StochasticAFD Based Multisignal Sparse Representation |
23 | MAT23 | A noReference Stereoscopic Image Quality Assessment Network Based on Binocular Interaction and Fusion Mechanisms |
24 | MAT24 | heoretical Framework to Predict Generalized ContrasttoNoise Ratios of Photoacoustic Images With Applications to Computer Vision |
25 | MAT25 | CFNet A Cross Fusion Network for Joint Land Cover Classification Using Optical and SAR Images |
S.No | Project Code | Network (NS2 / NS3) Project Topics |
---|---|---|
1 | NET1 | A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System |
2 | NAT2 | A Flexible NTT-Based Multiplier for Post-Quantum Cryptography |
3 | NAT3 | A Research Review of OpenFlow for Datacenter Networking |
4 | NAT4 | A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing |
5 | NAT5 | A Tutorial on the Sequential Sampling Impulse Radar Concept and Selected Applications |
6 | NAT6 | Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives |
7 | NAT7 | An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks |
8 | NAT8 | An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure |
9 | NAT9 | An Ultra-Low Energy Solution for Large-Scale Distributed Audio Monitoring |
10 | NAT10 | AVET: A Novel Transform Function to Improve Cancellable Biometrics Security |
11 | NAT11 | ePoSt: Practical and Client-Friendly Proof of Storage-Time |
12 | NAT12 | Extended Cyclic Codes Sandwiched Between Reed–Muller Codes |
13 | NAT13 | F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection |
14 | NAT14 | Implementation of Risk-Aggregated Substation Testbed Using Generative Adversarial Networks |
15 | NAT15 | IRS-Aided Wireless Communication: From Physics to Channel Modeling and Characterization |
16 | NAT16 | Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems |
17 | NAT17 | Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks |
18 | NAT18 | Next-Generation IoT Devices: Sustainable Eco-Friendly Manufacturing, Energy Harvesting, and Wireless Connectivity |
19 | NAT19 | On the Differential Spectrum and the APcN Property of a Class of Power Functions Over Finite Fields |
20 | NAT20 | Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences |
21 | NAT21 | Physical Layer Security Enhancement via Intelligent Omni-Surfaces and UAV-Friendly Jamming |
22 | NAT22 | Point Cloud Adversarial Perturbation Generation for Adversarial Attacks |
23 | NAT23 | Resilient Load Frequency Control of Multi-Area Power Systems Under DoS Attacks |
24 | NAT24 | Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car |
25 | NAT25 | Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks |
B
o
o
k
Y
o
u
r
F
R
E
E
D
e
m
o
C
l
a
s
s
T
o
d
a
y
B
o
o
k
Y
o
u
r
F
R
E
E
D
e
m
o
C
l
a
s
s
T
o
d
a
y