Embedded System Papers and Titles

IOT Projects

 

  1. IOT based smart geyser automation with environment condition to save electricity
  2. IOT based novel low-cost sensor for human bite force measurement
  3. IOT – smart seating management in public bus transportation using IOT  and embedded system
  4. IOT _airport baggage conveyor and voice notification using android technology
  5. IOT based underground cable fault detection
  6. IOT -an internet-of-things enabled connected navigation system for urban bus riders
  7. IOT based irrigation system with without internet and pump set control with status notification
  8. IOT -hive home automation system for intrusion detection
  9. IOT – evidence collection in automotive industry for legal claim
  10. IOT -intelligent smart traffic management for ambulance using RFID
  11. IOT -hive home automation and security system
  12. IOT based structural health monitoring of flyovers
  13. IOT ayurvedic medicine beetel leaf vine cultivation using IOT  & wireless sensor network
  14. IOT based refrigerator, storage room and FMCG products stock monitoring with email alert of purchase order
  15. IOT based semi-automated rash driving detection by using accelerometer sensors
  16. IOT -intelligent food and grain storage management system for warehouse
  17. IOT – er lock – intelligent anti-theft tracking and accident detection system for automobiles based on IOT
  18. IOT -electricity energy unit limits per sqft land – resource management responsibility per family
  19. IOT based garbage and street light monitoring system
  20. IOT & android based on-street and off-street parking availability prediction & space reservation
  21. IOT based monitoring and smart planning of urban solid waste management
  22. IOT – residence energy control system based on wireless smart socket and IOT
  23. IOT ayurvedic medicine tulsi, mint, turmeric land farming with IOT  & wireless sensor network

 

Raspberry Pi Based Projects

 

  1. Raspberry pi based wireless electronic notice board
  2. Raspberry pi based implementation og digital advertise boarding with email alert to end customer
  3. An implementation of digital advertising board using mini pc
  4. IOT – raspberry pi based global industrial process monitoring through wireless communication
  5. Raspberry pi based global industrial process monitoring through wireless communication
  6. Raspberry – IEEE – hive home automation and security system
  7. Raspberry – remote virtual lab access and capturing physical image of laboratory
  8. Raspberry pi – gesture based email access and voice command for blind and dumb
  9. Raspberry pi based deadly school van monitoring system with e-mail alert
  10. Raspberry pi – job vacancy? Handicap, drop your resume

 

 

Robotics

 

  1. Ambubot – robotic automated external defibrillator ambulance for emergency medical service in smart cities
  2. Gesture and speech based wheel chair control for physically challenged person using android Bluetooth technology
  3. Automated waste segregator
  4. Conveyor system automated restaurant management system
  5. Bluetooth embedded robotic agriculture plowing, seeding and grass cutting powered by solar energy
  6. Pot hole detection sensor robot notifying its location to the local authority via android
  7. Automatic and intelligent car motion
  8. Automated book picking robot for libraries
  9. Robotic automated food service provider is hotel with android based individual menu system
  10. Android – design of an intelligent combat robot for war field
  11. Unmanned autonomous vehicle control
  12. Speech based wheel chair control for physically challenged person using android Bluetooth technology
  13. Maze robot
  14. Bt embedded robotic lawn mover powered by solar energy
  15. Ambubot – robotic automated external defibrillator ambulance for emergency medical service in smart cities
  16. IOT based multi function war assistance robot
  17. Embedded land rover with sensor interface with zigbee technology
  18. Flex & acceleration used hand gesture control of robot with mp3 voice output
  19. Hand gesture based robot control with pick and place operation using accelerometer
  20. Multi control robot
  21. Two axis based solar tracking for power conservation in irrigation system
  22. Industrial conveyor batch counter for packing automation
  23. Seed sowing plowing and waste grass cutting robot with android application

 

Biomedical & Medical Applications

 

  1. Android based monitoring human knee joint movement using wearable computing
  2. Embed rapid entire body postural analysis assessment device for computer operators
  3. Operation theatre automation & control (OTAC)
  4. Android – electronic stick and android smart phones to the aid of blindly disabled individuals
  5. Android based patient monitoring in hospitals and old ages at home
  6. IOT and e glove based nurse calling system
  7. Ultrasonic haptic vision system for blindly disabled individuals
  8. Accessible electronic interaction for people with partial paralysis
  9. Head movement based wireless communication with speech alert for paralyzed person
  10. NICU monitoring
  11. Android based novel low-cost sensor for human bite force measurement
  12. Gesture and speech based wheel chair control for physically challenged person using android Bluetooth technology
  13. Any time medicine
  14. Android based monitoring human insole movement using wearable computing
  15. Elderly person activity tracking application using android smartphone
  16. Mat lab based novel low-cost sensor for human bite force measurement
  17. Android rapid entire body postural analysis assessment device for computer operators
  18. Speech based wheel chair control for physically challenged person using android Bluetooth technology
  19. Embed – electronic stick for vision control of pre-defined area with fn-m16p module voice alert

 

Agriculture & irrigation

 

  1. IOT ayurvedic medicine beetel leaf vine cultivation using IOT  & wireless sensor network
  2. Bluetooth embedded robotic agriculture plowing, seeding and grass cutting powered by solar energy
  3. Seed sowing plowing and waste grass cutting robot with android application
  4. IOT ayurvedic medicine tulsi, mint, turmeric land farming with IOT  & wireless sensor network
  5. Crop leaf area index observations with a wireless sensor network and its potential for validating remote sensing products
  6. Bt embedded robotic lawn mower powered by solar energy

 

Can protocol

 

  1. Design & implementation of smart city using controlled area network protocol for controlling purpose
  2. Can based control unit for a novel reconfigurable micro grid architecture with renewable energy sources
  3. Vehicle control for pedestrians safety using can protocol for implementing the intelligent braking system
  4. Can test analyzer for quality testing in automobile production plant with authorized report generation
  5. Co-operative adaptive cruise control (cacc) based on can protocol using microchip
  6. Vehicle control using can protocol for implementing the intelligent braking system
  7. Invisible eye – an advanced security system using web camera
Advertisements

Our NS2 Projects and Titles

NS2 Projects

 

Wireless Sensor Network (WSN)

 

  1. Energy-Efficient Optimization for Concurrent Compositions of WSN Services
  2. K-Coverage Model Based on Genetic Algorithm to Extend WSN Lifetime
  3. Can Sensors Collect Big Data? An Energy-Efficient Big Data Gathering Algorithm for a WSN
  4. Establishing a Cooperation-Based and Void Node Avoiding Energy-Efficient Underwater WSN for a Cloud

5.         Universal Cooperative Localizer for WSN With Varied Types of Ranging Measurements

6.         Reliability analysis for WSN based on a modular k-out-of-n system

7.         Target detection in cluster based WSN with massive MIMO systems

8.         Authentication Protocol Design and Low-Cost Key Encryption Function Implementation for Wireless Sensor Networks

  1. Lossless In-Network Processing and Its Routing Design in Wireless Sensor Networks

10.     An Optimization Scheme of Enhanced Adaptive Dynamic Energy Consumption Based on Joint Network-Channel Coding in WSNs

11.     Network Performance Evaluation of M2M With Self Organizing Cluster Head to Sink Mapping

12.     Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

13.     Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic

14.     Load Balanced Coverage with Graded Node Deployment in Wireless Sensor Networks

15.     A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

16.     Clustering Hierarchy Protocol in Wireless Sensor Networks Using an Improved PSO Algorithm

17.     Energy Harvesting Wireless Sensor Node With Temporal Death: Novel Models and Analyses

18.     3-D Target Localization in Wireless Sensor Networks Using RSS and AoA Measurements

19.     Energy-Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network

20.     Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks

21.     Optimal Mobility Patterns of Multiple Base Stations for Wireless Sensor Network Lifetime Maximization

22.     Data Gathering With Minimum Number of Relay Packets in Wireless Sensor Networks

23.     Optimizing Opportunistic Routing in Asynchronous Wireless Sensor Networks

24.     MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks

25.     Genetic algorithm based fault tolerant clustering in wireless sensor network

26.     Cluster-chain mobile agent routing algorithm for efficient data aggregation in wireless sensor network

27.     Delay constraint energy-efficient routing based on Lagrange relaxation in wireless sensor networks

28.     Structural Health Monitoring Using Wireless Sensor Networks: A Comprehensive Survey

29.     MCRA: A Multi-Charger Cooperation Recharging Algorithm Based on Area Division for WSNs

30.     Joint Charging Tour Planning and Depot Positioning for Wireless Sensor Networks Using Mobile Chargers

31.     A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks

32.     A Game-Theoretic and Energy-Efficient Algorithm in an Improved Software-Defined Wireless Sensor Network

33.     Concurrently Wireless Charging Sensor Networks with Efficient Scheduling

34.     Coordinate-Assisted Routing Approach to Bypass Routing Holes in Wireless Sensor Networks

35.     Design and Analysis of In-Network Computation Protocols With Compressive Sensing in Wireless Sensor Networks

 

Mobile Ad-Hoc Networks (MANETs)

 

  1. On Performance Modelling for MANETs Under General Limited Buffer Constraint
  2. LOMCF: Forwarding and Caching in Named Data Networking Based MANETs
  3. Smooth Mobility and Link Reliability-Based Optimized Link State Routing Scheme for MANETs
  4. Optimal Capacity–Delay Tradeoff in MANETs With Correlation of Node Mobility
  5. Ant based multipath backbone routing for load balancing in MANET
  6. Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
  7. Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks
  8. Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function
  9. Trust-Based Task Assignment With Multi objective Optimization in Service-Oriented Ad Hoc Networks
  10. A Dynamic Hop-Aware Buffer Management Scheme for Multi-Hop Ad Hoc Networks
  11. A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
  12. Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks
  13. SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
  14. Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function
  15. Deterministic Broadcasting and Random Linear Network Coding in Mobile Ad Hoc Networks
  16. A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks
  17. Mobility-aware route selection technique for mobile ad hoc networks
  18. A Location-Based Mobile Crowd sensing Framework Supporting a Massive Ad Hoc Social Network Environment
  19. A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
  20. Dynamic, Privacy-Preserving Decentralized Reputation Systems
  21. A Secure Approach for Caching Contents in Wireless Ad Hoc Networks
  22. Joint Scheduling and Transmission Power Control in Wireless Ad Hoc Networks
  23. OEFS: On-Demand Energy-Based Forwarding Strategy for Named Data Wireless Ad Hoc Networks
  24. Store-Carry-Cooperative Forward Routing With Information Epidemics Control for Data Delivery in Opportunistic Networks
  25. Broadcast-Based Content Delivery in Information-Centric Hybrid Multihop Wireless Networks

Our Projects and IEEE Papers on JAVA

CLOUD COMPUTING

 

  1. Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid
  2. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
  3. Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
  4. Attribute- Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  5. Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centres
  6. Customer- Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
  7. A Cross Tenant Access Control(CTAC)Model for Cloud Computing : Formal Specification and Verification
  8. A New Service Mechanism for Profit Optimization of a Cloud Provider and its Users
  9. A Novel Efficient Remote Data Possessing Checking Protocol in Cloud Storage
  10. A semi automatic and trustworthy scheme for continuous cloud service certification
  11. VPSearch : Achieving Verifiability for Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data
  12. Energy-Aware Load Balancing and Application Scaling for the Cloud Ecosystem
  13. Fast Phrase Search for Encrypted for Cloud Storage
  14. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
  15. Keyword Search with Access Controller over Encrypted Cloud Data
  16. Knowledge-Enhanced Mobile Video Broadcasting Framework With Cloud Support
  17. Enabling semantic search based on single keyword
  18. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
  19. Privacy-Protection Based Access Control Scheme in Cloud-Based services
  20. Privacy-Preserving Multi-keyword Top-k Similarity Search over Encrypted Data
  21. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
  22. Provable Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing in the Cloud
  23. RAAC : Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
  24. Resource renting for periodical cloud workflow applications
  25. Securing Cloud Data Under Key Exposure
  26. SeDaSC : Secure Data Sharing in Clouds
  27. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
  28. TAFC : Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
  29. TES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud
  30. Temporal Task Scheduling With Constrained Service Delay for Profit Maximization in Hybrid Clouds
  31. Two-Cloud Secure Database for Numeric –related SQL Range Queries With Privacy Preserving
  32. Fuzzy identity based data integrity auditing for reliable cloud storge system.
  33. SecRBAC: Secure data in the Clouds
  34. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
  35. A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing
  36. A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing
  37. A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds
  38. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
  39. iParker—A New Smart Car-Parking System Based on Dynamic Resource Allocation and Pricing
  40. EvacSys: A Cloud-Based Service for emergency
  41. Automatically Enforcing Security SLAs in the Cloud
  42. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
  43. A Hybrid Cloud Approach for Secure Authorized Deduplication
  44. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
  45. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute Based Encryption
  46. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
  47. Enabling Cloud Storage Auditing with Key-Exposure Resistance
  48. Identity-based Encryption with Outsourced Revocation in Cloud Computing
  49. Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
  50. Cloud bassed multimedia content protection system

BIG DATA      

 

  1. Efficient Processing of Skyline Queries Using MapReduce
  2. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
  3. Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
  4. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
  5. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
  6. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
  7. On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications
  8. The SP Theory of Intelligence: Distinctive Features and Advantages
  9. A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data
  10. Protection of Big Data Privacy
  11. Sentiment Analysis of Top Colleges in India Using Twitter Data
  12. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
  13. Phoenix: A MapReduce Implementation With New Enhancements
  14. Research Directions for Engineering Big Data Analytics Software
  15. Secure sensitive data sharing on a big data platform
  16. A Hierarchical Distributed ProcessingFramework for Big Image Data

DATA MINING

 

1.      Analyzing Sentiments in One Go :A Supervised Joint Topic Modelling Approach

2.      Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

3.      Sentiment Analysis of Indian Movie Review with various Feature Selection Techniques

4.      Predicting Student Actions in a Procedural Training Environment

5.      Detecting Stress Based on Social Interactions in Social Networks

6.      I-Injection : Toward Effective Collaborative Filtering Using Uninteresting items

7.      PPRank : Economically Selecting Initial Users for influence Maximization in Social Networks

8.      SociRank : Identifying and Ranking Prevalent News Topics Using Social Media Factors

9.      Query Reorganization Algorithms for Efficient Boolean Information Filtering

10.  Computing Semantic Similarity of Concepts in Knowledge Graphs

11.  Explaining Missing Answers to Top-k SQL Queries

12.  User-Centric Similarity Search

13.  Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

14.  Mining frequent route patterns based on personal trajectory abstraction

15.  RAPARE : A Generic Strategy for Cold-Start Rating Prediction Problem

16.  Collaborative Filtering-Based Recommendation of Online Social Voting

17.  Efficient Keyword-aware Representative Travel Route Recommendation

18.  DRIMUX : Dynamic Rumor Influence Minimization with User Experience in Social Networks

19.  Query Reorganization Algorithms for Efficient Boolean Information Filtering

20.  Towards Real-Time, Country-Level  Location Classification of Worldwide Tweets

21.  Cloud workflow scheduling with deadlines and time slot availability

22.  Analyzing the Hydro climatic Teleconnections of Summer Monsoon Rainfall in Kerala, India, Using Multivariate Empirical Mode Decomposition and Time-Dependent Intrinsic Correlation

23.  K Nearest Neighbor Joins for Big Data on Map Reduce: a Theoretical and Experiment

24.  SPIRIT: A Tree Kernel-based Method for Topic Person Interaction Detection

25.  Mining User-Aware Rare Sequential Topic Patterns in Document Streams

26.  Efficient Algorithms for Mining Top-K High Utility Item sets

27.  A Survey of Task Allocation and Load Balancing in Distributed Systems

28.  Resolving Multi-Party Privacy Conflicts in Social Media

NETWORK SECURITY

 

1.      Structural Vulnerability Assessment ofCommunity-based Routing in Opportunistic Networks

2.      Evaluation of web Security Mechanism Using Vulnerability & Attack Injection

3.      My Privacy- My decision: Control of Photo Sharing on Online Social Networks

4.      Detection of False Data Injection Attacks in smart Grid Communication System

IMAGEPROCESSING

 

1.      Robust Face Recognition with Kernelized Locality-Sensitive Group

2.      Sparsity Representation

3.      MuLoG, or How to apply Gaussian denoisers to multi-channel SAR speckle reduction?

4.      DeepFix: A Fully Convolutional Neural Network for predicting Human Eye Fixations

5.      Multimodal Similarity Gaussian Process Latent Variable Model

6.      Ocular Recognition for Blinking Eyes

7.      Piecewise-stationary motion modeling and iterative smoothing to track heterogeneous particle motions in dense environments

8.      300 FPS Salient Object Detection via Minimum Directional Contrast

9.      Multimodal Biometrics for user authentication

10.  Automatic Semantic Face Recognition

11.  Motion Detection Application Using Web Camera

12.  Detection of Plant Leaf Disease Using Image Processing Approach

13.  Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain

14.  Reversible Data Hiding in Encrypted Images Based on Progressive Recovery

15.  Agricultural plant Leaf Disease Detection Using Image Processing

16.  Steganography Using Reversible Texture Synthesis

17.  Reversible Data Hiding in Encrypted Images with Distributed Source Encoding

18.   One-time Password for Biometric Systems: Disposable Feature Templates

19.     Effective and Efficient Global Context Verification for Image Copy Detection
20.     Face Recognition Using Sparse Fingerprint Classification Algorithm
21.     Enhanced Password Processing Scheme Based on Visual Cryptography and OCR
22.     Image Re-ranking based on Topic Diversity
23.     Semi-Supervised Image-to-Video Adaptation for Video Action Recognition

24.     Accurate Detection and Recognition of Dirty Vehicle Plate Numbers for High-Speed Applications

25.     My Privacy My Decision: Control of Photo Sharing on Online Social Networks

26.     A Hierarchical Approach for Rain or Snow Removing in A Single Color Image

27.     Automatic Detection of Red Light Running Using Vehicular Cameras

28.     PassBYOP: Bring Your Own Picture for Securing Graphical Passwords

29.     Single Sample Face Recognition Based on LPP Feature Transfer

30.     A Shoulder Surfing Resistant Graphical Authentication System

31.     Reversible Data Hiding in Encrypted Images Based on Progressive Recovery

32.     Reversible Data Hiding in Encrypted Images With Distributed Source Encoding

33.     Phoenix: A Image MapReduce Implementation With New Enhancements

34.     2DCrypt: Image Scaling and Cropping in Encrypted Domains

35.     Multilevel Network Security Combining Cryptography and Steganography on ARM Platform

36.     Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

37.     Prevention of Phishing Attacks in Voting System using Visual Cryptography

 

WEB SECURITY

1.      Multi-party secret key agreement over state-dependent wireless broadcast channels

2.      Someone in Your Contact List: Cued Recall-Based Textual Passwords
3.      Authorship Attribution for Social Media Forensics
4.      NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

5.      My Privacy My Decision: Control of Photo Sharing on Online Social Networks

6.      One-time Password for Biometric Systems: Disposable Feature Templates

7.      Enhanced Password Processing Scheme Based on Visual Cryptography and OCR

8.      Effective and Efficient Global Context Verification for Image Copy Detection

9.      One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications

10.  Fast Detection of Transformed Data Leaks

11.  Secure Auditing and Deduplicating Data in Cloud

12.  Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

13.  Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

14.  FRAppE :Detecting Malicious Facebook Application

15.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

16.  An Exploration of Geographic Authentication Schemes
17.  Dummy-Based User Location Anonymization under Real-World Constraints
18.  Privacy-Preserving Location Sharing Services for Social Networks
19.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
20.  PRISM: PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
21.  A Shoulder Surfing Resistant Graphical Authentication System
22.  Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
INTERNET of THINGS (IoT)

1.      Blind Aid Stick: Hurdle Recognition, Simulated Perception, Android Integrated Voice Based Cooperation via GPS Along With Panic Alert System

2.      Botnets and Internet of Things Security
3.      Child Safety Wearable Device
4.      Poster Abstract: Data-Centric IoT Services Provisioning in Fog-Cloud Computing Systems
5.      An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies
6.      A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
7.      IOT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
8.      Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems
9.      A Micro-Location Based Dynamic Device-Oriented Control System for IOT Applications
10.  Event-Aware Framework for Dynamic Services Discovery and Selection in the Context of Ambient Intelligence and Internet of Things
11.  IoT based Home Security through Digital Image Processing Algorithms
12.  Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
13.  SMART LIBRARY MANAGEMENT SYSTEM USING RFID TECHNOLOGY
14.  An Internet-of-Things Enabled Connected Navigation System for Urban Bus Riders
15.  ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
16.  The Internet of Things for South African Tourism

17.  Cloud Based Web Application Supporting Vehicle Toll Payment System
18.  HIVE: Home Automation System for Intrusion Detection
19.  Fog Computing May Help to Save Energy in Cloud Computing
20.  Effective Ways to Use Internet of Things in the Field of Medical and Smart Health Care
21.  A Conceptual Framework for IoT-based Healthcare System using Cloud Computing

22.  Emerging Security Mechanisms for Medical Cyber Physical Systems

23.  Designing a Secure Exam Management System (SEMS) for M-Learning Environments

24.  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

25.  Mobile attendance using Near Field Communication and One-Time Password

26.  Context-Aware Mobile Cloud Computing and Its Challenges
27.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
28.  Monitoring of School Kids Using Android Devices and Near Field Communication (NFC)
29.  Intelligent Hands Free Speech based SMS System on Android
30.  Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions

31.  An Online Security Protocol for NFC Payment
32.  RISE: Role-based Internet of Things Service Environment
33.  Real-Time Locating Systems Using Active RFID for Internet of Things
ANDROID PROJECTS

1.   A Classroom Scheduling Service for Smart Classes

2.   GeoMoB – A Geo Location based browser for secured Mobile Banking
3.   Child Safety Wearable Device
4.   Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System

5.   A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

6.   Privacy-Preserving Location-Proximity for Mobile Apps

7.   Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
8.   Privacy-Preserving Location-Proximity for Mobile Apps

9.   IoT based Home Security through Digital Image Processing Algorithms
10.  ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
11.  A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

12.  Effective ways to use Internet of Things in the field of medical and smart health care

13.  Cloud Based Web Application Supporting Vehicle Toll Payment System
14.  An Internet-of-Things Enabled Connected Navigation System for Urban Bus Riders
15.  Emerging Security Mechanisms for Medical Cyber Physical Systems

16.  Designing a Secure Exam Management System (SEMS) for M-Learning Environments

17.  Shake Unlock: Securely Transfer Authentication States between Mobile Devices

18.  Dummy-Based User Location Anonymization Under Real-World Constraints
19.  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones
20.  Mobile attendance using Near Field Communication and One-Time Password
21.  Context-Aware Mobile Cloud Computing and Its Challenges
22.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
23.  Monitoring of School Kids Using Android Devices and Near Field Communication (NFC)
24.  Intelligent Hands Free Speech based SMS System on Android
25.  Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions

26.  An Online Security Protocol for NFC Payment