M.Tech Projects guided:
- Unobservable BATMAN Routing for Efficient Data Delivery using UOSPR
in comparison with USOR and USHR.
- Privacy Preserving Routing for Mobile Adhoc Networks using USOR.
- Defending against Unidentified Misbehaving Users using Nymble
Credential System.
- Impact of Blackhole Attack in Adhoc Wireless Networks.
- Black Hole Node Detection and Preventing using M-Detection and IODSR.
- Message Ferrying Approach in Disjoint Clusters of Mobile Sensor
Networks.
- Pattern Discovery for Text Mining.
- Performance Analysis of DSDV,DSR,AODV Routing Protocols for MANET’S.
- Detecting Blackhole Attack and prevention using DSR in Manet’s.
- Implementation of GPSR using Adaptive Position Updates using in
Manet’s.
- Mid-Node Aware Adaptive Position Update for Geographic Routing in
Mobile Adhoc Networks.
- Spam Detection Using Youtube Data By Applying Various Machine
Learning Algorithms And Lstm.
- Hierarchical Approach for Energy and Energy Aware Routing Protococol
Using a HEED Clustering Approach in WSN.
- Efficient and Secure Routing Protocol for Wireless Sensor Networks
using Mine detection.
- Best Relay Selection Process using Cooperative MAC Protocol Design for Network Lifetime in MANETS.
- Estimation Based Framework for Identifying Malicious Data Injections in Wireless Sensor Networks.
- Energy Efficient Single path with Multi Hop Routing Protocol For Mobile Coordinated Wireless Sensor Networks.
- Forward Privacy Preservation in IoT enabled Healthcare Systems.
- Transfer of Encrypted Files Over a Network.
- Detection and Prevention of Phishing Attack.
- Screen shot Hacker.
- Implementation of HTTP Proxy.
- A Web-based Drug Assistance System using Machine Learning.
- Crypto Currency.
- Face Recognition Bot.
- Immutable Land Registration Storage System Using Blockchain.
- Detecting Objects from Stationary Images Using
Canny Edge Detection Algorithm In Tensorflow. - Credit Card Approval System.
- Movie Recommendation with Sentiment Analysis.
- Online Disease Prediction App.
- Human Activity Recognition using LSTM.
- A Secure Routing of Wireless Sensor Networks Based on Trust Evaluation Model.
No comments:
Post a Comment