S.NO |
IOT/EMBEDDED IEEE Titles |
Abstract |
1 |
Health-monitoring of pregnant women Design requirements, and proposedreference architecture |
View |
2 |
A New Design Approach for Gesture Controlled SmartWheelchair Utilizing MicrocontrollerShared authority based privacy-preserving authentication protocol in cloud computing |
View |
3 |
Adjustment of Bed for a PatientThrough |
View |
4 |
An Intelligent Mobile Agents System for Sudden Infant Death SyndromeMonitoring |
View |
5 |
Wearable Heart Rate SensorSystems for Wireless Canine Health Monitoring |
View |
6 |
A Wireless Continuous PatientMonitoring System for Dengue; |
View |
7 |
On Access Control in Cabin-BasedTransport Systems. |
View |
8 |
Arduino Based Smart Fingerprint Authentication System |
View |
9 |
End to End IoT Based HazardMonitoring System. |
View |
10 |
Monitoring Effect of Air Pollutionon Agriculture using WSNs. |
View |
11 |
. Bluetooth GPS Application Based On Latitude And Longitude For ChildTracking Model. |
View |
12 |
A Wireless Health Monitoring System Using Mobile PhoneAccessories |
View |
13 |
Monitoring physiological variablesof mining workers at high altitude |
View |
14 |
Novel Approach to Non-Invasive Blood Glucose Monitoring based onTransmittance and Refraction ofVisible Laser Light |
View |
15 |
Private and Secured Medical Data Transmission and Analysis for WirelessSensing Healthcare System |
View |
16 |
Self-Powered ZigBee Wireless Sensor Nodes for RailwayCondition Monitoring |
View |
17 |
A Wireless Sensor Monitoring Node Based on Automatic Tracking SolarpoweredPanel for Paddy Field Environment |
View |
18 |
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine forEmbedded System. |
View |
19 |
Anti-theft protection of vehicle byGSM & GPS with fingerprint verification |
View |
20 |
Embedded Control System for Traffic CongestionSmart Walking Assistance Device |
View |
21 |
Direct and indirect sensing two-axis solar tracking system |
View |
22 |
A smart meter design and implementation using ZigBee based Wireless SensorNetwork in Smart Grid |
View |
23 |
Child Safety Wearable Device |
View |
24 |
Vehicle Information Communication Safety Combined with Mobile RFIDSystem |
View |
25 |
Low Cost Assistive OutdoorNavigation System for Blind People |
View |
26 |
Real-Time Signal Quality-Aware ECG Telemetry System for IoT- Based CareMonitoring. |
View |
27 |
Real-time Traffic Light Recognition Based on Smart Phone Platforms |
View |
28 |
RFID-Based Attendance Management System |
View |
29 |
Towards Intelligent Arabic Text-to- Speech Application for DisabledPeople |
View |
30 |
Design and Implementation of a Fingerprint Based Lock System for SharedAccess. |
View |
31 |
. Low-Cost, Real-Time ObstacleAvoidance for Mobile Robots |
View |
32 |
A novel anti phishing visual cryptographic framework |
View |
33 |
Enhanced data security model for cloud computing |
View |
34 |
Review of apriority based frequent item set mining solutions on big data |
View |
35 |
Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud |
View |
36 |
Scalable and efficient authentication scheme for secure smart grid communication |
View |
37 |
A novel feature matching ranked search mechanism over encrypted cloud data |
View |
38 |
A secure data dynamics and public auditing scheme for cloud storage |
View |
39 |
A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud |
View |
40 |
Fast secure and anonymous key agreement against bad randomness for cloud computing |
View |
41 |
Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing |
View |
42 |
Key-policy attribute-based encryption with keyword search in virtualized environments |
View |
43 |
.A secure and efficient cloud-centric internet of medical thingsenabled smart healthcare system with public verifiability |
View |
44 |
A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud |
View |
45 |
dentity-based encryption transformation for flexible sharing of encrypted data in public cloud |
View |
46 |
Authentication and key agreement based on anonymous identity for peer- to-peer cloud |
View |
47 |
Fine-grained access control in the era of cloud computing: an analytical review |
View |
48 |
Personalized market basket prediction with temporal annotated recurring sequences |
View |
49 |
Drops: division and replication of data in cloud for optimal performance and securit |
View |
50 |
Mining users trust from e commerce reviews based on sentiment similarity analysis |
View |
51 |
Spammer detection and fake user identification on social networks |
View |
52 |
Privacy-preserving attribute-based keyword search in shared multiowner setting |
View |
53 |
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds |
View |
54 |
Dynamic multi keyword ranked search based on bloom filter over encrypted cloud data |
View |
55 |
Data integrity auditing without private key storage for secure cloud storage |
View |
56 |
Enabling verifiable and dynamic ranked search over outsourced data |
View |
57 |
Hidden cipher text policy attribute-based encryption with fast decryption for personal health record system |
View |
58 |
.A practical attribute-based document collection hierarchical encryption scheme in cloud computing |
View |
59 |
Privacy preservation for outsourced medical data with flexible access control |
View |
60 |
Privacy preserving indexing and query processing for secure dynamic cloud storage |
View |
61 |
SEPDP secure and efficient privacy preserving provable data possession in cloud storage |
View |
62 |
An efficient and privacy preserving biometric identification scheme in cloud computing |
View |
63 |
Secured outsourcing towards a cloud computing environment based on DNA cryptography |
View |
64 |
Detection of suicide-related posts in twitter data streams |
View |
65 |
Combining data owner-side and cloud-side access control for encrypted cloud storage |
View |
66 |
Characterizing and predicting early reviewers for effective product marketing on e commerce websites |
View |
67 |
Event detection and identification of influential spreaders in social media data streams |
View |
68 |
Enabling identity-based integrity auditing and data sharing with sensitive information hiding |
View |
69 |
Class: cloud log assuring soundness and secrecy scheme for cloud forensics |
View |
70 |
Provably secure and lightweight identity based authenticated data sharing protocol for cyber physical environmen |
View |
71 |
Efficient retrieval over documents encrypted by attributes in cloud computing |
View |
72 |
Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing |
View |
73 |
Semantic aware searching over encrypted data for cloud computing |
View |
74 |
Privacy-preserving search over encrypted personal health record in multi-source cloud |
View |
75 |
Search rank fraud and malware detection in Google play |
View |
76 |
Detecting stress based on social interaction in social networks |
View |
77 |
TAFC time and attribute factors combined access control for timesensitive data in public cloud |
View |
78 |
Optimal resource scheduling and allocation system |
View |
79 |
.SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing |
View |
80 |
Shilling attack models in recommender system |
View |
81 |
FastGeo: efficient geometric range queries on encrypted spatial data |
View |
82 |
Query reorganization algorithms for efficient Boolean information filtering |
View |
83 |
Continuous top-k monitoring on document streams |
View |
84 |
Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic |
View |
85 |
Trajectory community discovery and recommendation by multisource diffusion modeling |
View |
1 |
Privacy protection based access control scheme in cloud-based services |
View |
86 |
User service rating prediction by exploring the social user rating behaviours |
View |
87 |
My privacy my decision |
View |
88 |
Net spam-a network based spam detection framework |
View |
89 |
Heterogeneous cloud computing network |
View |
90 |
Net spam-a network based spam detection framework |
View |
91 |
Achieving energy efficiency in data centers using an artificial intelligence abstraction model |
View |
92 |
An efficient file hierarchy attribute-based encryption scheme in cloud computing |
View |
93 |
Authenticated key exchange protocols for parallel network file systems |
View |
94 |
Circuit cipher text-policy attribute-based hybrid encryption with verifiable |
View |
95 |
Cloud workflow scheduling with deadline and time slot algorithm |
View |
96 |
Cloudarmor-supporting-reputation-based-trust-management-forcloud-services |
View |
97 |
Collective data-sanitization for preventing sensitive information inference attacks in social networks |
View |
98 |
Conditional identity-based broadcast proxy re-encryption and its application to cloud email |
View |
99 |
Discovery of ranking fraud for mobile |
View |
100 |
Efficient multipath communication for time-critical applications in underwater acoustic sensor networks |
View |
101 |
Fine-grained two-factor access control for cloud computing services |
View |