IOT

IOT/EMBEDDED Titles

S.NO IOT/EMBEDDED IEEE Titles Abstract
1 Health-monitoring of pregnant women Design requirements, and proposedreference architecture View
2 A New Design Approach for Gesture Controlled SmartWheelchair Utilizing MicrocontrollerShared authority based privacy-preserving authentication protocol in cloud computing View
3 Adjustment of Bed for a PatientThrough View
4 An Intelligent Mobile Agents System for Sudden Infant Death SyndromeMonitoring View
5 Wearable Heart Rate SensorSystems for Wireless Canine Health Monitoring View
6 A Wireless Continuous PatientMonitoring System for Dengue; View
7 On Access Control in Cabin-BasedTransport Systems. View
8 Arduino Based Smart Fingerprint Authentication System View
9 End to End IoT Based HazardMonitoring System. View
10 Monitoring Effect of Air Pollutionon Agriculture using WSNs. View
11 . Bluetooth GPS Application Based On Latitude And Longitude For ChildTracking Model. View
12 A Wireless Health Monitoring System Using Mobile PhoneAccessories View
13 Monitoring physiological variablesof mining workers at high altitude View
14 Novel Approach to Non-Invasive Blood Glucose Monitoring based onTransmittance and Refraction ofVisible Laser Light View
15 Private and Secured Medical Data Transmission and Analysis for WirelessSensing Healthcare System View
16 Self-Powered ZigBee Wireless Sensor Nodes for RailwayCondition Monitoring View
17 A Wireless Sensor Monitoring Node Based on Automatic Tracking SolarpoweredPanel for Paddy Field Environment View
18 Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine forEmbedded System. View
19 Anti-theft protection of vehicle byGSM & GPS with fingerprint verification View
20 Embedded Control System for Traffic CongestionSmart Walking Assistance Device View
21 Direct and indirect sensing two-axis solar tracking system View
22 A smart meter design and implementation using ZigBee based Wireless SensorNetwork in Smart Grid View
23 Child Safety Wearable Device View
24 Vehicle Information Communication Safety Combined with Mobile RFIDSystem View
25 Low Cost Assistive OutdoorNavigation System for Blind People View
26 Real-Time Signal Quality-Aware ECG Telemetry System for IoT- Based CareMonitoring. View
27 Real-time Traffic Light Recognition Based on Smart Phone Platforms View
28 RFID-Based Attendance Management System View
29 Towards Intelligent Arabic Text-to- Speech Application for DisabledPeople View
30 Design and Implementation of a Fingerprint Based Lock System for SharedAccess. View
31 . Low-Cost, Real-Time ObstacleAvoidance for Mobile Robots View
32 A novel anti phishing visual cryptographic framework View
33 Enhanced data security model for cloud computing View
34 Review of apriority based frequent item set mining solutions on big data View
35 Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud View
36 Scalable and efficient authentication scheme for secure smart grid communication View
37 A novel feature matching ranked search mechanism over encrypted cloud data View
38 A secure data dynamics and public auditing scheme for cloud storage View
39 A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud View
40 Fast secure and anonymous key agreement against bad randomness for cloud computing View
41 Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing View
42 Key-policy attribute-based encryption with keyword search in virtualized environments View
43 .A secure and efficient cloud-centric internet of medical thingsenabled smart healthcare system with public verifiability View
44 A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud View
45 dentity-based encryption transformation for flexible sharing of encrypted data in public cloud View
46 Authentication and key agreement based on anonymous identity for peer- to-peer cloud View
47 Fine-grained access control in the era of cloud computing: an analytical review View
48 Personalized market basket prediction with temporal annotated recurring sequences View
49 Drops: division and replication of data in cloud for optimal performance and securit View
50 Mining users trust from e commerce reviews based on sentiment similarity analysis View
51 Spammer detection and fake user identification on social networks View
52 Privacy-preserving attribute-based keyword search in shared multiowner setting View
53 Revocable identity-based broadcast proxy re-encryption for data sharing in clouds View
54 Dynamic multi keyword ranked search based on bloom filter over encrypted cloud data View
55 Data integrity auditing without private key storage for secure cloud storage View
56 Enabling verifiable and dynamic ranked search over outsourced data View
57 Hidden cipher text policy attribute-based encryption with fast decryption for personal health record system View
58 .A practical attribute-based document collection hierarchical encryption scheme in cloud computing View
59 Privacy preservation for outsourced medical data with flexible access control View
60 Privacy preserving indexing and query processing for secure dynamic cloud storage View
61 SEPDP secure and efficient privacy preserving provable data possession in cloud storage View
62 An efficient and privacy preserving biometric identification scheme in cloud computing View
63 Secured outsourcing towards a cloud computing environment based on DNA cryptography View
64 Detection of suicide-related posts in twitter data streams View
65 Combining data owner-side and cloud-side access control for encrypted cloud storage View
66 Characterizing and predicting early reviewers for effective product marketing on e commerce websites View
67 Event detection and identification of influential spreaders in social media data streams View
68 Enabling identity-based integrity auditing and data sharing with sensitive information hiding View
69 Class: cloud log assuring soundness and secrecy scheme for cloud forensics View
70 Provably secure and lightweight identity based authenticated data sharing protocol for cyber physical environmen View
71 Efficient retrieval over documents encrypted by attributes in cloud computing View
72 Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing View
73 Semantic aware searching over encrypted data for cloud computing View
74 Privacy-preserving search over encrypted personal health record in multi-source cloud View
75 Search rank fraud and malware detection in Google play View
76 Detecting stress based on social interaction in social networks View
77 TAFC time and attribute factors combined access control for timesensitive data in public cloud View
78 Optimal resource scheduling and allocation system View
79 .SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing View
80 Shilling attack models in recommender system View
81 FastGeo: efficient geometric range queries on encrypted spatial data View
82 Query reorganization algorithms for efficient Boolean information filtering View
83 Continuous top-k monitoring on document streams View
84 Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic View
85 Trajectory community discovery and recommendation by multisource diffusion modeling View
1 Privacy protection based access control scheme in cloud-based services View
86 User service rating prediction by exploring the social user rating behaviours View
87 My privacy my decision View
88 Net spam-a network based spam detection framework View
89 Heterogeneous cloud computing network View
90 Net spam-a network based spam detection framework View
91 Achieving energy efficiency in data centers using an artificial intelligence abstraction model View
92 An efficient file hierarchy attribute-based encryption scheme in cloud computing View
93 Authenticated key exchange protocols for parallel network file systems View
94 Circuit cipher text-policy attribute-based hybrid encryption with verifiable View
95 Cloud workflow scheduling with deadline and time slot algorithm View
96 Cloudarmor-supporting-reputation-based-trust-management-forcloud-services View
97 Collective data-sanitization for preventing sensitive information inference attacks in social networks View
98 Conditional identity-based broadcast proxy re-encryption and its application to cloud email View
99 Discovery of ranking fraud for mobile View
100 Efficient multipath communication for time-critical applications in underwater acoustic sensor networks View
101 Fine-grained two-factor access control for cloud computing services View