| S.NO | IOT/EMBEDDED IEEE Titles | Abstract |
| 1 | Health-monitoring of pregnant women Design requirements, and proposedreference architecture | View |
| 2 | A New Design Approach for Gesture Controlled SmartWheelchair Utilizing MicrocontrollerShared authority based privacy-preserving authentication protocol in cloud computing | View |
| 3 | Adjustment of Bed for a PatientThrough | View |
| 4 | An Intelligent Mobile Agents System for Sudden Infant Death SyndromeMonitoring | View |
| 5 | Wearable Heart Rate SensorSystems for Wireless Canine Health Monitoring | View |
| 6 | A Wireless Continuous PatientMonitoring System for Dengue; | View |
| 7 | On Access Control in Cabin-BasedTransport Systems. | View |
| 8 | Arduino Based Smart Fingerprint Authentication System | View |
| 9 | End to End IoT Based HazardMonitoring System. | View |
| 10 | Monitoring Effect of Air Pollutionon Agriculture using WSNs. | View |
| 11 | . Bluetooth GPS Application Based On Latitude And Longitude For ChildTracking Model. | View |
| 12 | A Wireless Health Monitoring System Using Mobile PhoneAccessories | View |
| 13 | Monitoring physiological variablesof mining workers at high altitude | View |
| 14 | Novel Approach to Non-Invasive Blood Glucose Monitoring based onTransmittance and Refraction ofVisible Laser Light | View |
| 15 | Private and Secured Medical Data Transmission and Analysis for WirelessSensing Healthcare System | View |
| 16 | Self-Powered ZigBee Wireless Sensor Nodes for RailwayCondition Monitoring | View |
| 17 | A Wireless Sensor Monitoring Node Based on Automatic Tracking SolarpoweredPanel for Paddy Field Environment | View |
| 18 | Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine forEmbedded System. | View |
| 19 | Anti-theft protection of vehicle byGSM & GPS with fingerprint verification | View |
| 20 | Embedded Control System for Traffic CongestionSmart Walking Assistance Device | View |
| 21 | Direct and indirect sensing two-axis solar tracking system | View |
| 22 | A smart meter design and implementation using ZigBee based Wireless SensorNetwork in Smart Grid | View |
| 23 | Child Safety Wearable Device | View |
| 24 | Vehicle Information Communication Safety Combined with Mobile RFIDSystem | View |
| 25 | Low Cost Assistive OutdoorNavigation System for Blind People | View |
| 26 | Real-Time Signal Quality-Aware ECG Telemetry System for IoT- Based CareMonitoring. | View |
| 27 | Real-time Traffic Light Recognition Based on Smart Phone Platforms | View |
| 28 | RFID-Based Attendance Management System | View |
| 29 | Towards Intelligent Arabic Text-to- Speech Application for DisabledPeople | View |
| 30 | Design and Implementation of a Fingerprint Based Lock System for SharedAccess. | View |
| 31 | . Low-Cost, Real-Time ObstacleAvoidance for Mobile Robots | View |
| 32 | A novel anti phishing visual cryptographic framework | View |
| 33 | Enhanced data security model for cloud computing | View |
| 34 | Review of apriority based frequent item set mining solutions on big data | View |
| 35 | Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud | View |
| 36 | Scalable and efficient authentication scheme for secure smart grid communication | View |
| 37 | A novel feature matching ranked search mechanism over encrypted cloud data | View |
| 38 | A secure data dynamics and public auditing scheme for cloud storage | View |
| 39 | A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud | View |
| 40 | Fast secure and anonymous key agreement against bad randomness for cloud computing | View |
| 41 | Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing | View |
| 42 | Key-policy attribute-based encryption with keyword search in virtualized environments | View |
| 43 | .A secure and efficient cloud-centric internet of medical thingsenabled smart healthcare system with public verifiability | View |
| 44 | A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud | View |
| 45 | dentity-based encryption transformation for flexible sharing of encrypted data in public cloud | View |
| 46 | Authentication and key agreement based on anonymous identity for peer- to-peer cloud | View |
| 47 | Fine-grained access control in the era of cloud computing: an analytical review | View |
| 48 | Personalized market basket prediction with temporal annotated recurring sequences | View |
| 49 | Drops: division and replication of data in cloud for optimal performance and securit | View |
| 50 | Mining users trust from e commerce reviews based on sentiment similarity analysis | View |
| 51 | Spammer detection and fake user identification on social networks | View |
| 52 | Privacy-preserving attribute-based keyword search in shared multiowner setting | View |
| 53 | Revocable identity-based broadcast proxy re-encryption for data sharing in clouds | View |
| 54 | Dynamic multi keyword ranked search based on bloom filter over encrypted cloud data | View |
| 55 | Data integrity auditing without private key storage for secure cloud storage | View |
| 56 | Enabling verifiable and dynamic ranked search over outsourced data | View |
| 57 | Hidden cipher text policy attribute-based encryption with fast decryption for personal health record system | View |
| 58 | .A practical attribute-based document collection hierarchical encryption scheme in cloud computing | View |
| 59 | Privacy preservation for outsourced medical data with flexible access control | View |
| 60 | Privacy preserving indexing and query processing for secure dynamic cloud storage | View |
| 61 | SEPDP secure and efficient privacy preserving provable data possession in cloud storage | View |
| 62 | An efficient and privacy preserving biometric identification scheme in cloud computing | View |
| 63 | Secured outsourcing towards a cloud computing environment based on DNA cryptography | View |
| 64 | Detection of suicide-related posts in twitter data streams | View |
| 65 | Combining data owner-side and cloud-side access control for encrypted cloud storage | View |
| 66 | Characterizing and predicting early reviewers for effective product marketing on e commerce websites | View |
| 67 | Event detection and identification of influential spreaders in social media data streams | View |
| 68 | Enabling identity-based integrity auditing and data sharing with sensitive information hiding | View |
| 69 | Class: cloud log assuring soundness and secrecy scheme for cloud forensics | View |
| 70 | Provably secure and lightweight identity based authenticated data sharing protocol for cyber physical environmen | View |
| 71 | Efficient retrieval over documents encrypted by attributes in cloud computing | View |
| 72 | Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing | View |
| 73 | Semantic aware searching over encrypted data for cloud computing | View |
| 74 | Privacy-preserving search over encrypted personal health record in multi-source cloud | View |
| 75 | Search rank fraud and malware detection in Google play | View |
| 76 | Detecting stress based on social interaction in social networks | View |
| 77 | TAFC time and attribute factors combined access control for timesensitive data in public cloud | View |
| 78 | Optimal resource scheduling and allocation system | View |
| 79 | .SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing | View |
| 80 | Shilling attack models in recommender system | View |
| 81 | FastGeo: efficient geometric range queries on encrypted spatial data | View |
| 82 | Query reorganization algorithms for efficient Boolean information filtering | View |
| 83 | Continuous top-k monitoring on document streams | View |
| 84 | Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic | View |
| 85 | Trajectory community discovery and recommendation by multisource diffusion modeling | View |
| 1 | Privacy protection based access control scheme in cloud-based services | View |
| 86 | User service rating prediction by exploring the social user rating behaviours | View |
| 87 | My privacy my decision | View |
| 88 | Net spam-a network based spam detection framework | View |
| 89 | Heterogeneous cloud computing network | View |
| 90 | Net spam-a network based spam detection framework | View |
| 91 | Achieving energy efficiency in data centers using an artificial intelligence abstraction model | View |
| 92 | An efficient file hierarchy attribute-based encryption scheme in cloud computing | View |
| 93 | Authenticated key exchange protocols for parallel network file systems | View |
| 94 | Circuit cipher text-policy attribute-based hybrid encryption with verifiable | View |
| 95 | Cloud workflow scheduling with deadline and time slot algorithm | View |
| 96 | Cloudarmor-supporting-reputation-based-trust-management-forcloud-services | View |
| 97 | Collective data-sanitization for preventing sensitive information inference attacks in social networks | View |
| 98 | Conditional identity-based broadcast proxy re-encryption and its application to cloud email | View |
| 99 | Discovery of ranking fraud for mobile | View |
| 100 | Efficient multipath communication for time-critical applications in underwater acoustic sensor networks | View |
| 101 | Fine-grained two-factor access control for cloud computing services | View |