ABOUT ARTIFICIAL INTELLIGENCE PROJECT 2018 – 2019
IEEE Artificial Intelligence Projects For M.Tech, B.Tech, BE, MS, MCA, Artificial Intelligence Students. Real Time, Chennai Offers Project Training In IEEE 2018 / 2019 Artificial Intelligence. A Artificial Intelligence Is A Group Of Specialized Transducers With A Communications Infrastructure For Monitoring And Recording Conditions At Diverse Locations. Commonly Monitored Parameters Are Temperature, Humidity, Pressure, Wind Direction And Speed, Illumination Intensity, Vibration Intensity, Sound Intensity, Power-Line Voltage, Chemical Concentrations, Pollutant Levels And Vital Body Functions.A Sensor Network Consists Of Multiple Detection Stations Called Sensor Nodes, Each Of Which Is Small, Lightweight And Portable.
In Other Words, More Important Data Will Be Encrypted With More Secure Encryption Algorithm And Larger Key Sizes, While Less Important Data Might Even Not Be Encrypted. This Approach Is Very Helpful In Reducing The Processing Cost And Complexity Of Data Storage And Manipulation Since We Do Not Need To Apply The Same Sophisticated Encryption Techniques To The Entire Users Data. The Results Of Applying The Proposed Framework Show Improvement And Efficiency Over Other Existing Frameworks.
SNO | Projects List |
1 | A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems |
2 | A New Approach for Authentication using Water marking Technique |
3 | Advance Secure ATM Transaction Using Biometric Fingerprint Technology |
4 | Dynamics of Malware Spread in Decentralized Peer to Peer Networks |
5 | Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks |
7 | A Competitive Study of Cryptography Techniques over Block Cipher |
8 | A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems |
9 | Minimizing Delay and Maximizing Lifetime for Artificial Intelligences With Anycast |
10 | Dynamic Routing for Reducing the Compromised Node Attacks |
11 | Designing routing protocols for mobile ad hoc network |
12 | Lossless Compression and information hiding in images using Steganography |
13 | Video Stegnography Using Mordell Curve Cryptography Technique |
14 | Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service |
15 | Intrusion detection An Energy efficient approach |
16 | Balancing Revocation and Storage Trade Offs in Secure Group Communication |
17 | Ontology Based Business Process Customization for Composite Web Services |
18 | A foundation for stochastic bandwidth estimation of networks with random service |
19 | On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents |
20 | Caching Scheme for Distributed Data Processing in Peer-to-Peer Environments |
21 | Restoring Inter node connectivity using Rim algorithm |
22 | Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding |
23 | Optimized Resource Allocation for Software Release Planning |
24 | A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows |
25 | Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis |