ABOUT ARTIFICIAL INTELLIGENCE PROJECT 2019 – 2020
In Computer Science AI Research Is Defined As The Study Of “Intelligent Agents”: Any Device That Perceives Its Environment And Takes Actions That Maximize Its Chance Of Success At Some Goal.
SNO | Projects List |
1 | A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems |
2 | A New Approach for Authentication using Water marking Technique |
3 | Advance Secure ATM Transaction Using Biometric Fingerprint Technology |
4 | Dynamics of Malware Spread in Decentralized Peer to Peer Networks |
5 | Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks |
7 | A Competitive Study of Cryptography Techniques over Block Cipher |
8 | A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems |
9 | Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast |
10 | Dynamic Routing for Reducing the Compromised Node Attacks |
11 | Designing routing protocols for mobile ad hoc network |
12 | Lossless Compression and information hiding in images using Steganography |
13 | Video Stegnography Using Mordell Curve Cryptography Technique |
14 | Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service |
15 | Intrusion detection An Energy efficient approach |
16 | Balancing Revocation and Storage Trade Offs in Secure Group Communication |
17 | Ontology Based Business Process Customization for Composite Web Services |
18 | A foundation for stochastic bandwidth estimation of networks with random service |
19 | On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents |
20 | Caching Scheme for Distributed Data Processing in Peer-to-Peer Environments |
21 | Restoring Inter node connectivity using Rim algorithm |
22 | Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding |
23 | Optimized Resource Allocation for Software Release Planning |
24 | A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows |
25 | Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis |