EMBEDDED SYSTEM PROJECT LIST 2016-2017

ABOUT EMBEDDED SYSTEM PROJECT 2016 – 2017

A Precise Definition of Embedded Systems is Not Easy. Simply Stated, all Computing Systems Other than General Purpose Computer (with Monitor, Keyboard, Etc.) are Embedded Systems

SNO Projects List
1 Trust enhanced cryptography role based access control for secure cloud data storage
2 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
3 A Time efficient approach for detecting errors in big sensor data on cloud
4 Cost Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
5 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
7 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
8 Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
9 PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative
10 Enabling Fine-grained Multi-keyword Search Supporting Classified
11 A Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted cloud
12 Real-time Twitter sentiment analysis with Stream Analytics
13 COMIC Cost Optimization for Internet Content Multi homing
14 Discovery of Ranking Fraud for Mobile Apps
15 Query Aware Determinization of Uncertain Objects
16 RRW – A Robust and Reversible Watermarking Technique for Relational Data
17 Combining Multiple Classification Methods for Hyperspectral Data Interpretation
18 A Secure Data Hiding Technique in Compressed Video Using a Secret Key
19 Steganography Using Reversible Texture Synthesis
20 Robust Watermarking Techniques For Color Images
21 Authenticated Key Exchange Protocols for Parallel Network File Systems
22 Assessment In Wireless Sensor Network Security
23 Energy aware Load Balancing and Application Scaling for the Cloud
24 Universal Network Coding-Based Opportunistic Routing for Unicast
25 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical
26 Friend book: A Semantic-Based Friend Recommendation System for Social Networks
27 Continuous and Transparent User Identity Verification for Secure Internet
28 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System