Mini Projects 2024-25 LIST
Mini Projects 2024-25 LIST
Mini Projects 2024-25 LIST
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
Python Mini Projects (2024-2025)
A Review on Data Mining and Machine Learning Methods for Student Scholarship
Prediction
Analysis of risk factors in the Firework Industries Using Decision Tree Classifier
Dynamic Churn Prediction using Machine Learning Algorithms Predict your customer
through customer behavior
E-Health Monitoring System with Diet and Fitness Recommendation using Machine
Learning
Evaluation based Approaches for Liver Disease Prediction using Machine Learning
Algorithms
Hybrid CNN-LSTM Model with GloVe Word Vector for Sentiment Analysis on
Football Specific Tweets
International Stock Index Prediction Using Artificial Neural Network (ANN) and
Python Programming
Prediction of Parkinson’s disease and severity of the disease using Machine Learning
Research on Gender Prediction for Social Media User Profiling by machine learning
method
Wheat yield prediction using Artificial Intelligence models and its comparative
analysis for better prediction
Artificial Intelligence and COVID-19: Deep Learning Approaches for Diagnosis and
Treatment
Machine Learning based Presaging Technique for Multi-user Utility Pattern Rooted
Cloud Service Negotiation for Providing Efficient Service
Predicting Flight Delays with Error Calculation using Machine Learned Classifiers
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request
Forgery
Leveraging CNN and Transfer Learning for Vision-based Human Activity Recognition
B5G and Explainable Deep Learning Assisted Healthcare Vertical at the Edge:
COVID-19 Perspective
Solving Onion Market Instability by Forecasting Onion Price Using Machine Learning
Approach
Customer Churn Analysis and Prediction Using Data Mining Models in Banking
Industry
Rich Short Text Conversation Using Semantic Key Controlled Sequence Generation
User Centric Machine Learning Frame work For Cyber Security Operations Center
ROBUST MALWARE DETECTION FOR Iot DEVICES USING DEEP
EIGENSPACE LEARNING
Prediction Of Crude Oil Prices Using Svr With Grid Search Cross Validation
Algorithm
A_Bi-Objective_Hyper Heuristic_Support_Vector_Machines_For_Big_Data_Cyber-
Security
Rainfall Rate Prediction Based On Artificial Neural Networks For Rain Fade
Mitigation Over Earth- Satellite Link
Object Visual Detection For Intelligent Vehicles
Fraquent Itemsets Mining With Differential Privacy Over Large Scale Data
Urban Street Cleanliness Assessment Using Mobile Edge Computing And Deep
Learning
Density Based Smart Traffic Control System Usingcanny Edge Detection Algorithm
For Congregatingtraffic Information
Applied Machine Learning Predictive Analytics To Sql Injection Attack Detection And
Prevention
A Novel Approach for Credit Card Fraud Detection using Decision Tree and Random
Forest Algorithms
Movie Recommendation System Using Sentiment Analysis From Micro blogging Data
A Holistic Framework for Crime Prevention, Response, and Analysis with Emphasis
on Women Safety using Technology and Societal Participation
A Novel technique for effective Image gallery search using Content based Image
retrieval system
Construct Food Safety Traceability System for Peoples Health Under the Internet of
Things and Big Data
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
Deep Learning Anti-Fraud Model for Internet Loan Where We Are Going
E-Health Monitoring System with Diet and Fitness Recommendation using Machine
Learning
Detecting Mental Disorders in Social Media Through Emotional Patterns The case of
Anorexia
Detection of Fake and Clone accounts in Twitter using Classification and Distance
Measure Algorithms
An Efficient Spam Detection Technique for IoT Devices using Machine Learning
Design of Facial Expression Recognition System using Deep Learning Model Based
on Human Emotions Through Classification with CNN & RNN algorithm
Hotel review analysis for the prediction of business using deep learning approach
Internet Financial Fraud Detection based on a Distributed Big Data Approach with
Node2vec
Privacy Preserving Social Media Data Publishing for Personalized Ranking Based
Recommendation
S. NO
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
Java Mini Projects (2024-25)
A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media
Mining
An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
An Efficient Method for High Quality and Cohesive Topical Phrase Mining
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
A proxy-based collaboration system to minimize content downloads time and energy consumption
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and
Verification
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud
Storage
Pro Guard Detecting Malicious Accounts in Social-Network- Based Online Promotions
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud
Computing
A Novel Recommendation Model Regularized with User Trust and Item Ratings
Personal Web Revalidation by Context and Content Keywords with Relevance Feedback
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption
Function for E-Health Clouds
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Efficient Algorithms for Mining Top-K High Utility Itemsets
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter
Metadata
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-
Enforced Search Authorization
in the Cloud
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Dynamic Routing For Data Integrity And Delay Differentiated Services In Wireless Sensor Networks
A Secure Anti-Collusion Data Sharing Scheme For Dynamic Groups In The Cloud
Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute-Based
Encryption
Co-Extracting Opinion Targets And Opinion Words From Online Reviews Based On The Word
Alignment Model
Learning To Rank Image Tags With Limited Training Examples
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless
Sensor Networks
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage System
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor NetworkS
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
Achieving secure, universal, and fine-grained query results verification for secure search scheme over
encrypted cloud data