0% found this document useful (0 votes)
9 views21 pages

Project Topics

The document outlines various machine learning and cloud computing projects from 2021, focusing on applications such as accident prediction, spam detection, disease identification, and sentiment analysis. It also includes topics related to privacy-preserving techniques and secure data sharing in cloud environments. The projects demonstrate the integration of machine learning with real-world challenges and cloud computing solutions.

Uploaded by

sairammadival5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views21 pages

Project Topics

The document outlines various machine learning and cloud computing projects from 2021, focusing on applications such as accident prediction, spam detection, disease identification, and sentiment analysis. It also includes topics related to privacy-preserving techniques and secure data sharing in cloud environments. The projects demonstrate the integration of machine learning with real-world challenges and cloud computing solutions.

Uploaded by

sairammadival5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Machine Learning Topics 2021

A Road Accident Prediction Model Using


Data Mining Technique

A Systematic Review of Predicting


Elections Based on Social Media Data

Agricultural Crop Recommendations based


on Productivity and Season

An Efficient Spam Detection Technique for


IoT Devices Using Machine Learning

Chronic Kidney Disease Stage


Identification in HIV Infected Patients
using Machine Learning

COVIDSenti: A Large-Scale Benchmark


Twitter Data Set for COVID-19 Sentiment
Analysis

Crop Recommender System Using


Machine Learning Approach

Detecting Fake Reviews Using


Multidimensional Representations With
Fine-Grained Aspects Plan

Detection of Cyberbullying on Social


Media Using Machine learning

Diabetes Disease Prediction Using


Machine Learning Algorithms

Emotion Recognition by Textual Tweets


Classification Using Voting
Classifier (LR-SGD)

Crime Type and Occurrence Prediction


Using Machine Learning Algorithm

Machine Learning Based Heart Disease


Prediction System

Naïve Bayes Classifier for Predicting the


Novel Coronavirus
Potato Disease Detection Using Machine

WELFake: Word Embedding Over


Linguistic Features for Fake News
Detection

Drug Recommendation System based on


Sentiment Analysis of Drug Reviews using
Machine Learning

Predictive Analysis for Big Mart Sales


Using Machine Learning Algorithms

Primary Stage of Diabetes Prediction using


Machine Learning Approaches

Prediction of Modernized Loan Approval


System Based on Machine Learning
Approach

A Comparative Study on Fake Job Post


Prediction Using Different Data mining
Techniques

A Lightweight Convolutional Neural


Network for Real-Time Facial Expression
Detection

Brain Tumour Detection Using Deep


Learning

Classification of Malaria-Infected Cells


using Convolutional Neural Networks

Diabetic Retinopathy Detection by means


of Deep Learning

Diagnosis of COVID-19 from Chest X-Ray


Images Using Wavelets-Based Depthwise
Convolution Network

Handwritten Digit Recognition Using CNN


License Plate Detection Methods Based on
OpenCV

A Study on a Car Insurance Purchase


Prediction Using Machine Learning

Melanoma Detection Using Convolutional


Neural Network

Real-Time Drowsiness Identification based


on Eye State Analysis

Tomato Leaf Disease Identification by


Restructured Deep Residual Dense
Network

Traffic Sign Recognition using Deep


learning for Autonomous Driverless
Vehicles

Logistics regression

Academic Performance Prediction Based


on Multisource, Multifeature Behavioral
Data

Artificial Intelligence and COVID-19:


Deep Learning Approaches for Diagnosis
and Treatment

Comparison of Machine Learning


Algorithms for Predicting Crime Hotspots

COVID-19 Future Forecasting Using


Supervised Machine Learning Models

Crop Yield Prediction based on Indian


Agriculture using Machine Learning

Deep Learning Based Fusion Approach for


Hate Speech Detection

Deep Learning for Large-Scale Traffic-


Sign Detection and Recognition

Defensive Modeling of Fake News


Through Online Social Networks
Detecting and Characterizing Extremist
Reviewer Groups in Online Product
Reviews

Detecting Spam Email With Machine


Learning Optimized With Bio-Inspired
Metaheuristic Algorithms

Detection of Fake and Clone accounts in


Twitter using Classification and Distance
Measure Algorithms

Detection of Malicious Social Bots Using


Learning Automata With URL Features in
Twitter Network

FAKEDETECTOR: Effective Fake News


Detection with Deep Diffusive Neural
Network

Finding Psychological Instability Using


Machine Learning

Flight Delay Prediction Based on Aviation


Big Data and Machine Learning

Heart Disease Identification Method Using


Machine Learning Classification in E-
Healthcare

Hybrid Feature based Prediction of Suicide


Related Activity on Twitter

Intrusion Detection System Using PCA


with Random Forest Approach

Performance Analysis on Student Feedback


using Machine Learning Algorithms

Predicting Stock Market Trends Using


Machine Learning and Deep Learning
Algorithms Via Continuous and Binary
Data; a Comparative Analysis

Prediction of Breast Cancer, Comparative


Review of Machine Learning Techniques,
and Their Analysis

Rice Leaf Diseases Classification Using


CNN With Transfer Learning

Spam Review Detection Using the


Linguistic and Spammer Behavioral
Methods

Students Performance Prediction in Online


Courses Using Machine Learning
Algorithms

A Mask Detection Method for Shoppers


Under the Threat of COVID-19
Coronavirus

Email Spam Detection Using Machine


Learning Algorithms

Detecting A Twitter Cyberbullying Using


Machine Learning

A New Intelligent Approach for Effective


Recognition of Diabetes in the IoT E-
HealthCare Environment

Malaria Detection using Deep Learning

Human Recognition using Ear based Deep


Learning Features

Cloud computing topics

IEEE A STATISTICAL INFERENCE ATTACK ON PRIVACY-PRESERVING BIOMETRIC


IDENTIFICATION SCHEME
IEEE ENCRYPTED NEGATIVE PASSWORD IDENTIFICATION EXPLOITATION RSA
RULE
IEEE A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE
CLOUDCOMPUTING
IEEE PARALLEL PROXY RE-ENCRYPTION WORKLOAD DISTRIBUTION FOR
EFFICIENT BIG DATA SHARING IN CLOUD COMPUTING
IEEE TOWARDS DEADLINE GUARANTEED CLOUD STORAGE SERVICES
IEEE A FLEXIBLE ACCESS CONTROL WITH USER REVOCATION IN FOG-ENABLED
CLOUD COMPUTING
IEEE IDENTITY-BASED PRIVACY PRESERVING REMOTE DATA INTEGRITY
CHECKING FOR CLOUD STORAGE
IEEE PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN
MOBILE CLOUD COMPUTING
IEEE CLASS: CLOUD LOG ASSURING SOUNDNESS AND SECRECY SCHEME FOR
CLOUD FORENSICS
IEEE CRYPT-DAC: CRYPTOGRAPHICALLY ENFORCED DYNAMIC ACCESS CONTROL
IN THE CLOUD
IEEE REVOCABLE IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION FOR
DATA SHARING IN CLOUDS
IEEE CROSS-CLOUD MAPREDUCE FOR BIG DATA
IEEE COST-EFFICIENT OUTSOURCED DECRYPTION OF ATTRIBUTE-BASED
ENCRYPTION SCHEMES FOR BOTH USERS AND CLOUD SERVER IN CLOUD
COMPUTING
IEEE PRIVACY CHAIN: A BLOCKCHAIN-BASED ACCESS CONTROL FRAMEWORK
WITH PRIVACY PROTECTION IN CLOUD
IEEE A SCALABLE ATTRIBUTE-BASED ACCESS CONTROL SCHEME WITH FLEXIBLE
DELEGATION CUM SHARING OF ACCESS PRIVILEGES FOR CLOUD STORAGE
IEEE AN ATTRIBUTE-BASED CONTROLLED COLLABORATIVE ACCESS CONTROL
SCHEME FOR PUBLIC CLOUD STORAGE
IEEE SECURE PHRASE SEARCH FOR INTELLIGENT PROCESSING OF ENCRYPTED
DATA IN CLOUD-BASED IOT
IEEE AN EFFICIENT ABE SCHEME WITH VERIFIABLE OUTSOURCED ENCRYPTION
AND DECRYPTION
IEEE CRYPT-DAC: CRYPTOGRAPHICALLY ENFORCED DYNAMIC ACCESS CONTROL
IN THE CLOUD
IEEE CHARON: A SECURE CLOUD-OF-CLOUDS SYSTEM FOR STORING AND
SHARING BIG DATA
IEEE A FOG-CENTRIC SECURE CLOUD STORAGE SCHEME
IEEE AN EFFICIENT AND PRIVACY-PRESERVING BIO METRIC IDENTIFICATION
SCHEME IN CLOUD
IEEE CLASS: CLOUD LOG ASSURING SOUNDNESS AND SECRECY SCHEME FOR
CLOUD FORENSICS
IEEE DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL
PERFORMANCE AND SECURITY
IEEE A SECURE CLIENT-SIDE FRAMEWORK FOR PROTECTING THE PRIVACY OF
HEALTH DATASTORED ON THE CLOUD
IEEE PROFIT MAXIMIZATION FOR CLOUD BROKERS IN CLOUD COMPUTING
IEEE PAIRING-FREE CP-ABE BASED CRYPTOGRAPHY COMBINED WITH
STEGANOGRAPHY FOR MULTIMEDIA APPLICATIONS
IEEE A PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER
ENCRYPTED DATA IN HYBRID CLOUDS
IEEE AN ATTRIBUTE-BASED AVAILABILITY MODEL FOR LARGE SCALE IAAS
CLOUDS WITH CARMA
IEEE LIGHTWEIGHT SHAREABLE AND TRACEABLE SECURE MOBILE HEALTH
SYSTEM
IEEE TOWARD PRACTICAL PRIVACY-PRESERVING FREQUENT ITEM SET MINING
ON ENCRYPTED CLOUD DATA
IEEE A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC-KEY
ENCRYPTION FOR CLOUD-BASED DATA SHARING
IEEE A DECRYPTABLE ATTRIBUTE-BASED KEYWORD SEARCH SCHEME ON
EHEALTH CLOUD IN
INTERNET OF THINGS PLATFORMS
IEEE LIGHTWEIGHT AND PRIVACY-PRESERVING ID-AS-A-SERVICE PROVISIONING
IN VEHICULAR CLOUD COMPUTING
IEEE PRIVACY-PRESERVING COST-OPTIMIZATION FOR DYNAMIC REPLICATION IN
CLOUD DATA CENTERS
IEEE A REVIEW OF SENTIMENT ANALYSIS TECHNIQUES USING SOFT COMPUTING
APPROACHES
IEEE AN ATTRIBUTE-BASED ACCESS CONTROL FOR CLOUD ENABLED INDUSTRIAL
SMART VEHICLES
IEEE FEATURE SELECTION AND ANALYSIS IN AIR QUALITY DATA
IEEE PRIVACY-PRESERVING SIMILARITY SEARCH WITH EFFICIENT UPDATES IN
DISTRIBUTED KEY-VALUE STORES
IEEE TABE-DAC: EFFICIENT TRACEABLE ATTRIBUTE-BASED ENCRYPTION SCHEME
WITH DYNAMIC ACCESS CONTROL BASED ON BLOCKCHAIN
IEEE EFFICIENT IDENTITY-BASED PUBLIC INTEGRITY AUDITING OF SHARED DATA
IN CLOUD STORAGE WITH USER PRIVACY PRESERVI NG

2019-2020 JAVA IEEE CLOUD COMPUTING TOPICS

SNO Projects List

1 An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted

2 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data

3 Efficient Traceable Authorization Search system cloud storage

4 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud envi

5 SEPDP Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

6 Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing


7 Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage

8 Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing

9 Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud

10 Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage

11 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data

12 Normal cloud model-based algorithm for multi-attribute trusted cloud service selection

2019-2020 DOTNET IEEE CLOUD COMPUTING TOPICS

SNO Projects List

1 Privacy-Preserving Search over Encrypted Personal Health Record In Multi-Source Cloud

2 Decentralized attribute-based encryption and data sharing scheme in cloud storage

3 Privacy-preserving and Dynamic Multi-attribute Conjunctive Keyword Search over Encrypted Cloud Data

4 An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing

5 Privacy Preservation for Outsourced Medical Data With Flexible Access Control

6 File-centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things
7 Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protectio

8 Secure and Efficient Attribute-Based Access Control for Multi authority Cloud Storage

9 Searchable Encryption over Feature-Rich Data

10 Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data

11 Towards Shared Ownership in the Cloud

12 A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

1. Application of Text Classification and Clustering of Twitter Data


for Business Analytics
2. Privacy-preserving Search over Encrypted Personal Health Record
in Multi-Source Cloud
3. Optimization of Tasks in Cloud Computing Based on MAX-MIN,
MIN-MIN and Priority
4. Lightweight and Privacy-Preserving Delegatable Proofs of Storage
with Data Dynamics in Cloud Storage
5. Enabling Efficient User Revocation in Identity-based cloud Storage
Auditing for Shared Big Data
6. Efficient Client-Side Deduplication of Encrypted Data with Public
Auditing in Cloud Storage
7. Anonymous Data Sharing Scheme in Public Cloud and Its
Application in E-health Record
8. Adaptive Encrypted Cloud Storage Model
9. Access control by signature keys to provide privacy for cloud and
Big Data
10. Privacy-preserving Search over Encrypted Personal Health Record
in Multi-Source Cloud
11. Optimization of Tasks in Cloud Computing Based on MAX-MIN,
MIN-MIN and Priority
12. Lightweight and Privacy-Preserving Delegatable Proofs of Storage
with Data Dynamics in Cloud Storage
13. Efficient Client-Side Deduplication of Encrypted Data with Public
Auditing in Cloud Storage
14. Anonymous Data Sharing Scheme in Public Cloud and Its
Application in E-health Record
15. Adaptive Encrypted Cloud Storage Model
16. Access control by signature - key to provide privacy for cloud and
Big Data
17. Secure and Efficient Cloud Computing Framework
18. Privacy Protection and Intrusion Avoidance for Cloudlet-based
Medical Data Sharing
19. IFCaaS: Information Flow Control as a Service for Cloud Security
20. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data
Owners in Cloud Computing
21. Implementation OF DNA cryptography in cloud computing and
using socket programming
22. Anonymous Authentication for Secure Data Stored on Cloud with
Decentralized Access Control
23. Performance-Oriented Deployment of Streaming Applications on
Cloud
24. Smart Grid Solution for Charging and Discharging Services Based
on Cloud Computing Scheduling
25. Towards Approximating the Mean Time to Failure in Vehicular
Clouds
26. Linked Semantic Model for Information Resource Service towards
Cloud Manufacturing
27. Resource Management in Sustainable Cyber-Physical Systems
Using Heterogeneous Cloud Computing
28. Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an
Application to Glucose Control
29. Online Learning for Offloading and Autoscaling in Energy
Harvesting Mobile Edge Computing
30. Flexible Container-Based Computing Platform on Cloud for
Scientific Workflows
31. Machine Learning with Sensitivity Analysis to Determine Key
Factors Contributing to Energy Consumption in Cloud Data
Centers
32. Cost-Efficient Provisioning Strategy for Multiple Services in
Distributed Clouds
33. An Anomalous Behavior Detection Model in Cloud Computing
34. Cryptographic Public Verification of Data Integrity for
Cloud Storage Systems
35. Deleting Secret Data with Public Verifiability
36. Secure Cloud Storage Meets with Secure Network Coding
37. Multi-Objective Tasks Scheduling Algorithm for Cloud Computing
Throughput Optimization
38. Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
39. A Hybrid Cloud Approach for Secure Authorized Deduplication
40. On the Security ofDataAccess Control for Multiauthority
CloudStorageSystems
41. Cost-Effective Authentic and Anonymous Data Sharing with
Forward Security
42. Task Scheduling in Cloud Computing
43. An Optimized Task Scheduling Algorithm in CloudComputing
44. Attribute-Based Access Control for Multi-Authority with constant
size ciphertext in cloud Computing
45. A Study on Secure Intrusion Detection System in Wireless MANETs
to Increase the Performance of Eaack
46. Privacy-Preserving Detection of Sensitive Data Exposure
47. A Secure Client Side Deduplication Scheme in Cloud Storage
Environments
48. Expressive, Efficient, and Revocable Data Access Control for
Multi-Authority Cloud Storage
49. On the Security of a Public Auditing Mechanism for Shared Cloud
Data Service
50. Secure Auditing and Deduplicating Data in Cloud
51. Truthful Greedy Mechanisms for Dynamic Virtual Machine
Provisioning and Allocation in Clouds
52. DROPS: Division and Replication of Data in Cloud for Optimal
Performance and Security
53. An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor Networks Integration
54. Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
55. EasySMS: A Protocol for End-to-End Secure Transmission of SMS
56. Shared Authority Based Privacy-preserving Authentication
Protocol in Cloud Computing
57. CloudMoV: Cloud-based Mobile Social TV
58. A packet marking approach to protect cloud environment against
DDoS attacks
59. Load Balancing for Privacy-Preserving Access to Big Data in
Cloud
60. A Load Balancing Model Based on Cloud Partitioning
61. ClubCF: A Clustering-based Collaborative Filtering Approach for
Big Data Application
62. Identity-Based Encryption with Outsourced Revocation in Cloud
Computing
63. An Anonymous End-to-End Communication Protocol for Mobile
Cloud Environments
64. Public Integrity Auditing for Dynamic Data Sharing with Multi-User
Modification
65. Authorized Public Auditing of Dynamic Big Data Storage on Cloud
with Efficient Verifiable Fine-Grained Updates
66. Key-Aggregate Searchable Encryption (KASE) for Group Data
Sharing via Cloud Storage
67. Enabling Efficient Access Control with Dynamic Policy Updating
for Big Data in the Cloud
68. Toward Efficient and Privacy-Preserving Computing in Big Data
Era
69. Privacy Preserving Data Analytics for Smart Homes
70. KASR: A Keyword-Aware Service Recommendation Method on
MapReduce for Big Data
71. Cost Minimization for Big Data Processing in Geo-Distributed Data
Centers
72. Dache: A Data Aware Caching for Big-Data Applications Using the
MapReduce Framework
73. Public Integrity Auditing for Shared Dynamic Cloud Data with
Group User Revocation
74. A Secure Client Side Deduplication Scheme in Cloud Storage
Environments
75. A Framework For Selection Of Best Cloud Service Provider Using
Ranked Voting Method
76. Cloud-Assisted Mobile-Access of Health Data With Privacy and
Auditability
77. iFarm: Development of Cloud-based System of Cultivation
Management for Precision Agriculture
78. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted
Cloud Data
79. Oruta: Privacy-Preserving Public Auditing for Shared Data in the
Cloud
80. Load Rebalancing for Distributed File Systems in Clouds
81. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-
Clouds
82. Secure and Efficient Data Transmission for Cluster-Based Wireless
Sensor Networks
83. Using Location Based Encryption to Improve the Security of Data
Access in Cloud Computing
84. C-MART: Benchmarking the Cloud Parallel and Distributed
Systems
85. Pre-emptive scheduling of on-line real time services with task
migration for cloud computing
86. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud
Data
87. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud
88. Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
89. HASBE: A Hierarchical Attribute-Based Solution for Flexible and
Scalable Access Control in Cloud Computing
90. Secure Logging As a Service—Delegating Log Management to the
Cloud
91. Protecting Data Privacy and Security for Cloud Computing Based
on Secret Sharing
92. A cloud computing based telemedicine service
93. Privacy-Preserving Public Auditing for Secure Cloud Storage
94. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
95. Seed Block Algorithm: A Remote Smart Data Back-up Technique
for Cloud Computing
96. An Improved Mutual Authentication Framework for Cloud
Computing
97. Innovative Schemes for Resource Allocation in the Cloud for Media
Streaming Applications

Image processing Topics

Review on emerging trends in detection of plant diseases using image


processing with machine learning
free download
diseases in plants becomes essential. The digital image processing system is
one such powerful technique to diagnose the difficult symptoms much earlier
than the human eye could recognize. It enables the farmers to take[15]
Appasaheb Gargade, Mr. S. A Khandekar (2019 IEEE): In this paper describe a
custard apple leaf parameter disease and its analysis, detection using digital
image processing . It is a review paper in this paper review a seventeen paper
Abstract Image segmentation is one of the inevitable parts of the digital image
processing and very useful to solve different real life problems. Biomedical image
segmentation is a prime domain of application of digital image processing

Toward developing tangling noise removal and blind inpainting mechanism


based on total variation in image processing
free download
always make some ar- tificial marks in their focus area, which leads to some
difficulties in fur- ther computer-aided processing and evaluating Syst. 32(1), 252
265 (2021) 2 Deeba, F., Kun, S.: Lossless digital image watermarking in sparse
do- main by using K-singular value
Improving Encryption Digital Watermark by Using Blue Monkey Algorithm
free download
Copyright protection for digital image by watermarking technique, Journal of
Information

A robust image copy detection method using machine learning


free download
It prompts to exceedingly worrying for people to distinguish the picture is
authenticate or forged. The accessibility of digital image processing software
includes Photo Shop, Adobe Photoshop makes it moderately simple to generate
the forged image from several images

Categorizing and measurement satellite image processing of fire in the


forest greece using remote sensing
free download
In [14-16], show the size harms and dangers in Turkey especially over
Mediterranean and Aegean Regions caused by Forest fires. Several digital
image processing methods used to study the fire categorizing and compute the
fire influenced on the burned areas

Tomato leaf disease detection using image processing technique


free download
In the pre- processing step, all the images are converted into the same size. The
main source of noise in a digital image are sensor be affected by environmental
conditions, light levels not sufficient, dust particle present on the scanner screen

Automated Screening of Diabetic Retinopathy Using Image Processing


free download
in the United Kingdom, Curr. Diab. Rep., vol. 1 no. pp. 338 34 2012. RC
Gonzalez and E. Richard, Woods, digital image processing ed: Prentice Hall
Press, ISBN 0-201-18075- 2002. MJ Cree, JA Olson, KC

LIVER CANCER DETECTION USING HYBRIDIZED FULLY CONVOLUTIONAL


NEURAL NETWORK BASED ON DEEP LEARNING FRAMEWORK
free download
I. INTRODUCTION Digital image processing is the process of digital images
through an algorithm by the digital computer It is classified into two types of
processing one is digital image processing and analogue image processing23].
Digital image processing is an active field of research that has various application
in our daily life [1 1 1 22]. Image segmentation is one of the most frequently used
job in digital image processing . It is necessaryhave introduced a method of
calibrating a distorted projection on an arbitrary planar screen by using a tilt
sensor and a digital compass brings the visual interaction into new step because
image area recognition is no needed to be done by a heavy image processing
technique

A Review of Medical Image Segmentation Algorithms


free download
2009; pp. 703-707. RCGonzalez and REWoods, Digital image processing 2-
ed.NewYork: Prentice Hall; 2002.1-813. RM Haralick and LGShapiro, Image
Segmentation Techniques, .Computer VisionGraphics,and Image
processing .1985;Vol-2 Issue p.100

Comparative Analysis of Spatial-orientation Trees Wavelet (STW) and


Adaptively Scanned Wavelet Difference Reduction (ASWDR) Image
Compression
free download
Two principal applications of digital image processing include improvement of
image Page | 365 individually. Fig 1: Fundamental steps in digital image
processing Image representation and description: Image representation is used
to convert the input data to a form suitable

Social Distancing Detector using YOLO v3 Image Processing Algorithm


free download
Look Once) algorithm for object detection till date YOLO is one of fastest image
processing algorithm recognition via spatial multiple instance embedding, Journal
of Visual Communication and Image Representation 32 A. Ghorai, S. Gawde, D.
Kalbande, Digital solution forSteve Man, Intelligent Image Processing , John
Wiley Sons. William K. Pratt, Digital Image Processing , John Wiley Sons. SV
Rice, G. Nagy, and TA Nartker, OCR: An Illustrated Guide to the Frontier ,
Kluwer Academic PublishersThe fifth chapter reports on a wide range of
electronic reproduction tools while the sixth chapter explains spatial sampling,
quantization, and digital encoding of the image signal these tools use. Chapters
and 11 are devoted, respectively, to the processing of fine details

DETECTION OF DIABETIC RETINOPATHY BY RED LESION ANALYSIS


free download
Several image processing based techniques are employed for the DR detection.
In this work, an identification technique was developed on the basis of digital
image processing to obtain the fundus image from the affected retina

Grading and Quality Testing of Rice Granules Using Neural Networks


free download
consuming and inaccurate. For the identification of rice grain seed varieties and
quality the other method is a chemical method which uses a machine vision or
the digital image processing system. Compared to the chemical The combination
of these digital recording devices and the internet has provided individuals with
the opportunity to rapidly distribute copyrighted material without appropriate
compensation to the appropriate owners [ 5]. Ergo Ieee Transactions on Image
Processing Vol Khaled Loukhaoukha and Jean-Yves Chouinard [27], suggested
hybrid robust digital watermarking technique singular estimate of that sub-band,
at the end the image is reconstructed imperceptibility is provided as well as
greater robustness against common signal processing10.1145/1507149.1507161
24. Pratt, WK: Digital Image Processing . John Wiley Sons, Inc., Hoboken
(2007). https://doi. org/10.1002/0470097434

Fast Implementation of Digital Watermarking Schemes Based on Arnold


and Discrete Wavelet Transforms
free download
The results demonstrated the robustness of the system against common image
processing operations. Tsai et al. (2017) proposed image watermarking method
based on the fast DCT algorithm for implementation in digital signal
processorThe processing parameters are directly linked to its evolution in the
image The final digital image that contains the information useful to the control
depends on the different elements that make up the radioscopic system (1-2].
The radiant image is distinguished from the digital one

ESTIMATING INDIVIDUAL TREE HEIGHTS AND DBHS FROM VERTICALLY


DISPLACED SPHERICAL IMAGE PAIRS
free download
DeCourt (1956) demonstrated how printed photos and manual processing could
be used to estimate basal area per ha using angle count sampling In addition,
errors resulting from the stitching of several digital image cannot be avoided
(Dick et al.; Fastie; Lu et alKH Mangaleswari, T. Kaviya, Detection of leaf
diseases and classification using digital image processing , International
Conference on Innovations in Information, Embedded and Communication
Systems (ICIIECS), Year: | Conference Paper | Publisher: IEEE

Improvement of Grayscale Images in Orthogonal Basis of the Type-2


Membership Function.
free download
1. Introduction The number of practical problems associated with digital image
processing which are obtained with the help of standard research methods, and
which are used, for example, in materials science, or medicine, or flaw detection,
is constantly growing

An Efficient Implementation of IWT-DCT-SVD for Copyright Protection in


Digital Watermarking Algorithm
free download
2313| Karthikeyan C An Efficient Implementation of IWT-DCT-SVD for Copyright
Protection in Digital Watermarking Algorithm R.Singh, A.Ashokand
M.Saraswat,Optimised robust watermarking techniques using CKGSA in DCT-
SVD domain,IET Image ProcessingVol.1 No.10

Quality analysis for the production of pelletised materials using Fourier


Descriptors
free download
Keywords Fourier analysis, fourier descriptors, surface analy- sis, digital image
processing 1 Introduction Plastic pellets be produced by pushing molten prime
material through die plates into a water stream and pelletizing by cutting the
extrusion with a rotating cutter to the

LOW AREA HIGH SPEED COMBINED MULTIPLIER USING MULTIPLEXER


BASED FULL ADDER
free download
Abstract:- In Digital Image Processing Median Filter is used to reduce the noise
in an image . The median filter considers each pixel in the image and replaces
the noisy pixel by the median of the neighbourhood pixels. The median value is
calculated by sorting the pixels

A Lightweight Secure Image Super Resolution using Network Coding.


free download
CVGIP: Graphical Models and Image Processing 53(3):231 239. Keys, R. (1981).
Cubic convolution interpolation for digital image processing . IEEE Transactions
on Acoustics, Speech, and Signal Processing 29(6):1153 1160. Kim, J., Kwon
Lee, J., and Mu Lee, K. (2016)

Convexity and AFPP in the Digital Plane


free download
SPIE Proceedings: Image and Video Processing II, 2182(1994), 300 307. L.
Chen. Discrete Surfaces and Manifolds. Scientific Practical Computing. G.
Lupton, J. Oprea and N. Scoville. Homotopy theory in digital topology, preprint

Skin hyperpigmentation index facilitating quantification of


hyperpigmentation in clinical practice
free download
distances, and use of different devices. As a result, we recently presented an
advanced digital image processing system called the skin hyperpigmenta- tion
index (SHI) for the automated quantification of skin hyperpigmentationOne is to
extract visual features in digital image for pattern classification by using deep
learning methods, the other is to extract visual 2. We firstly employ image
processing to cope with foggy images for artifacts removal [3 32], then import the
preprocessed images into a

Complexes⋆
Homotopic Digital Rigid Motion: An Optimization Approach on Cellular

free download
Border processing In general, the complex H (resp This be caused by the non-
existence of a solution, under the topological constraints, in the context of a finite
support image Page 11. Homotopic Digital Rigid Motion: An Optimization
Approach on Cellular Complexes 11

Applications of the digital technologies in textile and fashion industry


free download
Ngan, GKH Pang, and NHC Yung, Automated fabric defect detection A review,
Image and Vision Innovating fashion industry through digital transformation,
RJTA, vol H.-C. Kim, and R. Wicker, Multi-material stereolithography, Journal of
Materials Processing Technology, vol

An Image Enhancement Algorithm Based on Fractional-Order Phase


Stretch Transform and Relative Total Variation
free download
e output phase prototype of the filter shows the change in image intensity value
in the spatial domain, and the edge detection can be achieved after the
thresholding and mor- phological processing of the phase prototype. Figure 1
shows the process of digital image edge de

Single-Cell Conventional Pap Smear Image Classification Using Pre-


Trained Deep Neural Network Architectures
free download
As depicted in the pipeline of this study (see Figure 6), during the data pre-
processing stage 182 all images were resized to 128×128 before being fed to the
classification models to keep the 183 pre-trained architecture requirements.
Image normalization was done to keep the

Introduction to Machine Learning and Internet of Things for Management in


Agriculture
free download
in agriculture are digital soil maps, predictive models for yield prediction,
identification of pest and disease infestation through image analysis,
identification of weeds through hyperspectral image analysis, species recognition
through digital image processing of leaves and floral images related to an area of
interest from some external source for performing any kind of image processing
To work on any particular disease, we have got to prepare our own image
archive better to visit farms and take pictures of the diseased plants using any
digital cameras

2021/22 List of Final Year BE/B.Tech/M.tech/MCA Image

Processing Projects
#1Eye Recognition With Mixed Convolutional And Residual Network(Micore-Net)
#2Developing LSB Method Using Mask In Colored Images
#3Efficient Quantum Information Hiding For Remote Medical Image Sharing
#4An Efficient MSB Prediction-Based Method For High-Capacity Reversible Data Hiding In Encrypted
Images
#5Visual Secret Sharing Schemes Encrypting Multiple Images
#6Human Identification From Freestyle Walks Using Posture-Based Gait Feature
#7Computer Assisted Segmentation Of Palmprint Images For Biometric Research
#8Deep Convolutional Neural Networks For Human Action Recognition Using Depth Maps And
Postures
#9Image Classification Using Manifold Learning Based Non-Linear Dimensionality Reduction
#10Conceptual View Of The IRIS Recognition Systems In The Biometric World Using Image
Processing Techniques
#11Animal Classification Using Facial Images With Score-Level Fusion.
#12Smile Detection In The Wild Based On Transfer Learning
#13Design Of Biometric Recognition Software Based On Image Processing
#14Effective And Efficient Global Context Verification For Image Copy Detection
#15Face Recognition Using Sparse Fingerprint Classification Algorithm
#16One-Time Password For Biometric Systems: Disposable Feature Templates
#17Enhanced Password Processing Scheme Based On Visual Cryptography And OCR
#18Semi-Supervised Image-To-Video Adaptation For Video Action Recognition
#19My Privacy My Decision: Control Of Photo Sharing On Online Social Networks
#20MR Image Classification Using Adaboost For Brain Tumor Type
#21Lung Lesion Extraction Using A Toboggan Based Growing Automatic Segmentation Approach
#22Passbyop: Bring Your Own Picture For Securing Graphical Passwords
#23Accurate Detection And Recognition Of Dirty Vehicle Plate Numbers For High-Speed Applications
#24Mutual Component Convolutional Neural Networks For Heterogeneous Face Recognition
#25Lane And Curve Detection Using Deep Learning
#26Leaf Disease Detection Using Cnn-Deep Learning
#27Text Recognition In Images And Converting Recognized Text To Speech Using Image Processing
#28Face Recognition Using Image Processing For Visually Challenged
#29Toward End-To-End Car License Plate Detection And Recognition With Deep Neural Networks
#30Deep Learning Class Discrimination Based On Prior Probability For Human Activity Recognition
#31Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications
#32A Continuous Random Walk Model With Explicit Coherence Regularization For Image
Segmentation
#33A Local Metric For Defocus Blur Detection Based On Cnn Feature Learning
#34Automatic Land Cover Reconstruction From Historical Aerial Images An Evaluation Of Features
Extraction And Classification Algorithms
#35One-Time Password For Biometric Systems: Disposable Feature Templates
Image
Ordinal Deep Learning for Processing
MATLAB
Facial Age Estimation (Face
Recognition)

2 JPM1922 Commutative Encryption and Data Hiding in HEVC Video Co

3 JPM1927 New Framework of Reversible Data Hiding in Encrypted JPEG

4 JPM1965 Enhanced Fog Detection and Free Space Segmentation for Ca

5 JPM1966 Diabetes Detection based on Iris abnormal

Classification of Chikoo (Sapota) Fruits on basis of RGB colour sp


6 JPM1967
Image Processing

A Novel Approach Towards Dynamic And Scalable Video Comm


7 JPM1968
OFDMA and C-OFDMA Schemes over Wireless 4G Net

Machine vision based sorting of Chikoo (sapota) fruit of Dahanu ta


8 JPM1969
Digital Image Processing

System to predict the gestational age and extracting the features


9 JPM1970
the fetus and its orientation

Image Processing IEEE Final Year Projects


2018
Project Title

Topology Preserving Structural Matching for Automatic Partial Face Recognition

Automated Detection of White Blood Cells Cancer Diseases


Local and Global Feature Learning for Blind Quality Evaluation of Screen Content and Natural Scene Images

Robust Feature-Based Automated Multi-View Human Action Recognition System

Semi-Coupled Dictionary Learning With Relaxation Label Space Transformation for Video-Based Person Re-
Identification

Data Hiding Scheme Based on Pixel-Value Differencing in Dual Images

Image Forgery Detection

Feature based transition region extraction for image segmentation

Holoentropy measures for image stitching of scenes acquired under CAMERA unknown or arbitrary
positions

Moving Object Tracking Under Occlusion Using Hybrid Model

Driver Drowsiness Detection System Using Image Processing

Smart Traffic Detection System Using Canny Edge Detectio

You might also like