A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | VASAVI COLLEGE OF ENGINEERING (Autonomous) | ||||||||||||||||||||||
2 | Ibrahimbagh,Hyderabad | ||||||||||||||||||||||
3 | Department of Computer Science and Engineering | ||||||||||||||||||||||
4 | Project Seminar Titles | ||||||||||||||||||||||
5 | Year :IV | Sem:VII | Section : A | AY: 2022-23 | |||||||||||||||||||
6 | S.No | Rollno | Name | Title-1 | Title-2 | ||||||||||||||||||
7 | 1 | 1602-19-733-001 | ADITYA NARAYAN. KHAJURIA | Machine Learning-Based Malicious
Application Detection of Android | The synthesized speech recognition based on BiLTSM | ||||||||||||||||||
8 | 2 | 1602-19-733-002 | BEDIGA. AKHIL | Sharing secured information through SCM | Security Analysis and protection for cloud computing | ||||||||||||||||||
9 | 3 | 1602-19-733-003 | GUDAPURI. AKHIL KUMAR | Research on Big data technology and application in Internet era | HoneyBee Model: A Mobile Work Sharing Algorithm | ||||||||||||||||||
10 | 4 | 1602-19-733-004 | AKHIL. THANDU | Usage of Internet of Things for Forest Digitalization | Learning space conceptual model for computing games developers | ||||||||||||||||||
11 | 5 | 1602-19-733-005 | PADIDHALA. AKSHAY | A Systematic Review of Human–Computer Interaction and Explainable Artificial Intelligence(XAI) | CLUSTERING BASED SEMI-SUPERVISED MACHINE LEARNING FOR DDOS ATTACK CLASSIFICATION | ||||||||||||||||||
12 | 6 | 1602-19-733-006 | KOMURAVELLY. AKSHAYA | No Reference Quality Assessment for Contrast-Distorted images | Face mask recognition using cnn model | ||||||||||||||||||
13 | 7 | 1602-19-733-007 | YAMSANI. AKSHAYA | Estimation of Cloud Node Aquisition | The commoditization of AI for molecule design | ||||||||||||||||||
14 | 8 | 1602-19-733-008 | POTTABATHINI. AKSHITA | Patient-Centric Health Information Exchange Framework Using Blockchain Technology | Detecting and Explaining Depression in Social Media Text with Machine Learning | ||||||||||||||||||
15 | 9 | 1602-19-733-009 | D. AKSHITH | Attention model for image captioning | Enabling technologies for Internet of Healthcare Things | ||||||||||||||||||
16 | 10 | 1602-19-733-010 | LOKASANI. ASHRITHA REDDY | LEARNING TEXT TO IMAGE SYNTHESIS WITH TEXTUAL DATA AUGMENTATION | Aggregate Reinforcement Learning for multi-agent territory
division: The Hide-and-Seek game | ||||||||||||||||||
17 | 11 | 1602-19-733-011 | KANIKI. BHIKSHAPATHI | AI in Medical Imaging Informatics: CurrentChallenges and Future Directions | An Efficient SQL Injection Detection System Using Deep Learning | ||||||||||||||||||
18 | 12 | 1602-19-733-012 | B. CHAITHANYA | ||||||||||||||||||||
19 | 13 | 1602-19-733-013 | NATALA. DEEKSHA | Detecting spam email with machine learning optimized with Bio-inspired meta heuristic algorithms | Classification of plant seedling using Convolutional neural networks | ||||||||||||||||||
20 | 14 | 1602-19-733-014 | KACHAM. GAYATHRI | Automatic Exam Correction Framework (AECF) for the MCQs, Essays, and Equations Matching | A Smartphone Based Application using Machine Learning for Gesture Recognition | ||||||||||||||||||
21 | 15 | 1602-19-733-015 | HARADEEP. MARA | Self-Guided Image Dehazing Using Progressive Feature Fusion | Bitmap Carving and Reassembly of fragmented bitmap images | ||||||||||||||||||
22 | 16 | 1602-19-733-016 | GOLUSU. HEMANTH KUMAR | A review of security standards and frameworks for IOT based smart environments | False news detection using deep learning architecture | ||||||||||||||||||
23 | 17 | 1602-19-733-017 | JUVERIA. AMJAD | Heart Disease Identification Method Using Machine Learning Classification in E-Healthcare | Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system | ||||||||||||||||||
24 | 18 | 1602-19-733-018 | MARABATHULA. KARTHEEK | Secure Data Transfer through Internet using Cryptography and Image Steganography | The Top 10 Risks of Machine Learning Security 2020 | ||||||||||||||||||
25 | 19 | 1602-19-733-019 | KRISHNA. CHITLANGI | Predicting Cyberbullying on Social Media in the
Big Data Era Using Machine Learning Algorithms | An assessment of machine learning models and algorithms for early prediction and diagnosis of diabetes using health indicators | ||||||||||||||||||
26 | 20 | 1602-19-733-020 | KRISHNAPRIYA V S. GARIMELLA | Forecasting Stock Prices Using a Hybrid Deep Learning Model Integrating Attention Mechanism, Multi-Layer Perceptron, and Bidirectional Long-Short Term Memory Neural Network | Blockchain based COVID vaccination registration and monitoring | ||||||||||||||||||
27 | 21 | 1602-19-733-021 | PINISETTI. LALITH SRINIVAS | A Financial data security sharing solution based on blockchain technology and proxy re-encryption technology | Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain | ||||||||||||||||||
28 | 22 | 1602-19-733-022 | TADIKAMALLA LASYA. SHREE | ScoolAR: An Educational Platform to Improve Students’ Learning Through Virtual Reality | A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing | ||||||||||||||||||
29 | 23 | 1602-19-733-023 | KANDARE. LAVANYA | DriveBFR:Driver Behaviour and Fuel Efficiency bsrd Recommend System | Deep learning based smart IoT health system for Blindness detection using retina images | ||||||||||||||||||
30 | 24 | 1602-19-733-024 | ITHA. MANISHA | Deep learning-based smart it health system for blindness detection using retina images | cloud computing of E-Commerce | ||||||||||||||||||
31 | 25 | 1602-19-733-025 | DANDA. MIDHUN | Attention Is All You Need In Speech Separation | Discovering faster matrix multiplication algorithms with reinforcement learning | ||||||||||||||||||
32 | 26 | 1602-19-733-026 | MIRZA ADNAN. ABBAS | Detection of Cyber Crime on Social Media using Random Forest Algorithm | COGNITIVE AGENT-BASED ACCIDENT
AVOIDANCE SYSTEM | ||||||||||||||||||
33 | 27 | 1602-19-733-027 | MOHAMMAD. RIYAZUDDIN | Data poisoning attacks against machine learning algorithms | Crop yield prediction using machine learning techniques | ||||||||||||||||||
34 | 28 | 1602-19-733-028 | MOHAMMED IMRAN MIRZA | A Novel Ensemble Learning Paradigm for Medical Diagnosis With Imbalanced Data | PolarCap a deep learning approach for first motion polarity classification of earthquake waveforms | ||||||||||||||||||
35 | 29 | 1602-19-733-029 | MONIKA CHOWDARY. ALAM | An android base application system for women safety | |||||||||||||||||||
36 | 30 | 1602-19-733-030 | MONISHKA. DAS | Deep Learning for Safe Autonomous Driving:
Current Challenges and Future Directions | Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network | ||||||||||||||||||
37 | 31 | 1602-19-733-031 | KARRA. MOUNIKA | wireless AI in smart car, How smart a car can Be? | Transfer Learning for Multi-Crop Leaf Disease Image Classification using Convolutional Neural Network VGG | ||||||||||||||||||
38 | 32 | 1602-19-733-032 | ANGIRGE. MUKESH | SECURITY PERSPECTIVE AND ML-BASED DDOS DETECTION | Phishing website detection by machine learning techniques | ||||||||||||||||||
39 | 33 | 1602-19-733-033 | NUNE. NARESH | Influence of the Development of VR Technology on Enterprise Human Resource Management in the Era of Artificial Intelligence | |||||||||||||||||||
40 | 34 | 1602-19-733-034 | KARRI. NEEHARIKA | Artificial intelligence and Big data for Coronavirus (COVID-19) pandemic: A survey on the state of the arts | Machine learning in health condition check up:An approach using Breimans random forest algorithm | ||||||||||||||||||
41 | 35 | 1602-19-733-035 | KATLA. NIKHIL GOUD | Research on Artificial Intelligence Algorithm and Its Application in Games 2020 | The BiLSTM-based synthesized speech recognition | ||||||||||||||||||
42 | 36 | 1602-19-733-036 | RAJAPAKA. PAVAN KALYAN | A smartphone application based on gesture recognition | BUSINESS INTELLIGENCE TECHNOLOGY IN THE
ERA OF AI | ||||||||||||||||||
43 | 37 | 1602-19-733-037 | PODUGU. PRANAYA | Prediction of diabetes empowered with fused machine learning | Cyber security of railways cyber-physical system(CPS) - A risk management methodology | ||||||||||||||||||
44 | 38 | 1602-19-733-038 | KARUKONDA. RAHUL | Computing with Nearby Mobile Devices: A Work
Sharing Algorithm for Mobile Edge-Clouds | file carving (hex editor) | ||||||||||||||||||
45 | 39 | 1602-19-733-039 | ADAPALA. RUTHWIK REDDY | Visual Aligning Attention Model | Prediction of EV charging behaviour | ||||||||||||||||||
46 | 40 | 1602-19-733-040 | SAHITHI. CHUNCHU | Credit card fraud detection using state-of-the-art machine learning and deep learning algorithms | What changed in the cyber-security after COVID-19? | ||||||||||||||||||
47 | 41 | 1602-19-733-041 | NIMMALA. SAINADH REDDY | Data poisioning attacks against machine learning algorithms | Classification of plant seedlings using convolutional neural networks | ||||||||||||||||||
48 | 42 | 1602-19-733-042 | PAPPULA. SAKETH REDDY | 5G Technology and it's evolution | Cognitive Agent-Based Accident Avoidance System | ||||||||||||||||||
49 | 43 | 1602-19-733-043 | SAMEEHA. MUBEEN | Doodle-Based Authentication Technique Using Augmented Reality | A GSA-based hybrid algorithm for bi-objective workflow scheduling in cloud computing | ||||||||||||||||||
50 | 44 | 1602-19-733-044 | M SARAPU. SHARAT CHANDRA | BCOSN: A BLOCKCHAIN BASED DECENTRALIZED ONLINE SOCIAL MEDIA A conceptual model and case study of blockchain-enabled social media platform | A conceptual model and case study of blockchain-enabled social media platform | ||||||||||||||||||
51 | 45 | 1602-19-733-046 | KATEPALLI. SHRAVANI | Backscatter technologies and the future of Internet of Things: Challenges and opportunities | Movie recommendation and sentiment analysis using Machine learning | ||||||||||||||||||
52 | 46 | 1602-19-733-047 | SHREE VAISHNAVI REDDY. B | Crypto Pharmacy –Digital Medicine a mobile application integrated with hybrid blockchain to tackle the issues in pharma supply chain | Autoencoder-based feature construction for IoT attacks clustering | ||||||||||||||||||
53 | 47 | 1602-19-733-048 | MULUKALA. SHREYA | A Study on the digital forensic investigation method of clever malware in iot devices | Uniting cybersecurity and machine learning | ||||||||||||||||||
54 | 48 | 1602-19-733-049 | V. S S NAGA SURYA PRAKASH | Industrial Internet of Things Security Enhanced with Deep Learning Approaches for Smart Cities | Increasing productivity of rice plants based on IoT to realize Smart Agriculture Using System Thinking approach | ||||||||||||||||||
55 | 49 | 1602-19-733-050 | P. SRI KRISHNA PAVAN KALYAN | An exploration of the application of computer music production software in music composition | File Carving (BMP Images). | ||||||||||||||||||
56 | 50 | 1602-19-733-051 | KALVA. SRI KRISHNA REDDY | Anomaly Detection of industrial control systems based on transfer learning | Automatic detection of coronavirus disease
(COVID-19) in X-ray and CT images: A machine learning based approach | ||||||||||||||||||
57 | 51 | 1602-19-733-052 | VYDA. SRIRAM | Toward Automated Security Analysis and enforcemet for cloud computing (2022) | prediction of diabetes using classification algorithms | ||||||||||||||||||
58 | 52 | 1602-19-733-053 | M. SUPRITHA | Schizophrenia detection | Fake review detection using supervised machine learning | ||||||||||||||||||
59 | 53 | 1602-19-733-054 | MANNEPALLI. TANDAN | Realising an effective COVID 19 Diagnosis system based on machine learning and IOT in smart hospital environment | Digitalization of forest using IoT | ||||||||||||||||||
60 | 54 | 1602-19-733-055 | KOLPULA. TEJASREE | Reliable Data Transmission Scheme for Perception Layer of Internet of Underwater Things(IoUT) | Cardiovascular Events Prediction using Artificial intelligence Models and Heart rate variability | ||||||||||||||||||
61 | 55 | 1602-19-733-056 | KATIPELLY. VARDHINI | Blockchain based privacy preserving healthcare architecture | Secured information sharing in supply chain management: Modified data sanitization with optimal key generation via hybrid algorithm | ||||||||||||||||||
62 | 56 | 1602-19-733-057 | V. VARUN | Predicting Epileptic Seizures: Case Studies
Harnessing Machine Learning | The case of HyperLedger Fabric as a blockchain solution for
healthcare applications | ||||||||||||||||||
63 | 57 | 1602-19-733-058 | VOORUGONDA. VIGNESH | Renewable energy management system: optimum design and hourly dispatch | Services Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain | ||||||||||||||||||
64 | 58 | 1602-19-733-059 | DHANDAVENI. VINAY | Quantitative Assessment of Burner Flame Stability through Digital Image Processing | Face mask detection using CNN model | ||||||||||||||||||
65 | 59 | 1602-19-733-060 | VISHAL. GOLKONDA | Blue eyes Technology | IoT based wearable device to monitor the signs of
quarantined remote patients of COVID-19 | ||||||||||||||||||
66 | 60 | 1602-19-733-061 | Y. VISHNU VARDHAN | IEEE Annals of the History of Computing | Transport network downsizing based on optimal sub-network | ||||||||||||||||||
67 | 61 | 1602-19-733-183 | G. RAJEEV REDDY | A Semi- Supervised Attention (SSA) model for identifying authentic sneakers | Automating procurement contracts in the Healthcare Supply Chain Using Blockchain Smart Contracts | ||||||||||||||||||
68 | 62 | 1602-19-733-301 | B. RAMA KRISHNA | Cloud computing networking: challenges and opportunities for innovations | Information extraction from text messages using data mining techniques | ||||||||||||||||||
69 | 63 | 1602-19-733-302 | SEEMALA. PAVANI | security and privacy in smart farming:challenges and opportunities. | A data driven model for safety risk identification from flight data analysis | ||||||||||||||||||
70 | 64 | 1602-19-733-303 | MAMINDLA. SAI KUMAR | Razor: Scaling Backend Capacity for Mobile Applications | Detecting phishing websites using machine learning techniques | ||||||||||||||||||
71 | 65 | 1602-19-733-304 | SANGA. ANKITH | Clustering based semi-supervised machine learning for DDoS attack classification | An Efficient SQL Injection Detection System Using Deep Learning | ||||||||||||||||||
72 | 66 | 1602-19-733-305 | MOHAMMAD. AMREEN | 6G and beyond: The Future of wireless communications Systems | smart farming using machine learning and deep learning techniques | ||||||||||||||||||
73 | 67 | 1602-19-733-306 | PATHULOTHU. MEGHANA | Control and Management of Railway System Connected to Microgrid Stations | An advanced and secure framework for conducting online examination using blockchain method | ||||||||||||||||||
74 | |||||||||||||||||||||||
75 | |||||||||||||||||||||||
76 | |||||||||||||||||||||||
77 | |||||||||||||||||||||||
78 | |||||||||||||||||||||||
79 | |||||||||||||||||||||||
80 | |||||||||||||||||||||||
81 | |||||||||||||||||||||||
82 | |||||||||||||||||||||||
83 | |||||||||||||||||||||||
84 | |||||||||||||||||||||||
85 | |||||||||||||||||||||||
86 | |||||||||||||||||||||||
87 | |||||||||||||||||||||||
88 | |||||||||||||||||||||||
89 | |||||||||||||||||||||||
90 | |||||||||||||||||||||||
91 | |||||||||||||||||||||||
92 | |||||||||||||||||||||||
93 | |||||||||||||||||||||||
94 | |||||||||||||||||||||||
95 | |||||||||||||||||||||||
96 | |||||||||||||||||||||||
97 | |||||||||||||||||||||||
98 | |||||||||||||||||||||||
99 | |||||||||||||||||||||||
100 |