0% found this document useful (0 votes)
165 views8 pages

Thesies

The document discusses potential research topics in various areas related to wireless networks, including wireless sensor networks, mobile ad hoc networks, vehicular ad hoc networks, Internet of Things, and wireless security. It also lists potential topics in other areas such as digital image processing, software engineering, data mining, cloud computing, machine learning/AI, and big data. The topics focus on proposing novel techniques and evaluating existing methods to address issues like energy efficiency, security, fault tolerance, quality of service, and more.

Uploaded by

Saurabh N.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views8 pages

Thesies

The document discusses potential research topics in various areas related to wireless networks, including wireless sensor networks, mobile ad hoc networks, vehicular ad hoc networks, Internet of Things, and wireless security. It also lists potential topics in other areas such as digital image processing, software engineering, data mining, cloud computing, machine learning/AI, and big data. The topics focus on proposing novel techniques and evaluating existing methods to address issues like energy efficiency, security, fault tolerance, quality of service, and more.

Uploaded by

Saurabh N.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Topics on Wireless Networks

Wireless Sensor networks

1. Evaluate and propose novel technique for node localization in under water acoustic networks

2. To improve opportunistic routing to ensure data privacy in the network

3. Evaluate multi-level hierarchal routing scheme to increase life time of wireless sensor
networks

4. To propose novel technique for the isolation of misdirection attack in wireless sensor networks

5. Evaluate and propose energy efficient data aggregation scheme for wireless sensor networks

6. To propose technique for the isolation of sinkhole attack in wireless sensor networks

7. To modify LEACH protocol to increase data aggregation rate and lifetime of wireless sensor
networks

8. To propose scheme for wireless sensor networks to reduce chances of fault occurrence

9. Improve Channel sensing scheme for wireless sensor networks with clock synchronization

10. To propose scheme for wireless body area networks to reduce chances of path failure

Mobile Ad hoc Networks

1. Evaluate and propose scheme for the link recovery in mobile ad hoc networks

2. To propose hybrid technique for path establishment using bio-inspired techniques in


MANET’s

3. To propose secure scheme for the isolation of black hole attack in mobile ad hoc networks

4. To propose trust based mechanism for the isolation of wormhole attack in mobile ad hoc
networks

5. The novel approach for the congestion avoidance in mobile ad hoc networks

6. To propose scheme for the detection of selective forwarding attack in mobile ad hoc networks

7. To propose localization scheme which reduce faults in mobile ad hoc network

8. The energy efficient scheme for multicasting routing in wireless ad hoc network

9. The scheme for secure localization aided routing in wireless ad hoc networks

10. The cross-layer scheme for opportunistic routing in mobile ad hoc networks
Vehicular Ad hoc Networks

1. To propose multicasting scheme for path establishment in vehicular ad hoc networks

2. To propose secure framework for the isolation of Sybil attack in vehicular ad hoc networks

3. To evaluate and propose scheme for the isolation of DDOS attack in vehicular ad hoc
networks

4. Evaluate and propose mobility based routing scheme for vehicular ad hoc networks

5. The data clustering scheme for message dissemination in vehicular ad hoc networks

6. The data routing scheme based on the location prediction in vehicular ad hoc networks

7. To propose trust based framework for secure vehicular ad hoc networks

8. The location estimation scheme for vehicular networks based on RSSI technique

9. Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc


Networks

10. A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Topics on IOT (Internet of Things)

1. The secure and energy efficient data routing in the IOT based networks

2. The secure channel establishment algorithm for the isolation of misdirection attack in the IOT

3. The clock synchronization of IOT devices of energy efficient data communication in IOT

4. The adaptive learning scheme to increase fault tolerance of IoT

5. Mobility aware energy efficient routing protocol for Internet of Things

6. To propose energy efficient multicasting routing protocol for Internet of Things

7. The novel scheme to maintain quality of service in internet of Things

8. Link reliable and trust aware RPL routing protocol for Internet of Things

9. The energy efficient cluster based routing in Internet of Things

10. Optimizing Multipath Routing With Guaranteed Fault Tolerance in Internet of Things
Digital Image Processing

1. To propose classification technique for plant disease detection in image processing

2. The hybrid bio-inspired scheme for edge detection in image processing

3. The HMM classification scheme for the cancer detection in image processing

4. To propose efficient scheme for digital watermarking of images in image processing

5. The propose block wise image compression scheme in image processing

6. To propose and evaluate filter based on internal and external features of an image for image
de noising

7. To improve local mean filtering scheme for de noising of MRI images

8. To propose image encryption base d on textural feature analysis and chaos method

9. The classification scheme for the face spoof detection in image processing

10. The automated scheme for the number plate detection in image processing
Topic on Software Engineering

1. Fault detection in software using biological techniques

2. Enhancement in MOOD metrics for software maintainability and reliability

3. To analyze the effect of imperfect debugging and testing effects in multi-release effects

4. An object oriented analysis using image segmentation based SAR algorithm

5. To enhance effort estimation using Function point analysis in Cocomo model

6. To evaluate and improve model based mutation technique to detect test cases error in product
line testing

7. To propose improvement in genetic algorithm to calculate function dependency in test case


prioritization in regression testing

8. To propose improvement in Component based software to check compatibility

9. To propose dynamic technique with static metrics to check coupling between software
modules

10. To improve genetic algorithm for code insertion in automated testing for fault detection

11. To propose improvement TYPE 4 clone detection in clone testing


Topic on Data mining

1. Performance enhancement of DBSCAN density based clustering algorithm in data mining

2. The classification scheme for sentiment analysis of twitter data

3. To increase accuracy of min-max k-mean clustering in Data mining

4. To evaluate and improve apriori algorithm to reduce execution time for association rule
generation

5. The classification scheme for credit card fraud detection in Data mining

6. To propose novel technique for the crime rate prediction in Data Mining

7. To evaluate and propose heart disease prediction scheme in Data Mining

8. Software defect prediction analysis using machine learning algorithms

9. A new data clustering approach for data mining in large databases

10. The diabetes prediction technique for Data mining using classification

11. Novel Algorithm for the network traffic classification in Data Mining
Topic on Cloud Computing

1. To isolate the virtual side channel attack in cloud computing

2. Enhancement in homomorphic encryption for key management and key sharing

3. To overcome load balancing problem using weight based scheme in cloud computing

4. To apply watermarking technique in cloud computing to enhance cloud data security

5. To propose improvement green cloud computing to reduce fault in the network

6. To apply stenography technique in cloud computing to enhance cloud data security

7. To detect and isolate Zombie attack in cloud computing

Topics on Machine Learning and AI

1. The classification technique for the face spoof detection in artificial neural networks

2. The iris detection and reorganization system using classification and glcm algorithm

3. The pattern detection system using algorithm of textual feature analysis and classification

4. The plant disease detection using glcm and KNN classification in neural networks

5. To propose technique for the prediction analysis in data mining

6. The sentiment analysis technique using SVM classifier in data mining

7. The heart disease prediction using technique of classification


Topic on Big Data

1. Privacy preserving big data publishing: a scalable k-anonymization approach


using MapReduce.

2. Nearest Neighbor Classification for High-Speed Big Data Streams Using Spark.

3. Efficient and Rapid Machine Learning Algorithms for Big Data and Dynamic Varying
Systems

4. Disease Prediction by Machine Learning Over Big Data From Healthcare Communities

5. A Parallel Multi-classification Algorithm for Big Data Using an Extreme Learning Machine

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy