Main Reference PaperA scalable distributed machine learning approach for attack detection in edge computing environments, Journal of Parallel and Distributed Computing, 2018.
  • The proposed Extreme Learning Machine (ELM) based attack detection system for the IoT exploits the HPC cluster resources of the cloud environment to reduce the time and cost constraint of specialized edge devices.

+ Description
  • The proposed Extreme Learning Machine (ELM) based attack detection system for the IoT exploits the HPC cluster resources of the cloud environment to reduce the time and cost constraint of specialized edge devices.

  • To identify the anomalies and cyber threats

  • To perform the accurate traffic classification in edge device based on the cloud computing environment

+ Aim & Objectives
  • To identify the anomalies and cyber threats

  • To perform the accurate traffic classification in edge device based on the cloud computing environment

  • A technique is contributed to handling the uncertainty issue of the system

+ Contribution
  • A technique is contributed to handling the uncertainty issue of the system

  • Operating system: Ubuntu / Windows

  • Java/Python/R

+ Software Tools & Technologies
  • Operating system: Ubuntu / Windows

  • Java/Python/R

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit