Escolar Documentos
Profissional Documentos
Cultura Documentos
68.
69.
Face and Iris based recognition system
Image Processing
69.
70.
AI based protein structure prediction
AI
70.
71.
Segmentation of Tracking Sequences Using Dynamically Updated Adaptive Learning
Image Processing
71.
72.
Detection and Segmentation of Concealed Objects in Terahertz Images
Image Processing
72.
73.
Development of Fuzzy-Based Bus Rear-End Collision Warning Thresholds Using a Dr
iving Simulator
Image Processing
73.
74.
Moving Object detection
Image Processing
74.
75.
The Application of Artificial Intelligence in Mobile Learning
Artificial Intelligence
75.
76.
Enhanced automated intrusion prevention in network security
Network Security
76.
77.
4G firewall
Network Security
77.
78.
Network security for wireless networks
Network Security
78.
79.
A Java Virtual Machine for Smart Sensors and Actuators
java technology and AI
79.
80.
Elliptic Curve Cryptography in resource Constrained Environment
Information Security
80.
81.
Text Cryptography
Information Security
81.
82.
Combining MMS with Elliptic Curve Cryptography
Information Security
82.
83.
Combining Elliptic Curve Cryptography with digital watermarking for OWL document
s
Information Security
83.
84.
Hyper Elliptic Curve Cryptography
Information Security
84.
85.
Potential use of Artificial Neural Network in Data Mining
Database and datamining
85.
86.
Script Recognition
Database and datamining
86.
87.
A New Software Approach to defend against Cache-based Timing Attacks
Database and datamining
87.
88.
Software Radio Attacks and Zero-Power Defenses
Database and datamining
88.
89.
H/w Monitoring Sysytem for Embedded System Security
Embedded Security
89.
90.
Embedded IPSec
Embedded Security
90.
91.
Cube3 Model for Data Mining:Web Based Approach
Data Mining
91.
92.
AN EFFICIENT INTRUSION DETECTION MODEL BASED ON FAST INDUCTIVE LEARNING
Information Security
92.
93.
Digital Governance and Hotspot Geo Informatics Software - Prioritization
Geo Informatics
93.
94.
Mining System for Community Finding and Centrality of Virtual User Network on th
e Internet
Data Mining
94.
95.
A Survey and Comparison of Various Routing Protocols of Wireless Sensor Network
(WSN) and a Proposed New TTDD Protocol Based on LEACH
WSN Security
95.
96.
Simulating AODV and DSDV For A dynamic Wireless Sensor Networks
WSN Security
96.
97.
Performance Comparison and Analysis of DSDV and AODV for MANET
WSN Security
97.
98.
Performance Evaluation of Modified AODV for Load Balancing
WSN Security
98.
99.
Online Banking and Modem Approaches Toward its Enhanced Security
WSN Security
99.
100.
T-PIM Trusted Password Input Method against Data Stealing Malware for an Online
Banking System
WSN Security
101.
The Use of Attack and Protection Trees to Analyze Security for an Online Bankin
g System
WSN Security
102.
Towards Secure Information Systems in Online Banking
WSN Security
103.
Security Scheme for Online Banking Based on Secret Key Encryption
WSN Security
104.
Design and Implementation of Anti-Screenshot Virtual Keyboard Applied in Online
Banking
WSN Security
105.
A Secure Crypto-Biometric Verfication Protocol.
Biometric Technology
106.
Personal Authentication System Using Fingerprint With Digital Signature Technolo
gies.
Biometric Technology
107.
ON-Line Signature Verfication System Using Multi-Template Matching Approaches.
Biometric Technology
108.
Locomotive Security System Using Biometric Authentication.
Biometric Technology
109.
Design & Implementaion of Voice Recognition System (VRS) Using Biometric Techn
ology
Biometric Technology
110.
Off-line Handwritten Signature Verification using Artificial Neural Network Clas
sifier
Artificial Neural Network
111.
Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated
System
Using Recurrent Neural Network
Artificial Neural Network
112.
Improved Offline Signature Verification Scheme Using Feature Point Extraction Me
thod
Artificial Neural Network
113.
Off Signature Verification and Identification using Distance statistics
Artificial Neural Network
114.
Signature Recognition and Verification with ANN
Artificial Neural Network
115.
Novel feature extraction technique for Off-line Signature Verification system
Artificial Neural Network
116.
Clustering of streaming data.
Data Mining
117.
Data stream
Data Mining
118.
Stream mining
Data Mining
119.
Kernel density estimation
Data Mining
120.
A resource aware kernel density estimation
Data Mining
121.
Real-Time Analysis of Physiological Data to Support Medical Applications
Data Mining
122.
Mining Based Decision Support Multi-agent System for Personalized e-Healthcare S
ervice
Data Mining
123.
Hierarchical Clustering of Time Series Data Streams
Data Mining
124.
Intelligent Mobile Health Monitoring System (IMHMS)
Data Mining
125.
RULE BASED CLASSIFICATION OF ISCHEMIC ECG BEATS USING ANTMINER
Data Mining
126.
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Net
works
Wireless Communication
127.
MAC-SCC: a medium access control protocol with separate control channel for reco
nfigurable multi-hop wireless networks
Wireless Communication
128.
Performance measurement and analysis of ZRP for MANETs using network simulator-Q
ualNet
Wireless Communication
129.
Comparative assessment of WiMAX scheduler in fixed and mobile WiMAX networks for
VoIP using QualNet
Wireless Communication
130.
The simulation model of Multicast and Broadcast Service in the Mobile WiMAX for
Qualnet
Wireless Communication
131.
Natural Language Computing
NLP
132.
Dependence Language Model for Information Retrieval
Information Retrieval
133.
Language Translation
NLP
134.
Compiler Technology for Scalable Architectures
Compilers
135.
Computing machinery and intelligence
AI
136.
Efficient use of Artificial Neural Network in WSN.
WSN.
137.
Google MAPS API used for traffic control System
traffic control System
138.
A Role of WSN in Precision Farming.
WSN.
139.
Android 2.23
OS
140.
Text Watermarking
SEcurity
141.
Text Mining in Bioinformatics
Bioinformatics
142.
Web mining
Database
143.
A 3D collaborative virtual environment for web browsing
Visualization
144.
3 dimensional visualization of www
Visualization
145.
Visualizing the structure of www in 3D hyperbolic space
Visualization
146.
Visualizing www search engine results
Visualization
147.
Performance optimization in wireless sensor network using Buffer management
WSN
148.
Buffer management in wireless sensor networks
WSN
149.
Congestion detection avoidance techniques in Wireless Sensor Networks
WSN
150.
Vehicular Network Management
Network Management
151.
Root cause analysis of congestion in WSN
WSN Wireless Sensor Networks