Project topics Active Learning Methods for Interactive - TopicsExpress



          

Project topics Active Learning Methods for Interactive Image Retrieval Active Queue Management for Fair Resource Allocation in Wireless Networks Active Source Routing Protocol for Mobile AD-HOC Networks Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks Adaptive Programming Model for Fault-Tolerant Distributed Computing Adaptive Security and Authentication for DNS System Advertisement Posting Website ASP .Net Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks Apartment Management System Application of BPCS steganography to wavelet compressed video Artificial intelligence network load balancing using Ant Colony Optimization ASP .Net Project Titles ATM Networks for Online Monitoring System Auction System Authenticating Network Attached Storage - IEEE Automatic Dependent Surveillance-Broadcasting Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks Benefit Based Data Caching In Ad Hoc Networks BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Building Intelligent Shopping Assistant using Data mining technique for Web Services Bulk Billing System C# MP3 Compressor CAC Connection Admission Control using ATM Networks Implementation Call Center Management System Clinical telemedicine COACS: Co - Operative and adaptive caching system for MANETs Color imaging and multidimensional projections Computer vision and resolution Computerized Information Software Controlling IP Spoofing Through Inter Domain Packet Filters Convolution Filter Convolution Filters Credit Card Fraud Detection Using Hidden Markov Models Crypt kit A real time cryptographic system for security over the networks - IEEE Cryptographically Using Secure Server/Client Protocol CVS Root File Changing Utility Data Minimization And Storage Using XML Enable SQL Server Data mining implementation for Credit Cards Application Processing System Data Security in Ad hoc Networks Using Multi Path Routing Database Schema Comparison Utility C# Databases and mobility in databases Defect Tracking Tool - Enterprise Project and Defect Tracking System Designing Less - Structured P2p Systems for the Expected High Churn Digital Image Processing with Multi Domain Approach Digital libraries Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification Digital Steganography: Hiding Data within Data Digital Water Marking For Video Piracy Detection Displacement filters, including swirl using GDI+ Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE Distributed cache updating for the Dynamic source routing protocol Distributed Component Router Based CRM Customer Relationship Management Distributed Component Router based Supply Chain Management System SCM Distributed Data mining in Credit Card Fraud Detection Analysis Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Distributed Node Migration by Effective Fault Tolerance Dual-Link Failure Resiliency through Backup Link Mutual Exclusion Dynamic Character & Pattern Recognition using Neural Networks Dynamic Control for Active Network System Dynamic Signature Verification Using Pattern Recognition Dynamic University Linking & Data integrity Maintenance E“Secure Transaction Design & Implementation Edge Detection Filters Effective Packet Analyzing and Filtering System for ATM Network Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Efficient Association Rule Mining Algorithm In Distributed Databases Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks Efficient Contiguous Data & Video Streamer with Buffer Management Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks efficient message digest algorithm (MD) for data security Efficient Resource Allocation For Wireless Multicast Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case E-HealthCare - Distributed HealthCare and A Strategic Management System Electronic Fund Transfer Electronic imagery and visualization frameworks Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management E-Mail Server Using Multithreaded Sockets Embedding in Video Steganography Employee Management System Encryption and Decryption technique for secure communication in WLAN E-Recruitment System - Dynamic Online Professional Recruitment & Management System ERP Application integrated Enterprise Solutions with Strategic advantages ERP for Leather Company ERP for Small Business E-Sales Order Processing System Estimation of Defects Based On Defect Decay Model: ED3M Evaluating the Performance of Versatile RMI Approach In Java Face Recognition Using Laplacian faces Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks File Encryption and Encrypted text embedding in an image Find and Replace utility Flood Fill Algorithms in C# and GDI+ FTP Explorer Fuzzy Control Model Optimization for Behavior- Constent Traffic Routing Under Information Provision Genetic Algorithm Based Train Simulation Using Concurrent Engineering Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM Geometric Approach to Improving Active Packet Loss Measurement GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks Grid information Retrieval System Hardware enhanced association rule mining with Hashing and Pipelining HBA Distributed Metadata Management for Large Cluster-Based Storage Systems Hiding binary data in HTML documents Hiding Messages in MIDI Songs Hiding messages in the Noise of a Picture High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks Homogeneous Networks & Control Implementation Homogenous Network Control and Implementation Hopfield model of neural network for pattern recognition Hotel Management System HTML Editor Human Resources Management System Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) Image Compression and Analysis with MSE & PSNR Technique - IEEE Image Converter 2005 Image Processing Image Processing for Bilinear Filters and Resizing Image Processing for Convolution Filters Image Processing for Edge Detection Filters Image processing for HSL color space Image Processing for Per Pixel Filters using GDI+ Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings Image Rendering for Grid Technology Image Stream Transfer Using Real-Time Transmission Protocol Image Water Marking and Combustion Imaging interfaces and navigation Incremental deployment service of Hop by hop multicast routing protocol Industrial systems Integrated Development Environment using JSWING IDE JSWING Integrating Speech Engine with Web Navigator Intelli WAP System Implementation / WAP based information Retrieval System Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization Internet History Viewer Internet imaging localization and archiving Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks Intrusion Detection Prevention And Trace back Systems Inventory Manage System Inventory System ITP: An Image Transport Protocol for the Internet J2EE Project Titles J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME J2ME Mail Client Server J2ME Project Titles Java Network File Sharing System Java Productivity Aids Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader Java Visual Editor with Compiler Job Order System Library Management System Localized Sensor Area Coverage With Low Communication Overhead Location Aided Routing for Mobile Ad-Hoc Networks Location Aided Routing in Mobile ADHOC Networks for Secured Routing Location Based Spatial Query Processing In Wireless Broadcast Environments Material Forecasting and Management Solution Medical image processing Membership Management System Memory Learning Framework for Effective Image Retrieval Message Digest Messaging Service over TCP/IP in Local Area Network Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks Mobile Agents In Distributed Multimedia Database Systems Mobile Bank Mobile Banking Design & Implementation - IEEE Mobile Information Provider Mobile shop shopping cart System Modeling & Automated Containment of Worms Monitoring And Managing The Clusters Using JMX Multi Router Traffic Monitor Implementation Multi Router Traffic Monitoring System Multi Server Communication In Distributed Management System Multicast Live Video Broadcasting Using Real Time Transmission Protocol Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks Multithreaded Chat Server Multithreaded Peer to Peer Communication using Distributed Frameworks near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Network Analyze Network Analyzer Network Analyzer & Network Monitoring Tool using SNMP Network Border Patrol for Congestion Collapse Preventing System Network Border Patrol Preventing Congestion Collapse Network border patrol: preventing congestion collapse and promoting fairness in the Internet Network Component for XML Migration Network Packer Sniffer Implementation Network Security System in DNS using AD-HOC Networks Network Traffic Anomaly Detector Network Traffic, Packet Analyzer and Sniffer Neural Network for Recognition of Handwritten and Digits Neural Network for Recognition of Handwritten and Digits Backpropagation Neural Network-Based Face Detection Neural Networks for Handwriting Detection System Using Brain Net Neural Networks for Handwritten character and Digits Neural Networks for Unicode Optical Character Recognition New Model for Dissemination of XML Content Noise Reduction by Fuzzy Image Filtering Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video Novel Secure Communication Protocol for Ad Hoc networks [SCP] OCGRR: A New Scheduling Algorithm for Differentiated Services Network ODAM: An Optimized Distributed Association Rule Mining Algorithm On Guaranteed Smooth Switching For Buffered Crossbar Switches Online Bank Online Book Shop Online Customer Care Online Fashion Studios Online Handwritten Script Recognition Online Handwritten Script Recognition - IEEE Online Index Recommendations for High- Dimensional Databases Using Query Workloads Online Issue Tracking - Project Management Solutions Online Quiz Online Shopping Online Voting System Online Web shop Optimal Cryptographic Technique Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) Optimal Multicast Routing in Mobile Ad-Hoc Networks Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach Patient Care System Patient Management System Peer to Peer Messaging System using JXTA Peer-To-Peer Messaging Performance Evaluation of DISTANCE Routing Algorithm in MANET Performance Evaluation of RMI Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction Personal Authentication Using 3-D Finger Geometry Personal, adaptive, and content-based image retrieval imaging Precise Termination Condition of the Probabilistic Packet Marking Algorithm Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks Probabilistic Packet Marking For Large Scale IP Trace Back Property Management System Protection of Database Security via Collaborative Inference Detection Protocol Scrubbing: Network Security Through Transparent Flow Modification Proxy Server - Design and Implementation Public Key Validation for DNS security Extension Public Key Validation For DNS Security Extensions Public Key Validation for DNS Security Extensions Domain Naming Server Query Routing Optimization In Sensor Communication Networks QUIVER: Consistent Object Sharing For Edge Services Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks Reading and Writing AVI files using steganography Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security Reduction of Network Density for Wireless Ad-Hoc Networks Remote Computing using Thin Clients Remote medicine and Internet Reputation Based Trust Model for Peer to Peer eCommerce Communities Retrieving Files Using Content Based Search Retrieving Files using Content Based Searching and displaying them in Carousel View Retrieving Files Using Content Based Searching and presenting it in Carousel view Routing and Security in Mobile Ad Hoc Networks RTF to XML Converter Safety in telemedicine Sales and Purchase Management System Scalable and Efficient End-To-End Network Topology Inference Scalable Wireless Ad-Hoc Network Simulation using XTC Screen capture Utility Scribe Automation Secure Data Hiding and Extraction Using BPCS Secure Optimal Cyclic Cryptographic System Secure Password-Based Protocol for Downloading a Private Key - IEEE Secure Routing Protocol for mobile Ad-hoc Network Securing Image URL Securing User-Controlled Routing Infrastructures Security In Large Networks Using Mediator Protocols Selective Encryption of Still Image Send SMS To Cell Phone Through SMTP Mail Shortest Node Finder In Wireless Ad-Hoc Networks Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns Smart Knowledge Provider Static Image Hand Gesture Recognition using Neural Networks Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data Steganography for FTP through a Proxy Server Steganography for Hiding Data in Wave Audio Files Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App TCPIP Chat client server Using C# Tele cardiology Tele pathology and digital imaging Tele rehabilitation TELEMED: Telemedicine and eHealth Telemedicine and tele health Telemedicine portals Telemedicine software and devices Temporal Portioning of Communication Resources in an Integrated Architecture Textile Management System Textile Web Services The File Digest program and the C++ implementation of some Message-Digest algorithms Towards multi model interfaces for intrusion detection - IEEE Trainee Management System Trustworthy Computing Under Resource Constraints With The Down Policy Truth Discovery with Multiple Conflicting Information Providers on Web Tutoring systems Two Techniques for Fast Computation of Constrained Shortest Paths Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems Using Trigonometry and Pythagoras to Watermark an Image VB .Net Smart Mail Transfer Protocol Video Steganography Using Mobile Simulation Video techniques for medical images Virtual Private Network Virtual telemedicine Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light Voice Enabled Smart Browser VOIP Flexible & Efficient Voice Communicator, Voice Over IP VVoIP Voice with Video Over IP Networks Wallpaper Changer Utility Watermarking Relational Databases Using Optimization Based Techniques Wavelet Based Compression and Decompression Using Steganography Web Based Content Management System Web Services Win Application for Word Processing Windows Management Instrument (WMI) .Net 2005 Windows Management Instrumentation WMI Implementation Windows Multi File Search utility Wireless telemedicine Wireless Traffic Viewer Using J2ME Work Flow Management System Workflow Mining: Discovering Process Models from Event Logs XML Enabled SQL SERVER XTC Algorithm based Scalable Wireless AD-HOC Networking XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks By. ...............Vishnu boo sasi Yuva. .......
Posted on: Mon, 01 Dec 2014 13:00:53 +0000

Trending Topics



Recently Viewed Topics




© 2015