0% found this document useful (0 votes)
96 views5 pages

Project List

The document lists various research topics and projects related to mobile applications, network security, data management, and biometric systems. It covers a wide range of areas including 3D graphics, secure communications, data streaming, and machine learning techniques. Each entry highlights a specific technology or method aimed at addressing contemporary challenges in computing and telecommunications.

Uploaded by

Dasarath Naidu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views5 pages

Project List

The document lists various research topics and projects related to mobile applications, network security, data management, and biometric systems. It covers a wide range of areas including 3D graphics, secure communications, data streaming, and machine learning techniques. Each entry highlights a specific technology or method aimed at addressing contemporary challenges in computing and telecommunications.

Uploaded by

Dasarath Naidu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

o 3D Graphics Library for Mobile Applications o Accessing a Network Using Secure Mobile Communications o An Accurate ermination Con!

ition of the "robabilistic "acket Marking Algorithm o Acti#e Synchroni$ation of "owere! "c An! %an! %el! De#ices o A!apti#e Compression Metho! for Minimi$ing the &ile Downloa! ime in "eer' o'"eer Networks o A!mission Control Scheme at (!ge )outers o A!#ance ob*ect Consistency an! sharing in Distribute! architecture for e!ge ser#ices o A!#ance! 3D Maps for "ersonal Digital Assistant o Aggregate'+nterference A#oi!ance in Cogniti#e )a!io Network o Analysis an! Classification of Digiti$e! ((G ,a#eforms o Analysis an! Classification of Digiti$e! ((G ,a#eforms o Analysis of -arious &eature (.traction Algorithms of (ar /iometrics o An!roi! Application for Call a.i o Anonymous &ile Sharing in "eer to "eer System by )an!om ,alks o Assimilate! Color0 e.ture an! Shape &eatures for C/-+) o Assuring Security an! "ri#acy for (.tensible Access Control +n 1pen ,eb Ser#ice o A M Security Management System o Atten!ance System for %ostel Management /ase! on /iometrics

o Augmentation of 1pen Source ,eb Content Management Systems o Authentication System Creation Using +ris "attern Analysis o Automate! Data an! -i!eo Streaming &or Data "ublishing a "ro*ect )eport o Automate! Data an! -i!eo Streaming &or Data "ublishing a "ro*ect )eport o Automate! "arking System using )&+D echnology o Automate! "ortfolio Manager o Automatic Alert Alarming for Security Systems o Automatic Categori$ation of 2uery )esults /ase! on Concept %ierarchies o Automatic Solar "anel )otation Using "+C Microcontroller o Automatic Solar "anel )otation Using "ic Microcontrollers o Autonomous Learning in 1n'Line ra!itional -ersion of Software (ngineering Course o Autonomous Na#igation (mbe!!e! Systems using Coor!inate Mapping o /arco!e Generation an! )ecognition o /ase 34 (nco!ing an! Deco!ing o A /asic 5eylogger o /attery 1ptimi$er for An!roi! Mobile De#ices o /eam )obot ' An in L+ne &ollwing ,alker o /iometric Authentication System Using the %uman (ar

o /usiness +ntelligence System o Cellular Automata for +mage "rocessing o Channel Di#ersity in ,ireless Mesh Network o Character )egnition Using Neural Networks o C+G ' &ilenet to Documentum Con#ersion o Client Centere! raffic Shaping for C" Downloa!s o Clou! ComputingMo!elling0 Simulating an! "ro#i!ing "ri#acy o Co'1perati#e -irtual "ri#ate Network o Combination of Symmetric an! Asymmetric Algorithms to "ro#i!e Security to 1nline ransactions o Comparing the "erformance of wo )eacti#e "rotocols with )eference to Security +ssue o Comparison of &irewalls Design o Computer "urchase (.pert o Computing Meter /illing of Cache Ser#ices in Clou! (n#ironment o Congestion Control in ,ireless Sensor Networks o Consistent 1b*ect Sharing Using 2ui#er Architecture o Constructing )egular (.pression from D&A Using ND&A o Construction of a &oolproof Lie Detector Using (lectroencephalogram o Consultancy Management System

o Content /ase Mail Classification

o Content /ase! +mage )etrie#al System 6a Compariti#e Stu!y o Content Management System o Controlling Linu. Ser#er -+A (conomic Circuit o Cooperati#e Channeli$ation in ,ireless Networks ,ith Network Co!ing o A Cost /ase! Approach to A!apti#e )esource Management in Data Stream System o Co#erage "roblem in Mobile A!'%oc Sensor Network o Co#erage "roblem in Mobile A!'%oc Sensor Network o Cre!it Car! /ase! Customer )elationship Mangement Using Datamining o Cre!it Car! &rau! Detection Using %i!!en Marko# Mo!el o Cre!it Car! Security System o Cross "lateform +ntegraation ool for Acces Control an! Linu. through 7a#a o Cross "latform Mi!!leware Database Dri#er o Cross ools o Cryptography Mechanism Using Colors an! Armstrong in Data ransmission o A Cryptograrhic Approach to Distribute! Systems o CSA +mplementation of )emote Desktop Capturing Using )&/ "rotocol

o CS( "lacements

o Daemon for +" Accounting an! Configuring o Data Leakage Detection o Data Mining for Cre!it Car! Application "rocessing o Database Migration

You might also like