Sr. No. |
Title |
Download |
1 |
Security Assessment of desktop-PC using cloud based AV |
|
2 |
IRM: Integrated File Replication and Consistency Maintenance in cloud environment using Hadoop and map reduce Technique |
|
3 |
Combining Natural Language Processing and Software Engineering |
|
4 |
Off-droid Communication Network |
|
5 |
Arithmetic Logic Unit Design using Vedic Mathematics |
|
6 |
Redundancy Management of Multipath Routing for Intrusion Tolerance of Packet Loss by Malicious Node in HWSN |
|
7 |
Survey on Geographic Routing in VANET |
|
8 |
Elevated Drop- An Efficient Drop Buffer Management Policy for DTN Routing Protocols |
|
9 |
Web Application Security Approach against Online Password Guessing Attacks Using CAPTCHA |
|
10 |
Iridodialysis: Open Challenges and Issues in Iris Recognition |
|
11 |
Gesture Controlled Robot Using Support Vector Machines in Real Time Environment |
|
12 |
Clean Glass Approach: Improving Transparency in Software Industry |
|
13 |
Implementation of a tool for effective selection of classification algorithm to build classifier model using WEKA |
|
14 |
Implementation of Translation algorithm to generate UML diagrams from Database Modeling |
|
15 |
Sophisticated Deception Recognition Exploitation Hidden Morkov Model |
|
16 |
Characteristic Specific Sentiment Analysis An Innovative Thanks To Product Review |
|
17 |
Advance Multi Exploitation And Multi Snap Shotting On Iaas Cloud Surroundings |
|
18 |
A Survey On Network Watching And Administration Victimisation Email And Humanoid Phone |
|
19 |
Modified Image Search Supported Searchers Preference Prediction Phone |
|
20 |
Advanced Fraud Detection Using Hidden Morkov Model |
|
21 |
Feature Specific Sentiment Analysis An Innovative Way To Product Review |
|
22 |
Advance Multideployment and Multisnapshotting on IaaS Cloud Environments |
|
23 |
A Survey on Network Monitoring and Administration Using Email and Android Phone |
|
24 |
Personalized Image Search based on Searchers Preference Prediction |
|
25 |
Highly Developed Authentication System In 3D Environments |
|
26 |
Review on Accurate Multiple View 3D Reconstruction Using Depth Map |
|
27 |
TuCP Nested Tunnel Header Compression with Flow Context |
|
28 |
Generating Automated Test Cases using Model Based Testing |
|
29 |
Privacy Preserving in Data Mining using Perturbation Technique |
|
30 |
Location Privacy Preservation & Monitoring Approach in Wireless Sensor Network |