MOBILE COMPUTING
· A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice - 2009
· Contention-Aware Performance Analysis of Mobility - 2009
· Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks - 2009
· Efficient Resource Allocation for Wireless Multicast - 2008
· Localized Sensor Area Coverage with Low Communication Overhead - 2008
NETWORKING PROJECTS
· On Guaranteed Smooth Switching For Buffered Crossbar Switches - 2008
· Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case - 2008
· A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers - 2008
· Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks - 2008
· Probabilistic Packet Marking For Large Scale IP Trace Back - 2008
· Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data - 2008
WEB APPLICATION
· Distributed Component Router based Supply Chain Management – SCM
· Distributed Component Router based CRM – Customer Relationship Management
· Project Scrutinizer – Project Tracking System
· E Recruitment System – Dynamic Online Professional Recruitment & Mgt System
· E Career and Consultancy Services
· Professional E Banking System – Online Banking Services
· E Health Care – A Strategic Management System
· E Governance Management Design & Implementation
· ERP Application – Integrated Enterprise Solutions with Strategic Advantages
· Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support
· Dynamic University Linking & Data Integrity Maintenance
· Property Management System, Propertybiz – Design & Build Requirements
· B2C – Application, online Shopping with Cart
· B2B – Application, online Shopping with Cart
· Online Portfolio Manager – Equity Trading & Mutual Funds Management - Stock / Share Trading
· Web based Service Flow Automation
· Materials Management System with Forecasting Implementation
· Ultimate Online Jobsite with Intelli Search Engine
· Online Wedding Tracker, A service Providing Application for a Marriage from A to Z Options
· Online Shopping with Shopping Cart
· Online auction with Featured shopping cart
· Dynamic College Information System & Online Examination
· WEB SERVICES
· Producing and Sharing Regional Weather Forecast Data for e-Science Applications - 2009
· A Load Balance Algorithm for WMS - Web Map Service - 2009
· Web Query Recommendation via Sequential Query Prediction – 2009
KNOWLEDGE AND DATA ENGINEERING
· An Enhanced Data Mining Life Cycle - 2009
· Agent Mining: The Synergy of Agents and Data Mining - 2009
· Bank Lending, Inventory Financing and Trade Credit - 2009
· Partial Chain based GA for Joint Inventory and Delivery Scheduling with Vehicle Rent Way - 2009
· Research on the Adoption of Electronic Commerce based on Customer's Behavior - 2009
· Student Model in Adaptive Learning System based on Semantic Web - 2009
· The Application of Google Earth Education - 2009
· Use of Incomplete Timestamp Records for Hospital Simulation Analysis - 2009
· A Relation-Based Page Rank Algorithm for Semantic Web Search Engines - 2009
· Hardware enhanced association rule mining with Hashing and Pipelining – 2008
· Efficient Approximate Query Processing in Peer-to-Peer Networks - 2007
· E-Secure Transactions - Secure Electronic Data Interchange over Internet – 2005 - INTERNET COMPUTING
· Schema Conversion from Relation to XML with Semantic Constraints - FUZZY SYSTEMS 2007
PARALLEL AND DISTRIBUTED SYSTEMS
· Privacy-Aware Collaborative Spam Filtering - 2009
· Quiver on the Edge Consistent Scalable Edge Services - 2008
· Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks - 2008
· OCGRR A New Scheduling Algorithm for Differentiated Services Network - 2008
· HBA Distributed Metadata Management for Large Cluster-Based Storage Systems – 2008
· An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
· pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
DEPENDABLE AND SECURE COMPUTING
· Trustworthy Computing Under Resource Constraints with The Down Policy - 2008
· Credit Card Fraud Detection Using Hidden Markov Models - 2008
· Temporal Portioning of Communication Resources in an Integrated Architecture - 2008
CRYPTO SYSTEMS
· An Implementation of the Blowfish Cryptosystem - 2009
· An Advanced Timing Attack Scheme on RSA - 2009
· SSL/TLS with Quantum Cryptography - 2009
· An Advanced Timing Attack Scheme on RSA - 2009
· A Study on Rijndael for Providing Confidentiality to Mobile Devices – 2009
· Secure Identification Documents via Pattern Recognition and Public-Key Cryptography – 2009
· A New Model for Secure Dissemination of XML Content – 2008
· Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies - 2008
· Estimation of Defects Based on Defect Decay Model ED3M – 2008
· Quantum Cryptographic Key Distribution Protocols
IMAGE PROCESSING PROJECTS
· A Combinational Solution for Model-based Image Segmentation and Real-Time Tracking - 2009
· Automatic ASCII Art Conversion of Binary Images using Non-Negative Constraints - 2009
· Efficient Recognition of Highly Similar 3D Objects in Range Images - 2009
· Fusion of Multispectral and Panchromatic Images using a Restoration based Method - 2009
· Image Transformations and Blurring - 2009
· Texture Image Segmentation using Spectral Histogram and Skeleton Extracting - 2009
· Using Language to Learn Structured Appearance Models for Image Annotation - 2009
· Efficient 2-D Grayscale Morphological Transformations with Arbitrary Flat Structuring Element - 2008
· Vision Based Processing for Real-Time 3-D Data Acquisition Based On Coded Structured Light - 2008
· Active Learning Methods for Interactive Image Retrieval - 2008
INTELLIGENT SYSTEM
· Data-Mining-Enhanced Agents in Dynamic Supply-Chain-Management Environments - 2009
· Fuzzy Control Model Optimization for Behavior-Consistent Traffic Routing Under Information Provision – 2008
SOFTWARE ENGINEERING
· Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies - 2008
· Estimation of Defects Based on Defect Decay Model ED3M – 2008
MULTIMEDIA
· Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach - 2008
· A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video – 2008
· Small and medium enterprises supporting system based on integration of CMS and CRM solutions using .NET framework - 2009
· Mobile Medicine: Providing Drug Related Information through Natural Language Queries via SMS - 2009
· Benefit Based Data Caching in Ad Hoc Networks – 2006
· Watermarking Relational Databases Using Optimization Based Techniques - 2008
· Location-Based Spatial Queries with Data Sharing in Wireless Broadcast Environments - 2008
· On The Computational Complexity and Effectiveness of N-Hub Shortest-Path Routing - 2008
· A Software Defect Report and Tracking System in an Intranet
· E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management
No comments:
Post a Comment