Sie sind auf Seite 1von 12

1.

A new approach for data encryption using genetic algorithms


Network Security
2.
Authenticated Diffie Hellman key agreement protocol using a single cryptographic a
ssumption
Network Security
2.
3.
Ensembles of jittered association rule classifiers
Network Security
3.
4.
Privacy-preserving user clustering in a social network
Network Security
4.
5.
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data
Network Security
5.
6.
Incremental Clustering in Data Mining using Genetic Algorithm
Artificial Intelligence/Data Mining
6.
7.
Graph-based clustering approaches and their applications
Data Mining
7.
8.
Challenges in Multi-lingual Machine Translation
Natural Language Processing
8.
9.
Intelligent Tutoring Systems
Artificial Intelligence
9.
10.
Combining Breadth-first and Depth-first strategies in searching for tree -width
Artificial Intelligence
10.
11.
Towards Context Aware Emotional Intelligence in Machines
Artificial Intelligence
11.
12.
Knowledge-based Systems in Machine-learning-
Machine Learning & Data Mining
12.
13.
Knowledge-Based Word Sense Disambiguation on Specific Domains
Natural Language Processing
13.
14.
Data deduplication in linux file system
Operating system
14.
15.
Maximizing the Lifetime of Wireless Sensor Networks
Mobile computing
15.
16.
Optimize Storage Placement in Sensor Networks
Mobile computing
16.
17.
Clustering Algorithm in Wireless Sensor Networks
Mobile computing
17.
18.
Data aggregation in wireless sensor networks
Mobile computing
18.
19.
Fault Diagnosis of Marine Engine Cooling System Based on Artificial Neural Netwo
rk
Data Mining
19.
20.
A Vision-Based Approach for Deep Web Data Extraction
Data Mining
20.
21.
Visual Human+Machine Learning
Data Mining
21.
22.
Model Building Methodologies Utilizing Artificial Neural Network (ANN) for Perfo
rmance of Project Planning, Implementation and Controlling Processes
Data Mining
22.
23.
Content based Zero-Watermarking Algorithm for Authentication of Text Documents
Database Security
23.
24.
multimodal fusion technique
Image Processing and AI
24.
25.
gesture recognition
Image Processing and ANN
25.
26.
image processing modeling
Image Processing and AI
26.
27.
context search engine
machine learning and AI
27.
28.
multiparameter optimization
machine learning and AI
28.
29.
New Operating modes for Bluetooth networks in Distributed process control system
s
Operating system
29.
30.
The clouds distributed operating systems
Operating system
30.
31.
Service modeling in distributed operating systems
Operating system
31.
32.
Distributed systems for heterogeneous systems
Operating system
32.
33.
Service oriented operating system
Operating system
33.
34.
A Probabilistic Self-Organising Map for Facial Recognition
Face Recognition
34.
35.
Face Recognition using Self-Organising Map
Face Recognition
35.
36.
Face Recognition using PCA versus ICA versus LDA cascaded with the neural Classi
fier of Concurrent Self-Organising Map
Face Recognition
36.
37.
Face Recognition using Self-Organising Map and Principal Component Analysis
Face Recognition
37.
38.
Face Recognition - A Convolutional Neural Network Approach
Face Recognition
38.
39.
Cloud computing: A new business paradigm for biomedical information sharing
Cloud computing
39.
40.
Cloud computing and emerging IT platforms: Vision, hype, and reality for deliver
ing computing as the 5th utility
Cloud computing
40.
41.
The I-Cluster Cloud: distributed management
of idle resources for intense computing
Cloud computing
41.
42.
Toward dynamic and attribute based publication, discovery and selection for clou
d computing
Cloud computing
42.
43.
Computing the maximum similarity bi-clusters of gene expression data
BioInformatics
43.
44.
Topology search over Biological Databases
BioInformatics and DB
44.
45.
An Internet-Based Interactive Embedded Data-Acquisition System for Real-Time App
lications
Operating system
45.
46.
Enhancing File Data Security in Linux Operating System by Integrating Secure Fil
e System
Operating system
46.
47.
An Optimum Multilevel CPU Scheduling Algorithm
Operating system
47.
48.
Effect of Context Aware Scheduler on TLB
Operating system
48.
49.
Implementing data security in Grid environment
Grid Computing
49.
50.
Energy Efficient Transport Protocol for Wireless Sensor Networks
Wireless Sensor Networks
50.
51.
Reliable Transport with Memory Consideration in WSNs
Wireless Sensor Networks
51.
52.
RMST: Reliable Data Transport in Sensor Networks
Wireless Sensor Networks
52.
53.
End-to-end reliability in wireless sensor networks: survey and research challeng
es
Wireless Sensor Network
53.
54.
A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Net
works
Wireless Sensor Networks
54.
55.
Dimensionality Reduction using SOM based Technique for Face Recognition
Face Recognition
55.
56.
Face Recognition using Neural Networks
Face Recognition
56.
57.
A VQ-Based fast Face Recognition Algorithm using Optimized Codebook
Face Recognition
57.
58.
An Efficient Fusion Based Classifier(Face Recognition)
Face Recognition
58.
59.
Face Recognition using PCA versus ICA versus LDA cascaded with the neural Classi
fier of concurrent SOM.
Face Recognition
59.
60.
Self Organising Map
Face Recognition
60.
61.
Application of Swarm Intelligence in Data Mining
Algorithms
61.
62.
Ant colony optimization Algorithms
Algorithms
62.
63.
Swarm Intelligence and Traffic Safety
Algorithms
63.
64.
Near Field Communication
Wireless Sensor Networks
64.
65.
Privacy Preserving datamining
Datamining
65.
66.
Moving Object detection
66.
67.
Audio steganography
Security
67.
68.
object detection system

68.
69.
Face and Iris based recognition system
Image Processing
69.
70.
AI based protein structure prediction
AI
70.
71.
Segmentation of Tracking Sequences Using Dynamically Updated Adaptive Learning
Image Processing
71.
72.
Detection and Segmentation of Concealed Objects in Terahertz Images
Image Processing
72.
73.
Development of Fuzzy-Based Bus Rear-End Collision Warning Thresholds Using a Dr
iving Simulator
Image Processing
73.
74.
Moving Object detection
Image Processing
74.
75.
The Application of Artificial Intelligence in Mobile Learning
Artificial Intelligence
75.
76.
Enhanced automated intrusion prevention in network security
Network Security
76.
77.
4G firewall
Network Security
77.
78.
Network security for wireless networks
Network Security
78.
79.
A Java Virtual Machine for Smart Sensors and Actuators
java technology and AI
79.
80.
Elliptic Curve Cryptography in resource Constrained Environment
Information Security
80.
81.
Text Cryptography
Information Security
81.
82.
Combining MMS with Elliptic Curve Cryptography
Information Security
82.
83.
Combining Elliptic Curve Cryptography with digital watermarking for OWL document
s
Information Security
83.
84.
Hyper Elliptic Curve Cryptography
Information Security
84.
85.
Potential use of Artificial Neural Network in Data Mining
Database and datamining
85.
86.
Script Recognition
Database and datamining
86.
87.
A New Software Approach to defend against Cache-based Timing Attacks
Database and datamining
87.
88.
Software Radio Attacks and Zero-Power Defenses
Database and datamining
88.
89.
H/w Monitoring Sysytem for Embedded System Security
Embedded Security
89.
90.
Embedded IPSec
Embedded Security
90.
91.
Cube3 Model for Data Mining:Web Based Approach
Data Mining
91.
92.
AN EFFICIENT INTRUSION DETECTION MODEL BASED ON FAST INDUCTIVE LEARNING
Information Security
92.
93.
Digital Governance and Hotspot Geo Informatics Software - Prioritization
Geo Informatics
93.
94.
Mining System for Community Finding and Centrality of Virtual User Network on th
e Internet
Data Mining
94.
95.
A Survey and Comparison of Various Routing Protocols of Wireless Sensor Network
(WSN) and a Proposed New TTDD Protocol Based on LEACH
WSN Security
95.
96.
Simulating AODV and DSDV For A dynamic Wireless Sensor Networks
WSN Security
96.
97.
Performance Comparison and Analysis of DSDV and AODV for MANET
WSN Security
97.
98.
Performance Evaluation of Modified AODV for Load Balancing
WSN Security
98.
99.
Online Banking and Modem Approaches Toward its Enhanced Security
WSN Security
99.
100.
T-PIM Trusted Password Input Method against Data Stealing Malware for an Online
Banking System
WSN Security
101.
The Use of Attack and Protection Trees to Analyze Security for an Online Bankin
g System
WSN Security

102.
Towards Secure Information Systems in Online Banking
WSN Security

103.
Security Scheme for Online Banking Based on Secret Key Encryption
WSN Security

104.
Design and Implementation of Anti-Screenshot Virtual Keyboard Applied in Online
Banking
WSN Security

105.
A Secure Crypto-Biometric Verfication Protocol.
Biometric Technology

106.
Personal Authentication System Using Fingerprint With Digital Signature Technolo
gies.
Biometric Technology

107.
ON-Line Signature Verfication System Using Multi-Template Matching Approaches.
Biometric Technology

108.
Locomotive Security System Using Biometric Authentication.
Biometric Technology

109.
Design & Implementaion of Voice Recognition System (VRS) Using Biometric Techn
ology
Biometric Technology

110.
Off-line Handwritten Signature Verification using Artificial Neural Network Clas
sifier
Artificial Neural Network

111.
Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated
System
Using Recurrent Neural Network
Artificial Neural Network
112.
Improved Offline Signature Verification Scheme Using Feature Point Extraction Me
thod
Artificial Neural Network

113.
Off Signature Verification and Identification using Distance statistics
Artificial Neural Network

114.
Signature Recognition and Verification with ANN
Artificial Neural Network

115.
Novel feature extraction technique for Off-line Signature Verification system
Artificial Neural Network

116.
Clustering of streaming data.
Data Mining

117.
Data stream
Data Mining

118.
Stream mining
Data Mining

119.
Kernel density estimation
Data Mining

120.
A resource aware kernel density estimation
Data Mining

121.
Real-Time Analysis of Physiological Data to Support Medical Applications
Data Mining

122.
Mining Based Decision Support Multi-agent System for Personalized e-Healthcare S
ervice
Data Mining

123.
Hierarchical Clustering of Time Series Data Streams
Data Mining

124.
Intelligent Mobile Health Monitoring System (IMHMS)
Data Mining

125.
RULE BASED CLASSIFICATION OF ISCHEMIC ECG BEATS USING ANTMINER
Data Mining

126.
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Net
works
Wireless Communication

127.
MAC-SCC: a medium access control protocol with separate control channel for reco
nfigurable multi-hop wireless networks
Wireless Communication

128.
Performance measurement and analysis of ZRP for MANETs using network simulator-Q
ualNet
Wireless Communication

129.
Comparative assessment of WiMAX scheduler in fixed and mobile WiMAX networks for
VoIP using QualNet
Wireless Communication

130.
The simulation model of Multicast and Broadcast Service in the Mobile WiMAX for
Qualnet
Wireless Communication

131.
Natural Language Computing
NLP

132.
Dependence Language Model for Information Retrieval
Information Retrieval

133.
Language Translation
NLP

134.
Compiler Technology for Scalable Architectures
Compilers

135.
Computing machinery and intelligence
AI

136.
Efficient use of Artificial Neural Network in WSN.
WSN.

137.
Google MAPS API used for traffic control System
traffic control System

138.
A Role of WSN in Precision Farming.
WSN.

139.
Android 2.23
OS

140.
Text Watermarking
SEcurity

141.
Text Mining in Bioinformatics
Bioinformatics

142.
Web mining
Database

143.
A 3D collaborative virtual environment for web browsing
Visualization

144.
3 dimensional visualization of www
Visualization

145.
Visualizing the structure of www in 3D hyperbolic space
Visualization

146.
Visualizing www search engine results
Visualization

147.
Performance optimization in wireless sensor network using Buffer management
WSN

148.
Buffer management in wireless sensor networks
WSN

149.
Congestion detection avoidance techniques in Wireless Sensor Networks
WSN

150.
Vehicular Network Management
Network Management

151.
Root cause analysis of congestion in WSN
WSN Wireless Sensor Networks

Das könnte Ihnen auch gefallen