SR.NO. | TITLE | DOWNLOAD |
1 |
Design SMS Spamming Detection System
| Download Here |
2 |
Novel Techniques To Safeguard Privacy And Security On Mobile Devices Through Optimal Algorithms
| Download Here |
3 |
IMPLEMENTATION OF EXTENTED APPROACH OF VISUAL SECRET SHARING FOR DIGITAL IMAGES | Download Here |
4 |
Enhance Path Planning Algorithm And Energy Efficient Data Transmission Using Mobile Anchor nodes In Wireless Sensor Networks | Download Here |
5 |
“MINING OF TEXT DATA FRAMEWORK BY THE USE OF SIDE INFORMATION”
| Download Here |
6 |
MANET: Low Transmission Power can be raised by using mobility | Download Here |
7 |
EFFICIENT DATA EXTRACTION USING ARTIFICIAL INTELLIGENCE | Download Here |
8 |
Result: Design and deployment of secure sharing protocol using TTP via cloud computing | Download Here |
9 |
Fingerprint compression based on RADON transform
| Download Here |
10 |
RATIONAL DITHER MODULATION ON COMPRESSED
AND ENCRYPTED JPEG2000 IMAGES | Download Here |
11 |
Implementation Of REA(Reveres Encryption Algorithm) | Download Here |
12 |
Design of Split Radix Fast Fourier Transform
| Download Here |
13 |
Simulation Based performance analysis in wireless network
| Download Here |
14 |
DESIGN AND IMPROVE THE EFFICIENCY OF RADIAL TURBINE
| Download Here |
15 |
Hardware realization of AXI Master & Slave (point to point) | Download Here |
16 |
ROBUST DWT-BASED AUDIO WATERMARKING IN DETAIL COEFFICIENT | Download Here |
17 |
Content-based Image Retrieval from Videos using Self Learning Objet Dictionary
| Download Here |
18 |
MODIFICATION OF DRILLING TOOL TO MAKE SQUARE HOLE | Download Here |
19 |
DATA SECURITY IN CLOUD COMPUTING | Download Here |
20 |
LS-SVM based algorithm for the identification and delineation of QRS complexes in 12 lead ECG using Entropy as a feature
| Download Here |
21 |
A SYSTEM BASED ON MULTIVARIATE CORRELATION ANALYSIS
FOR DENIAL-OF-SERVICE ATTACK DETECTION
| Download Here |
22 |
Survey on decoding algorithm on belief propagation
| Download Here |
23 |
AUTONOMOUS LANDING SYSTEM USING IMAGE PROCESSING | Download Here |
24 |
XML QUERY- ANSWERING SUPPORT USING RSS FEEDS | Download Here |
25 |
Evaluation of Bit Error Rate Performance of Reed Muller Block Coded System | Download Here |
26 |
“EXEMPLAR BASED POSE CORRECTION METHOD FOR MICROSOFT KINECT BASED SYSTEM” | Download Here |
27 |
Gateway to the Cloud | Download Here |
28 |
Implementation of Clustering And Preprocessing For Web Log Mining | Download Here |
29 |
Data security for android devices by using hybrid encryption | Download Here |
30 |
Password Protected Anti Theft Control System | Download Here |
31 |
MULTIPLE OBJECTS IN VIDEO SEQUENCES: SEGMENTATION AND TRACKING | Download Here |
32 |
Analytical Study of Frequent Itemset and Utility Mining Approaches
| Download Here |
33 |
Trajectory Based Damping of Electromechanical Oscillations
| Download Here |
34 |
Methodology Of Multi Factor Authentication Scheme
| Download Here |