3
1. Color Image Indexing Using Binay Truncation Coding 2. Software Project Management Information System 3. An Integrated Congestion Management Architecture for Internet Hosts 4. Efficient Frequency Domain Selective Scrambling of Digital Video 5. Intrusion Detection in Wireless Sensor Networks using Emotional Ants 6. Foveation Scalable Video Coding 7. Association Rule Hiding 8. Enhanced Elliptic Curve Cryptography and Analysis 9. Proximity Aware DHT-based Load Balancing in Heterogenous P2P Systems 10. Three-Dimensional Object Recognition from Local Scale-Invariant Keypoint Features 11. Online Handwritten Script Recognition 12. Memory Learning Framework for Effective Image Retrieval on Medical images 13. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad-Hoc Networks 14. Focused Crawler Search by Generalized SharkN Algorithm for Web Content Mining 15. Detection and Removal of Cracks in Digitized Paintings 16. Unified Framework for Image Retrieval using Keyword and Visual Features on Medical Images 17. Data Hiding in Binary Image for Authentication and Annotation 18. Noise Reduction by Fuzzy Image Filtering 19. Identification of Humans using Gait 20. Robustness Testing of Java Server Applications 21. Projective Clustering by Histograms 22. Time-Scaled Proxy Server 23. Optimized Distributed Association Rule Mining 24. Maximal Frequent Itemset Mining using Support Vectors 25. Yarn Fabrication Defect Analysis System using Image Processing 26. Fault-Tolerant Distributed Channel Allocation 27. Distributed Content-Based Visual Information Retrieval System on Peer-to-Peer Networks 28. Domain-Based Multiple Description Coding of Images

New Microsoft Office Word Document

  • Upload
    sanket

  • View
    212

  • Download
    0

Embed Size (px)

DESCRIPTION

gsrg

Citation preview

1. Color Image Indexing Using Binay Truncation Coding2. Software Project ManagementInformation System3. An Integrated Congestion Management Architecture for Internet Hosts4. Efficient Frequency Domain Selective Scrambling of DigitalVideo5. Intrusion Detection inWireless Sensor Networksusing Emotional Ants6. Foveation ScalableVideoCoding7. Association Rule Hiding8. Enhanced Elliptic Curve Cryptography and Analysis9. Proximity Aware DHT-based Load Balancing in Heterogenous P2P Systems10. Three-Dimensional Object Recognition from Local Scale-Invariant Keypoint Features11. Online Handwritten Script Recognition12. Memory Learning Framework for Effective Image Retrieval on Medical images13. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad-Hoc Networks14. Focused Crawler Search by Generalized SharkN Algorithm for Web Content Mining15. Detection and Removal of Cracks in DigitizedPaintings16. Unified Framework for Image Retrieval using Keyword and Visual Features on Medical Images17. Data Hiding in Binary Image for Authentication and Annotation18. Noise Reduction by Fuzzy Image Filtering19. Identification of Humans using Gait20. Robustness Testing of Java Server Applications21. Projective Clustering by Histograms22. Time-Scaled Proxy Server23. Optimized Distributed Association Rule Mining24. Maximal Frequent Itemset Mining using Support Vectors25. Yarn Fabrication Defect Analysis System using Image Processing26. Fault-Tolerant Distributed Channel Allocation27. Distributed Content-Based Visual Information Retrieval System on Peer-to-Peer Networks28. Domain-Based Multiple Description Coding of Images andVideoDomain-Based Multiple Description Coding of Images andVideo29. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications30. High-Performance Motion-based Handwritten Signature Recognition31. Efficient Phrase-based Document Indexing for Web Document Clustering32. Efficient Iris Recognition by Characterizing Key Local Variations33. TCP Vegas-like Algorithm for Layered Multicast Transmission34. Link Layer Support for Streaming MPEGVideoover Wireless Links35. Privacy Preserving Distributed Mining of Association Rules in Horizontally Partitioned Data36. A Simulation-based Analysis of Cycle-Time of Cluster Tools in Semiconductor Manufacturing37. Switching and Traffic Grooming in WDM Networks38. Personal Identification based on Iris Texture Analysis39. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks40. Image Transfer Protocol for Internet41. Modified JPEG Huffman Coding42. Protocol Scrubbing: Network Security through Transparent Flow Modification43. GHIC: A Hierarchical Pattern-based Clustering Algorithm for Grouping Web Transactions44. Unsupervised Multistage Image Classification Using Hierarchical Clustering With a Bayesian Similarity Measure45. Honey Pots: Intrusion Detection System46. Blocking Artifacts Suppression47. Reverse Engineering of Executable Programs48. Location Based Routing for Mobile Ad-Hoc Networks49. Efficient authenticated key agreement protocols Efficient Authenticated Key Agreement Protocols Resistant to Denial-of-Service Attacks50. Scalable Spatio Temporal Query Processing for Location-aware Services51. Workflow Mining: Discovering Process Models from Event Logs

Reference:http://seminarprojects.com/Thread-latest-ieee-projects-topics-for-computer-science-cse-students#ixzz3UfcMU0cE