1. Color Image Indexing Using Binay Truncation Coding 2. Software Project Management Information System 3. An Integrated Congestion Management Architecture for Internet Hosts 4. Efficient Frequency Domain Selective Scrambling of Digital Video 5. Intrusion detection in Wireless Sensor Networks using Emotional Ants 6. Foveation Scalable Video Coding 7. Association Rule Hiding 8. Enhanced Elliptic Curve Cryptography and Analysis 9. Proximity Aware DHT-based Load Balancing in Heterogenous P2P Systems 10. Three-Dimensional Object Recognition from Local Scale-Invariant Keypoint Features 11. Online Handwritten Script Recognition 12. Memory Learning Framework for Effective Image Retrieval on Medical images 13. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad-Hoc Networks 14. Focused Crawler Search by Generalized SharkN Algorithm for Web Content Mining 15. Detection and Removal of Cracks in Digitized Paintings 16. Unified Framework for Image Retrieval using Keyword and Visual Features on Medical Images 17. Data Hiding in Binary Image for Authentication and Annotation 18. Noise Reduction by Fuzzy Image Filtering 19. Identification of Humans using Gait 20. Robustness Testing of Java Server Applications 21. Projective Clustering by Histograms 22. Time-Scaled Proxy Server 23. Optimized Distributed Association Rule Mining 24. Maximal Frequent Itemset Mining using Support Vectors 25. Yarn Fabrication Defect Analysis System using Image Processing 26. Fault-Tolerant Distributed Channel Allocation 27. Distributed Content-Based Visual Information Retrieval System on Peer-to-Peer Networks 28. Domain-Based Multiple Description Coding of Images and Video Domain-Based Multiple Description Coding of Images and Video 29. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications 30. High-Performance Motion-based Handwritten Signature Recognition 31. Efficient Phrase-based Document Indexing for Web Document Clustering 32. Efficient Iris Recognition by Characterizing Key Local Variations 33. TCP Vegas-like Algorithm for Layered Multicast Transmission 34. Link Layer Support for Streaming MPEG Video over Wireless Links 35. Privacy Preserving Distributed Mining of Association Rules in Horizontally Partitioned Data 36. A Simulation-based Analysis of Cycle-Time of Cluster Tools in Semiconductor Manufacturing 37. Switching and Traffic Grooming in WDM Networks 38. Personal Identification based on Iris Texture Analysis 39. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile networks 40. Image Transfer Protocol for Internet 41. Modified JPEG Huffman Coding 42. Protocol Scrubbing: Network Security through Transparent Flow Modification 43. GHIC: A Hierarchical Pattern-based Clustering Algorithm for Grouping Web Transactions 44. Unsupervised Multistage Image Classification Using Hierarchical Clustering With a Bayesian Similarity Measure 45. Honey Pots: Intrusion Detection System 46. Blocking Artifacts Suppression 47. Reverse Engineering of Executable Programs 48. Location Based Routing for Mobile Ad-Hoc Networks 49. Efficient authenticated key agreement protocols Efficient Authenticated Key Agreement Protocols Resistant to Denial-of-Service Attacks 50. Scalable Spatio Temporal Query Processing for Location-aware Services 51. Workflow Mining: Discovering Process Models from Event Logs |
Anna University Results November - December 2011 available with your GPA only for Credit System
Anna University Results Nov - Dec 2011
Exam Results 2012
Exam Results 2012 | Inspirational Quotes |
Thursday, July 28, 2011
IEEE Project Topics - CSE
Labels:
IEEE Project Topics
Subscribe to:
Post Comments (Atom)
1 comment:
Great thoughts you got there, believe I may possibly try just some of it throughout my daily life.
Image Processing Company in Chennai
Post a Comment