acc. year acc. no. title report.pdf2014 - 2018 se 3 multimodal biometrics for mobile application...
TRANSCRIPT
Acc. Year Acc. No. Title
2015 - 2019 SE 1 INTERPLANETARY FILE SYSTEM
2015 - 2019 SE 2 SMARTQUILL
2015 - 2019 SE 3 SERVERLESS ARCHITECHTURE
2015 - 2019 SE 4
2015 - 2019 SE 5 IMAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS
2015 - 2019 SE 6 GENERATIVE ADVERSARIAL NETWORKS
2015 - 2019 SE 7 PALM VEIN TECHNOLOGY
2015 - 2019 SE 8 BLOCKSTACK
2015 - 2019 SE 9 DNA COMPUTING
2015 - 2019 SE 10
2015 - 2019 SE 11 NAO ROBOT
2015 - 2019 SE 12 NEURO ROBOT
2015 - 2019 SE 13 OPEN SOURCE INTELLIGENCE
2015 - 2019 SE 14 QUANTUM COMPUTING
2015 - 2019 SE 15 CRYPTOCURRENCY
2015 - 2019 SE 16 DEEP LEARNING
2015 - 2019 SE 17 DARK WEB
2015 - 2019 SE 18 BRAIN COMPUTER INTERFACE
2015 - 2019 SE 19BLOCKCHAIN TECHNOLOGIES: THE FORESEEABLE IMPACT ON SOCIETY AND INDUSTRY
2015 - 2019 SE 20 IOT BASED WATER MANAGEMENT SYSTEM
2015 - 2019 SE 21
2014 - 2018 SE 1 FOG COMPUTING FOR THE INTERNET OF THINGS: SECURITY AND PRIVACY ISSUES
2014 - 2018 SE 2 LOW POWER WIDE AREA NETWORK
2014 - 2018 SE 3 MULTIMODAL BIOMETRICS FOR MOBILE APPLICATION SECURITY
2014 - 2018 SE 4
2014 - 2018 SE 5 MOBILE PHONE JAMMER
2014 - 2018 SE 6
2014 - 2018 SE 7 IOT BASED ENERGY AWARE SMART HOME CONTROL SYSTEM
2014 - 2018 SE 8 PREDICTIVE MODELLING TECHINQUES
2014 - 2018 SE 9DDOS ATTACKS IN CLOUD COMPUTING : ISSUES, TAXONOMY, AND FUTURE DIRECTIONS
2014 - 2018 SE 10 HYPERLOOP
2014 - 2018 SE 11 DEEP LEARNING AND IT’S APPLICATION ON SILENT SOUND TECHNOLOGY
2014 - 2018 SE 12
2014 - 2018 SE 13 RED – BLACK CRYPTOGRAPHY
2014 - 2018 SE 14
2014 - 2018 SE 15 SMART ATM SECURITY USING FPR, GSM, GPS
2014 - 2018 SE 16 INTERNET OF THINGS FOR SMART CITIES
2014 - 2018 SE 17 SOCIAL NETWORK FORENSICS THE WHAT, THE WHY AND HOW.
2014 - 2018 SE 18 VEHICULAR AUTOMATION
2014 - 2018 SE 19 GLOBAL POSITIONING SYSTEM
2014 - 2018 SE 20
2013 - 2017 SE 1 INTERNET OF THINGS IN ECOMMERCE
2013 - 2017 SE 2 ARTIFICIAL NEURAL NETWORKS AND LEARNING SYSTEMS
2013 - 2017 SE 3 DATA ANALYTICS IN SMART HEALTHCARE SERVICES
2013 - 2017 SE 4 BIO-INSPIRED COMPUING
2013 - 2017 SE 5 BIG DATA IN HEALTH CARE ISSUES
2013 - 2017 SE 6 CYBER SECURITY IN SMART GRID
2013 - 2017 SE 7 INTERNET OF THINGS-SECURITY ISSUES CHALLENGES AND SOLUTIONS
2013 - 2017 SE 8 INTERNET OF THINGS QUALITY ISSUES AND SOLUTIONS
2013 - 2017 SE 9OPENSESAME: UNLOCKING SMARTPHONES THROUGH HANDWAVING BIOMETRICS
2013 - 2017 SE 10 BIG DATA – A GROWING TORRENT
2013 - 2017 SE 11 DNA COMPUTING
2013 - 2017 SE 12 ARCHITECTURE FOR BIG DATA TRANSPORTATION
2013 - 2017 SE 13VIRTUAL REALITY ENVIRONMENT & TOOLS FOR EMERGENCY EVACUATION APPLICATION
2013 - 2017 SE 14 INTEGRATION OF INTERNET OF THINGS AND CLOUD COMPUTING
2013 - 2017 SE 15 SECURITY AND PRIVACY CHALLENGES IN INTERNET OF THINGS
2013 - 2017 SE 16 DATA MINING TECHNIQUES IN SOCIAL MEDIA
2013 - 2017 SE 17 HAPTIC TECHNOLOGY IN GAMES
2013 - 2017 SE 18 ARTIFICIAL INTELLIGENCE IN SERVICE ORIENTED SOFTWARE DESIGN
2013 - 2017 SE 19 TRANSFER LEARNING USING COMPUTATIONAL INTELLIGENCE
2013 - 2017 SE 20 BLUETOOTH LOW ENERGY 4.0
2013 - 2017 SE 21 SUPPLY CHAIN MANAGEMENT USING BIG DATA ANALYTICS
2013 - 2017 SE 22 GREEN COMPUTING
2013 - 2017 SE 23 OPEN CLOUD CONNECT ARCHITECTURE
2013 - 2017 SE 24 CLOUD ENABLED DATA ANALYTICS
2013 - 2017 SE 25DETECTING CONCURRENCY BUGS FROM THE PERSPECTIVE OF SYNCHRONIZATION
INTENTION
2012-2016 SE 1 VISIBLE LIGHT COMMUNICATION USING SUSTAINABLE LED LIGHTS
2012-2016 SE 2 DATA MINING WITH BIG DATA
2012-2016 SE 3 REUSE-BASED METHODOLOGY IN DEVELOPING SYSTEM-ON-CHIP(SOC)
2012-2016 SE 4TOWARDS FAST OS REJUVENATION: AN EXPERIMENTAL EVALUATION OF FAST OS REBOOT
TECHNIQUES
2012-2016 SE 5 IDENTITY BASED CRYPTOGRAPHY
2012-2016 SE 6 FOG COMPUTING PARADIGM : APPLICATIONS AND SECURITY ISSUES
2012-2016 SE 7 FORENSICS READINESS FOR WIRELESS BODY AREA NETWORK (WBAN) SYSTEM
2012-2016 SE 8 FAULT TOLERANCE OF REAL TIME OPERATING SYSTEMS
2012-2016 SE 9SET TOP BOX SYSTEM WITH ANDROID SUPPORT USING EMBEDDED LINUX OPERATING
SYSTEM
2012-2016 SE 10 POWER MANAGEMENT IN CLOUD USING GREEN COMPUTING
2012-2016 SE 11INTER-CARS SAFETY COMMUNICATION SYSTEM BASED ON ANDROID SMARTPHONE
2012-2016 SE 12 VHDL ENVIRONMENT FOR SMART VENDING MACHINE
2012-2016 SE 13 EFFICIENT ALGORITHM FOR DESTABILIZATION OF TERRORIST NETWORKS
2012-2016 SE 14 ENERGY EFFICIENT GREEN CLOUD COMPUTING
2012-2016 SE 15 SOFTBIOMETRICS: HUMAN IDENTIFICATION USING COMPARATIVE DESCRIPTIONS
2012-2016 SE 16 SERVICE MODELS AND USE OF CRYPTOGRAPHY IN CLOUD COMPUTING
2012-2016 SE 17 DATA ACQUISITION USING SRSS AND MANAGEMENT OF SENSORS IN IOT
2012-2016 SE 18 ONLINE TRAFFIC PREDICTION IN CLOUD: A DYNAMIC WINDOW APPROACH
2012-2016 SE 19 NETWORK IN IOT
2012-2016 SE 20 NETWORK SECURITY FOR SMART MOBLIE ECOSYSTEM
2012-2016 SE 21 CLOUD COMPUTING IN INTERNET OF THINGS
2012-2016 SE 22 SELF-RECONFIGURABLE SMART CAMERA NETWORK
2012-2016 SE 23NETWORK ARCHITECTURE FOR MITIGATING SECURITY ISSUES IN A CAMPUS AREA
NETWORK
2012-2016 SE 24 INCONSISTENCIES IN BIG DATA
2012-2016 SE 25MONITORING PHYSIOLOGICAL PARAMETERS OF PATIENTS WITH CHRONIC DISEASES AN
APPLICATION OF CELL BASED SENSOR NETWORK
2012-2016 SE 26 INTERNET OF INTELLIGENT THINGS
2012-2016 SE 27A NOVEL APPROACH TO HUMAN COMPUTER INTERFACE BASED ON EYE MOVEMENTS
2012-2016 SE 28 MESH BASED WIRELESS NETWORK-ON-CHIP SYSTEM
2012-2016 SE 29 SYSTEM OPTIMIZATION USING SYSTEM ON CHIP
2012-2016 SE 30 SMART GRID TECHNOLOGY
2012-2016 SE 31 SECURITY IN INTERNET OF THINGS
2012-2016 SE 32MULTIMODAL SOFT BIOMETRIC AUTHENTICATION USING HAND SHAPE AND HANDWRITING
MOTION IN THE AIR
2012-2016 SE 33 SOFTBIOMETRICS: HUMAN IDENTIFICATION USING COMPARATIVE DESCRIPTIONS
2012-2016 SE 34 BITCOIN: BENEFIT OR CURSE
2012-2016 SE 35 MOBILITY MANAGEMENT IN INTERNET OF THINGS
2012-2016 SE 36 LOW POWER ENCODING SCHEME IN NOCS
2012-2016 SE 37 MOBILE CLOUD COMPUTING SECURITY THREATS
2012-2016 SE 38 ENHANCED TFTP MECHANISM FOR FAST AND SECURE FILE TRANSFER
2012-2016 SE 39PEER-TO-PEER COMMUNICATION TECHNOLOGY RESEARCH BASED ON INTERNET OF THINGS
2012-2016 SE 40 FRAMEWORK FOR ENERGY SAVING IN THE ANDROID SMARTPHONE
2012-2016 SE 41 ENERGY EFFICIENT HUMAN INTERACTION IN SMARTPHONES
2012-2016 SE 42ENABLING SECURE COMMUNICATION OVER EXISTING PEER –TO –PEER FRAREWORKS
2011-2015 SE 1THE FUTURE OF BODY CENTRIC COMMUNICATIONS ANTENNAS, PROPAGATION AND
COGNITION
2011-2015 SE 2 NEAR FIELD COMMUNICATION
2011-2015 SE 3SOLUTION FOR MITIGATING PERSISTENT PACKET REORDERING ATTACK IN WIRELESS AD
HOC NETWORK
2011-2015 SE 4 AMBIENT BACKSCATTER HARVESTING POWER FROM THIN AIR
2011-2015 SE 5SMART ENERGY MANAGEMENT SYSTEM FOR REDUCING POWER CONSUMPTION USING
ZIGBEE WIRELESS COMMUNICATION
2011-2015 SE 6 FEMTOCELL
2011-2015 SE 7 4G TELECOMMUNICATION
2011-2015 SE 8 BLUE BRAIN
2011-2015 SE 9 OTCAD
2011-2015 SE 10 ANDROID MALWARE DETECTION METHODOLOGIES
2011-2015 SE 11
2011-2015 SE 12 VIRTUAL REALITY SIMULATOR FOR ADVANCED CARDIAC LIFE SUPPORT TRAINING
2011-2015 SE 13 DISTRIBUTED FIREWALLS – A COMPARATIVE STUDY
2011-2015 SE 14 WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES
2011-2015 SE 15ADVANCED BORDER INTRUSION DETECTION USING WIRELESS INTEGRATED NETWORK
SENSOR TECHNOLOGY
2011-2015 SE 16 BIG DATA TECHNOLOGYTRENDS, CHALLENGES AND OPPORTUNITIES
2011-2015 SE 17 DATA MINING TECHNIQUES USED FOR ACTIVITY RECOGNITION
2011-2015 SE 18TEXT AND FILE ENCRYPTION APPLICATION FOR BLACKBERRY USING CIPHER FEEDBACK 8-BIT
MODE
2011-2015 SE 19 GPS AND ETHERNET BASED REAL TIME TRAIN TRACKING SYSTEM
2011-2015 SE 20 PROJECT LOON
2011-2015 SE 21 AUGMENTED REALITY
2011-2015 SE 22 GPS BASED VEHICLE SURVEILLANCE AND PROTECTION
2011-2015 SE 23 PHYSICAL ACTIVITY MONITORING USING WIMS
2011-2015 SE 24 GREENDROID: DIAGNOSIS OF INEFFICIENCY FOR SMARTPHONE APPLICATION
2011-2015 SE 25REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE
ENCRYPTION
2011-2015 SE 26 MODELING AND RESTRAINING OF MOBILE VIRUS PROPAGATION
2011-2015 SE 27 ONLINE SOCIAL NETWORKS THREATS AND SOLUTIONS
2011-2015 SE 28 ARM PROCESSORS FOR EMBEDDED LOW POWER APPLICATIONS
2011-2015 SE 29 REVIEW OF SECURITY ISSUES IN INDUSTRIAL NETWORKS
2011-2015 SE 30 METADATA CACHE MANAGEMENT ON DISTRIBUTED FILE SYSTEM
2011-2015 SE 31WICARD: A CONTEXT AWARE WEARABLE WIRELESS SENSOR FOR CARDIAC MONITORING
2011-2015 SE 32 SIXTH SENSE TECHNOLOGY
2011-2015 SE 33FAVED BIOMETRICS! TELL ME WHICH IMAGE YOU LIKE AND I’LL TELL WHO YOU ARE
2011-2015 SE 34 GOOGLE GLASS
2011-2015 SE 35A READ-WRITE AWARE DRAM SCHEDULING FOR POWER REDUCTION IN MULTI-CORE
SYSTEMS
2011-2015 SE 36 LONG TERM EVOLUTION - ADVANCED
2011-2015 SE 37 LI-FI TECHNOLOGY
2011-2015 SE 38 RAILWAY PLATFORM MONITORING USING VISION BASED MONITORING SYSTEM
2011-2015 SE 39 VIRTUALIZATION AND PERFORMANCE ANALYSIS OF OPERATING SYSTEMS
2011-2015 SE 40 ADVANCED APPROACHES FOR SOFTWARE COST ESTIMATION
2011-2015 SE 41 DEFEATING SQL INJECTION
2011-2015 SE 42 BRAIN FINGERPRINTING
2011-2015 SE 43 CLOUD OFFLOADING – ILLUSTRATED WITH OPTICAL CHARACTER RECOGNITION
2011-2015 SE 44 INTELLIGENT TRAFFIC MANAGEMENT USING VANET
2011-2015 SE 45 GEOCAPTCHA
2011-2015 SE 46 DATA MINING FOR HEALTHCARE MANAGEMENT
2011-2015 SE 47 3D PRINTING TECHNOLOGY
2011-2015 SE 48PORTABLE CAMERA-BASED ASSISTIVE TEXT AND PRODUCT LABEL READING FROM HAND-
HELD OBJECTS FOR BLIND PERSONS
2011-2015 SE 49NICE:NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL
NETWORK SYSTEMS
2011-2015 SE 50 TECHNIQUES FOR CODE REUSE IN SOFTWARE PROJECTS
2011-2015 SE 51 GOOGLE CONTACT LENS
2011-2015 SE 52 LEAP MOTION
2011-2015 SE 53 CLOUD COMPUTING
2010-2014 SE 1 SMS ENCRYPTION
2010-2014 SE 2 CLOUD COMPUTING LEARNING
2010-2014 SE 3 A KEYLESS APPROACH TO IMAGE ENCRYPTION
2010-2014 SE 4 BUFFER OVERFLOW EXPLOITS AND DEFENSIVE TECHNIQUES
2010-2014 SE 5FACE-NAME GRAPH MATCHING FOR MOVIE
CHARACTER IDENTIFICATION
2010-2014 SE 6 CLOUD COMPUTING RESEARCH AND DEVELOPMENT TREND
2010-2014 SE 7BROWSER GUARD:A BEHAVIOR BASED SOLUTION TO
DRIVE-BY-DOWNLOAD ATTACKS
2010-2014 SE 8 A SECURE CLOUD COMPUTING
2010-2014 SE 9 OPTICAL WIRELESS COMMUNICATION FOR REAL TIME SWIMMERS FEEDBACK
2010-2014 SE 10DOCUMENT CLUSTERING FOR FORENSIC ANALYSIS: AN APPROACH
FOR IMPROVING COMPUTER INSPECTION
2010-2014 SE 11CURRENT BENEFITS AND FUTURE DIRECTIONS OF NFC
SERVICES
2010-2014 SE 12SECURE OVERLAY CLOUD STORAGE WITH ACCESS CONTROL
AND FILE ASSURED DELETION
2010-2014 SE 13
A NEW FINGER TOUCH DETECTION ALGORITHM AND PROTOTYPE SYSTEM ARCHITECTURE
FOR
PERVASIVE BARE-HAND HUMAN COMPUTER INTERACTION
2010-2014 SE 14PATH PLANNING ALGORITHM FOR MOBILE ANCHOR-BASED
LOCALIZATION IN WIRELESS SENSOR NETWORKS
2010-2014 SE 15 EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS
2010-2014 SE 16SECURING UNDERWATER WIRELESS COMMUNICATION
NETWORK
2010-2014 SE 17DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC
AUTHENTICATON SYSTEM
2010-2014 SE 18 IMPROVING ATM SECURITY VIA FACE RECOGNITION
2010-2014 SE 19 MOBILE MALWARE IN THE WILD
2010-2014 SE 20 A SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE
2010-2014 SE 21 HOST-TO-HOST CONGESTION CONTROL FOR TCP
2010-2014 SE 22 PROPOSAL AND DEMONSTRATION OF OPTICAL WIRELESS
2010-2014 SE 23 YET ANOTHER SIMPLE PROCESSOR (YASP)
2010-2014 SE 24WIFI NETWORK INFORMATION SECURITY ANALYSIS
RESEARCH
2010-2014 SE 25DESIGNING AND IMPLEMENTING OF EARLIEST DEADLINE
FIRST SCHEDULING ALGORITHM ON STANDARD LINUX
2010-2014 SE 26 OPTICAL LAYER SECURITY IN FIBER OPTIC NETWORK
2010-2014 SE 27DESIGN OF USER SPECIFIC INTELLIGENT
CELL PHONE JAMMER
2010-2014 SE 28 CONTENT-CENTRIC NETWORKING
2010-2014 SE 29MIGRATE OR NOT? EXPLOITING DYNAMIC TASK
MIGRATION IN MOBILE CLOUD COMPUTING SYSTEM
2010-2014 SE 30LIFEMAP: A SMARTPHONE-
BASED CONTEXT PROVIDER FOR LOCATION-BASED SYSTEM.
2010-2014 SE 31TOWARDS A MOBILE SERVICE FOR HARD OF HEARING PEOPLE TO MAKE INFORMATION
ACCESSIBLE ANYWHERE
2010-2014 SE 32TRUSTBOX: SECURITY ARCHITECTURE FOR PREVENTING
DATA BREACHES
2010-2014 SE 33 AN EFFECTIVE METHOD FOR DEFENSE AGAINST IP SPOOFING ATTACK
2010-2014 SE 34LOCKING AND UNLOCKING OF THEFT VEHICLES USING
CAN
2010-2014 SE 35 FUTURE MEMORY AND INTERCONNECT TECHNOLOGIES
2010-2014 SE 36 THREE DIMENSIONAL OBJECT USED FOR DATA SECURITY
2010-2014 SE 37 REMOTE DISPLAY SOLUTIONS FOR MOBILE CLOUD COMPUTING
2010-2014 SE 38 CSE – CONTROLLED CATEGORY SEARCH ENGINE
2010-2014 SE 39PRIVACY AND INTEGRITY PRESERVING IN SENSOR
NETWORKS
2010-2014 SE 40INTENT SEARCH: CAPTURING USER INTENTION FOR ONE
CLICK INTERNET IMAGE SEARCH
2010-2014 SE 41CLUMSY FLOW CONTROL FOR HIGH-THROUGHPUT
BUFFERLESS ON-CHIP NETWORKS
2010-2014 SE 42 DDOS: ANALYSIS AND DEFENSIVE MECHANISMS
2010-2014 SE 43 FACE RECOGNITION USING MOBILE CLOUD ARCHITECTURE
2010-2014 SE 44A DRM FRAMEWORK TOWARDS
PREVENTING DIGITAL PIRACY
2010-2014 SE 45 WIRELESS LAN SECURITY ISSUES AND SOLUTIONS
2010-2014 SE 46 FILE CARVING
2010-2014 SE 47 WIRELESS DATA CENTER NETWORKING
2010-2014 SE 48MULTI-TOUCH TABLE SYSTEM FOR MEDICAL VISUALIZATION: APPLICATION TO ORTHOPEDIC
SURGERY PLANNING
2010-2014 SE 49INTRODUCTION TO SYSTEM ARCHITECTURE FOR A ROBOTIC
COMPUTER
2010-2014 SE 50 WIGIG: MULTI-GIGABIT WIRELESS COMMUNICATION IN THE 60 GHZ BAND
2010-2014 SE 51 VOICE-INPUT VOICE OUTPUT COMMUNICATION AID (VIVOCA)
2010-2014 SE 52 3D INDOOR LOCATION AND NAVIGATION SYSTEM BASED ON BLUETOOTH
2010-2014 SE 53DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS USING
PERSUASIVE CUED CLICK POINTS
2009-2013 SE 1 HTTPS LOCK
2009-2013 SE 2 CONTENT SHARING OVER SMARTPHONE-BASED DELAY TOLERANT NETWORKS
2009-2013 SE 3LIGHTWEIGHT PROTECTION AGAINST BRUTE FORCE LOGIN ATTACKS ON WEB APPLICATION
2009-2013 SE 4APPLICATION OF ARTIFICIAL INTELLIGENCE IN SAFE HUMAN ROBOT INTERACTION
2009-2013 SE 5 SECERT COMMUNICATION USING JPEG DOUBLE COMPRESSION
2009-2013 SE 6 NOKIA MORPH TECHNOLOGY
2009-2013 SE 7 GOOGLE GLASS
2009-2013 SE 8 MULTIMEDIA CLOUD COMPUTING
2009-2013 SE 9SECURITY THREATS AND REAL TIME PROXY BASED SECURITY MECHANISM FOR SOCIAL
NETWORKING SITES
2009-2013 SE 10 EXAMPLE BASED MACHINE TRANLATION
2009-2013 SE 11 A VIRTUAL LABORATORY FOR MEDICAL IMAGE ANALYSIS
2009-2013 SE 12INTEGRATING VISUAL SALIENCY AND CONSISTENCY FOR RE-RANKING IMAGE SEARCH
RESULTS
2009-2013 SE 13 SKINPUT TECHNOLOGY
2009-2013 SE 14 ARTIFICIAL INTELLIGENCE IN CYBER DIFFENCE
2009-2013 SE 15 SURFACE COMPUTING
2009-2013 SE 16 TWO FACTOR AUTHENTICATION
2009-2013 SE 17 ONION ROUTING
2009-2013 SE 18 EVOLUTION FROM 3G TO 5G
2009-2013 SE 19 MOBILE OPERATING SYSTEM
2009-2013 SE 20 INTEL ATOM PROCESSOR
2009-2013 SE 21 OPTICAL LAYER SECURITY IN FIBER OPTIC NETWORK
2009-2013 SE 22 ZIGBEE AND GI-FI
2009-2013 SE 23 FRAUD DETECTION OF CREDIT CARD PAYMENT SYSTEM BY GENETIC ALGORITHM
2009-2013 SE 24 3D PRINTING
2009-2013 SE 25 BUBBLE SENSING
2009-2013 SE 26 SMART NOTE TAKER
2009-2013 SE 27 LI-FI
2009-2013 SE 28 HELIODISPLAY
2009-2013 SE 29NEW FRAMEWORK TO DETECT AND PREVENT DENIAL OF SERVICE ATTACK IN CLOUD
COMPUTING ENVIRONMENT
2009-2013 SE 30 HIGH DEFEINITION VIDEO TRANSMISSION USING BLUETOOTH OVER UWB
2009-2013 SE 31 OPASS
2009-2013 SE 32 BIOMETRIC VOTING SYSTEM
2009-2013 SE 33 CONTENT BASED IMAGE RETRIEVAL
2009-2013 SE 34 OPTICAL CAMOUFLAGE
2009-2013 SE 35A NEW DISKLESS CHECKPOINTING APPROACH FOR MULTIPLE PROCESSOR FAILURES
2009-2013 SE 36 IMPLEMENTATION OF SOCIAL MEDIA STRATEGY BY THE BUSINESS
2009-2013 SE 37 TELEPORTATION
2009-2013 SE 38 FAST DATA COLLECTION IN TREE BASED WIRELESS NETWORK
2009-2013 SE 39 EMERGING MEMORY TECHNOLOGIES
2009-2013 SE 40 IMPACT OF THE HOST OPERATING SYSTEM ON VIRTUAL MACHINE PERFORMANCE
2009-2013 SE 41 BLUE EYES TECHNOLOGY
2009-2013 SE 42 MOBILE VIRUS
2009-2013 SE 43 BRAIN COMPUTER INTERFACE
2009-2013 SE 44 ARM PROCESSOR
2009-2013 SE 45 3D TELEVISION
2009-2013 SE 46 HTML 5
2008-2012 SE 1 STOCHASTIC TRANSPARENCY
2008-2012 SE 2 COLLISION WARNING SYSTEM FOR ALL ROAD PATTERNS
2008-2012 SE 3 DANCE TRAINING SYSTEM BASED ON MOTION CAPTURE TECHNOLOGY
2008-2012 SE 4 WEB SERVICE MANAGEMENT SYSTEM FOR DIGITAL GOVERNMENT APPLICATION
2008-2012 SE 5 WILLWARN:WIRELESS LOCAL DANGER WARNING
2008-2012 SE 6 REMOTE LABS : REVOLUTIONIZING CONCEPTS OF ONLINE EDUCATION
2008-2012 SE 7 MOBILE ADAPTIVE LEARNING ENVIRONMENTS
2008-2012 SE 8 BUILT IN SELF REPAIR SCHENMES FOR FLASH MEMORIES
2008-2012 SE 9 BRAIN TISSUE CLASSIFICATION FOR MRI BASED ON FPGA
2008-2012 SE 10 A VIRTUAL LABORATORY FOR MEDICAL IMAGE ANALYSIS
2008-2012 SE 11 [4G RELATED] SMART SERVER UPDATE MECHANISM
2008-2012 SE 12 COSDES: A COLLABORATETIVE SPAM DETECTION SYSTEM
2008-2012 SE 13THREE - FACTOR AUTHENTICATION TO PRESERVE SECURITY AND PRIVACY IN DISTRIBUTED
SYSTEMS.
2008-2012 SE 14 ENERGY EFFICIENT VOIP OVER WIRELESS LANS
2008-2012 SE 15MONITORING, DETECTION AND ANALYSIS OF ENERGY GREEDY ANOMALIES IN MOBILE
HANDSETS.
2008-2012 SE 16 AN ADVANCED HYBRID PEER TO PEER BOTNET
2008-2012 SE 17 KEY TECHNOLOGY RESEARCH ON ADAPTATION LAYER OF ANDROID PLATFORM
2008-2012 SE 18 PERVASIVE EHEALTH MONITORING SYSTEMS
2008-2012 SE 19 OPTIMIZING DEPENDABILITY THROUGHOUT THE SOA LIFE CYCLE
2008-2012 SE 20 ENHANCED SECURITY FOR ONLINE EXAMS USING GROUP CRYPTOGRAPHY
2008-2012 SE 21 UNDER WATER SENSOR NETWORKS
2008-2012 SE 22 PATHMINER-A NEW WEB BASED TOOL IN BIOMEDICINE
2008-2012 SE 23 EFFICIENT ASSOCIATION CONTROL FOR VEHICULAR WI FI ACCESS
2008-2012 SE 24 INTRUSION DETECTION WITH ALERT AGRESSION
2008-2012 SE 25 LIVE AND INTERACTIVE TV BROADCASTING
2008-2012 SE 26 AGE SYNTHESIS AND ESTIMATION VIA FACES
2008-2012 SE 27 FACIAL ACTION CODING SYSTEM
2008-2012 SE 28 HANDLING STEALTHY ATTACKS IN WIRELESS AD HOC NETWORKS
2008-2012 SE 29 PRIVACY-AWARE COLLABORATIVE SPAM FILTERING
2008-2012 SE 30 DETECTION OF VULNERABILITIES IN INDUSTRIAL NETWORK
2007-2011 SE 1 IRIS RECOGNITION FOR AUTHENTICCATION
2007-2011 SE 2 ACTIVE SECURITY SITUATION SESOR FOR NETWORK
2007-2011 SE 3 SMART DUST
2007-2011 SE 4 CRIME PATTERN DETECTION USING DATA MINING
2007-2011 SE 5 AUTOMATIC NUMBERPLATE RECOGNITION
2007-2011 SE 6QUANTUM CRYPTOGRAPHY: A NEW GENERATION OF INFORMATION TECHNOLOGY
SECURITY SYSTEM
2007-2011 SE 7 AUTOMOBILE THEFT CONTROL SYSTEM
2007-2011 SE 8 SOFTWARE AND HARDWARE ISSUES IN SMART CARD TECHNOLOGY
2007-2011 SE 9 CLICK TO ZOOM INSIDE GRAPHICAL AUTHENTICATION
2007-2011 SE 10 APPLICATION OF CAN BUS IN DATA ARM COMMUNICATION SYSTEM
2007-2011 SE 11 ORIGIN OF ARTIFICIAL CREATURES - OF GENETIC ALGORITHM AMD GENETIC ROBOTS
2007-2011 SE 12 POLYMER MEMORY
2006-2010 SE 1 IN VEHICLE SECURE WIRELESS PERSONAL AREA NETWORK
2006-2010 SE 2 DESIGN OF HOME GATEWAY BASED ON INTELLIGENT NETWORK
2006-2010 SE 3 EYE MOUSE FOR DISABLED
2006-2010 SE 4 COMPREHENSIVE STUDY ON GRAPHICAL PASSWORDS
2006-2010 SE 5HONEYPOT: AN INTRODUCTION AND ITS EFFICIENCY IN SECURING BLUETOOTH BASED
PAYMENTS
2006-2010 SE 6 BODY AREA NETWORK
2006-2010 SE 7 AN INTELLIGENT BRAIN COMPUTER INTERFACE OF VISUAL EVOKED POTENTIAL EEG
2006-2010 SE 8 QUICKIES: INTELLIGENT STICKY NOTES
2006-2010 SE 9 IMMUNE MECHANISM BASED INTRUSION DETECTIONSYSTEMS
2006-2010 SE 10 INTERNAL FINGERPRINT IDENTIFICATION WITH OPTICAL COHERENCE TOMOGRAPHY
2006-2010 SE 11 SECURITIES IN GRID COMPUTING
2006-2010 SE 12 DIFFERENT TYPES OF ATTACKS ON MULTICAST IN MOBILE AD-HOC NETWORKS
2006-2010 SE 13 4G WIRELESS NETWORKS
2006-2010 SE 14 DROWSY DRIVER DETECTION AND SAFETY
2006-2010 SE 15 COLLECTIVE INTELLIGENCE BASED COMPUTATIONAL APPROACH TO WEB INTELLIGENCE
2006-2010 SE 16 BODY AREA NETWORK
2005-2009 SE 1 TRUTH DISCOVERY WITH MULTIPLE CONFLICTING INFORMATION PROVIDERS ON THE WEB
2005-2009 SE 2 A DISTRIBUTED EFFICEIENT ARCHITECHURE FOR WIRELESS SENSOR NETWORKS
2005-2009 SE 3 HOME MESH: A LOW COST INDOOR WIRELESS MESH FOR HOME NETWORKING
2005-2009 SE 4 AN EMPIRICAL STUDY OF THIRD GENERATION (3G) NETWORKS
2005-2009 SE 5 TRUTH DISCOVERY WITH MULTIPLE CONFLICTING INFORMATION PROVIDERS ON THE WEB
2005-2009 SE 6 MPEG ENCRYPTION
2005-2009 SE 7 BODY WORN E- TEXTILE ANTENNAS:- THE GOOD THE LOW MASS AND THE CONFORMAL
2005-2009 SE 8 CHAMELEON: APPLICATION LEVEL POWER MANAGEMENT
2005-2009 SE 9 IMPACT OF DENIAL OF SERVICE ATTACKS ON AD HOC NETWORKS
2005-2009 SE 10 SYBILGUARD : DEFENDING AGAINST SYBIL ATTACKS VIA SOCIAL NETWORKS
2005-2009 SE 11 AN AUTOMATED RETINAL IMAGE ANALYSIS OVER THE INTERNET
2005-2009 SE 12THE DESIGN OF A WIRELESS SOLAR- POWERED ROUTER FOR RURAL ENVIRONMENTS
ISOLATED FROM HEALTH FACILITIES
2005-2009 SE 13 SECURITY ISSUES IN ON_ DEMAND GRID AND CLUSTER COMPUTING
2005-2009 SE 14 PARALLEL COMPUTING IN LAN BASED SYSTEMS
2005-2009 SE 15 GRID ARCHITECURE STORAGE UTILIZING GRID COMPUTING FOR DYNAMIC STORAGE
2005-2009 SE 16 TVA: A DOS- LIMITING NETWORK ARCHITECTURE
2005-2009 SE 17SOFTWARE CONTROLLED INTEGRATED MEMORY ARCHITECTURE FOR HIGH PERFORMANCE
COMPUTING
2005-2009 SE 18 OPERATING SYSTEM SUPPORT FOR DYNAMIC CODE LOADING IN SENSOR NETWORK
2005-2009 SE 19 ONLINE DETECTION AND PREVENTION OF PHISHING ATTACKS
2005-2009 SE 20 DISCOVERING OBJECTS IN VIDEO
2005-2009 SE 21 TOPCAT: DATA MINING FOR TOPIC IDENTIFICATION IN A TEXT CORPUS
2005-2009 SE 22SUPPORTING DISTRIBUTED MANAGEMENT IN A TELECOMMUNICATIONS MANAGEMENT
NETWORK (TMN) ENVIRONMENT
2005-2009 SE 23 A CONFIGARABLE AND EXTENSIBLE TRANSPORT PROTOCOL
2005-2009 SE 24 A BROADBAND WIRELESS COMMUNICATIOB SYSTEM FOR EMERGENCY MANAGEMENT
2005-2009 SE 25MULTIPATH KEY ESTABLISHMENT FOR WIRELESS SENSOR NETWORK USING JUST ENOUGH
REDUNDANCY TRANSMISSION
2005-2009 SE 26 HYBRID WIRELESS OPTICAL BROADBAND - ACCESS NETWORK
2005-2009 SE 27 IMPACT OF HOT POTATO ROUTING CHANGES IN IP NETWORKS
2005-2009 SE 28DIGITAL INVISIBLE INK DATA HIDING BASED SPREAD SPECTRUM AND QUANTIZATION
TECHNIQUES
2005-2009 SE 29 MOBILE CARE WITH ALERT MECHANISM
2005-2009 SE 30 ADVANCED KNOWLEDGE DISCOVERY DATA MINING