| Sr.no | Project Code | Project Title | Domain | Synopsis/Abstract |
| 1 | WNV_JIE1101 | A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And Wimax Systems | Network Security | Synopsis |
| 2 | WNV_JIE1102 | A Privacy-Preserving Location Monitoring System For Wireless Sensor Networks | Mobile Computing | Synopsis |
| 3 | WNV_JIE1103 | Buffer Sizing For 802.11 Based Networks | Networking | Synopsis |
| 4 | WNV_JIE1104 | Clustering With Multi-Viewpoint Based Similarity Measure | Data Engineering | Synopsis |
| 5 | WNV_JIE1105 | Analysis on Credit Card Fraud Detection Methods | Data Engineering | Synopsis |
| 6 | WNV_JIE1106 | Delay Analysis And Optimality Of Scheduling Policies For Multi-Hop Wireless Networks | Networking | Synopsis |
| 7 | WNV_JIE1107 | Discovering Conditional Functional Dependencies | Data Engineering | Synopsis |
| 8 | WNV_JIE1108 | Effective Navigation Of Query Results Based On Concept Hierarchies | Data Engineering | Synopsis |
| 9 | WNV_JIE1109 | Extended Xml Tree Pattern Matching: Theories And Algorithms | Data Engineering | Synopsis |
| 10 | WNV_JIE1110 | Modeling And Detection Of Camouflaging Worm | Synopsis | |
| 11 | WNV_JIE1111 | Nymble: Blocking Misbehaving Users In Anonymizing Networks | Synopsis | |
| 12 | WNV_JIE1112 | Ranking Spatial Data By Quality Preferences | Data Engineering | Synopsis |
| 13 | WNV_JIE1113 | Sat: A Security Architecture Achieving Anonymity And Traceability In Wireless Mesh Networks | Secure Computing | Synopsis |
| 14 | WNV_JIE1114 | Secure And Practical Outsourcing Of Linear Programming In Cloud Computing | Cloud Computing | Synopsis |
| 15 | WNV_JIE1115 | Sketch4match – Content-Based Image Retrieval System Using Sketches | Image Processing | Synopsis |
| 16 | WNV_JIE1116 | Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding | Video Technology | Synopsis |
| 17 | WNV_JIE1117 | A Competitive Study Of Cryptography Techniques Over Block Cipher | Secure Computing | Synopsis |
| 18 | WNV_JIE1118 | A Dual Framework and Algorithms for Targeted Online Data Delivery | Data Engineering | Synopsis |
| 19 | WNV_JIE1119 | Embedded Extended Visual Cryptography Schemes | Security | Synopsis |
| 20 | WNV_JIE1120 | Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports | Networking | Synopsis |
| 21 | WNV_JIE1121 | Cloud Computing For Agent-Based Urban Transportation Systems | Intelligent Systems | Synopsis |
| 22 | WNV_JIE1122 | Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc Networks | Mobile Computing | Synopsis |
| 23 | WNV_JIE1123 | A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts | Data Engineering | Synopsis |
| 24 | WNV_JIE1124 | Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks | Networking | Synopsis |
| 25 | WNV_JIE1125 | Optimal Bandwidth Assignment for Multiple Description Coded Video | Multi Media | Synopsis |
| 26 | WNV_JIE1126 | Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks | Secure Computing | Synopsis |
| 27 | WNV_JIE1127 | A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification | Data Mining | Synopsis |
| 28 | WNV_JIE1128 | Going Back And Forth: Efficient Multideployment And Multisnapshotting On Clouds | Cloud Computing | Synopsis |
| 29 | WNV_JIE1129 | Progme: Towards Programmable Network Measurement | Networking | Synopsis |
| 30 | WNV_JIE1130 | Live Streaming With Receiver-Based Peer-Division Multiplexing | Networking | Synopsis |
| 31 | WNV_JIE1131 | Decision Trees for Uncertain Data | Data Engineering | Synopsis |
| 32 | WNV_JIE1132 | The Coquos Approach To Continuous Queries In Unstructured Overlays | Data Engineering | Synopsis |
| 33 | WNV_JIE1133 | Ritas: Services For Randomized Intrusion Tolerance | Secure Computing | Synopsis |
| 34 | WNV_JIE1134 | Selfish Overlay Network Creation And Maintenance | Networking | Synopsis |
| 35 | WNV_JIE1135 | Throughput Optimization in Mobile Backbone Networks | Mobile Computing | Synopsis |
| 36 | WNV_JIE1136 | Locating Equivalent Servants Over P2p Networks | Network & Service Management | Synopsis |
| 37 | WNV_JIE1137 | Improving Utilization Of Infrastructure Clouds | Cloud Computing | Synopsis |
| 38 | WNV_JIE1138 | Wireless Sensor Network Security Model Using Zero Knowledge Protocol | Mobile Computing | Synopsis |
Hi..this is Bilal Ahmed Shaik.All the above tricks and hacks do at your own risk..This information is for research and academic purposes only! This info is not to be abused! I am not response.Watch and Enjoy the Technical Fun .Free Knowledge on Technical issues -free books -free softwares -amazing computer tips and tricks.
Pages
▼
No comments:
Post a Comment