Sl. No. Project Titles
AT-1
A COLLABORATIVE WRITING TOOL ON CLOUD ENVIRONMENT.DOC

AT-2
A DECENTRALIZED DATA DISTRIBUTION ASSESSMENT.DOCX

AT-3
A DIVIDE AND CONQUER APPROACH FOR MINIMUM SPANNING TREE BASED CLUSTERING.DOC

AT-4
A FAITHFUL DISTRIBUTED MECHANISM FOR SHARING THE COST OF MULTICAST TRANSMISSIONS.DOC

AT-5
A FAST CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM FOR HIGH DIMENSIONAL DATA.DOC

AT-6
A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM.DOC

AT-7
A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION.DOC

AT-8
A LOCATION-PRIVACY THREAT STEMMING FROM THE USE OF SHARED PUBLIC IP ADDRESSES.DOC

AT-9
A NOVEL AND EFFICIENT APPROACH FOR NEAR DUPLICATE PAGE DETECTION IN WEB CRAWLING.DOC

AT-10
A NOVEL SECURE COMMUNICATION PROTOCOL FOR.DOC

AT-11
A QUERY FORMULATION LANGUAGE FOR THE DATA WEB.DOC

AT-12
A REAL-TIME GROUP AUCTION SYSTEM FOR EFFICIENT ALLOCATION OF CLOUD INTERNET APPLICATIONS.DOCX

AT-13
A SIMPLE TEXT-BASED SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD SCHEME.DOC

AT-14
A SURVEY OF INDEXING TECHNIQUES FOR SCALABLE RECORD LINKAGE AND DEDUPLICATION.DOC

AT-15
A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS.DOC

AT-16
A TABU SEARCH ALGORITHM FOR CLUSTER BUILDING (2).DOC

AT-17
A TABU SEARCH ALGORITHM FOR CLUSTER BUILDING IN ADHOC NETWORKS.DOCX

AT-18
A UNIFIED RELEVANCE FEEDBACK FRAMEWORK FOR WEB IMAGE RETRIEVAL.DOC

AT-19
A USER-LEVEL TOOL FOR INFERRING ROUTER PACKET FORWARDING PRIORITY.DOC

AT-20
AN EFFICIENT PACKET LOSS RECOVERY METHODOLOGY FOR VIDEO STREAMING OVER IP NETWORKS.DOC

AT-21
ABSTRACT DATAMINING WITH CREDIT CARD.DOC

AT-22
ACCURATELY MEASURING DENIAL OF SERVICE IN.DOC

AT-23
ADAPTIVE JOIN OPERATORS FOR RESULT RATE OPTIMIZATION ON STREAMING INPUTS.DOC

AT-24
AN ACKNOWLEDGE BASED APPROACH FOR MANETS.DOC

AT-25
ANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTI-HOP WIRELESS NETWORKS.DOC

AT-26
ANSWERING GENERAL TIME-SENSITIVE QUERIES.DOC

AT-27
ARTIFICIAL INTELLIGENCE NETWORK LOAD BALANCING USING ANT COLONY OPTIMISATION.DOC

AT-28
ATTRIBUTE BASED DETECTION & PREVENTION OF PHISHING ATTACKS.DOC

AT-29
ATTRIBUTE-BASED ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION.DOCX

AT-30
CAM CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING.DOC

AT-31
CLOUD COMPUTING SECURITY FOR MULTICLOUDS (2).DOCX

AT-32
CODING FOR CRYPTOGRAPHIC SECURITY ENHANCEMENT USING STOPPING SETS.DOC

AT-33
CODING FOR CRYPTOGRAPHIC SECURITY ENHANCEMENT USING STOPPING SETS.DOCX

AT-34
COMPACTED PROBABILISTIC VISUAL TARGET CLASSIFICATION WITH COMMITTEE DECISION IN WIRELESS MULTIMEDIA SENSOR NETWORKS.DOC

AT-35
CAPTCHA AS GRAPHICAL PASSWORDS.DOCX

AT-36
CELL BREATHING TECHNIQUES FOR LOAD BALANCING IN WIRELESS LANS.DOC

AT-37
CELL BREATHING TECHNIQUES.DOC

AT-38
CLICK STREAM DATA ANALYSIS.DOC

AT-39
CLIENT SERVER BASED LIVE MEETING ABST.DOC

AT-40
CLOUD COMPUTING BASED FORENSIC ANALYSIS FOR COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEMS.DOCX

AT-41
CLOUD COMPUTING-BASED FORENSIC ANALYSIS FOR COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM.DOCX

AT-42
CLOUDMOV CLOUD-BASED MOBILE SOCIAL TV.DOC

AT-43
CO OPERATIVE CACHING (2).DOCX

AT-44
COLLABRATIVE WRITING SUPPORT TOOL.DOCX

AT-45
COMPLEX QUERIES OPTIMIZATION AND EVALUATION OVER RELATIONAL AND NOSQL DATA STORES IN CLOUD ENVIRONMENTS.DOCX

AT-46
COMPUTING STRUCTURAL STATISTICS.DOC

AT-47
CONDITIONAL SHORTEST PATH ROUTING IN DELAY TOLERANT NETWORKS.DOC

AT-48
CONGESTION CONTROL ALGORITHM FOR TREE.DOC

AT-49
CONNECTIVITY RESTORATION IN WIRELESS SENSOR AND ACTOR NETWORKS.DOC

AT-50
CONSIGNMENT TRACKING SYSTEM.DOC

AT-51
CONTENT-BASED SENSOR SELECTION AND TRANSMISSION POWER ADJUSTMENT FOR COLLABORATIVE TARGET TRACKING..DOC

AT-52
CONTINUOUS MONITORING OF SPATIAL QUERIES IN WIRELESS BROADCAST ENVIRONMENTS.DOC

AT-53
CONTROLLING IP SPOOFING.DOC

AT-54
CONVOLUTION FILTERS.DOC

AT-55
COPERNICUS.DOC

AT-56
COSTING OF CLOUD COMPUTING SERVICES A TOTAL COST OF OWNERSHIP APPROACH.DOC

AT-57
CREDIT CARD USING HMM.DOCX

AT-58
DATA AGGREGATION PROTOCOL BASED ON DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS.DOC

AT-59
DATA MINING BASED DECISION SUPPORT FOR SUPERMARKET.DOCX

AT-60
DEFECT TRACKING SYSTEM.DOC

AT-61
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS.DOC

AT-62
DYNAMIC LOAD BALANCING FOR EFFECTIVE TRAFFIC MANAGEMENT.DOC

AT-63
DATA HIDING ADDITIONAL FILES IN A ZIP ARCHIVE.DOC

AT-64
DATA SHARING ON CLOUD COMPUTING.DOCX

AT-65
DATABASE SCHEMA COMPARISON UTILITYC#.DOC

AT-66
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBUTE BASED ENCRYPTION.DOCX

AT-67
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORAGE IN CLOUD.DOCX

AT-68
DECENTRALIZED ACCESS CONTROL.DOCX

AT-69
DETECTING MALICIOUS PACKET LOSSES.DOC

AT-70
DETECTION OF MOVING OBJECTS IN LIVE VIDEO.DOC

AT-71
DETERMINING ATTRIBUTES TO MAXIMIZE VISIBILITY OF OBJECTS.DOC

AT-72
DIGITAL PAD SIGNATURE ABSTRACT.DOC

AT-73
DIGITAL PAD SIGNATURE.DOC

AT-74
DISTRBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL.DOC

AT-75
DYNAMIC ROUTING WITH SECURITY CONSIDERATIONS.DOC

AT-76
DYNAMIC SIGNATURE VERIFICATION.DOC

AT-77
EFFICIENT BROADCASTING WITH GUARANTEED COVERAGE IN MANETS.DOC

AT-78
EFFICIENT ONLINE JOB SEARCHING.DOC

AT-79
EFFICIENT AND DISCOVERY OF PATTERNS IN SEQUENCE DATA SETS.DOC

AT-80
EFFICIENT LOAD BALANCING ABSTRACT.DOC

AT-81
ENABLING DATA DYNAMIC AND INDIRECT MUTUAL.DOCX

AT-82
ENABLING SECURE AND EFFICIENT RANKED KEYWORD.DOC

AT-83
ENABLING DYNAMIC.DOC

AT-84
ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING (2).DOC

AT-85
ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD.DOC

AT-86
FORENSIC.DOC

AT-87
FAST CLUSTERING (2).DOCX

AT-88
FILE ENCRYPTIONDECRYPTION WITH HASH VERIFICATION IN C#.DOC

AT-89
FILE SECURITY SYSTEM USING FINGER PRINT AUTHENTICATION.DOCX

AT-90
FILE_SHARING AND AUTHENTICATION ON LAN.DOC

AT-91
HIGH-LEVEL NETWORK SECURITY USING PACKET FILTERING.DOC

AT-92
HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING TECHNIQUE ENSURING PRIVACY.DOC

AT-93
IMPLEMENTATION OF AUTHENTICATED AND DYNAMIC LOGISTICS SUPPORT MANAGEMENT.DOC

AT-94
IMPLEMENTATION OF DATA TRANSMISSION FOR BPO COMPANIES.DOC

AT-95
IMPLEMENTATION OF HIGH SPEED, NO.DOC

AT-96
IMPLEMENTATION OF SECURED AND ENCRYPTED DATA TRANSMISSIO.DOC

AT-97
IMPLEMENTATION OF WEB ENABLED E - SHOPPING CART BASED ON MULTIPLE PROCESSING.DOC

AT-98
INTRUSION DETECTION SYSTEM.DOC

AT-99
METRO_TRAIN_CARDISSUE_AND_RECHARGE (2).DOC

AT-100
MITIGATION OF CONTROL CHANNEL JAMMING UNDER NODE CAPTURE ATTACKS.DOC

AT-101
MONA-SECURE-MULTI-OWNER-DATA-SHARING-FOR-DYNAMIC-GROUPS-IN-THE-CLOUD-DOCX.DOCX

AT-102
MONITORING THE APPLICATION-LAYER DDOS ATTACKS FOR.DOC

AT-103
ON THE PLANNING OF WIRELESS SENSOR NETWORKS ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT ROUTING AND COVERAGE.DOC

AT-104
ON THE SECURITY OF ROUTE DISCOVERY IN MANETS.DOC

AT-105
OPINION MINING AND SENTIMENT ANALYSIS AND CLASSIFICATION OF ONLINE REVIEWS USING CATEGORICAL PROPORTIONAL DIFFERENCE.DOCX

AT-106
PRIVACY-PRESERVING OPTIMAL MEETING LOCATION DETERMINATION ON MOBILE DEVICES.DOC

AT-107
PSMPA PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY-PRESERVING COOPERATIVE AUTHENTICATION.DOC

AT-108
PUBLIC KEY VALIDATION FOR DNS.DOC

AT-109
PHYSICALLY DISABLED INSPIRATION.DOCX

AT-110
PREVENTING PRIVATE INFORMATION INFERENCE ATTACKS ON SOCIAL NETWORKS.DOCX

AT-111
PRICE DIFFERENTIATION FOR COMMUNICATION NETWORKS.DOC

AT-112
PRIVACY PRESERVING DATA SHARING WITH ANONYMOUS ID ASSIGNMENT (2).DOC

AT-113
PRIVACY PRESERVING DATA SHARING WITH ANONYMOUS ID ASSIGNMENT.DOC

AT-114
PRIVACY PRESERVING.DOCX

AT-115
PRIVACY-PRESERVING MULTI-KEYWORD.DOCX

AT-116
PRIVATE_COURIER_COMPANY_ADMINISTRATION_ACADEMIC_PROJECTS_SYNOPSIS.DOC

AT-117
PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSION.DOC

AT-118
QR-CODE BASED INFORMATION ACCESS SYSTEM IN SHOPPING MALL.DOC

AT-119
QUICK-WITTED CAR PARKING GUIDANCE AND DESTRUCTION ALERT.DOC

AT-120
REMOTE CONTROLLED CACHING PROXY SERVER.DOC

AT-121
RADICAL APPLICATION PORTAL.DOC

AT-122
RANDOM CAST AN ENERGY-EFFICIENT COMMUNICATION SCHEME FOR MOBILE AD HOC NETWORKS.DOC

AT-123
RATE ALLOCATION AND NETWORK LIFETIME PROBLEMS FOR WIRELESS SENSOR NETWORKS.DOC

AT-124
RELIABLE RE-ENCRYPTION IN UNRELIABLE CLOUDS.DOC

AT-125
RESEQUENCING ANALYSIS OF STOP-AND-WAIT ARQ FOR PARALLEL MULTICHANNEL COMMUNICATIONS.DOC

AT-126
RESIDUAL-BASED ESTIMATION OF PEER AND LINK.DOC

AT-127
RESOURCE ALLOCATION AND SCHEDULING IN THE CLOUD.DOCX

AT-128
RESOURCE ALLOCATION IN OFDMA WIRELESS COMMUNICATIONS SYSTEMS SUPPORTING MULTIMEDIA SERVICES..DOC

AT-129
REVERSE ENGINEERING IDE FOR JAVA.DOC

AT-130
ROBUST DATA HIDING IN AUDIO USING ALL PASS FILTERS IN MP3.DOC

AT-131
ROBUST DATA HIDING IN AUDIO USING ALL PASS FILTERS IN MP31.DOC

AT-132
ROBUST WATERMARKING OF COMPRESSED AND ENCRYPTED JPEG2000 IMAGES.DOC

AT-133
RODAS HOTEL MANAGEMENT SYSTEM.DOC

AT-134
ROUTE STABILITY IN MANETS UNDER THE RANDOM DIRECTION MOBILITY MODEL.DOC

AT-135
SCALABLE CONTENT BASED ROUTING.DOC

AT-136
SECURED INTRANET DATA COMMUNICATION SYSTEM.DOC

AT-137
SIMPS.DOC

AT-138
SECURE AND POLICY-COMPLIANT SOURCE ROUTING.DOC

AT-139
SECURITY ANALYSIS OF THE SASI PROTOCOL.DOC

AT-140
SELECTIVE DATA STREAM BLOCKING MECHANISM FOR NETWORKS.DOCX

AT-141
SEMISUPERVISED BIASED MAXIMUM MARGIN ANALYSIS FOR INTERACTIVE IMAGE RETRIEVAL.DOC

AT-142
SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE.DOC

AT-143
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING.DOC

AT-144
SIGNATURE BASED INDEXING.DOCX

AT-145
SINGLE AND PAIR RESOLUTIONS FOR RFID TAG IDENTIFICATION.DOC

AT-146
SMARTCRAWLER A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES.DOCX

AT-147
TOWARD PRESERVING PRIVACY AND FUNCTIONALITY IN GEOSOCIAL NETWORKS.DOC

AT-148
TABU SEARCH (2).DOCX

AT-149
TOWARDS SECURE MULTI-KEYWORD TOP-K RETRIEVAL OVER ENCRYPTED CLOUD DATA.DOCX

AT-150
VERIFIABLE ATTRIBUTE-BASED ENCRYPTION.DOCX

AT-151
WINDS OF CHANGE FROM VENDOR LOCK-IN.DOCX

AT-152
CLOUD COMPUTING OF FORENSIC.DOCX

AT-153
CLOUD COMPUTING.DOC

AT-154
EGOVERNANCE.DOC

AT-155
IEEE.PHP

AT-156
INDEX.HTML

AT-157
PROJECTTITLE.PHP

AT-158
QUERY FORMULATION.DOCX

AT-159
SECURITY AND PRIVACY ENHANCED MULTI CLOUD ARCHITECTURE.DOCX