Sl. No.
Project Titles
AT-1
A COLLABORATIVE WRITING TOOL ON CLOUD ENVIRONMENT.DOC
AT-2
A DECENTRALIZED DATA DISTRIBUTION ASSESSMENT.DOCX
AT-3
A DIVIDE AND CONQUER APPROACH FOR MINIMUM SPANNING TREE BASED CLUSTERING.DOC
AT-4
A FAITHFUL DISTRIBUTED MECHANISM FOR SHARING THE COST OF MULTICAST TRANSMISSIONS.DOC
AT-5
A FAST CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM FOR HIGH DIMENSIONAL DATA.DOC
AT-6
A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM.DOC
AT-7
A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION.DOC
AT-8
A LOCATION-PRIVACY THREAT STEMMING FROM THE USE OF SHARED PUBLIC IP ADDRESSES.DOC
AT-9
A NOVEL AND EFFICIENT APPROACH FOR NEAR DUPLICATE PAGE DETECTION IN WEB CRAWLING.DOC
AT-10
A NOVEL SECURE COMMUNICATION PROTOCOL FOR.DOC
AT-11
A QUERY FORMULATION LANGUAGE FOR THE DATA WEB.DOC
AT-12
A REAL-TIME GROUP AUCTION SYSTEM FOR EFFICIENT ALLOCATION OF CLOUD INTERNET APPLICATIONS.DOCX
AT-13
A SIMPLE TEXT-BASED SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD SCHEME.DOC
AT-14
A SURVEY OF INDEXING TECHNIQUES FOR SCALABLE RECORD LINKAGE AND DEDUPLICATION.DOC
AT-15
A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS.DOC
AT-16
A TABU SEARCH ALGORITHM FOR CLUSTER BUILDING (2).DOC
AT-17
A TABU SEARCH ALGORITHM FOR CLUSTER BUILDING IN ADHOC NETWORKS.DOCX
AT-18
A UNIFIED RELEVANCE FEEDBACK FRAMEWORK FOR WEB IMAGE RETRIEVAL.DOC
AT-19
A USER-LEVEL TOOL FOR INFERRING ROUTER PACKET FORWARDING PRIORITY.DOC
AT-20
AN EFFICIENT PACKET LOSS RECOVERY METHODOLOGY FOR VIDEO STREAMING OVER IP NETWORKS.DOC
AT-21
ABSTRACT DATAMINING WITH CREDIT CARD.DOC
AT-22
ACCURATELY MEASURING DENIAL OF SERVICE IN.DOC
AT-23
ADAPTIVE JOIN OPERATORS FOR RESULT RATE OPTIMIZATION ON STREAMING INPUTS.DOC
AT-24
AN ACKNOWLEDGE BASED APPROACH FOR MANETS.DOC
AT-25
ANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTI-HOP WIRELESS NETWORKS.DOC
AT-26
ANSWERING GENERAL TIME-SENSITIVE QUERIES.DOC
AT-27
ARTIFICIAL INTELLIGENCE NETWORK LOAD BALANCING USING ANT COLONY OPTIMISATION.DOC
AT-28
ATTRIBUTE BASED DETECTION & PREVENTION OF PHISHING ATTACKS.DOC
AT-29
ATTRIBUTE-BASED ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION.DOCX
AT-30
CAM CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING.DOC
AT-31
CLOUD COMPUTING SECURITY FOR MULTICLOUDS (2).DOCX
AT-32
CODING FOR CRYPTOGRAPHIC SECURITY ENHANCEMENT USING STOPPING SETS.DOC
AT-33
CODING FOR CRYPTOGRAPHIC SECURITY ENHANCEMENT USING STOPPING SETS.DOCX
AT-34
COMPACTED PROBABILISTIC VISUAL TARGET CLASSIFICATION WITH COMMITTEE DECISION IN WIRELESS MULTIMEDIA SENSOR NETWORKS.DOC
AT-35
CAPTCHA AS GRAPHICAL PASSWORDS.DOCX
AT-36
CELL BREATHING TECHNIQUES FOR LOAD BALANCING IN WIRELESS LANS.DOC
AT-37
CELL BREATHING TECHNIQUES.DOC
AT-38
CLICK STREAM DATA ANALYSIS.DOC
AT-39
CLIENT SERVER BASED LIVE MEETING ABST.DOC
AT-40
CLOUD COMPUTING BASED FORENSIC ANALYSIS FOR COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEMS.DOCX
AT-41
CLOUD COMPUTING-BASED FORENSIC ANALYSIS FOR COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM.DOCX
AT-42
CLOUDMOV CLOUD-BASED MOBILE SOCIAL TV.DOC
AT-43
CO OPERATIVE CACHING (2).DOCX
AT-44
COLLABRATIVE WRITING SUPPORT TOOL.DOCX
AT-45
COMPLEX QUERIES OPTIMIZATION AND EVALUATION OVER RELATIONAL AND NOSQL DATA STORES IN CLOUD ENVIRONMENTS.DOCX
AT-46
COMPUTING STRUCTURAL STATISTICS.DOC
AT-47
CONDITIONAL SHORTEST PATH ROUTING IN DELAY TOLERANT NETWORKS.DOC
AT-48
CONGESTION CONTROL ALGORITHM FOR TREE.DOC
AT-49
CONNECTIVITY RESTORATION IN WIRELESS SENSOR AND ACTOR NETWORKS.DOC
AT-50
CONSIGNMENT TRACKING SYSTEM.DOC
AT-51
CONTENT-BASED SENSOR SELECTION AND TRANSMISSION POWER ADJUSTMENT FOR COLLABORATIVE TARGET TRACKING..DOC
AT-52
CONTINUOUS MONITORING OF SPATIAL QUERIES IN WIRELESS BROADCAST ENVIRONMENTS.DOC
AT-53
CONTROLLING IP SPOOFING.DOC
AT-54
CONVOLUTION FILTERS.DOC
AT-55
COPERNICUS.DOC
AT-56
COSTING OF CLOUD COMPUTING SERVICES A TOTAL COST OF OWNERSHIP APPROACH.DOC
AT-57
CREDIT CARD USING HMM.DOCX
AT-58
DATA AGGREGATION PROTOCOL BASED ON DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS.DOC
AT-59
DATA MINING BASED DECISION SUPPORT FOR SUPERMARKET.DOCX
AT-60
DEFECT TRACKING SYSTEM.DOC
AT-61
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS.DOC
AT-62
DYNAMIC LOAD BALANCING FOR EFFECTIVE TRAFFIC MANAGEMENT.DOC
AT-63
DATA HIDING ADDITIONAL FILES IN A ZIP ARCHIVE.DOC
AT-64
DATA SHARING ON CLOUD COMPUTING.DOCX
AT-65
DATABASE SCHEMA COMPARISON UTILITYC#.DOC
AT-66
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBUTE BASED ENCRYPTION.DOCX
AT-67
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORAGE IN CLOUD.DOCX
AT-68
DECENTRALIZED ACCESS CONTROL.DOCX
AT-69
DETECTING MALICIOUS PACKET LOSSES.DOC
AT-70
DETECTION OF MOVING OBJECTS IN LIVE VIDEO.DOC
AT-71
DETERMINING ATTRIBUTES TO MAXIMIZE VISIBILITY OF OBJECTS.DOC
AT-72
DIGITAL PAD SIGNATURE ABSTRACT.DOC
AT-73
DIGITAL PAD SIGNATURE.DOC
AT-74
DISTRBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL.DOC
AT-75
DYNAMIC ROUTING WITH SECURITY CONSIDERATIONS.DOC
AT-76
DYNAMIC SIGNATURE VERIFICATION.DOC
AT-77
EFFICIENT BROADCASTING WITH GUARANTEED COVERAGE IN MANETS.DOC
AT-78
EFFICIENT ONLINE JOB SEARCHING.DOC
AT-79
EFFICIENT AND DISCOVERY OF PATTERNS IN SEQUENCE DATA SETS.DOC
AT-80
EFFICIENT LOAD BALANCING ABSTRACT.DOC
AT-81
ENABLING DATA DYNAMIC AND INDIRECT MUTUAL.DOCX
AT-82
ENABLING SECURE AND EFFICIENT RANKED KEYWORD.DOC
AT-83
ENABLING DYNAMIC.DOC
AT-84
ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING (2).DOC
AT-85
ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD.DOC
AT-86
FORENSIC.DOC
AT-87
FAST CLUSTERING (2).DOCX
AT-88
FILE ENCRYPTIONDECRYPTION WITH HASH VERIFICATION IN C#.DOC
AT-89
FILE SECURITY SYSTEM USING FINGER PRINT AUTHENTICATION.DOCX
AT-90
FILE_SHARING AND AUTHENTICATION ON LAN.DOC
AT-91
HIGH-LEVEL NETWORK SECURITY USING PACKET FILTERING.DOC
AT-92
HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING TECHNIQUE ENSURING PRIVACY.DOC
AT-93
IMPLEMENTATION OF AUTHENTICATED AND DYNAMIC LOGISTICS SUPPORT MANAGEMENT.DOC
AT-94
IMPLEMENTATION OF DATA TRANSMISSION FOR BPO COMPANIES.DOC
AT-95
IMPLEMENTATION OF HIGH SPEED, NO.DOC
AT-96
IMPLEMENTATION OF SECURED AND ENCRYPTED DATA TRANSMISSIO.DOC
AT-97
IMPLEMENTATION OF WEB ENABLED E - SHOPPING CART BASED ON MULTIPLE PROCESSING.DOC
AT-98
INTRUSION DETECTION SYSTEM.DOC
AT-99
METRO_TRAIN_CARDISSUE_AND_RECHARGE (2).DOC
AT-100
MITIGATION OF CONTROL CHANNEL JAMMING UNDER NODE CAPTURE ATTACKS.DOC
AT-101
MONA-SECURE-MULTI-OWNER-DATA-SHARING-FOR-DYNAMIC-GROUPS-IN-THE-CLOUD-DOCX.DOCX
AT-102
MONITORING THE APPLICATION-LAYER DDOS ATTACKS FOR.DOC
AT-103
ON THE PLANNING OF WIRELESS SENSOR NETWORKS ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT ROUTING AND COVERAGE.DOC
AT-104
ON THE SECURITY OF ROUTE DISCOVERY IN MANETS.DOC
AT-105
OPINION MINING AND SENTIMENT ANALYSIS AND CLASSIFICATION OF ONLINE REVIEWS USING CATEGORICAL PROPORTIONAL DIFFERENCE.DOCX
AT-106
PRIVACY-PRESERVING OPTIMAL MEETING LOCATION DETERMINATION ON MOBILE DEVICES.DOC
AT-107
PSMPA PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY-PRESERVING COOPERATIVE AUTHENTICATION.DOC
AT-108
PUBLIC KEY VALIDATION FOR DNS.DOC
AT-109
PHYSICALLY DISABLED INSPIRATION.DOCX
AT-110
PREVENTING PRIVATE INFORMATION INFERENCE ATTACKS ON SOCIAL NETWORKS.DOCX
AT-111
PRICE DIFFERENTIATION FOR COMMUNICATION NETWORKS.DOC
AT-112
PRIVACY PRESERVING DATA SHARING WITH ANONYMOUS ID ASSIGNMENT (2).DOC
AT-113
PRIVACY PRESERVING DATA SHARING WITH ANONYMOUS ID ASSIGNMENT.DOC
AT-114
PRIVACY PRESERVING.DOCX
AT-115
PRIVACY-PRESERVING MULTI-KEYWORD.DOCX
AT-116
PRIVATE_COURIER_COMPANY_ADMINISTRATION_ACADEMIC_PROJECTS_SYNOPSIS.DOC
AT-117
PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSION.DOC
AT-118
QR-CODE BASED INFORMATION ACCESS SYSTEM IN SHOPPING MALL.DOC
AT-119
QUICK-WITTED CAR PARKING GUIDANCE AND DESTRUCTION ALERT.DOC
AT-120
REMOTE CONTROLLED CACHING PROXY SERVER.DOC
AT-121
RADICAL APPLICATION PORTAL.DOC
AT-122
RANDOM CAST AN ENERGY-EFFICIENT COMMUNICATION SCHEME FOR MOBILE AD HOC NETWORKS.DOC
AT-123
RATE ALLOCATION AND NETWORK LIFETIME PROBLEMS FOR WIRELESS SENSOR NETWORKS.DOC
AT-124
RELIABLE RE-ENCRYPTION IN UNRELIABLE CLOUDS.DOC
AT-125
RESEQUENCING ANALYSIS OF STOP-AND-WAIT ARQ FOR PARALLEL MULTICHANNEL COMMUNICATIONS.DOC
AT-126
RESIDUAL-BASED ESTIMATION OF PEER AND LINK.DOC
AT-127
RESOURCE ALLOCATION AND SCHEDULING IN THE CLOUD.DOCX
AT-128
RESOURCE ALLOCATION IN OFDMA WIRELESS COMMUNICATIONS SYSTEMS SUPPORTING MULTIMEDIA SERVICES..DOC
AT-129
REVERSE ENGINEERING IDE FOR JAVA.DOC
AT-130
ROBUST DATA HIDING IN AUDIO USING ALL PASS FILTERS IN MP3.DOC
AT-131
ROBUST DATA HIDING IN AUDIO USING ALL PASS FILTERS IN MP31.DOC
AT-132
ROBUST WATERMARKING OF COMPRESSED AND ENCRYPTED JPEG2000 IMAGES.DOC
AT-133
RODAS HOTEL MANAGEMENT SYSTEM.DOC
AT-134
ROUTE STABILITY IN MANETS UNDER THE RANDOM DIRECTION MOBILITY MODEL.DOC
AT-135
SCALABLE CONTENT BASED ROUTING.DOC
AT-136
SECURED INTRANET DATA COMMUNICATION SYSTEM.DOC
AT-137
SIMPS.DOC
AT-138
SECURE AND POLICY-COMPLIANT SOURCE ROUTING.DOC
AT-139
SECURITY ANALYSIS OF THE SASI PROTOCOL.DOC
AT-140
SELECTIVE DATA STREAM BLOCKING MECHANISM FOR NETWORKS.DOCX
AT-141
SEMISUPERVISED BIASED MAXIMUM MARGIN ANALYSIS FOR INTERACTIVE IMAGE RETRIEVAL.DOC
AT-142
SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE.DOC
AT-143
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING.DOC
AT-144
SIGNATURE BASED INDEXING.DOCX
AT-145
SINGLE AND PAIR RESOLUTIONS FOR RFID TAG IDENTIFICATION.DOC
AT-146
SMARTCRAWLER A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES.DOCX
AT-147
TOWARD PRESERVING PRIVACY AND FUNCTIONALITY IN GEOSOCIAL NETWORKS.DOC
AT-148
TABU SEARCH (2).DOCX
AT-149
TOWARDS SECURE MULTI-KEYWORD TOP-K RETRIEVAL OVER ENCRYPTED CLOUD DATA.DOCX
AT-150
VERIFIABLE ATTRIBUTE-BASED ENCRYPTION.DOCX
AT-151
WINDS OF CHANGE FROM VENDOR LOCK-IN.DOCX
AT-152
CLOUD COMPUTING OF FORENSIC.DOCX
AT-153
CLOUD COMPUTING.DOC
AT-154
EGOVERNANCE.DOC
AT-155
IEEE.PHP
AT-156
INDEX.HTML
AT-157
PROJECTTITLE.PHP
AT-158
QUERY FORMULATION.DOCX
AT-159
SECURITY AND PRIVACY ENHANCED MULTI CLOUD ARCHITECTURE.DOCX