SlideShare ist ein Scribd-Unternehmen logo
1 von 7
FUTURE-TEC TECHNOLOGIES
1. A Machine Learning Approach to TCP Throughput         Networking
   Prediction
2. Feedback-Based Scheduling for Load-Balanced Two-
   Stage Switches

3.Trust management in mobile ad hoc networks using
   a scalable maturity-based Model
1. Online social networks                                Network

2. Sharing location in online social networks
1. Fuzzy Data Standardization                            Fuzzy


1. On the Quality of Service of Crash-Recovery Failure   Dependable and Security
   Detectors

2.Cluster-Based Key Pre-distribution Using
   Deployment Knowledge
                                                         Computer Science
1.Integrated High-Fidelity Geosciences Simulations for
   Enhanced Terrain-Related Target Detection

2. Accelerating Biomedical Research in Designing
   Diagnostic Assays, Drugs, and Vaccines
1. Spatial Navigation for Context-Aware Video            Computer Science and
   Surveillance                                          Graphics
2. Guest Editors' Introduction: Multimedia Analytics
3. Multimedia Analysis + Visual Analytics = Multimedia
   Analytics
4. AniViz: A Template-Based Animation Tool for
   Volume Visualization
5. iFeel_IM!: Augmenting Emotions during Online
   Communication

6. MediaTable: Interactive Categorization of
Multimedia Collections
1. Classification of Protein-Protein Interaction Full-Text Computational Biology
   Documents Using Text and Citation Network               and Bioinformatics
   Features

2. Exploring Species-Based Strategies for Gene
   Normalization
1. Automatic Generation of Game Level Solutions as         Computational
   Storyboards                                             Intelligence and AI in
                                                           Games
2. Game Bot Detection via Avatar Trajectory Analysis

3. The Parametrized Probabilistic Finite-State
   Transducer Probe Game Player Fingerprint Model
1. Full-Reference Video Quality Metric for Fully           Broadcasting
   Scalable and Mobile SVC Content

1. Understanding Wi-Fi 2.0: from the economical            Wireless Communications
   perspective of wireless service providers [Dynamic
   Spectrum Management]
2. Efficient routing for international mobile call setup
   [Accepted from Open Call]
3. IEEE 802.11E QoS and power saving features
   overview and analysis of combined performance
   [Accepted from Open Call]

4. Achieving Secret Communication for Fast Rayleigh
   Fading Channels
1. Using a web-based tool to define and implement          Software
   software process improvement initiatives in a small
   industrial setting
2. Including both static and dynamic typing in the
   same programming language
3. Design principles of web-based distance education
   system and sample application in Afyon Kocatepe
   University
4. Component co-evolution and component
dependency: speculations and verifications

5. Technologies and Tools for Distributed Teams
1. End-to-End Service Support for Mashups                 Service Computing


1. Privacy-Preserving Sharing of Sensitive Information    Security and privacy
2. Preserving Privacy Based on Semantic Policy Tools
3. The Phish-Market Protocol: Secure Sharing Between
   Competitors
4. Can Public-Cloud Security Meet Its Unique
   Challenges?
5. Internet Filtering Issues and Challenges

6. Encrypting Keys Securely
1. Joint synchronization and localization using TOAs: A   Communications
   linearization based WLS solution

1. Auto-Context and Its Application to High-Level         Pattern Analysis and
   Vision Tasks and 3D Brain Image Segmentation           Machine Intelligence
2. Cost-Sensitive Face Recognition
3. Motion Segmentation in the Presence of Outlying,
   Incomplete, or Corrupted Trajectories
4. P&D

5. FS2You: Peer-Assisted Semipersistent Online
   Hosting at a Large Scale
1. Improved Speech Presence Probabilities Using           Signal
   HMM-Based Inference, With Applications to Speech
   Enhancement and ASR
1. Affective Visualization and Retrieval for Music Video Multimedia
2. Speech Emotion Analysis: Exploring the Role of
   Context
3. Feature Analysis and Evaluation for Automatic
   Emotion Identification in Speech
4. Emotion Recognition in Text for 3-D Facial
   Expression Rendering
5. A 3-D Audio-Visual Corpus of Affective
   Communication

6. Accelerating the Media Business with MPEG
   Extensible Middleware
1. Classroom Wiki: A Collaborative Wiki for             Learning Technologies
   Instructional Use with Multiagent Group Formation
2. An Interactive Table for Supporting Participation
   Balance in Face-to-Face Collaborative Learning
3. Automatic Detection of Off-Task Behaviors in
   Intelligent Tutoring Systems with Machine Learning
   Techniques

4. Improving Teaching and Learning through
   Automated Short-Answer Marking
1. Efficient Lazy Evaluation of Rule-Based Programs     KDD
2. A Novel Combination of Answer Set Programming
   with Description Logics for the Semantic Web

3. Unsupervised Semantic Similarity Computation
   between Terms Using Web Documents

1. Web-Application Security: From Reactive to           IT
   Proactive

2. Introduction: Cyber security

1. Trust and Reputation Management                      INTERNET COMPUTING
2. Trusted Cloud Computing with Secure Resources
   and Data Coloring
3. Advanced Feedback Management for Internet
   Auction Reputation Systems
4. A Survey of First-Person Shooter Gaming Traffic on
   the Internet
5. Incentive Mechanisms in P2P Media Streaming
   Systems
6. Cloud Computing: The New Frontier of Internet
   Computing
7. Secure/Multipurpose Internet Mail Extensions

8. Trust and the Internet
1. Intrusion Detection for Grid and Cloud Computing     IT PROFESSIONAL

2. A Framework for RFID Deployment in Supply Chains
1. Special Section on Distributed Camera Networks:      Image Processing
   Sensing, Processing, Communication, and
   Implementation
2. 3-D Target-Based Distributed Smart Camera
   Network Localization

3. Activity Based Matching in Distributed Camera
   Networks
1. A managerial community of Web Services for           WEB SERVICES
   management of communities of Web Services
2. Automatic Composition of Semantic Web Services
   An Enhanced State Space Search Approach
3. Knowledge-first web services an E-Government
   example

4. Using the iPhone and iPod Touch for remote sensor
   control and data acquisition
1.   The Applied Research of Cloud Computing Platform   Cloud Computing
     Architecture in the E-Learning Area.
2. Cloud Computing System Based on Trusted
   Computing Platform.
3. IT Auditing to Assure a Secure Cloud Computing.
4. Performance Evaluation of Cloud Computing
   Offerings
5. Providing Privacy Preserving in cloud computing
6. Toward a Unified Ontology of Cloud Computing.
Bayesian classifier programmed in SQL

Secured Data Collection
Gene ontology with word computing with SOM
MILD
Edge Adaptive image stenography by MSB

Multibody Structure-and-Motion Segmentation by Branch-
and-Bound Model Selection
Satellite Image Contrast Enhancement Using Discrete
Wavelet Transform and Singular Value Decomposition
Skew Estimation of Document Images Using Bagging
Fast-Mesh: A Low-Delay High-Bandwidth Mesh for Peer-
to-Peer Live Streaming
A Stochastic Approach to Image Retrieval Using Relevance
Feedback and Particle Swarm Optimization
A Virtual Cloud Computing LAB
Predictive Network Anomaly detection and visualization
Active Re-ranking for Web Image Search
Facial detection and recognition in mimetic algorithm

Accurate image search using contextual dissimilarity
measures
Light:A query efficient yet low maintenance indexing
scheme over dth's
Anonymous query processing in road networks
The applied research of cloud computing arch in area of e-
learning
Routing
Understanding online interruption based advertising
impact
Aging Bloom Filter with Two Active Buffers for Dynamic
Sets
Layered Approach Using Conditional
Random Fields for Intrusion Detection




     For details:
           ASHADAS.P.K / SARANYA
           Mob: 9566216611 / 33
           asha@future-tec.co.in / sharanya@future-tec.co.in
           www.future-tec.co.in
           Old 52,New 62,Floor 3,Espee Complex
           Brindavan Street,West Mambalam,Chennai 33

Weitere ähnliche Inhalte

Was ist angesagt?

A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management SchemeA Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management Schemeijiert bestjournal
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-20141pointer
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014onepointer
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Adz91 Digital Ads Pvt Ltd
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
IEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIES
IEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIESIEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIES
IEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIEScreativetechgroups
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesecwayerode
 

Was ist angesagt? (13)

4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management SchemeA Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
 
IEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for meIEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for me
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
J1802035460
J1802035460J1802035460
J1802035460
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
IEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIES
IEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIESIEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIES
IEEE 2011 DOTNET PROJECTS @CREATIVE TECHNOLOGIES
 
E2matrix
E2matrixE2matrix
E2matrix
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 

Andere mochten auch

Andere mochten auch (6)

The most expensive movies
The most expensive moviesThe most expensive movies
The most expensive movies
 
Bring a copy of your resume for your future placements
Bring a copy of your resume for your future placementsBring a copy of your resume for your future placements
Bring a copy of your resume for your future placements
 
Lupus and fibro answers edited!
Lupus and fibro answers edited!Lupus and fibro answers edited!
Lupus and fibro answers edited!
 
свое дело в интернет!
свое дело в интернет!свое дело в интернет!
свое дело в интернет!
 
I pad swiper
I pad swiperI pad swiper
I pad swiper
 
Vuelo De Gansos
Vuelo De  GansosVuelo De  Gansos
Vuelo De Gansos
 

Ähnlich wie Ieee 2010 project titles

IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEallmightinfo
 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEonepointer
 
FINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEFINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEonepointer
 
FINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESFINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESonepointer
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsLeMeniz Infotech
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryLeMeniz Infotech
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryLeMeniz Infotech
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titlesEcwayt
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titlesEcway2004
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titlesEcwaytechnoz
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwayt
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcway2004
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwaytechnoz
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsHarish PG
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 

Ähnlich wie Ieee 2010 project titles (20)

IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
 
2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE
 
FINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEFINAL PROJECT FOR ECE
FINAL PROJECT FOR ECE
 
FINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESFINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLES
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projects
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherry
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titles
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titles
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Java ieee titles 2013 14
Java ieee titles 2013 14Java ieee titles 2013 14
Java ieee titles 2013 14
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 

Ieee 2010 project titles

  • 1. FUTURE-TEC TECHNOLOGIES 1. A Machine Learning Approach to TCP Throughput Networking Prediction 2. Feedback-Based Scheduling for Load-Balanced Two- Stage Switches 3.Trust management in mobile ad hoc networks using a scalable maturity-based Model 1. Online social networks Network 2. Sharing location in online social networks 1. Fuzzy Data Standardization Fuzzy 1. On the Quality of Service of Crash-Recovery Failure Dependable and Security Detectors 2.Cluster-Based Key Pre-distribution Using Deployment Knowledge Computer Science 1.Integrated High-Fidelity Geosciences Simulations for Enhanced Terrain-Related Target Detection 2. Accelerating Biomedical Research in Designing Diagnostic Assays, Drugs, and Vaccines 1. Spatial Navigation for Context-Aware Video Computer Science and Surveillance Graphics 2. Guest Editors' Introduction: Multimedia Analytics 3. Multimedia Analysis + Visual Analytics = Multimedia Analytics 4. AniViz: A Template-Based Animation Tool for Volume Visualization 5. iFeel_IM!: Augmenting Emotions during Online Communication 6. MediaTable: Interactive Categorization of
  • 2. Multimedia Collections 1. Classification of Protein-Protein Interaction Full-Text Computational Biology Documents Using Text and Citation Network and Bioinformatics Features 2. Exploring Species-Based Strategies for Gene Normalization 1. Automatic Generation of Game Level Solutions as Computational Storyboards Intelligence and AI in Games 2. Game Bot Detection via Avatar Trajectory Analysis 3. The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model 1. Full-Reference Video Quality Metric for Fully Broadcasting Scalable and Mobile SVC Content 1. Understanding Wi-Fi 2.0: from the economical Wireless Communications perspective of wireless service providers [Dynamic Spectrum Management] 2. Efficient routing for international mobile call setup [Accepted from Open Call] 3. IEEE 802.11E QoS and power saving features overview and analysis of combined performance [Accepted from Open Call] 4. Achieving Secret Communication for Fast Rayleigh Fading Channels 1. Using a web-based tool to define and implement Software software process improvement initiatives in a small industrial setting 2. Including both static and dynamic typing in the same programming language 3. Design principles of web-based distance education system and sample application in Afyon Kocatepe University 4. Component co-evolution and component
  • 3. dependency: speculations and verifications 5. Technologies and Tools for Distributed Teams 1. End-to-End Service Support for Mashups Service Computing 1. Privacy-Preserving Sharing of Sensitive Information Security and privacy 2. Preserving Privacy Based on Semantic Policy Tools 3. The Phish-Market Protocol: Secure Sharing Between Competitors 4. Can Public-Cloud Security Meet Its Unique Challenges? 5. Internet Filtering Issues and Challenges 6. Encrypting Keys Securely 1. Joint synchronization and localization using TOAs: A Communications linearization based WLS solution 1. Auto-Context and Its Application to High-Level Pattern Analysis and Vision Tasks and 3D Brain Image Segmentation Machine Intelligence 2. Cost-Sensitive Face Recognition 3. Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories 4. P&D 5. FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale 1. Improved Speech Presence Probabilities Using Signal HMM-Based Inference, With Applications to Speech Enhancement and ASR 1. Affective Visualization and Retrieval for Music Video Multimedia 2. Speech Emotion Analysis: Exploring the Role of Context 3. Feature Analysis and Evaluation for Automatic Emotion Identification in Speech
  • 4. 4. Emotion Recognition in Text for 3-D Facial Expression Rendering 5. A 3-D Audio-Visual Corpus of Affective Communication 6. Accelerating the Media Business with MPEG Extensible Middleware 1. Classroom Wiki: A Collaborative Wiki for Learning Technologies Instructional Use with Multiagent Group Formation 2. An Interactive Table for Supporting Participation Balance in Face-to-Face Collaborative Learning 3. Automatic Detection of Off-Task Behaviors in Intelligent Tutoring Systems with Machine Learning Techniques 4. Improving Teaching and Learning through Automated Short-Answer Marking 1. Efficient Lazy Evaluation of Rule-Based Programs KDD 2. A Novel Combination of Answer Set Programming with Description Logics for the Semantic Web 3. Unsupervised Semantic Similarity Computation between Terms Using Web Documents 1. Web-Application Security: From Reactive to IT Proactive 2. Introduction: Cyber security 1. Trust and Reputation Management INTERNET COMPUTING 2. Trusted Cloud Computing with Secure Resources and Data Coloring 3. Advanced Feedback Management for Internet Auction Reputation Systems 4. A Survey of First-Person Shooter Gaming Traffic on the Internet 5. Incentive Mechanisms in P2P Media Streaming Systems
  • 5. 6. Cloud Computing: The New Frontier of Internet Computing 7. Secure/Multipurpose Internet Mail Extensions 8. Trust and the Internet 1. Intrusion Detection for Grid and Cloud Computing IT PROFESSIONAL 2. A Framework for RFID Deployment in Supply Chains 1. Special Section on Distributed Camera Networks: Image Processing Sensing, Processing, Communication, and Implementation 2. 3-D Target-Based Distributed Smart Camera Network Localization 3. Activity Based Matching in Distributed Camera Networks 1. A managerial community of Web Services for WEB SERVICES management of communities of Web Services 2. Automatic Composition of Semantic Web Services An Enhanced State Space Search Approach 3. Knowledge-first web services an E-Government example 4. Using the iPhone and iPod Touch for remote sensor control and data acquisition 1. The Applied Research of Cloud Computing Platform Cloud Computing Architecture in the E-Learning Area. 2. Cloud Computing System Based on Trusted Computing Platform. 3. IT Auditing to Assure a Secure Cloud Computing. 4. Performance Evaluation of Cloud Computing Offerings 5. Providing Privacy Preserving in cloud computing 6. Toward a Unified Ontology of Cloud Computing.
  • 6. Bayesian classifier programmed in SQL Secured Data Collection Gene ontology with word computing with SOM MILD Edge Adaptive image stenography by MSB Multibody Structure-and-Motion Segmentation by Branch- and-Bound Model Selection Satellite Image Contrast Enhancement Using Discrete Wavelet Transform and Singular Value Decomposition Skew Estimation of Document Images Using Bagging Fast-Mesh: A Low-Delay High-Bandwidth Mesh for Peer- to-Peer Live Streaming A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization A Virtual Cloud Computing LAB Predictive Network Anomaly detection and visualization Active Re-ranking for Web Image Search Facial detection and recognition in mimetic algorithm Accurate image search using contextual dissimilarity measures Light:A query efficient yet low maintenance indexing scheme over dth's Anonymous query processing in road networks The applied research of cloud computing arch in area of e- learning Routing Understanding online interruption based advertising impact Aging Bloom Filter with Two Active Buffers for Dynamic Sets
  • 7. Layered Approach Using Conditional Random Fields for Intrusion Detection For details: ASHADAS.P.K / SARANYA Mob: 9566216611 / 33 asha@future-tec.co.in / sharanya@future-tec.co.in www.future-tec.co.in Old 52,New 62,Floor 3,Espee Complex Brindavan Street,West Mambalam,Chennai 33