SlideShare a Scribd company logo
1 of 11
Download to read offline
Techno Info Solutions




   TECHNO INFO SOLUTIONS
                                                      Project’s Warehouse




            PROJECT TITLES 2012-13




On Campus Drive for                                         + 91 96777 97222
    Techno Info
                                                            + 91 98408 22088
Solutions’s Students
                                                              044 - 43544440




            No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
           Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions




                              JAVA

S.No                         Title                                  Domain


J001 Indirect Reciprocity Security            Game      for    Networking
     Large-Scale Wireless Networks

J002 Publishing Search Logs—A               Comparative Data Mining
     Study of Privacy Guarantees

J003 Efficient Iceberg Query Evaluation Using Data Mining
     Compressed Bitmap Index
     Packet-Hiding Methods For Preventing
                                                Secure
J004 Selective Jamming Attacks Dependable And
                                              Computing
     Secure Computing
     Local Tetra Patterns: A New Feature
                                                 Image
J005 Descriptor    for  Content-Based   Image
                                              Processing
     Retrieval
                                                                 Image
J006 Interactive Image Segmentation Based on
                                                               Processing
     Level Sets Probabilities
                                                                 Secure
J007 Modeling The Worm And Detection The
                                                               Computing
     Camouflaging Worm

J008 Enhanced Periodic Stream Based BandwiDh                   Networking
     Allocation Scheme For Wireless Networks
     Content Based Image Retrieval Methods
                                                                 Image
J009 Using Self Supporting Retrieval Map
                                                               Processing
     Algorithm

          No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
         Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
                                                                     Network
J010 Two Way Authentication Protocol For Mobile
                                                                     Security
     Payment System
     Analysis of Distributed Algorithms to
J011 Remove Correlations for Reducing Average                   Networking
     Download Time in Peer-to-Peer Networks
     Towards Secure and Dependable Storage
                                                                  Cloud
J012 Services in Cloud Computing
                                                                Computing

                                                                  Cloud
J013 Enabling Public Auditablity for Dynamic
                                                                Computing
     Storage in Cloud Computing
                                                                  Mobile
J014 Privacy- and Integrity-Preserving Range
                                                                Computing
     Queries in Sensor Networks
     A dynamic flow control mechanism based on
                                                                     Network
J015 a hierarchical feedback model for data
                                                                     Security
     center networks
                                                                  Secure
J016 Secure and practical outsourcing linear
                                                                Computing
     programming in cloud computing
     An efficient remote user authentication and
                                                                  Mobile
J017 key agreement protocol for mobile client-
                                                                Computing
     server environment from pairings
     A new method for detecting JEPG doubly
                                                                     Network
J018 compression images by using estimated
                                                                     Security
     primary quantization step

J019 Detecting Black hole Attack on DSR based                   Networking
     Mobile ad hoc network.
     Priority based congestion control for
J020 heterogeneous traffic in multipath wireless                Networking
     sensor network

J021 Administrator and           Trust    Based      secure     Networking
     routing in MANET
                                                                  Secure
J022 Mechanism Design based secure data object
                                                                Computing
     Replication

           No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
          Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
     Impact of mobility on location based routing
                                                                  Mobile
J023 with adaptive request zone in Mobile ad hoc
                                                                Computing
     networks
                                                                  Mobile
J024 Constructing inter domain packet filters to
                                                                Computing
     control IP Forging

J025 Improving     Aggregate   Recommendation Data Mining
     Diversity Using Ranking-Based Techniques
                                                                  Mobile
J026 Exploiting ubiquitous data collection for
                                                                Computing
     mobile users wireless sensors Networks
                                                                  Secure
J027 Two Way Authentication Protocol For Mobile
                                                                Computing
     Payment System

J028 Improving sparse organic Wi-Fi localization                Networking
     with inertial sensors
     On the complexity of the regenerator
J029 placement problem on the optimized                         Networking
     network

J030 Expert system for simulating the behavior of Data Mining
     the cybernetic offenders
     Analysis of Distributed Algorithms to
                                                    Parallel
J031 Remove Correlations for Reducing Average
                                                  Distribution
     Download Time in Peer-to-Peer Networks

J032 Design, Implementation, and Performance of                 Networking
     a Load Balancer for SIP Server Clusters
     Scheduling algorithm and bounds for rate
J033 less data dissemination in dense wireless                  Networking
     network

J034 Privacy- and Integrity-Preserving               Range      Networking
     Queries in Sensor Networks

J035 Effective transmission of data through rbph                Networking
     for group communication

           No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
          Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
                                                                  Image
J036
                                                                Processing
       Crack detection
                                                                  Pattern
J037
                                                                 Matching
       A real time deformable detection
                                                                  Image
J038
                                                                Processing
       Patch based near optimal image de noising
                                                                  Image
J039 Interactive   Image    Complication               with
                                                                Processing
     direction empirical mode

J040 Exploiting ubiquitous data collection for                  Networking
     mobile users wireless sensors Networks
                                                                  Artificial
J041 Cloud Computing for Agent-Based Urban
                                                                Intelligence
     Transportation Systems
     Artificial Societies and GPU-Based Cloud
                                                                  Artificial
J042 Computing for Intelligent Transportation
                                                                Intelligence
     Management

J043 A distributed cycle minimization protocol for              Networking
     peer to peer networks
                                                                  Cloud
J044
                                                                Computing
     Reliable Re-encryption in Unreliable Clouds
     Timescale Decoupled Routing and Rate
J045 Control    in    Intermittently   Connected                Networking
     Networks
                                                                  Cloud
J046 Fog Computing: Mitigating Insider Data
                                                                Computing
     Theft Attacks in the Cloud
     An    Efficient    Caching Scheme   and
J047 Consistency Maintenance in Hybrid P2P                      Networking
     System
     Analysis of Distributed Algorithms to
J048 Remove Correlations for Reducing Average                   Networking
     Download Time in PEER–TO–PEER Networks

           No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
          Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
                                                                  Cloud
J049 Ensuring Distributed Accountability
                                                                Computing
     for Data Sharing in the Cloud

J050 Design of Wireless Sensor Networks                         Networking
     for Mobile Target Detection
                                                                  Mobile
J051 Efficient Scheduling for Periodic Aggregation
                                                                Computing
     Queries in Multi hop Sensor Networks
     Network-Level Access Control Policy Analysis
J052 and Transformation                                         Networking


J053 Efficient Computation of Range Aggregates Data Mining
     against Uncertain Location-Based Queries
     Local Broadcast Algorithms in
                                                 Mobile
J054 Wireless Ad Hoc Networks: Reducing
                                               Computing
     the Number of Transmissions
                                                                  Image
J055 A Universal De noising Framework With a
                                                                Processing
     New Impulse Detector and Nonlocal Means
                                                                  Mobile
J056 Taming the Mobile Data Deluge With Drop
                                                                Computing
     Zones

J057 Mercury A scalable and Similarity Aware Data Mining
     Scheme in Multi Level Cache hierarchy
     Energy Efficient resource allocation and
                                                    Mobile
J058 scheduling for multi caste of scalable video
                                                  Computing
     over wireless network
                                                                  Secure
J059 Intrusion detection in Homogeneous and
                                                                Computing
     Heterogeneous wireless sensor network

J060 Learn to personalized image search from the Data Mining
     photo sharing websites




           No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
          Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions




                           DOTNET

S.No                          Title                                 Domain

       Pair wise Key Establishment Technique
                                                                    Network
D001   Based Message Authentication For Wireless
                                                                    Security
       sensor Network
       Self Configurable Re-link Establishment
D002   using Continuous Neighbor Discovery in                  Networking
       Asynchronous Wireless Sensor Networks
                                                                 Image
D003   ATM Security Using Fingerprint Biometric
                                                               Processing
       Identifier: An Investigative Study
       On the Security of a Ticket-Based
                                                                    Network
D004   Anonymity       System     with   Traceability
                                                                    Security
       Property in Wireless Mesh Networks
                                                   Parallel &
D005   Traffic Aware Dynamic Routing to Alleviate
                                                  Distribution
       Congestion in wireless Sensors Networks
                                              Parallel &
D006   Leveraging Pretension to Improve the
                                             Distribution
       Coverage of Wireless Sensors Networks
                                                                 Cloud
D007   Data Dynamics for Storage Security and
                                                               Computing
       Public Audit ability in Cloud Computing

D008   Combining tag and value similarity for data Data Mining
       extraction and alignment

D009   Vision based deep web data extraction for Data Mining
       web document clustering

          No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
         Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions

D010   Fuzzy    Feature     Clustering For  Text Data Mining
       Classification
       A Web Search Engine-Based Approach to
D011   Measure Semantic Similarity between Web service
       Words
       A Privacy-Preserving Remote Data Integrity
                                                    Cloud
D012   Checking Protocol with Data Dynamics and
                                                  Computing
       Public Verifiability

D013   A Collaborative De-Centralized Approach to Data Mining
       Web Search
                                                   Cloud
D014   Toward Secure and Dependable Storage
                                                Computing
       Services in Cloud Computing
       Decentralized Meta data management
                                                 Parallel &
D015   research based on distributed hash table
                                                Distribution
       technology
       A Performance Anomaly      Detection and
D016   Analysis                                 Data Mining
       Framework for DBMS
                                                                 Secure
D017   Multicast network security using quantum
                                                               Computing
       key distribution

D018   A Knowledge-Driven Approach to Activity Data Mining
       Recognition in Smart Homes
       Efficient Virtual Backbone Construction
                                                     Mobile
D019   with Routing Cost Constraint in Wireless
                                                   Computing
       Networks Using Directional Antennas
       STORM: A Framework for Integrated
                                                     Mobile
D020   Routing,     Scheduling,    and     Traffic
                                                   Computing
       Management in Ad Hoc Networks
                                                                    Network
D021   Network-Level   Access    Control             Policy
                                                                    Security
       Analysis and Transformation

D022   Design of Wireless Sensor Networks                      Networking
       for Mobile Target Detection

          No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
         Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
                                                                 Pattern
D023   ATM Security Using Fingerprint Biometric
                                                                matching
       Identifier: An Investigative Study
                                                                 Artificial
D024   Fuzzy    Feature       Clustering       For     Text
                                                               Intelligence
       Classification
                                                    Network
D025   Towards Shift Tolerant Visual Secret
                                                    security
       Sharing Schemes
       A   Machine     Learning     Approach    for
D026   Identifying Disease-Treatment Relations in Data Mining
       Short Texts
       Disengagement      Detection    in   Online
D027   Learning:     Validation    Studies    and Data Mining
       Perspectives

D028   Knowledge Mining Process Between Various Data Mining
       Groups

D029   Visual Exploration across Biomedical Data Mining
       Database
       Enabling Public Audit ability and Data
                                                  Cloud
D030   Dynamics for Storage Security in Cloud
                                                Computing
       Computing
       Artificial Societies and GPU-Based Cloud
                                                  Cloud
D031   Computing for Intelligent Transportation
                                                computing
       Management
                                                                 Image
D032   Fingerprint Verification Using Minutiae
                                                               Processing
       matching
       Defending against distance cheating in
D033   link-weighted application layer multicast               Networking

                                                                 Image
D034   Identity verification using computer vision
                                                               Processing
       for automatic garage door opening
       Exploiting Dynamic Resource Allocation for
                                                                 Cloud
D035   Efficient Parallel Data Processing in the
                                                               Computing
       Cloud computing

          No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
         Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
                                                                 Cloud
D036
                                                               Computing
       Optimal Service Pricing For A Cloud Cache

D037                                                           Networking
       Compressing Network Access Control Lists
                                                                 Cloud
D038   Fuzzy keyword search over encrypted data
                                                               computing
       type in cloud computing

D039                                                           Networking
       Privacy-aware role based access control

D040   Index Based N-Gram Extraction from Large Data Mining
       Document Collection
       Constrained Function Based Message
                                                 Network
D041   authentication using wireless sensors
                                                 Security
       networks

D042   Continuous   Neighbor    Discovery                 in   Networking
       Asynchronous Sensors Networks

D043   Fault-Tolerant Relay Node Placement in Networking
       Heterogeneous Wireless Sensor Networks
       A Bandwidth – Efficient Co operative
                                                    Parallel and
D044   Authentication scheme for filtering injected
                                                    Distribution
       data in wireless sensors networks

D045   Efficient Streaming of Videos in Broadband              Networking
       Networks.
                                                                 Cloud
D046   Optimization of resource provisioning cost
                                                               Computing
       in cloud computing

D047   Personalized concept based search engine Data Mining
       quires
                                                                 Mobile
D048   Local    Greedy      Approximation     for
                                                               Computing
       Scheduling in Multihop Wireless Networks

          No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
         Phone: 044-43544440 E-mail: info@technoinfosolutions.com
Techno Info Solutions
       Enabling Secure and Efficient Ranked
D049   Keyword Search over Outsourced Cloud Data Mining
       Data
       A Web-based Patient Support System Using
       Artificial Intelligence to Improve Health   Artificial
D050
       Monitoring and Quality of Life            Intelligence

       Artificial Societies and GPU-Based Cloud
                                                                 Artificial
D051   Computing for Intelligent Transportation
                                                               Intelligence
       Management

D052   Efficient Multidimensional Fuzzy Search for Data Mining
       Personal Information Management Systems
                                                 Parallel and
D053   An Efficient Prediction-Based Routing in
                                                 Distribution
       Disruption-Tolerant Networks
       Mobility: A Double-Edged Sword for HSPA
                                                 Parallel and
D054   Networks: A Large-Scale Test on Hong Kong
                                                 Distribution
       Mobile HSPA Networks
       Bloom Cast: Efficient and Effective Full-
                                                 Parallel and
D055   Text Retrieval in Unstructured P2P
                                                 Distribution
       Networks
       Timescale Decoupled Routing & Rate
D056   Control    in   Intermittently  Connected Networking
       Networks

D057   Long term cross session relevance feedback              Networking
       using virtual features
                                                                    Network
D058   An Adaptive Cross-Layer Design Approach
                                                                    Security
       for Network Security Management
       Artificial Intelligence Algorithm for Heart
                                                                 Pattern
D059   disease Diagnosis using Phonocardiogram
                                                                Matching
       signals
                                                                 Image
D060   An improved Canny               edge      detection
                                                               Processing
       algorithm for color image



          No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15.
         Phone: 044-43544440 E-mail: info@technoinfosolutions.com

More Related Content

What's hot

ieee CSE & IT M.tech\BTECH project list
ieee CSE & IT M.tech\BTECH project listieee CSE & IT M.tech\BTECH project list
ieee CSE & IT M.tech\BTECH project listVision Solutions
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Tutorial 3 pedro janices
Tutorial 3 pedro janicesTutorial 3 pedro janices
Tutorial 3 pedro janicesegovernment
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
java & .net titles
java & .net titlesjava & .net titles
java & .net titlesAsha Das
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hatgopikurup
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projectsGagnertech
 

What's hot (19)

ieee CSE & IT M.tech\BTECH project list
ieee CSE & IT M.tech\BTECH project listieee CSE & IT M.tech\BTECH project list
ieee CSE & IT M.tech\BTECH project list
 
575 579
575 579575 579
575 579
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Tutorial 3 pedro janices
Tutorial 3 pedro janicesTutorial 3 pedro janices
Tutorial 3 pedro janices
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
java & .net titles
java & .net titlesjava & .net titles
java & .net titles
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hat
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
489 493
489 493489 493
489 493
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projects
 

Viewers also liked

Codefest-2015 Reactive Streams
Codefest-2015 Reactive StreamsCodefest-2015 Reactive Streams
Codefest-2015 Reactive StreamsAlexey Romanchuk
 
12201669 pss7
12201669 pss712201669 pss7
12201669 pss7oscar_mui
 
(403666543) tc2
(403666543) tc2(403666543) tc2
(403666543) tc2Marcie22
 
Week 3 e facilitation
Week 3 e facilitation Week 3 e facilitation
Week 3 e facilitation resourceguru
 
Unlimited Health
Unlimited HealthUnlimited Health
Unlimited HealthRey Misoles
 
Smart restaurant system (u te m students)
Smart restaurant system (u te m students)Smart restaurant system (u te m students)
Smart restaurant system (u te m students)Muhammad Tarmizi
 
Improving survival from Sudden Cardiac Arrest – can it really work?
Improving survival from Sudden Cardiac Arrest – can it really work?Improving survival from Sudden Cardiac Arrest – can it really work?
Improving survival from Sudden Cardiac Arrest – can it really work?Haydn Drake
 
알파고의 알고리즘
알파고의 알고리즘알파고의 알고리즘
알파고의 알고리즘SeokWon Kim
 
How Blockchain Works - 블록체인의 원리
How Blockchain Works - 블록체인의 원리How Blockchain Works - 블록체인의 원리
How Blockchain Works - 블록체인의 원리SeokWon Kim
 
Migliaccio.pdf
Migliaccio.pdfMigliaccio.pdf
Migliaccio.pdfgrssieee
 
IGARSS2011_GulfOilSpill_CJones.pdf
IGARSS2011_GulfOilSpill_CJones.pdfIGARSS2011_GulfOilSpill_CJones.pdf
IGARSS2011_GulfOilSpill_CJones.pdfgrssieee
 
FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...
FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...
FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...grssieee
 
2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt
2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt
2 ShengleiZhang_IGARSS2011_MO3.T04.2.pptgrssieee
 
WE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo Tomiyasu
WE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo TomiyasuWE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo Tomiyasu
WE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo Tomiyasugrssieee
 

Viewers also liked (20)

Floor Plan
Floor PlanFloor Plan
Floor Plan
 
Codefest-2015 Reactive Streams
Codefest-2015 Reactive StreamsCodefest-2015 Reactive Streams
Codefest-2015 Reactive Streams
 
12201669 pss7
12201669 pss712201669 pss7
12201669 pss7
 
(403666543) tc2
(403666543) tc2(403666543) tc2
(403666543) tc2
 
Week 3 e facilitation
Week 3 e facilitation Week 3 e facilitation
Week 3 e facilitation
 
asthma management
asthma managementasthma management
asthma management
 
Unlimited Health
Unlimited HealthUnlimited Health
Unlimited Health
 
Non resistant tuberculosis
Non resistant tuberculosisNon resistant tuberculosis
Non resistant tuberculosis
 
Smart restaurant system (u te m students)
Smart restaurant system (u te m students)Smart restaurant system (u te m students)
Smart restaurant system (u te m students)
 
EJEMPLOS DE CALCULO DE WATERCAD
EJEMPLOS DE CALCULO DE WATERCADEJEMPLOS DE CALCULO DE WATERCAD
EJEMPLOS DE CALCULO DE WATERCAD
 
Improving survival from Sudden Cardiac Arrest – can it really work?
Improving survival from Sudden Cardiac Arrest – can it really work?Improving survival from Sudden Cardiac Arrest – can it really work?
Improving survival from Sudden Cardiac Arrest – can it really work?
 
알파고의 알고리즘
알파고의 알고리즘알파고의 알고리즘
알파고의 알고리즘
 
ANTIDEPRESSANTS
ANTIDEPRESSANTSANTIDEPRESSANTS
ANTIDEPRESSANTS
 
Dr bushra antiulcer screening
Dr bushra antiulcer screeningDr bushra antiulcer screening
Dr bushra antiulcer screening
 
How Blockchain Works - 블록체인의 원리
How Blockchain Works - 블록체인의 원리How Blockchain Works - 블록체인의 원리
How Blockchain Works - 블록체인의 원리
 
Migliaccio.pdf
Migliaccio.pdfMigliaccio.pdf
Migliaccio.pdf
 
IGARSS2011_GulfOilSpill_CJones.pdf
IGARSS2011_GulfOilSpill_CJones.pdfIGARSS2011_GulfOilSpill_CJones.pdf
IGARSS2011_GulfOilSpill_CJones.pdf
 
FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...
FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...
FR1.L09.3 - SAR TOMOGRAPHIC FOCUSING BY COMPRESSIVE SAMPLING: EXPERIMENTS ON ...
 
2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt
2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt
2 ShengleiZhang_IGARSS2011_MO3.T04.2.ppt
 
WE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo Tomiyasu
WE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo TomiyasuWE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo Tomiyasu
WE3.L10 - Many Happy Returns: Reflections Inspired by Kiyo Tomiyasu
 

Similar to Techno info solutions titles list

Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtechPantech ProEd Pvt Ltd
 
2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtechSrinivasan Natarajan
 
Java Project 2013- 2014 TITLES
Java Project 2013- 2014 TITLESJava Project 2013- 2014 TITLES
Java Project 2013- 2014 TITLESeccube
 
JAVA-2014 IEEE Projects for Latest
JAVA-2014 IEEE Projects for LatestJAVA-2014 IEEE Projects for Latest
JAVA-2014 IEEE Projects for LatestChinnasamy C
 
Mobileapplicationprojectsformcaingagnerchennai
MobileapplicationprojectsformcaingagnerchennaiMobileapplicationprojectsformcaingagnerchennai
Mobileapplicationprojectsformcaingagnerchennairathikamca
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Joel Demay
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015kishu0005
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesSrinivasan Natarajan
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titlesingenioustech
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
Java IEEE 2015 titles
Java IEEE 2015 titlesJava IEEE 2015 titles
Java IEEE 2015 titlessmartprotech
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Bring a copy of your resume for your future placements
Bring a copy of your resume for your future placementsBring a copy of your resume for your future placements
Bring a copy of your resume for your future placementsIngenious Techno Solution
 

Similar to Techno info solutions titles list (20)

Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech
 
2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech
 
Java Project 2013- 2014 TITLES
Java Project 2013- 2014 TITLESJava Project 2013- 2014 TITLES
Java Project 2013- 2014 TITLES
 
2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles
 
JAVA-2014 IEEE Projects for Latest
JAVA-2014 IEEE Projects for LatestJAVA-2014 IEEE Projects for Latest
JAVA-2014 IEEE Projects for Latest
 
Mobileapplicationprojectsformcaingagnerchennai
MobileapplicationprojectsformcaingagnerchennaiMobileapplicationprojectsformcaingagnerchennai
Mobileapplicationprojectsformcaingagnerchennai
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17
 
Dotnet ieee 2014, completed list(gy)
Dotnet ieee 2014, completed list(gy)Dotnet ieee 2014, completed list(gy)
Dotnet ieee 2014, completed list(gy)
 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titles
 
5. _java_2012-13_titles
5.  _java_2012-13_titles5.  _java_2012-13_titles
5. _java_2012-13_titles
 
2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
Java IEEE 2015 titles
Java IEEE 2015 titlesJava IEEE 2015 titles
Java IEEE 2015 titles
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Bring a copy of your resume for your future placements
Bring a copy of your resume for your future placementsBring a copy of your resume for your future placements
Bring a copy of your resume for your future placements
 

Techno info solutions titles list

  • 1. Techno Info Solutions TECHNO INFO SOLUTIONS Project’s Warehouse PROJECT TITLES 2012-13 On Campus Drive for + 91 96777 97222 Techno Info + 91 98408 22088 Solutions’s Students 044 - 43544440 No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 2. Techno Info Solutions JAVA S.No Title Domain J001 Indirect Reciprocity Security Game for Networking Large-Scale Wireless Networks J002 Publishing Search Logs—A Comparative Data Mining Study of Privacy Guarantees J003 Efficient Iceberg Query Evaluation Using Data Mining Compressed Bitmap Index Packet-Hiding Methods For Preventing Secure J004 Selective Jamming Attacks Dependable And Computing Secure Computing Local Tetra Patterns: A New Feature Image J005 Descriptor for Content-Based Image Processing Retrieval Image J006 Interactive Image Segmentation Based on Processing Level Sets Probabilities Secure J007 Modeling The Worm And Detection The Computing Camouflaging Worm J008 Enhanced Periodic Stream Based BandwiDh Networking Allocation Scheme For Wireless Networks Content Based Image Retrieval Methods Image J009 Using Self Supporting Retrieval Map Processing Algorithm No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 3. Techno Info Solutions Network J010 Two Way Authentication Protocol For Mobile Security Payment System Analysis of Distributed Algorithms to J011 Remove Correlations for Reducing Average Networking Download Time in Peer-to-Peer Networks Towards Secure and Dependable Storage Cloud J012 Services in Cloud Computing Computing Cloud J013 Enabling Public Auditablity for Dynamic Computing Storage in Cloud Computing Mobile J014 Privacy- and Integrity-Preserving Range Computing Queries in Sensor Networks A dynamic flow control mechanism based on Network J015 a hierarchical feedback model for data Security center networks Secure J016 Secure and practical outsourcing linear Computing programming in cloud computing An efficient remote user authentication and Mobile J017 key agreement protocol for mobile client- Computing server environment from pairings A new method for detecting JEPG doubly Network J018 compression images by using estimated Security primary quantization step J019 Detecting Black hole Attack on DSR based Networking Mobile ad hoc network. Priority based congestion control for J020 heterogeneous traffic in multipath wireless Networking sensor network J021 Administrator and Trust Based secure Networking routing in MANET Secure J022 Mechanism Design based secure data object Computing Replication No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 4. Techno Info Solutions Impact of mobility on location based routing Mobile J023 with adaptive request zone in Mobile ad hoc Computing networks Mobile J024 Constructing inter domain packet filters to Computing control IP Forging J025 Improving Aggregate Recommendation Data Mining Diversity Using Ranking-Based Techniques Mobile J026 Exploiting ubiquitous data collection for Computing mobile users wireless sensors Networks Secure J027 Two Way Authentication Protocol For Mobile Computing Payment System J028 Improving sparse organic Wi-Fi localization Networking with inertial sensors On the complexity of the regenerator J029 placement problem on the optimized Networking network J030 Expert system for simulating the behavior of Data Mining the cybernetic offenders Analysis of Distributed Algorithms to Parallel J031 Remove Correlations for Reducing Average Distribution Download Time in Peer-to-Peer Networks J032 Design, Implementation, and Performance of Networking a Load Balancer for SIP Server Clusters Scheduling algorithm and bounds for rate J033 less data dissemination in dense wireless Networking network J034 Privacy- and Integrity-Preserving Range Networking Queries in Sensor Networks J035 Effective transmission of data through rbph Networking for group communication No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 5. Techno Info Solutions Image J036 Processing Crack detection Pattern J037 Matching A real time deformable detection Image J038 Processing Patch based near optimal image de noising Image J039 Interactive Image Complication with Processing direction empirical mode J040 Exploiting ubiquitous data collection for Networking mobile users wireless sensors Networks Artificial J041 Cloud Computing for Agent-Based Urban Intelligence Transportation Systems Artificial Societies and GPU-Based Cloud Artificial J042 Computing for Intelligent Transportation Intelligence Management J043 A distributed cycle minimization protocol for Networking peer to peer networks Cloud J044 Computing Reliable Re-encryption in Unreliable Clouds Timescale Decoupled Routing and Rate J045 Control in Intermittently Connected Networking Networks Cloud J046 Fog Computing: Mitigating Insider Data Computing Theft Attacks in the Cloud An Efficient Caching Scheme and J047 Consistency Maintenance in Hybrid P2P Networking System Analysis of Distributed Algorithms to J048 Remove Correlations for Reducing Average Networking Download Time in PEER–TO–PEER Networks No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 6. Techno Info Solutions Cloud J049 Ensuring Distributed Accountability Computing for Data Sharing in the Cloud J050 Design of Wireless Sensor Networks Networking for Mobile Target Detection Mobile J051 Efficient Scheduling for Periodic Aggregation Computing Queries in Multi hop Sensor Networks Network-Level Access Control Policy Analysis J052 and Transformation Networking J053 Efficient Computation of Range Aggregates Data Mining against Uncertain Location-Based Queries Local Broadcast Algorithms in Mobile J054 Wireless Ad Hoc Networks: Reducing Computing the Number of Transmissions Image J055 A Universal De noising Framework With a Processing New Impulse Detector and Nonlocal Means Mobile J056 Taming the Mobile Data Deluge With Drop Computing Zones J057 Mercury A scalable and Similarity Aware Data Mining Scheme in Multi Level Cache hierarchy Energy Efficient resource allocation and Mobile J058 scheduling for multi caste of scalable video Computing over wireless network Secure J059 Intrusion detection in Homogeneous and Computing Heterogeneous wireless sensor network J060 Learn to personalized image search from the Data Mining photo sharing websites No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 7. Techno Info Solutions DOTNET S.No Title Domain Pair wise Key Establishment Technique Network D001 Based Message Authentication For Wireless Security sensor Network Self Configurable Re-link Establishment D002 using Continuous Neighbor Discovery in Networking Asynchronous Wireless Sensor Networks Image D003 ATM Security Using Fingerprint Biometric Processing Identifier: An Investigative Study On the Security of a Ticket-Based Network D004 Anonymity System with Traceability Security Property in Wireless Mesh Networks Parallel & D005 Traffic Aware Dynamic Routing to Alleviate Distribution Congestion in wireless Sensors Networks Parallel & D006 Leveraging Pretension to Improve the Distribution Coverage of Wireless Sensors Networks Cloud D007 Data Dynamics for Storage Security and Computing Public Audit ability in Cloud Computing D008 Combining tag and value similarity for data Data Mining extraction and alignment D009 Vision based deep web data extraction for Data Mining web document clustering No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 8. Techno Info Solutions D010 Fuzzy Feature Clustering For Text Data Mining Classification A Web Search Engine-Based Approach to D011 Measure Semantic Similarity between Web service Words A Privacy-Preserving Remote Data Integrity Cloud D012 Checking Protocol with Data Dynamics and Computing Public Verifiability D013 A Collaborative De-Centralized Approach to Data Mining Web Search Cloud D014 Toward Secure and Dependable Storage Computing Services in Cloud Computing Decentralized Meta data management Parallel & D015 research based on distributed hash table Distribution technology A Performance Anomaly Detection and D016 Analysis Data Mining Framework for DBMS Secure D017 Multicast network security using quantum Computing key distribution D018 A Knowledge-Driven Approach to Activity Data Mining Recognition in Smart Homes Efficient Virtual Backbone Construction Mobile D019 with Routing Cost Constraint in Wireless Computing Networks Using Directional Antennas STORM: A Framework for Integrated Mobile D020 Routing, Scheduling, and Traffic Computing Management in Ad Hoc Networks Network D021 Network-Level Access Control Policy Security Analysis and Transformation D022 Design of Wireless Sensor Networks Networking for Mobile Target Detection No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 9. Techno Info Solutions Pattern D023 ATM Security Using Fingerprint Biometric matching Identifier: An Investigative Study Artificial D024 Fuzzy Feature Clustering For Text Intelligence Classification Network D025 Towards Shift Tolerant Visual Secret security Sharing Schemes A Machine Learning Approach for D026 Identifying Disease-Treatment Relations in Data Mining Short Texts Disengagement Detection in Online D027 Learning: Validation Studies and Data Mining Perspectives D028 Knowledge Mining Process Between Various Data Mining Groups D029 Visual Exploration across Biomedical Data Mining Database Enabling Public Audit ability and Data Cloud D030 Dynamics for Storage Security in Cloud Computing Computing Artificial Societies and GPU-Based Cloud Cloud D031 Computing for Intelligent Transportation computing Management Image D032 Fingerprint Verification Using Minutiae Processing matching Defending against distance cheating in D033 link-weighted application layer multicast Networking Image D034 Identity verification using computer vision Processing for automatic garage door opening Exploiting Dynamic Resource Allocation for Cloud D035 Efficient Parallel Data Processing in the Computing Cloud computing No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 10. Techno Info Solutions Cloud D036 Computing Optimal Service Pricing For A Cloud Cache D037 Networking Compressing Network Access Control Lists Cloud D038 Fuzzy keyword search over encrypted data computing type in cloud computing D039 Networking Privacy-aware role based access control D040 Index Based N-Gram Extraction from Large Data Mining Document Collection Constrained Function Based Message Network D041 authentication using wireless sensors Security networks D042 Continuous Neighbor Discovery in Networking Asynchronous Sensors Networks D043 Fault-Tolerant Relay Node Placement in Networking Heterogeneous Wireless Sensor Networks A Bandwidth – Efficient Co operative Parallel and D044 Authentication scheme for filtering injected Distribution data in wireless sensors networks D045 Efficient Streaming of Videos in Broadband Networking Networks. Cloud D046 Optimization of resource provisioning cost Computing in cloud computing D047 Personalized concept based search engine Data Mining quires Mobile D048 Local Greedy Approximation for Computing Scheduling in Multihop Wireless Networks No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com
  • 11. Techno Info Solutions Enabling Secure and Efficient Ranked D049 Keyword Search over Outsourced Cloud Data Mining Data A Web-based Patient Support System Using Artificial Intelligence to Improve Health Artificial D050 Monitoring and Quality of Life Intelligence Artificial Societies and GPU-Based Cloud Artificial D051 Computing for Intelligent Transportation Intelligence Management D052 Efficient Multidimensional Fuzzy Search for Data Mining Personal Information Management Systems Parallel and D053 An Efficient Prediction-Based Routing in Distribution Disruption-Tolerant Networks Mobility: A Double-Edged Sword for HSPA Parallel and D054 Networks: A Large-Scale Test on Hong Kong Distribution Mobile HSPA Networks Bloom Cast: Efficient and Effective Full- Parallel and D055 Text Retrieval in Unstructured P2P Distribution Networks Timescale Decoupled Routing & Rate D056 Control in Intermittently Connected Networking Networks D057 Long term cross session relevance feedback Networking using virtual features Network D058 An Adaptive Cross-Layer Design Approach Security for Network Security Management Artificial Intelligence Algorithm for Heart Pattern D059 disease Diagnosis using Phonocardiogram Matching signals Image D060 An improved Canny edge detection Processing algorithm for color image No: 25/1, Karaneswarar Kovil St, Saidapet, Chennai-15. Phone: 044-43544440 E-mail: info@technoinfosolutions.com