acc. year acc. no. title report.pdf2014 - 2018 se 3 multimodal biometrics for mobile application...

13
Acc. Year Acc. No. Title 2015 - 2019 SE 1 INTERPLANETARY FILE SYSTEM 2015 - 2019 SE 2 SMARTQUILL 2015 - 2019 SE 3 SERVERLESS ARCHITECHTURE 2015 - 2019 SE 4 2015 - 2019 SE 5 IMAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS 2015 - 2019 SE 6 GENERATIVE ADVERSARIAL NETWORKS 2015 - 2019 SE 7 PALM VEIN TECHNOLOGY 2015 - 2019 SE 8 BLOCKSTACK 2015 - 2019 SE 9 DNA COMPUTING 2015 - 2019 SE 10 2015 - 2019 SE 11 NAO ROBOT 2015 - 2019 SE 12 NEURO ROBOT 2015 - 2019 SE 13 OPEN SOURCE INTELLIGENCE 2015 - 2019 SE 14 QUANTUM COMPUTING 2015 - 2019 SE 15 CRYPTOCURRENCY 2015 - 2019 SE 16 DEEP LEARNING 2015 - 2019 SE 17 DARK WEB 2015 - 2019 SE 18 BRAIN COMPUTER INTERFACE 2015 - 2019 SE 19 BLOCKCHAIN TECHNOLOGIES: THE FORESEEABLE IMPACT ON SOCIETY AND INDUSTRY 2015 - 2019 SE 20 IOT BASED WATER MANAGEMENT SYSTEM 2015 - 2019 SE 21 2014 - 2018 SE 1 FOG COMPUTING FOR THE INTERNET OF THINGS: SECURITY AND PRIVACY ISSUES 2014 - 2018 SE 2 LOW POWER WIDE AREA NETWORK 2014 - 2018 SE 3 MULTIMODAL BIOMETRICS FOR MOBILE APPLICATION SECURITY 2014 - 2018 SE 4 2014 - 2018 SE 5 MOBILE PHONE JAMMER 2014 - 2018 SE 6 2014 - 2018 SE 7 IOT BASED ENERGY AWARE SMART HOME CONTROL SYSTEM 2014 - 2018 SE 8 PREDICTIVE MODELLING TECHINQUES 2014 - 2018 SE 9 DDOS ATTACKS IN CLOUD COMPUTING : ISSUES, TAXONOMY, AND FUTURE DIRECTIONS 2014 - 2018 SE 10 HYPERLOOP 2014 - 2018 SE 11 DEEP LEARNING AND IT’S APPLICATION ON SILENT SOUND TECHNOLOGY 2014 - 2018 SE 12 2014 - 2018 SE 13 RED – BLACK CRYPTOGRAPHY 2014 - 2018 SE 14 2014 - 2018 SE 15 SMART ATM SECURITY USING FPR, GSM, GPS 2014 - 2018 SE 16 INTERNET OF THINGS FOR SMART CITIES 2014 - 2018 SE 17 SOCIAL NETWORK FORENSICS THE WHAT, THE WHY AND HOW. 2014 - 2018 SE 18 VEHICULAR AUTOMATION 2014 - 2018 SE 19 GLOBAL POSITIONING SYSTEM 2014 - 2018 SE 20 2013 - 2017 SE 1 INTERNET OF THINGS IN ECOMMERCE 2013 - 2017 SE 2 ARTIFICIAL NEURAL NETWORKS AND LEARNING SYSTEMS 2013 - 2017 SE 3 DATA ANALYTICS IN SMART HEALTHCARE SERVICES

Upload: others

Post on 03-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

Acc. Year Acc. No. Title

2015 - 2019 SE 1 INTERPLANETARY FILE SYSTEM

2015 - 2019 SE 2 SMARTQUILL

2015 - 2019 SE 3 SERVERLESS ARCHITECHTURE

2015 - 2019 SE 4

2015 - 2019 SE 5 IMAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS

2015 - 2019 SE 6 GENERATIVE ADVERSARIAL NETWORKS

2015 - 2019 SE 7 PALM VEIN TECHNOLOGY

2015 - 2019 SE 8 BLOCKSTACK

2015 - 2019 SE 9 DNA COMPUTING

2015 - 2019 SE 10

2015 - 2019 SE 11 NAO ROBOT

2015 - 2019 SE 12 NEURO ROBOT

2015 - 2019 SE 13 OPEN SOURCE INTELLIGENCE

2015 - 2019 SE 14 QUANTUM COMPUTING

2015 - 2019 SE 15 CRYPTOCURRENCY

2015 - 2019 SE 16 DEEP LEARNING

2015 - 2019 SE 17 DARK WEB

2015 - 2019 SE 18 BRAIN COMPUTER INTERFACE

2015 - 2019 SE 19BLOCKCHAIN TECHNOLOGIES: THE FORESEEABLE IMPACT ON SOCIETY AND INDUSTRY

2015 - 2019 SE 20 IOT BASED WATER MANAGEMENT SYSTEM

2015 - 2019 SE 21

2014 - 2018 SE 1 FOG COMPUTING FOR THE INTERNET OF THINGS: SECURITY AND PRIVACY ISSUES

2014 - 2018 SE 2 LOW POWER WIDE AREA NETWORK

2014 - 2018 SE 3 MULTIMODAL BIOMETRICS FOR MOBILE APPLICATION SECURITY

2014 - 2018 SE 4

2014 - 2018 SE 5 MOBILE PHONE JAMMER

2014 - 2018 SE 6

2014 - 2018 SE 7 IOT BASED ENERGY AWARE SMART HOME CONTROL SYSTEM

2014 - 2018 SE 8 PREDICTIVE MODELLING TECHINQUES

2014 - 2018 SE 9DDOS ATTACKS IN CLOUD COMPUTING : ISSUES, TAXONOMY, AND FUTURE DIRECTIONS

2014 - 2018 SE 10 HYPERLOOP

2014 - 2018 SE 11 DEEP LEARNING AND IT’S APPLICATION ON SILENT SOUND TECHNOLOGY

2014 - 2018 SE 12

2014 - 2018 SE 13 RED – BLACK CRYPTOGRAPHY

2014 - 2018 SE 14

2014 - 2018 SE 15 SMART ATM SECURITY USING FPR, GSM, GPS

2014 - 2018 SE 16 INTERNET OF THINGS FOR SMART CITIES

2014 - 2018 SE 17 SOCIAL NETWORK FORENSICS THE WHAT, THE WHY AND HOW.

2014 - 2018 SE 18 VEHICULAR AUTOMATION

2014 - 2018 SE 19 GLOBAL POSITIONING SYSTEM

2014 - 2018 SE 20

2013 - 2017 SE 1 INTERNET OF THINGS IN ECOMMERCE

2013 - 2017 SE 2 ARTIFICIAL NEURAL NETWORKS AND LEARNING SYSTEMS

2013 - 2017 SE 3 DATA ANALYTICS IN SMART HEALTHCARE SERVICES

Page 2: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2013 - 2017 SE 4 BIO-INSPIRED COMPUING

2013 - 2017 SE 5 BIG DATA IN HEALTH CARE ISSUES

2013 - 2017 SE 6 CYBER SECURITY IN SMART GRID

2013 - 2017 SE 7 INTERNET OF THINGS-SECURITY ISSUES CHALLENGES AND SOLUTIONS

2013 - 2017 SE 8 INTERNET OF THINGS QUALITY ISSUES AND SOLUTIONS

2013 - 2017 SE 9OPENSESAME: UNLOCKING SMARTPHONES THROUGH HANDWAVING BIOMETRICS

2013 - 2017 SE 10 BIG DATA – A GROWING TORRENT

2013 - 2017 SE 11 DNA COMPUTING

2013 - 2017 SE 12 ARCHITECTURE FOR BIG DATA TRANSPORTATION

2013 - 2017 SE 13VIRTUAL REALITY ENVIRONMENT & TOOLS FOR EMERGENCY EVACUATION APPLICATION

2013 - 2017 SE 14 INTEGRATION OF INTERNET OF THINGS AND CLOUD COMPUTING

2013 - 2017 SE 15 SECURITY AND PRIVACY CHALLENGES IN INTERNET OF THINGS

2013 - 2017 SE 16 DATA MINING TECHNIQUES IN SOCIAL MEDIA

2013 - 2017 SE 17 HAPTIC TECHNOLOGY IN GAMES

2013 - 2017 SE 18 ARTIFICIAL INTELLIGENCE IN SERVICE ORIENTED SOFTWARE DESIGN

2013 - 2017 SE 19 TRANSFER LEARNING USING COMPUTATIONAL INTELLIGENCE

2013 - 2017 SE 20 BLUETOOTH LOW ENERGY 4.0

2013 - 2017 SE 21 SUPPLY CHAIN MANAGEMENT USING BIG DATA ANALYTICS

2013 - 2017 SE 22 GREEN COMPUTING

2013 - 2017 SE 23 OPEN CLOUD CONNECT ARCHITECTURE

2013 - 2017 SE 24 CLOUD ENABLED DATA ANALYTICS

2013 - 2017 SE 25DETECTING CONCURRENCY BUGS FROM THE PERSPECTIVE OF SYNCHRONIZATION

INTENTION

2012-2016 SE 1 VISIBLE LIGHT COMMUNICATION USING SUSTAINABLE LED LIGHTS

2012-2016 SE 2 DATA MINING WITH BIG DATA

2012-2016 SE 3 REUSE-BASED METHODOLOGY IN DEVELOPING SYSTEM-ON-CHIP(SOC)

2012-2016 SE 4TOWARDS FAST OS REJUVENATION: AN EXPERIMENTAL EVALUATION OF FAST OS REBOOT

TECHNIQUES

2012-2016 SE 5 IDENTITY BASED CRYPTOGRAPHY

2012-2016 SE 6 FOG COMPUTING PARADIGM : APPLICATIONS AND SECURITY ISSUES

2012-2016 SE 7 FORENSICS READINESS FOR WIRELESS BODY AREA NETWORK (WBAN) SYSTEM

2012-2016 SE 8 FAULT TOLERANCE OF REAL TIME OPERATING SYSTEMS

2012-2016 SE 9SET TOP BOX SYSTEM WITH ANDROID SUPPORT USING EMBEDDED LINUX OPERATING

SYSTEM

2012-2016 SE 10 POWER MANAGEMENT IN CLOUD USING GREEN COMPUTING

2012-2016 SE 11INTER-CARS SAFETY COMMUNICATION SYSTEM BASED ON ANDROID SMARTPHONE

2012-2016 SE 12 VHDL ENVIRONMENT FOR SMART VENDING MACHINE

2012-2016 SE 13 EFFICIENT ALGORITHM FOR DESTABILIZATION OF TERRORIST NETWORKS

2012-2016 SE 14 ENERGY EFFICIENT GREEN CLOUD COMPUTING

2012-2016 SE 15 SOFTBIOMETRICS: HUMAN IDENTIFICATION USING COMPARATIVE DESCRIPTIONS

2012-2016 SE 16 SERVICE MODELS AND USE OF CRYPTOGRAPHY IN CLOUD COMPUTING

2012-2016 SE 17 DATA ACQUISITION USING SRSS AND MANAGEMENT OF SENSORS IN IOT

2012-2016 SE 18 ONLINE TRAFFIC PREDICTION IN CLOUD: A DYNAMIC WINDOW APPROACH

2012-2016 SE 19 NETWORK IN IOT

2012-2016 SE 20 NETWORK SECURITY FOR SMART MOBLIE ECOSYSTEM

2012-2016 SE 21 CLOUD COMPUTING IN INTERNET OF THINGS

Page 3: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2012-2016 SE 22 SELF-RECONFIGURABLE SMART CAMERA NETWORK

2012-2016 SE 23NETWORK ARCHITECTURE FOR MITIGATING SECURITY ISSUES IN A CAMPUS AREA

NETWORK

2012-2016 SE 24 INCONSISTENCIES IN BIG DATA

2012-2016 SE 25MONITORING PHYSIOLOGICAL PARAMETERS OF PATIENTS WITH CHRONIC DISEASES AN

APPLICATION OF CELL BASED SENSOR NETWORK

2012-2016 SE 26 INTERNET OF INTELLIGENT THINGS

2012-2016 SE 27A NOVEL APPROACH TO HUMAN COMPUTER INTERFACE BASED ON EYE MOVEMENTS

2012-2016 SE 28 MESH BASED WIRELESS NETWORK-ON-CHIP SYSTEM

2012-2016 SE 29 SYSTEM OPTIMIZATION USING SYSTEM ON CHIP

2012-2016 SE 30 SMART GRID TECHNOLOGY

2012-2016 SE 31 SECURITY IN INTERNET OF THINGS

2012-2016 SE 32MULTIMODAL SOFT BIOMETRIC AUTHENTICATION USING HAND SHAPE AND HANDWRITING

MOTION IN THE AIR

2012-2016 SE 33 SOFTBIOMETRICS: HUMAN IDENTIFICATION USING COMPARATIVE DESCRIPTIONS

2012-2016 SE 34 BITCOIN: BENEFIT OR CURSE

2012-2016 SE 35 MOBILITY MANAGEMENT IN INTERNET OF THINGS

2012-2016 SE 36 LOW POWER ENCODING SCHEME IN NOCS

2012-2016 SE 37 MOBILE CLOUD COMPUTING SECURITY THREATS

2012-2016 SE 38 ENHANCED TFTP MECHANISM FOR FAST AND SECURE FILE TRANSFER

2012-2016 SE 39PEER-TO-PEER COMMUNICATION TECHNOLOGY RESEARCH BASED ON INTERNET OF THINGS

2012-2016 SE 40 FRAMEWORK FOR ENERGY SAVING IN THE ANDROID SMARTPHONE

2012-2016 SE 41 ENERGY EFFICIENT HUMAN INTERACTION IN SMARTPHONES

2012-2016 SE 42ENABLING SECURE COMMUNICATION OVER EXISTING PEER –TO –PEER FRAREWORKS

2011-2015 SE 1THE FUTURE OF BODY CENTRIC COMMUNICATIONS ANTENNAS, PROPAGATION AND

COGNITION

2011-2015 SE 2 NEAR FIELD COMMUNICATION

2011-2015 SE 3SOLUTION FOR MITIGATING PERSISTENT PACKET REORDERING ATTACK IN WIRELESS AD

HOC NETWORK

2011-2015 SE 4 AMBIENT BACKSCATTER HARVESTING POWER FROM THIN AIR

2011-2015 SE 5SMART ENERGY MANAGEMENT SYSTEM FOR REDUCING POWER CONSUMPTION USING

ZIGBEE WIRELESS COMMUNICATION

2011-2015 SE 6 FEMTOCELL

2011-2015 SE 7 4G TELECOMMUNICATION

2011-2015 SE 8 BLUE BRAIN

2011-2015 SE 9 OTCAD

2011-2015 SE 10 ANDROID MALWARE DETECTION METHODOLOGIES

2011-2015 SE 11

2011-2015 SE 12 VIRTUAL REALITY SIMULATOR FOR ADVANCED CARDIAC LIFE SUPPORT TRAINING

2011-2015 SE 13 DISTRIBUTED FIREWALLS – A COMPARATIVE STUDY

2011-2015 SE 14 WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES

2011-2015 SE 15ADVANCED BORDER INTRUSION DETECTION USING WIRELESS INTEGRATED NETWORK

SENSOR TECHNOLOGY

2011-2015 SE 16 BIG DATA TECHNOLOGYTRENDS, CHALLENGES AND OPPORTUNITIES

2011-2015 SE 17 DATA MINING TECHNIQUES USED FOR ACTIVITY RECOGNITION

Page 4: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2011-2015 SE 18TEXT AND FILE ENCRYPTION APPLICATION FOR BLACKBERRY USING CIPHER FEEDBACK 8-BIT

MODE

2011-2015 SE 19 GPS AND ETHERNET BASED REAL TIME TRAIN TRACKING SYSTEM

2011-2015 SE 20 PROJECT LOON

2011-2015 SE 21 AUGMENTED REALITY

2011-2015 SE 22 GPS BASED VEHICLE SURVEILLANCE AND PROTECTION

2011-2015 SE 23 PHYSICAL ACTIVITY MONITORING USING WIMS

2011-2015 SE 24 GREENDROID: DIAGNOSIS OF INEFFICIENCY FOR SMARTPHONE APPLICATION

2011-2015 SE 25REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE

ENCRYPTION

2011-2015 SE 26 MODELING AND RESTRAINING OF MOBILE VIRUS PROPAGATION

2011-2015 SE 27 ONLINE SOCIAL NETWORKS THREATS AND SOLUTIONS

2011-2015 SE 28 ARM PROCESSORS FOR EMBEDDED LOW POWER APPLICATIONS

2011-2015 SE 29 REVIEW OF SECURITY ISSUES IN INDUSTRIAL NETWORKS

2011-2015 SE 30 METADATA CACHE MANAGEMENT ON DISTRIBUTED FILE SYSTEM

2011-2015 SE 31WICARD: A CONTEXT AWARE WEARABLE WIRELESS SENSOR FOR CARDIAC MONITORING

2011-2015 SE 32 SIXTH SENSE TECHNOLOGY

2011-2015 SE 33FAVED BIOMETRICS! TELL ME WHICH IMAGE YOU LIKE AND I’LL TELL WHO YOU ARE

2011-2015 SE 34 GOOGLE GLASS

2011-2015 SE 35A READ-WRITE AWARE DRAM SCHEDULING FOR POWER REDUCTION IN MULTI-CORE

SYSTEMS

2011-2015 SE 36 LONG TERM EVOLUTION - ADVANCED

2011-2015 SE 37 LI-FI TECHNOLOGY

2011-2015 SE 38 RAILWAY PLATFORM MONITORING USING VISION BASED MONITORING SYSTEM

2011-2015 SE 39 VIRTUALIZATION AND PERFORMANCE ANALYSIS OF OPERATING SYSTEMS

2011-2015 SE 40 ADVANCED APPROACHES FOR SOFTWARE COST ESTIMATION

2011-2015 SE 41 DEFEATING SQL INJECTION

2011-2015 SE 42 BRAIN FINGERPRINTING

2011-2015 SE 43 CLOUD OFFLOADING – ILLUSTRATED WITH OPTICAL CHARACTER RECOGNITION

2011-2015 SE 44 INTELLIGENT TRAFFIC MANAGEMENT USING VANET

2011-2015 SE 45 GEOCAPTCHA

2011-2015 SE 46 DATA MINING FOR HEALTHCARE MANAGEMENT

2011-2015 SE 47 3D PRINTING TECHNOLOGY

2011-2015 SE 48PORTABLE CAMERA-BASED ASSISTIVE TEXT AND PRODUCT LABEL READING FROM HAND-

HELD OBJECTS FOR BLIND PERSONS

2011-2015 SE 49NICE:NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL

NETWORK SYSTEMS

2011-2015 SE 50 TECHNIQUES FOR CODE REUSE IN SOFTWARE PROJECTS

2011-2015 SE 51 GOOGLE CONTACT LENS

2011-2015 SE 52 LEAP MOTION

2011-2015 SE 53 CLOUD COMPUTING

2010-2014 SE 1 SMS ENCRYPTION

2010-2014 SE 2 CLOUD COMPUTING LEARNING

2010-2014 SE 3 A KEYLESS APPROACH TO IMAGE ENCRYPTION

2010-2014 SE 4 BUFFER OVERFLOW EXPLOITS AND DEFENSIVE TECHNIQUES

2010-2014 SE 5FACE-NAME GRAPH MATCHING FOR MOVIE

CHARACTER IDENTIFICATION

Page 5: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2010-2014 SE 6 CLOUD COMPUTING RESEARCH AND DEVELOPMENT TREND

2010-2014 SE 7BROWSER GUARD:A BEHAVIOR BASED SOLUTION TO

DRIVE-BY-DOWNLOAD ATTACKS

2010-2014 SE 8 A SECURE CLOUD COMPUTING

2010-2014 SE 9 OPTICAL WIRELESS COMMUNICATION FOR REAL TIME SWIMMERS FEEDBACK

2010-2014 SE 10DOCUMENT CLUSTERING FOR FORENSIC ANALYSIS: AN APPROACH

FOR IMPROVING COMPUTER INSPECTION

2010-2014 SE 11CURRENT BENEFITS AND FUTURE DIRECTIONS OF NFC

SERVICES

2010-2014 SE 12SECURE OVERLAY CLOUD STORAGE WITH ACCESS CONTROL

AND FILE ASSURED DELETION

2010-2014 SE 13

A NEW FINGER TOUCH DETECTION ALGORITHM AND PROTOTYPE SYSTEM ARCHITECTURE

FOR

PERVASIVE BARE-HAND HUMAN COMPUTER INTERACTION

2010-2014 SE 14PATH PLANNING ALGORITHM FOR MOBILE ANCHOR-BASED

LOCALIZATION IN WIRELESS SENSOR NETWORKS

2010-2014 SE 15 EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS

2010-2014 SE 16SECURING UNDERWATER WIRELESS COMMUNICATION

NETWORK

2010-2014 SE 17DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC

AUTHENTICATON SYSTEM

2010-2014 SE 18 IMPROVING ATM SECURITY VIA FACE RECOGNITION

2010-2014 SE 19 MOBILE MALWARE IN THE WILD

2010-2014 SE 20 A SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE

2010-2014 SE 21 HOST-TO-HOST CONGESTION CONTROL FOR TCP

2010-2014 SE 22 PROPOSAL AND DEMONSTRATION OF OPTICAL WIRELESS

2010-2014 SE 23 YET ANOTHER SIMPLE PROCESSOR (YASP)

2010-2014 SE 24WIFI NETWORK INFORMATION SECURITY ANALYSIS

RESEARCH

2010-2014 SE 25DESIGNING AND IMPLEMENTING OF EARLIEST DEADLINE

FIRST SCHEDULING ALGORITHM ON STANDARD LINUX

2010-2014 SE 26 OPTICAL LAYER SECURITY IN FIBER OPTIC NETWORK

2010-2014 SE 27DESIGN OF USER SPECIFIC INTELLIGENT

CELL PHONE JAMMER

2010-2014 SE 28 CONTENT-CENTRIC NETWORKING

2010-2014 SE 29MIGRATE OR NOT? EXPLOITING DYNAMIC TASK

MIGRATION IN MOBILE CLOUD COMPUTING SYSTEM

2010-2014 SE 30LIFEMAP: A SMARTPHONE-

BASED CONTEXT PROVIDER FOR LOCATION-BASED SYSTEM.

2010-2014 SE 31TOWARDS A MOBILE SERVICE FOR HARD OF HEARING PEOPLE TO MAKE INFORMATION

ACCESSIBLE ANYWHERE

2010-2014 SE 32TRUSTBOX: SECURITY ARCHITECTURE FOR PREVENTING

DATA BREACHES

2010-2014 SE 33 AN EFFECTIVE METHOD FOR DEFENSE AGAINST IP SPOOFING ATTACK

2010-2014 SE 34LOCKING AND UNLOCKING OF THEFT VEHICLES USING

CAN

2010-2014 SE 35 FUTURE MEMORY AND INTERCONNECT TECHNOLOGIES

2010-2014 SE 36 THREE DIMENSIONAL OBJECT USED FOR DATA SECURITY

2010-2014 SE 37 REMOTE DISPLAY SOLUTIONS FOR MOBILE CLOUD COMPUTING

2010-2014 SE 38 CSE – CONTROLLED CATEGORY SEARCH ENGINE

Page 6: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2010-2014 SE 39PRIVACY AND INTEGRITY PRESERVING IN SENSOR

NETWORKS

2010-2014 SE 40INTENT SEARCH: CAPTURING USER INTENTION FOR ONE

CLICK INTERNET IMAGE SEARCH

2010-2014 SE 41CLUMSY FLOW CONTROL FOR HIGH-THROUGHPUT

BUFFERLESS ON-CHIP NETWORKS

2010-2014 SE 42 DDOS: ANALYSIS AND DEFENSIVE MECHANISMS

2010-2014 SE 43 FACE RECOGNITION USING MOBILE CLOUD ARCHITECTURE

2010-2014 SE 44A DRM FRAMEWORK TOWARDS

PREVENTING DIGITAL PIRACY

2010-2014 SE 45 WIRELESS LAN SECURITY ISSUES AND SOLUTIONS

2010-2014 SE 46 FILE CARVING

2010-2014 SE 47 WIRELESS DATA CENTER NETWORKING

2010-2014 SE 48MULTI-TOUCH TABLE SYSTEM FOR MEDICAL VISUALIZATION: APPLICATION TO ORTHOPEDIC

SURGERY PLANNING

2010-2014 SE 49INTRODUCTION TO SYSTEM ARCHITECTURE FOR A ROBOTIC

COMPUTER

2010-2014 SE 50 WIGIG: MULTI-GIGABIT WIRELESS COMMUNICATION IN THE 60 GHZ BAND

2010-2014 SE 51 VOICE-INPUT VOICE OUTPUT COMMUNICATION AID (VIVOCA)

2010-2014 SE 52 3D INDOOR LOCATION AND NAVIGATION SYSTEM BASED ON BLUETOOTH

2010-2014 SE 53DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS USING

PERSUASIVE CUED CLICK POINTS

2009-2013 SE 1 HTTPS LOCK

2009-2013 SE 2 CONTENT SHARING OVER SMARTPHONE-BASED DELAY TOLERANT NETWORKS

2009-2013 SE 3LIGHTWEIGHT PROTECTION AGAINST BRUTE FORCE LOGIN ATTACKS ON WEB APPLICATION

2009-2013 SE 4APPLICATION OF ARTIFICIAL INTELLIGENCE IN SAFE HUMAN ROBOT INTERACTION

2009-2013 SE 5 SECERT COMMUNICATION USING JPEG DOUBLE COMPRESSION

2009-2013 SE 6 NOKIA MORPH TECHNOLOGY

2009-2013 SE 7 GOOGLE GLASS

2009-2013 SE 8 MULTIMEDIA CLOUD COMPUTING

2009-2013 SE 9SECURITY THREATS AND REAL TIME PROXY BASED SECURITY MECHANISM FOR SOCIAL

NETWORKING SITES

2009-2013 SE 10 EXAMPLE BASED MACHINE TRANLATION

2009-2013 SE 11 A VIRTUAL LABORATORY FOR MEDICAL IMAGE ANALYSIS

2009-2013 SE 12INTEGRATING VISUAL SALIENCY AND CONSISTENCY FOR RE-RANKING IMAGE SEARCH

RESULTS

2009-2013 SE 13 SKINPUT TECHNOLOGY

2009-2013 SE 14 ARTIFICIAL INTELLIGENCE IN CYBER DIFFENCE

2009-2013 SE 15 SURFACE COMPUTING

2009-2013 SE 16 TWO FACTOR AUTHENTICATION

2009-2013 SE 17 ONION ROUTING

2009-2013 SE 18 EVOLUTION FROM 3G TO 5G

2009-2013 SE 19 MOBILE OPERATING SYSTEM

2009-2013 SE 20 INTEL ATOM PROCESSOR

2009-2013 SE 21 OPTICAL LAYER SECURITY IN FIBER OPTIC NETWORK

2009-2013 SE 22 ZIGBEE AND GI-FI

2009-2013 SE 23 FRAUD DETECTION OF CREDIT CARD PAYMENT SYSTEM BY GENETIC ALGORITHM

Page 7: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2009-2013 SE 24 3D PRINTING

2009-2013 SE 25 BUBBLE SENSING

2009-2013 SE 26 SMART NOTE TAKER

2009-2013 SE 27 LI-FI

2009-2013 SE 28 HELIODISPLAY

2009-2013 SE 29NEW FRAMEWORK TO DETECT AND PREVENT DENIAL OF SERVICE ATTACK IN CLOUD

COMPUTING ENVIRONMENT

2009-2013 SE 30 HIGH DEFEINITION VIDEO TRANSMISSION USING BLUETOOTH OVER UWB

2009-2013 SE 31 OPASS

2009-2013 SE 32 BIOMETRIC VOTING SYSTEM

2009-2013 SE 33 CONTENT BASED IMAGE RETRIEVAL

2009-2013 SE 34 OPTICAL CAMOUFLAGE

2009-2013 SE 35A NEW DISKLESS CHECKPOINTING APPROACH FOR MULTIPLE PROCESSOR FAILURES

2009-2013 SE 36 IMPLEMENTATION OF SOCIAL MEDIA STRATEGY BY THE BUSINESS

2009-2013 SE 37 TELEPORTATION

2009-2013 SE 38 FAST DATA COLLECTION IN TREE BASED WIRELESS NETWORK

2009-2013 SE 39 EMERGING MEMORY TECHNOLOGIES

2009-2013 SE 40 IMPACT OF THE HOST OPERATING SYSTEM ON VIRTUAL MACHINE PERFORMANCE

2009-2013 SE 41 BLUE EYES TECHNOLOGY

2009-2013 SE 42 MOBILE VIRUS

2009-2013 SE 43 BRAIN COMPUTER INTERFACE

2009-2013 SE 44 ARM PROCESSOR

2009-2013 SE 45 3D TELEVISION

2009-2013 SE 46 HTML 5

2008-2012 SE 1 STOCHASTIC TRANSPARENCY

2008-2012 SE 2 COLLISION WARNING SYSTEM FOR ALL ROAD PATTERNS

2008-2012 SE 3 DANCE TRAINING SYSTEM BASED ON MOTION CAPTURE TECHNOLOGY

2008-2012 SE 4 WEB SERVICE MANAGEMENT SYSTEM FOR DIGITAL GOVERNMENT APPLICATION

2008-2012 SE 5 WILLWARN:WIRELESS LOCAL DANGER WARNING

2008-2012 SE 6 REMOTE LABS : REVOLUTIONIZING CONCEPTS OF ONLINE EDUCATION

2008-2012 SE 7 MOBILE ADAPTIVE LEARNING ENVIRONMENTS

2008-2012 SE 8 BUILT IN SELF REPAIR SCHENMES FOR FLASH MEMORIES

2008-2012 SE 9 BRAIN TISSUE CLASSIFICATION FOR MRI BASED ON FPGA

2008-2012 SE 10 A VIRTUAL LABORATORY FOR MEDICAL IMAGE ANALYSIS

2008-2012 SE 11 [4G RELATED] SMART SERVER UPDATE MECHANISM

2008-2012 SE 12 COSDES: A COLLABORATETIVE SPAM DETECTION SYSTEM

2008-2012 SE 13THREE - FACTOR AUTHENTICATION TO PRESERVE SECURITY AND PRIVACY IN DISTRIBUTED

SYSTEMS.

2008-2012 SE 14 ENERGY EFFICIENT VOIP OVER WIRELESS LANS

2008-2012 SE 15MONITORING, DETECTION AND ANALYSIS OF ENERGY GREEDY ANOMALIES IN MOBILE

HANDSETS.

2008-2012 SE 16 AN ADVANCED HYBRID PEER TO PEER BOTNET

2008-2012 SE 17 KEY TECHNOLOGY RESEARCH ON ADAPTATION LAYER OF ANDROID PLATFORM

2008-2012 SE 18 PERVASIVE EHEALTH MONITORING SYSTEMS

2008-2012 SE 19 OPTIMIZING DEPENDABILITY THROUGHOUT THE SOA LIFE CYCLE

2008-2012 SE 20 ENHANCED SECURITY FOR ONLINE EXAMS USING GROUP CRYPTOGRAPHY

2008-2012 SE 21 UNDER WATER SENSOR NETWORKS

2008-2012 SE 22 PATHMINER-A NEW WEB BASED TOOL IN BIOMEDICINE

Page 8: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2008-2012 SE 23 EFFICIENT ASSOCIATION CONTROL FOR VEHICULAR WI FI ACCESS

2008-2012 SE 24 INTRUSION DETECTION WITH ALERT AGRESSION

2008-2012 SE 25 LIVE AND INTERACTIVE TV BROADCASTING

2008-2012 SE 26 AGE SYNTHESIS AND ESTIMATION VIA FACES

2008-2012 SE 27 FACIAL ACTION CODING SYSTEM

2008-2012 SE 28 HANDLING STEALTHY ATTACKS IN WIRELESS AD HOC NETWORKS

2008-2012 SE 29 PRIVACY-AWARE COLLABORATIVE SPAM FILTERING

2008-2012 SE 30 DETECTION OF VULNERABILITIES IN INDUSTRIAL NETWORK

2007-2011 SE 1 IRIS RECOGNITION FOR AUTHENTICCATION

2007-2011 SE 2 ACTIVE SECURITY SITUATION SESOR FOR NETWORK

2007-2011 SE 3 SMART DUST

2007-2011 SE 4 CRIME PATTERN DETECTION USING DATA MINING

2007-2011 SE 5 AUTOMATIC NUMBERPLATE RECOGNITION

2007-2011 SE 6QUANTUM CRYPTOGRAPHY: A NEW GENERATION OF INFORMATION TECHNOLOGY

SECURITY SYSTEM

2007-2011 SE 7 AUTOMOBILE THEFT CONTROL SYSTEM

2007-2011 SE 8 SOFTWARE AND HARDWARE ISSUES IN SMART CARD TECHNOLOGY

2007-2011 SE 9 CLICK TO ZOOM INSIDE GRAPHICAL AUTHENTICATION

2007-2011 SE 10 APPLICATION OF CAN BUS IN DATA ARM COMMUNICATION SYSTEM

2007-2011 SE 11 ORIGIN OF ARTIFICIAL CREATURES - OF GENETIC ALGORITHM AMD GENETIC ROBOTS

2007-2011 SE 12 POLYMER MEMORY

2006-2010 SE 1 IN VEHICLE SECURE WIRELESS PERSONAL AREA NETWORK

2006-2010 SE 2 DESIGN OF HOME GATEWAY BASED ON INTELLIGENT NETWORK

2006-2010 SE 3 EYE MOUSE FOR DISABLED

2006-2010 SE 4 COMPREHENSIVE STUDY ON GRAPHICAL PASSWORDS

2006-2010 SE 5HONEYPOT: AN INTRODUCTION AND ITS EFFICIENCY IN SECURING BLUETOOTH BASED

PAYMENTS

2006-2010 SE 6 BODY AREA NETWORK

2006-2010 SE 7 AN INTELLIGENT BRAIN COMPUTER INTERFACE OF VISUAL EVOKED POTENTIAL EEG

2006-2010 SE 8 QUICKIES: INTELLIGENT STICKY NOTES

2006-2010 SE 9 IMMUNE MECHANISM BASED INTRUSION DETECTIONSYSTEMS

2006-2010 SE 10 INTERNAL FINGERPRINT IDENTIFICATION WITH OPTICAL COHERENCE TOMOGRAPHY

2006-2010 SE 11 SECURITIES IN GRID COMPUTING

2006-2010 SE 12 DIFFERENT TYPES OF ATTACKS ON MULTICAST IN MOBILE AD-HOC NETWORKS

2006-2010 SE 13 4G WIRELESS NETWORKS

2006-2010 SE 14 DROWSY DRIVER DETECTION AND SAFETY

2006-2010 SE 15 COLLECTIVE INTELLIGENCE BASED COMPUTATIONAL APPROACH TO WEB INTELLIGENCE

2006-2010 SE 16 BODY AREA NETWORK

2005-2009 SE 1 TRUTH DISCOVERY WITH MULTIPLE CONFLICTING INFORMATION PROVIDERS ON THE WEB

2005-2009 SE 2 A DISTRIBUTED EFFICEIENT ARCHITECHURE FOR WIRELESS SENSOR NETWORKS

2005-2009 SE 3 HOME MESH: A LOW COST INDOOR WIRELESS MESH FOR HOME NETWORKING

2005-2009 SE 4 AN EMPIRICAL STUDY OF THIRD GENERATION (3G) NETWORKS

Page 9: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014

2005-2009 SE 5 TRUTH DISCOVERY WITH MULTIPLE CONFLICTING INFORMATION PROVIDERS ON THE WEB

2005-2009 SE 6 MPEG ENCRYPTION

2005-2009 SE 7 BODY WORN E- TEXTILE ANTENNAS:- THE GOOD THE LOW MASS AND THE CONFORMAL

2005-2009 SE 8 CHAMELEON: APPLICATION LEVEL POWER MANAGEMENT

2005-2009 SE 9 IMPACT OF DENIAL OF SERVICE ATTACKS ON AD HOC NETWORKS

2005-2009 SE 10 SYBILGUARD : DEFENDING AGAINST SYBIL ATTACKS VIA SOCIAL NETWORKS

2005-2009 SE 11 AN AUTOMATED RETINAL IMAGE ANALYSIS OVER THE INTERNET

2005-2009 SE 12THE DESIGN OF A WIRELESS SOLAR- POWERED ROUTER FOR RURAL ENVIRONMENTS

ISOLATED FROM HEALTH FACILITIES

2005-2009 SE 13 SECURITY ISSUES IN ON_ DEMAND GRID AND CLUSTER COMPUTING

2005-2009 SE 14 PARALLEL COMPUTING IN LAN BASED SYSTEMS

2005-2009 SE 15 GRID ARCHITECURE STORAGE UTILIZING GRID COMPUTING FOR DYNAMIC STORAGE

2005-2009 SE 16 TVA: A DOS- LIMITING NETWORK ARCHITECTURE

2005-2009 SE 17SOFTWARE CONTROLLED INTEGRATED MEMORY ARCHITECTURE FOR HIGH PERFORMANCE

COMPUTING

2005-2009 SE 18 OPERATING SYSTEM SUPPORT FOR DYNAMIC CODE LOADING IN SENSOR NETWORK

2005-2009 SE 19 ONLINE DETECTION AND PREVENTION OF PHISHING ATTACKS

2005-2009 SE 20 DISCOVERING OBJECTS IN VIDEO

2005-2009 SE 21 TOPCAT: DATA MINING FOR TOPIC IDENTIFICATION IN A TEXT CORPUS

2005-2009 SE 22SUPPORTING DISTRIBUTED MANAGEMENT IN A TELECOMMUNICATIONS MANAGEMENT

NETWORK (TMN) ENVIRONMENT

2005-2009 SE 23 A CONFIGARABLE AND EXTENSIBLE TRANSPORT PROTOCOL

2005-2009 SE 24 A BROADBAND WIRELESS COMMUNICATIOB SYSTEM FOR EMERGENCY MANAGEMENT

2005-2009 SE 25MULTIPATH KEY ESTABLISHMENT FOR WIRELESS SENSOR NETWORK USING JUST ENOUGH

REDUNDANCY TRANSMISSION

2005-2009 SE 26 HYBRID WIRELESS OPTICAL BROADBAND - ACCESS NETWORK

2005-2009 SE 27 IMPACT OF HOT POTATO ROUTING CHANGES IN IP NETWORKS

2005-2009 SE 28DIGITAL INVISIBLE INK DATA HIDING BASED SPREAD SPECTRUM AND QUANTIZATION

TECHNIQUES

2005-2009 SE 29 MOBILE CARE WITH ALERT MECHANISM

2005-2009 SE 30 ADVANCED KNOWLEDGE DISCOVERY DATA MINING

Page 10: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014
Page 11: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014
Page 12: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014
Page 13: Acc. Year Acc. No. Title REPORT.pdf2014 - 2018 se 3 multimodal biometrics for mobile application security 2014 - 2018 se 4 2014 - 2018 se 5 mobile phone jammer 2014 - 2018 se 6 2014