You are on page 1of 6

COMPUTER SCIENCE Sr no.

SELECTED ABSTRACTS
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42

43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

WAITLISTED ABSTRACTS
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

COMPUTER SCIENCE

ABSTRACT TITLE SELECTED ABSTRACTS


COUPLING IRIS SCAN WITH FINGER PRINT SYSTEM INCORPORATED WITH PSYCHO-PHYSIOLOGICAL IDENTIFICATION

Modelling of Vehicular Ad-Hoc networks using Coloured Petri Nets


Automation in Farming

Image Segmentation Methods for Malaria Parasite Detection Whos the campus stud : predicting sentiment leaders on a campus chat network7
OFFLINE E-MAIL ACCESSING THROUGH SPEECH APPLICATION PROGRAMMING INTERFACE

AUTOMATIC DISABLING OF CELL PHONES CLASSIFICATION OF QUERIES, INFORMATION RETRIEVAL BASED ON WORD SENSE. Campus scene recognition Structural health monitoring of bridges using computer vision Techniques AUTOMIZATION OF UMPIRING IN CRICKET USING FUZZY LOGIC A prospective approach to Dream Imaging Quantifying Human Emotions during REM. FUTURE VOTING SYSTEM REGISTERED USING SOFTWARE Study of Design of a knowledge-based logistics strategy system Improved Computer-supported collaborative learning by using semi-supervised support vector machines Energy Recovery Clocking Scheme for Low-Power Flip-Flops DNA Computer PIPELINE OPTIMIZATION USING GENETIC ALGORITHM Technique for DiffServ Networks [24 X 7 Quality of Serviced (QoS) Internet Scheme] Computerised Lip Reading using Fuzzy Numbers Hand Gesture recognition through fingertip detection using corner detection algorithms. Human Detection and Coordinate Mapping in a room Grid Computing in General Science 2FA (Two Factor Authentication) A Design & Implementation of Collision Avoidance System (CAS) for Automobiles using Embedded System BIO-ENCRYPTION OF A BIOMETRIC SYSTEM Conceptualizing a standalone offline updates and upgrades (for all of the installed softwares) managing program Security threats of smart phones VANETS-REVOLUTIONIZING THE TRANSIT SYSTEM Profile based Character Recognition System for Devnagari Numerals Hand Gesture recognition through fingertip detection using corner detection algorithms. DETECTION OF PARKINSONS DISEASE USING ARTIFICIAL NEURAL NETWORKS Review of Semantic Web Technologies and Artificial Neural Networks for Intelligent Web Knowledge Source Discovery SCADA - AUTOMATION IN THERMAL PLANT FUTURE LEARNING PROCESS E-LEARNING AS A SERVICE IN A CLOUD NON RELATIONAL DATABASE IN CLOUD COMPUTING RAID Systems: A Comparative Analysis Using Cache disks and Utilizing Rotational Latency to Boost disk I/O Mobile Databases: Challenges and Solutions Topic Models for Microblogs Tracking Down Digital Devices using A-GPS Cloud Computing-The Vision in Mobile Perspective

MLCA USING MICROARCHITECTURE FOR ENHANCED PARALLELISM Optimisation of power in Digital signal processor based software. Green Cloud Computing Solutions For Efficient Energy Management of Data Centre Resources REAL-TIME IMAGE SCALING ON FPGA HARDWARE FOR SMART VIDEO SURVEILLANCE SYTEMS Universal Mobile Application Development (UMAD) on Home Automation A practical approach for maintenance of MST under Transient Node Failure PHISHING DETECTION THROUGH AN INTEGRATED APPROACH SWARM INTELLIGENCE WITH GRID COMPUTING High-Performance Flip-Flops with Reduced Internal Switching Activity A Survey of Solutions to Security Vulnerabilities across Wireless Networks CRYPTOGRAPHY DECRYPTED CYBER CRIME AND SECURITY CRYPTOGRAPHY Banking & E-Commerce Security Technique Adaptive Dictionary Learning & Active Learning for Domain Adaptation

WAITLISTED ABSTRACTS
Ceasy Transforming C++. Hacking The Window
Design of Intrusion Detection System Using Data Mining

Mining the Web and the Internet for Accurate IP Address Estimating body mass of human subject using computer vision ANALYZING PERFORMANCE OF VARIOUS PARALLEL GRAPH ALGORITHMS ON GPU USING CUDA Application of Fuzzy Logic in Optical Character Recognition Artificial Journalist Review of Adaptive traffic flow distribution in computer network using artificial intelligence INTRANET FOR COLLEGES WITH EXTRA ORDINARY FEATURES BIOMETRIC AUTHENTICATION SYSTEMS Preserving Integrity of data And Public Auditing for Data Storage Security in Cloud Computing SECURITY ENHANCED VOTING PROCESS THROUGH ATMs ROBO HAND High Performance Computing Servers by Utilization of Free Systems using Clustering

AUTHOR

R.SIVARAJ : Prashanth. B J.Arun Prakash P Ravi Teja Muktabh Mayank Srivastava RAJALINGAM.V K.MANIMARAN KESAV BHARADWAJ R Maninder Singh Chabra Kapil Vatwani G.MAHESWARI Sumit bajaj ARVIND BABU.M.C Kumar Harsh Saumya Agrawal Vicky Jha Hitesh Patel SUMIT KUMAR R.Vivekanandan N Hari Prasad Kapil Vatwani Divya Joshi Abhishek Goel A.THENMOZHI Priyanka .S Nirmal S Amanpreet Singh R.V.Sivaramarajalu TANWEE KAUSAR amresh kumar kapil vatwani N.V.SHARAT CHANDRA Rishabh raj v.deeptikamani ARVIND BABU.M.C K.MANIMARAN Tejas Nagdulikar Vivek Notani Shubhi Agarwal Rishabh Mehrotra Shashank Misra Ridha Gupta

Navendran.C Amith Vikram Pai Kanak Lata CHETAN S. Amul Jadhav ANUJA GUPTA M V S SAI RAGHAVENDRA Omkar Chakraborti Vicky Jha Siddharth Garg NITISH BALACHANDRAN Prachi Gandhi SANJEEV KUMAR R.V.APURVA KSHITIJ GUPTA Rishabh Mehrotra

Suvonil Chatterjee Tapesh Bhargava Suganya.P SILAMBARASAN R Suvonil Chatterjee SREE HARSHA RAMESH akshay dugar stavan patel rishab raj vibhor gulati Vivek Mundra Abhinandan P Shirahatti Vignesh.B PURVA AGRAWAL A.Anitha

You might also like