08-17-2017, 12:16 AM
1. AN IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR SECRET HIDING METHOD
2. BIOMETRIC AUTHENTICATION SYSTEM ONMOBILE PERSONAL DEVICES
3. DETECTING LEAKAGE OF DATA
4. APPLICATION OF ARTIFICIAL NEURAL NETWORK (ANN) TECHNIQUE FOR THE MEASUREMENT OF VOLTAGE STABILITY
5. MOBILE COMPUTING
6. TELEPORTATION
7. IMPLEMENTATION OF NANO- TECHNOLOGY IN MEDIAL FIELD
8. 4G TECHNOLOGY
9. MULTIMEDIA INTERFACE FOR THE DISABLED (MIND) PROJECT
10. MOBILE COMPUTING (GSM)"
11. 4G THE FUTURE GENERATIONONBOARD PROXY TECHNIQUE
12. CRYONICS ON WAY RAISING THE DEAD?
13. BLUE EYES (ARTIFICAL INTELLIGENCE) (CREATING COMPUTERS THAT KNOW HOW WE FEEL)
14. RATBOTS
15. ELECTRICITY GENERATION USING SALVAGED AIR FROM MOVING TRAIN
16. AUTOMIZATION OF UMPIRING IN CRICKET USING FUZZY LOGIC
17. QUANTUM CRYPTOGRAPHY FOR SECURING WIRELESS LAN NETWORKS
18. TITLE OF PAPER
19. EFFECTIVE PRIVACY PRESERVATION FOR DATA PUBLICATIONS IN HOSPITALS
20. AN APPLICATION OF MORPHOLOGICAL
21. FACE RECOGNITION AND DETECTION WITH NEW IMAGE ENHANCEMENT TECHNIQUES
22. THE REALIZATION OF INFORMATION HIDING IN BMP IMAGES
23. NETWORK SECURITY THROUGH FIREWALLS
24. CLOUD COMPUTING
25. STEGANOGRAPHY FACTS)
26. THE BRAIN FINGERPRINTING TECHNOLOGY
27. IMAGE PROCESSING TO FORENSICS
28. NETWORK SECURITY
29. A NOVEL APPROACH TO ENCRYPTION OF MESSAGE THROUGH VEIN IMAGE
30. NANOTECHNOLOGY
31. CELL PHONE JAMMERS
32. A PSEUDO LOSELESS IMAGE COMPRESSION
33. NANOTECHNOLOGY AND CANCER TREATMENT.
34. GRID COMPUTING
35. AUTOMATION OF RATION SHOPS INTEGRATED IN SQL DATABASE USING ASP.NET AND EMBEDDED TECHNIQUE
36. HAPTIC TECHNOLOGY
37. OPTICAL CAMOUFLAGE (APPLICATION TO IMAGE PROCESSING)
38. SYMBRION [SWARM ROBOTICS