Programming a Video Game in Scheme |
Programming for the Computer and iPhone Platforms |
Quadrocopter Aerial Monocular Vision for Improved Autonomous Robot Navigation |
Real-Time Markerless Hand Computer Interaction |
|
Some Reasons a Computer Slow Down |
Study and Analysis of Q-Learning Algorithm Parameters |
Super-Encryption Standard for Large Data Using Elementary Chaotic Cellular Automata |
Total Kid Organizer |
Transportation Networks and the Propagation of Novel H1N1 Swine Flu-like Epidemics |
Turbo Charging Computer with Mathematical Algorithms |
Unbeatable PONG through Artificial Intelligence |
Utilizing Artificial Neural Networks to Create a Learning Robot |
VAS for Hand Held Device |
Virtual Router Using Destination-Sequenced Distance Vector |
Voyage Management |
Web Blossom Bazzar |
Web Enabled Automated Manufacturing System |
Wireless Health Care System |
WiSeNet |
Accuracy of Voice Recognition Software |
Adaptive Interference Rejection in Wireless Networking |
Air Force Security Using Thumb Checker |
A Novel Approach to Text Compression Using N-Grams |
Application of Bayesian Networks for Speech Classification |
Application of Geographic Profiling to Graffiti Crimes |
Artificial Intelligence Project in Computer-Based Music Composition |
Category Oriented Web Search Engine Based on Round Robin Learning and Ranking Algorithm |
Cell Breathing Technique |
Computer Modeling of Altruistic Punishment and the Fitness of Cooperative Behavior |
Computer Model of the SARS Epidemic |
Computer Simulation and Study of the Strategy Board Game Blokus |
Continual Adaptation of Acoustic Models for Domain-Specific Speech Recognition |
Cracking the Code |
|
Creating a 3D Rubik's Cube Simulator in C++ and OpenGL |
Developing a Computer Program That Effectively Mimics Human Creativity |
Development of a 3D Search Engine for Mechanical and Geometrical Applications |
Development of a Mashup That Transforms a Smartphone into an Assisted Vision Aid |
Drive 2 Destiny |
E-Cops |
Effect of Encryption Key Combination on Data Security |
Effect of Impaired Judgment and Speed on Traffic Accidents |
Effects of Cell Compressibility, Motility, and Contact Inhibition on the Growth of Tumor Cell Clusters |
Effects of Motility and Contact Inhibition on Tumor Viability |
Efficient Location Training Protocols For Heterogeneous Sensor And Actor Networks |
E-Gift Shoppe |
Electronic Cash Controller |
Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing |
Energy Maps for Mobile Wireless Networks |
Enterprise Fleet Management System |
Enterprise Security Services |
Environmental Changes and Species Diversity |
Evolving Neural Networks to Play Mastermind |
Examining File Compression in Computers |
Face Recognition by the Computer |
Fault-Tolerant Token Based Atomic Broadcast Algorithm |
File Security System |
Friend Mapper on Mobiles |
Global Tracker |
Health Maintenance System |
Image Compression and De-compression |
Image Processing Editor |
Improving Utilization Of Infrastructure Clouds |
Innovating Credit Card Security through Smartphone |
|
Inter Bank Fund Transfer in Distributed Network |
Intranet Chatting |
Intranet Mailing System |
Intrusion Detection System |
IRC Chat Client |
Issue Tracker |
IT Project and Process Management |
Jobbing Portcullis |
JOpenIT |
Lending Tree |
Load Shedding In Mobile Systems With Mobiqual |
Local Layering of Images with a Natural User Interface |
MACA Multiple Access with Collision Avoidance |
Malware Identification by Statistical Opcode Analysis |
Mathematical Model for the Optimal Arrangement of Cell Phone Towers |
M-banking |
Medical Image Compression |
Mindtech Bug And Component Systems |
Mobi Travel Guide |
Mobile Advertisement System |
Mobile Banking System |
Mobile Electronic Program Guide |
Mobile i Broker |
Mobile Location Alarm |
Mobile Phone Tracking |
Mobiminder |
Movie World |
Multi-document Summarization using Spectral Clustering |
Net the Net |
Novel Genetics-Based Early Disease Detection Using Ontology-Driven Microarray Semantics |
Online Fast Food |
Plagiarism Analysis Program |
Post-Disaster Response Using a Novel Adaptive Object Recognition Algorithm |
Prisoner's Dilemma |
Salmonids by Numbers II |
Security Through Chaos |
Simulating Incompressible Fluid Flow with the Navier-Stokes Equation |