| Friend Mapper on Mobiles |
| Global Tracker |
| Health Maintenance System |
| Total Kid Organizer |
|
|
| Transportation Networks and the Propagation of Novel H1N1 Swine Flu-like Epidemics |
| Turbo Charging Computer with Mathematical Algorithms |
| Unbeatable PONG through Artificial Intelligence |
| Utilizing Artificial Neural Networks to Create a Learning Robot |
| Image Compression and De-compression |
| Some Reasons a Computer Slow Down |
| Study and Analysis of Q-Learning Algorithm Parameters |
| Super-Encryption Standard for Large Data Using Elementary Chaotic Cellular Automata |
| VAS for Hand Held Device |
| Virtual Router Using Destination-Sequenced Distance Vector |
| Voyage Management |
| Web Blossom Bazzar |
| Web Enabled Automated Manufacturing System |
| Wireless Health Care System |
| WiSeNet |
| Accuracy of Voice Recognition Software |
| Adaptive Interference Rejection in Wireless Networking |
| Air Force Security Using Thumb Checker |
| A Novel Approach to Text Compression Using N-Grams |
| Application of Bayesian Networks for Speech Classification |
| Application of Geographic Profiling to Graffiti Crimes |
| Artificial Intelligence Project in Computer-Based Music Composition |
| Category Oriented Web Search Engine Based on Round Robin Learning and Ranking Algorithm |
| Cell Breathing Technique |
| Computer Modeling of Altruistic Punishment and the Fitness of Cooperative Behavior |
| Computer Model of the SARS Epidemic |
| Computer Simulation and Study of the Strategy Board Game Blokus |
| Continual Adaptation of Acoustic Models for Domain-Specific Speech Recognition |
| Cracking the Code |
|
|
| Creating a 3D Rubik's Cube Simulator in C++ and OpenGL |
| Developing a Computer Program That Effectively Mimics Human Creativity |
| Development of a 3D Search Engine for Mechanical and Geometrical Applications |
| Development of a Mashup That Transforms a Smartphone into an Assisted Vision Aid |
| Drive 2 Destiny |
| E-Cops |
| Effect of Encryption Key Combination on Data Security |
| Effect of Impaired Judgment and Speed on Traffic Accidents |
| Effects of Cell Compressibility, Motility, and Contact Inhibition on the Growth of Tumor Cell Clusters |
| Effects of Motility and Contact Inhibition on Tumor Viability |
| Efficient Location Training Protocols For Heterogeneous Sensor And Actor Networks |
| E-Gift Shoppe |
| Electronic Cash Controller |
| Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing |
| Energy Maps for Mobile Wireless Networks |
| Enterprise Fleet Management System |
| Enterprise Security Services |
| Environmental Changes and Species Diversity |
| Evolving Neural Networks to Play Mastermind |
| Examining File Compression in Computers |
| Face Recognition by the Computer |
| Fault-Tolerant Token Based Atomic Broadcast Algorithm |
| File Security System |
| Image Processing Editor |
| Improving Utilization Of Infrastructure Clouds |
| Innovating Credit Card Security through Smartphone |
|
|
| Inter Bank Fund Transfer in Distributed Network |
| Intranet Chatting |
| Intranet Mailing System |
| Intrusion Detection System |
| IRC Chat Client |
| Issue Tracker |
| IT Project and Process Management |
| Jobbing Portcullis |
| JOpenIT |
| Lending Tree |
| Load Shedding In Mobile Systems With Mobiqual |
| Local Layering of Images with a Natural User Interface |
| MACA Multiple Access with Collision Avoidance |
| Malware Identification by Statistical Opcode Analysis |
| Mathematical Model for the Optimal Arrangement of Cell Phone Towers |
| M-banking |
| Medical Image Compression |
| Mindtech Bug And Component Systems |
| Mobi Travel Guide |
| Mobile Advertisement System |
| Mobile Banking System |
| Mobile Electronic Program Guide |
| Mobile i Broker |
| Mobile Location Alarm |
| Mobile Phone Tracking |
| Mobiminder |
| Movie World |
| Multi-document Summarization using Spectral Clustering |
| Net the Net |
| Novel Genetics-Based Early Disease Detection Using Ontology-Driven Microarray Semantics |
| Online Fast Food |
| Plagiarism Analysis Program |
| Post-Disaster Response Using a Novel Adaptive Object Recognition Algorithm |
| Prisoner's Dilemma |
| Programming a Video Game in Scheme |
| Programming for the Computer and iPhone Platforms |
| Quadrocopter Aerial Monocular Vision for Improved Autonomous Robot Navigation |
| Real-Time Markerless Hand Computer Interaction |
| Salmonids by Numbers II |
| Security Through Chaos |
| Simulating Incompressible Fluid Flow with the Navier-Stokes Equation |