Project Ideas
Project Ideas
Project Ideas
list)
1. Honynet
2. Enterprise Resource Planning
3. Automated Robot for Military System (ARMS)
4. The Complete Personal Mobile System
5. Distributed Ant Robotics
6. Electronic Transaction
7. Networks Based Performance Analysis Tool
8. Webopedia (Web Sever)
9. Voice Chating & Voice Mail
10. Network Monitoring Based on Java
11. Security Robot
12. A Network Based University Collage Co-Ordiantion Syatem
13. Internet On Demand - Web Browser And Copier
14. Anti Viruses
15. AI Firewall
16. Steganography - an Art of Hiding Digital Information
17. Parellel Processing Thro' Job Distribution
18. Network Management Tool
19. Digital Image Processing
20. Utilities to Compressess, Decompressers and Split Merge Files
21. Load Balancing Using Process Migration in Linux
22. Web Based Proxy Sever
23. Ooline Polling
24. Microcomputer Based Robot
25. Intrusion Prevention System
26. Barcode Genration
27. Wireless Voice Over IP
28. Text to Speech Technology
29. Biometric - The Security System
30. Virtual Class Room
31. Remote PC Access in Cyber Caf
32. Parallel Processing Application
33. Online Shopping
34. SCET Intra Net
35. Voice Organization
36. Mobotric
37. Network Monitoring
38. Image Processing Application
39. Web Based Administration of Lunix Sever
40. SCET's Invition For Online Tender
41. Graphical Representation Of Online Shares & Stocks
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response and Blocking using signature method in
Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in
MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic source routing protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile
Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermark an Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing using Ant Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic
algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through
Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural
Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video
Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System for ATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative
Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A
High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative
Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resources in an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
37. Defect Tracking Tool - Enterprise Project and Defect Tracking System IEEE
38. Digital Signature Verification using Artificial Neural Networks / Digital Signature
Verification
39. Multi Router Traffic Monitor Implementation
40. Homogeneous Networks & Control Implementation
41. A/I Net A Network that Integrates ATM and IP - IEEE
42. ESecure Transaction Design & Implementation IEEE
43. Image Compression and Analysis with MSE & PSNR Technique - IEEE
44. Crypt kit A real time cryptographic system for security over the networks - IEEE
45. Efficient Contiguous Data & Video Streamer with Buffer Management
46. Distributed Component Router Based CRM Customer Relationship Management IEEE
47. Network Traffic, Packet Analyzer and Sniffer
48. Digital Steganography: Hiding Data within Data
49. Integrated Development Environment using JSWING IDE JSWING
50. ERP Application integrated Enterprise Solutions with Strategic advantages
51. Grid information Retrieval System
52. Network Packer Sniffer Implementation
53. Online Issue Tracking - Project Management Solutions
54. E-HealthCare - Distributed HealthCare and A Strategic Management System
55. Data mining implementation for Credit Cards Application Processing System
56. Dynamic University Linking & Data integrity Maintenance
57. E-Sales Order Processing System
58. RTF to XML Converter
59. Material Forecasting and Management Solution
60. Effective & Efficient Freight Management System
61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
62. XML Migration - Implementation for XML format from Database System
63. Shares & Stock Management system Portfolio Manager Implementation
64. Online Task Management with fully featured intelli System
65. Vertical Market Information Providing System Implementation
66. Insertion of Links of navigation into the Web Pages
67. Inter Office Messaging System IOMS, Office Automation System
68. Web based Matrimonial Services, A Desi Matrimony web Portal
69. Online Auction & Bidding System With Multi Brand & Product Selection
70. Online Body Shopping System with Auto Mailing feature
71. Online Job Consultancy Services
72. Net Banking Services & Solutions
73. Online Web Shop Mall - Web Shop Site
74. Intelli Shopping Cart & Assistant System
75. Online VRS - Vehicle Reservation System
76. Distributed Web Service for On-Line Coursework Submission
77. Document Archival Management System Electronic Archival Design
78. Remote Electricity Billing System Automation & Implementation EJB
79. Dynamic College information System & Data integrity Maintenance
80. Computerized system for Extracting Abstract from the given source document, Abstract
solutions
167. ? Crypt kit A real time cryptographic system for security over the networks - IEEE
168. ? Secure Optimal Cyclic Cryptographic System
169. ? JSAFE - Rijndael Algorithm based Encryption & Decryption
170. ? Secured Network manager
171. ? ESecure Transaction Design & Implementation
172. ? Fire wall - Customized Firewall for internet security & inter-network traffic gateway
173. ? Secure Password-Based Protocol for Downloading a Private Key
174. NETWORKING PROJECTS
175. ? A Distributed Database Architecture for Global Roaming in Next-Generation Mobile
Networks IEEE
176. ? Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
177. ? Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid
Traffic & Congestion
178. ? Authenticating Network Attached Storage - IEEE
179. ? CAC Connection Admission Control using ATM Networks Implementation
180. ? Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
181. ? Efficient Contiguous Data & Video Streamer with Buffer Management
182. ? Dynamic Server Replication System
183. ? Mobile based Network Monitoring System
184. ? Monitoring & Managing the Clusters using JMX IEEE
185. ? Multi Router Traffic Monitor Implementation
186. ? Grid information Retrieval System
187. ? Homogeneous Networks & Control Implementation
188. ? Location Aided Routing in Mobile ADHOC Networks for Secured Routing IEEE
189. ? Mobile Agents in a Distributed Multimedia Database System IEEE Approach
190. ? Multithreaded Peer to Peer Communication using Distributed Frameworks
191. ? Network Analyzer & Network Monitoring Tool using SNMP
192. ? Network Border Patrol for Congestion Collapse Preventing System
193. ? Network Packer Sniffer Implementation
194. ? Network Proctor & Action Coordinator - The Network Monitoring Daemon IEEE
195. ? Network Security System in DNS using AD-HOC Networks IEEE
196. ? Network Traffic Anomaly Detector IEEE
197. ? Network Traffic, Packet Analyzer and Sniffer
198. ? Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing
Protocol (AMRoute) IEEE
199. ? P2P (peer-to-peer networking) messaging system-using JXTA IEEE
200. ? Peer-to-Peer implementation Multithreaded Technology with tuple space
201. ? Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time
IEEE
202. ? Public Key Validation for DNS Security Extensions Domain Naming Server
203. ? Remote Computing using Thin Clients
204. ? Retrieving Files using Content Based Searching and Displaying them in Carousel View
205. ? Routing Simulator - An Efficient end to end Packet Delivery system
206. ? Secured Network manager
207. ? VOIP Flexible & Efficient Voice Communicator, Voice Over IP
208. ? XTC Algorithm based Scalable Wireless AD-HOC Networking IEEE
338. OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET
339. A Natural Language-Based Interface for Querying a Video Database
340. A Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc
Networks
341. A Secure Routing Protocol for mobile Ad-hoc Network
342. A Trustworthy Mobile Agent Infrastructure for Network Management
343. A wireless distributed intrusion detection system and a new attack model
344. Allocating Applications in Distributed Computing using JINI
345. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in
MANETs
346. Routing and Security in Mobile Ad Hoc Networks
347. Scripting JAX-WS
348. Simple a Pre-Provisioning Scheme to Enable Fast Restoration
349. Site-based Mapping for parallel proxy servers with fewer TCP connections
350. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
351. Watermark Based Digital Rights Management
352. A Semantic Web-Based Approach to Knowledge Management for Grid Applications
353. A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion
Detection
354. Context Oriented Search Engine with Web Crawler
355. Converting RTF into XML using the TEI Lite DTD
356. CRM based Sales of Fleet & Services Management
357. Data and Video Streaming System
358. Data Encryption and Compression System with Optimization
359. Dealership Management System - Dealers information & Dealings Process Manager
360. Defect Tracking Tool - Enterprise Project and Defect Tracking System
361. Design & Development of a Distributed, Scalable File Sharing & Access System with
Security
362. Digital Image Processing Frequency Domain
363. Digital Water Marking for Video Piracy Detection
364. Distributed Database System for online Shopping & Store
365. Distributed File Sharing System for Peer to Peer Network
366. E-Commerce Shopping cart for B2B Implementation
367. EJB Implementation Of Distributed Online Stock Maintenance and Trading
368. Graphical Network Browser
369. Heterogeneous Networks Control and Implementation
370. Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and
Administration in IP Network
371. Optimizing the Execution of multiple data analysis queries on Parallel & Distributed
Environments
372. Patient Keeper: Medical Application on mobile Phone
373. VPersonalized E-mail Management at Network Edges
374. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
375. XML Data Stores: Emerging Practices
376. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
377. Image File compression & Transmission across the Network by MDA (Message Digest
Algorithm)
378. Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE)
379. Media Gateway Control Protocol Network
380. Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm
381. Route Reservation in Ad Hoc Wireless Networks
382. Pre Active Circulated Cache Updating using on Demand Routing Protocol
383. Dynamic Load Balancing in Distributed Systems in The Presence Of Delays A
Regeneration Theory Approach
384. A Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed
Environments
385. An Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS
386. A Fully Distributed Proactively Secure Threshold Multi signature Scheme
387. Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet
Episodes
388. A Hierarchical Modeling and Analysis for Grid Service Reliability
389. Secure Data Hiding and Extractions using BPCS
390. SLA-Driven Clustering of QOS Aware Application Servers
391. User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony
392. Advanced Host Monitor Enterprise
393. Advanced instant Messenger & Message Broadcasting
394. Bug Tracking System - Comprehensive Bug Tracking & Change Management
395. Call Centre Management System
396. CALTOOL Computer Aided Learning Tool
397. Cargo Tracking System Design & implementation
398. Complete email system with an email server and an email client
399. Image Compression and Decompression using Huffmans
400. Image Manipulation for Face Recognition
401. Implementation of Broadcast Messaging System using Multi Threading
402. Asset Management Solution (AMS)
403. Implementation of Packet Filtering Firewall in Linux Systems
404. Implementation of Peer-to-Peer Communication System with a Centralized Name Server in
Linux Network
405. Implementation of Secured & Encrypted Data Transmission over the Web
406. Implementation of Wireless Application Protocol Gateway in Mobile Network
407. Implementation of Wireless Communication Gateway for PC To Mobile Network Route
using Internet Protocol
408. Integrated & Distributed Enterprise Resource Planning with Customer Relationship
Management Support
409. Intelli Mobile Banking System Design & Implementation
410. Investigation and Analysis of Packets Transformation in an Ethernet Network System
411. Java Grid Using Grid Computing System
412. Java Network Flow Analyzer
413. Java Network Monitor / Java Network Browser
414. Java RMI-based application which manages load balancing on heterogeneous clusters
415. Java SMTP, POP, Web Email Server
416. Java-to-XML Data Binding tool
Mobile Computing
Networking
Secure Computing
Wireless Communication
ADHOC / MANETS / Mesh Networks
Grid Computing
Software Engineering
Image Processing
Pattern Analysis
Network Security
Wireless Sensor Networks
Data Mining
Cryptography
Learning Technologies
Multimedia
Knowledge and Data Engineering
Web Applications
Information Forensics and Security
Communication Systems
On Guaranteed Smooth Switching For Buffered Crossbar Switches - 2008
Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case - 2008
A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers - 2008
Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks - 2008
Probabilistic Packet Marking For Large Scale IP Trace Back - 2008
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data - 2008
MOBILE COMPUTING
A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice - 2009
Contention-Aware Performance Analysis of Mobility - 2009
Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks - 2009
Efficient Resource Allocation for Wireless Multicast - 2008
Localized Sensor Area Coverage with Low Communication Overhead - 2008
WEB APPLICATION
Distributed Component Router based Supply Chain Management SCM
Distributed Component Router based CRM Customer Relationship Management
Project Scrutinizer Project Tracking System
E Recruitment System Dynamic Online Professional Recruitment & Mgt System
E Career and Consultancy Services
Professional E Banking System Online Banking Services
E Health Care A Strategic Management System
E Governance Management Design & Implementation
ERP Application Integrated Enterprise Solutions with Strategic Advantages
Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management
Support
Dynamic University Linking & Data Integrity Maintenance
Mobile Medicine: Providing Drug Related Information through Natural Language Queries via
SMS - 2009
Benefit Based Data Caching in Ad Hoc Networks 2006
Watermarking Relational Databases Using Optimization Based Techniques - 2008
Location-Based Spatial Queries with Data Sharing in Wireless Broadcast Environments - 2008
On The Computational Complexity and Effectiveness of N-Hub Shortest-Path Routing - 2008
A Software Defect Report and Tracking System in an Intranet
E Logistics for Warehouse Management Implementation of Authenticated and Dynamic
Logistics Support System & Management
ACTION RECOGNITION
9. TEXT FILE HIDING IN AUDIO (WAV) FILES USING LOW BIT ENCODING
STENOGRAPHY
10. BENEFIT-BASED DATA CACHING IN AD HOC NETWORKS
11. A SELF-REPAIRING TREE TOPOLOGY ENABLING CONTENT-BASED ROUTING
IN MOBILE AD HOC NETWORKS
12. LOCALIZED SENSOR AREA COVERAGE WITH LOW COMMUNICATION
OVERHEAD
13. MINIMIZING FILE DOWNLOAD TIME IN STOCHASTIC PEER-TO-PEER
NETWORKS
14. IMPLEMENTATION OF OBJECT ORIENTED REFACTORINGS USING SOFTWARE
MERGING EFFICACIOUSLY
15. A WAVELET-LAPLACE VARIATION TECHNIQUE FOR IMAGE DECONVOLUTION
AND IN PAINTING
16. MORPHOLOGICAL GRANULOMETRIC FEATURES OF NUCLEUS IN AUTOMATIC
BONE MARROW WHITE BLOOD CELL CLASSIFICATION
17. ENHANCED SECURITY FOR ONLINE EXAMS USING GROUP CRYPTOGRAPHY.
18. THE EFFECTIVENESS OF CHECKSUMS FOR EMBEDDED CONTROL NETWORKS
19. INTERNET AND ONLINE INFORMATION PRIVACY: AN EXPLORATORY STUDY
OF PRETEENS AND EARLY TEENS.
20. A LARGE-SCALE HIDDEN SEMI-MARKOV MODEL FOR ANOMALY DETECTION
ON USER BROWSING BEHAVIORS.
21. A SECURE MOBILE HEALTHCARE SYSTEM USING TRUST-BASED MULTICAST
SCHEME.
22. MINING FILE DOWNLOADING TIME IN STOCHASTIC PEER TO PEER
NETWORKS
23. DISTRIBUTED METADATA MANAGEMENT FOR LARGE SCALE CLUSTER
BASED STORAGE SYSTEM
IEEE REAL TIME EMBEDDED PROJECTS
1. ZIGBEE DEVICE ACCESS CONTROL AND RELIABLE DATATRANSMISSION IN
ZIGBEE BASED HEALTH MONITORING SYSTEM.
2. AN ADVANCED EMBEDDED MOBILE WEB SERVER FOR AGED PEOPLE
MONITORING AND PARAMETER BACK RECEPTION USING GSM TECHNOLOGIES.
3. A BOUNDARY SCAN METHODOLOGY THROUGH EMBEDDED WEB SERVERS
AND MOBILE RFID TRACKING SYSTEM FOR THE SURVEILLANCE AND MAPPING
OF MOTION SUBJECTS.
4. ROBUST AND EFFICIENT PASSWORD-AUTHENTICATED KEY AGREEMENT
USING SMART CARDS FOR CAMPUS MANAGEMENT.
5. GROUP ELEVATOR SCHEDULING WITH ADVANCE INFORMATION FOR
NORMAL AND EMERGENCY MODES IN BUILDING MANAGEMENT SYSTEMS.
6. MODELS FOR BEARING DAMAGE DETECTION IN INDUCTION MOTORS USING
STATOR CURRENT MONITORING.
7. A DESIGN OF A PROTOTYPIC HAND-TALK: ASSISTIVE TECHNOLOGY FOR THE
DEAF.
NETWORK
51. IMAGE STEGANOGRAPHY (JAVA )
ROOT LOCUS SIMULATOR (VISUAL BASIC )
BODE PLOT SIMULATOR (VISUAL BASIC )
HERWITZ DETERMINANT SIMULATOR (VISUAL BASIC )
RH CRITERIA SIMULATOR (VISUAL BASIC )
FACIAL IMAGE COMPRESSION (VISUAL BASIC MS ACCESS)
COURIER INFORMATION SYSTEM (VISUAL BASIC MS ACCESS)
ONLINE MAILING APPLICATION (VBNET/ASPNET MS ACCESS /PLSQL)
CRM SOLUTIONS (JAVA/ ASPNET SQL SERVER )
HEALTH INFORMATION SYSTEM (ASPNET/ SQL SERVER )
BLOOD BANK MANAGEMENT SYSTEM (VB/VBNET MS ACCESS)
FINGER PRINT SCANNING :: BANKING APPLICATION (VBNET/VB SQL SERVER/MS
ACCESS)
FINGER PRINT SCANNING :: ATM FINGER PRINT (ASPNET SQL SERVER)
LAB ATTENDANCE STUDENTS USING FINGER PRINT SCANNER
(VB/VBNET/ASPNET MSACCESS/ SQLSERVERK)
DATA SEARCH OPTIMIZATION (VBNET/ASPNET SQL SERVER /ORACLE G)
SALARY INFORMATION SYSTEM (VB/VBNET/ASPNET SQL SERVER)
FRUIT MANAGEMENT SYSTEM (VB MS ACCESS)
CYBORG (HTML/FLASH MX / JAVASCRIPT )
TOURISM INFORMATION (ASPNET SQL SERVER)
SPORTS INFORMATION (ASPNET MS SQL SERVER WML)
DYNAMIC INFORMATION SYSTEM (C#NET NET FRAMEWORK, HTML, JAVASCRIPT)
STUDENT SMART CARD APPLICATION (VC++, MS-ACCESS)
52. STUDENT INFORMATION SYSTEMS (VB, C#NET)
ANIMATION ENGINEERING (FLASH MX, ASP)
ONLINE BANKING SYSTEMS (C# +ASP)
ONLINE SHOPPING (ASP MS SQL SERVER)
FINGER PRINT SCANNING OF CRIMINALS (VB, MS ACCESS)
BANKING S/W ACCESSING WITH THE HELP OF BIOMETRICS TECHNOLOGY
(VBNET AND ACCESS H/W:- FINGERPRINT SCANNER)
CRM-CUSTOMER RELATIONSHIP MANAGEMENT (VBNET AND ORACLE I)
E-INSURANCE (JAVA)
H/W TROUBLESHOOTER AND ITS SOLUTION (VC#NET/ VB AND MS-ACCESS)
HEALTHCARE SYSTEMS CONNECTING AT VARIOUS TERMINALS TO GET THE
INFORMATION (ASP/ASPNET, SQL SERVER)
BANKING SOFTWARE TO ACCESS THE INFORMATION AT VARIOUS LEVELS WITH
COMPLETE SECURITY (ASPNET, SQL SERVER)
TELEPHONIC RESULTING SYSTEM (VC++,VB)
COMPLETE E-COMMERCE SOLUTION FOR A WEB BASED STORE WITH
SEARCHING, SHOPPING, PAYMENTS, ORDER PROCESSING ETC (ASP/ASPNET, SQL
SERVER)
ALUMNI CLUB FOR YOUR COLLEGE: REAL HOSTING AND USAGE (VBNET,
JAVASCRIPT/JAVA, SQL SERVER )
,sql server )
mm) HelpDesk and Fund raising system at the time of emergency like floods, earthquakes
(VB/VB NET ,SQL server )Wireless accessing the WAP site (WML, GPRS handset,
simulator)
nn) Finger Corporate Authentication System with photo identification (VB NET + MS Access)
oo) News Portal System (ASP NET + SQL server)
pp) Bank Account Access System (Java + VB Net + Access)
qq) Criminal Identification System (MATLAB + VB + Access)
rr) Interactive Classroom For College (VB NET + SQL k)
ss) Digital parking system (VB NET + Access)
tt) University Admission System (Java + SQL k)
uu) Message conversion tool (ASP NET + SQL K)
vv) Job Recruitment Scheme (ASP NET + Access)
ww) CD Return System (VB NET + Access)
xx) Sending mail using VB
yy) Java-RMI-chat
zz) Sending & receiving SMS-through-vb
aaa) Home automation using mobile (SMS)
bbb) File transfer & LAN-chat (wired & wireless) (Java)
ccc) Voice operated PC Applications (VB)
ddd) Stepper motor controlling using (VB,C,C++)
eee) VOICE MAIL USING Java
fff) Electronic banking (Servlet)
ggg) Electronic shopping (Servlet)
hhh) Sending SMS with internet (Java)
iii) Sending email with internet (Java)
jjj) Automation using internet (controlling equipments ) (Java)
kkk) Using your mobile miss call as password (VB, / net)
lll) Agile Manufacturing using Genetic Algorithm (Java)
mmm) CRM for Airlines Industry (VB/VB Net)
nnn) Pattern Detection using Web Log Data (VB)
ooo) Image Codec (Matlab)
ppp) Core Banking (Java, Oracle)
qqq) Cross Compiler (C/C++) ABSTRACT
rrr) MIS (VB Net)
sss) Intelligent Search Engine (Java, XML)
ttt) PATAL (Java)
uuu) ERP System (VB Net) ABSTRACT
vvv) Video transmission over network (Java) ABSTRACT
www) Remote desktop system (Java)
xxx) Credit card approval system (VB)
yyy) Effort & billing tracking system for IT Projects (VB/SQL Server)
zzz) Assurance allocation technique using mobile agent (Java)
aaaa) Process & flow tracking for biomass distribution project (VB)
bbbb) ERP implementation ( net)
/Java
Mobile Agents In Distributed Multimedia Database Systems /Java
Wireless Traffic Viewer Using JME JME
JME Mail Client Server JME
Monitoring And Managing The Clusters Using JMX JME
Peer-To-Peer Messaging JME
Mobile Information Provider JME
Mobile Bank WAP
Video Steganography Using Mobile Simulation JME
Network Traffic Anomaly Detector JME
ERP for Leather Company JEE
Online Web shop JEE
Online Fashion Studios JEE
ERP for Small Business JEE
Bulk Billing System JEE
SN Java Project Titles Language
Optimal Multicast Routing in Mobile Ad-Hoc Networks Java
Homogenous Network Control and Implementation Java
Performance Evaluation of RMI Java
Network Component for XML Migration Java
A Secure Routing Protocol for mobile Ad-hoc Network Java
Retrieving Files Using Content Based Searching and presenting it in Carousel view Java
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
Java
Java Network File Sharing System Java
Image Transformation using Grid Java
Java Visual Editor with Compiler Java
Embedding In Video Steganography Java
Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java
Image Rendering For Grid Technology Java
Scalable Wireless AD-HOC Network Simulation Using XTC Java
ATM Networks For Online Monitoring System Java
Network Border Patrol Preventing Congestion Collapse Java
Shortest Node Finder In Wireless Ad-Hoc Networks Java
TCP/IP Pocket Controlling Monitor Java
Network Security System In DNS Using Ad-Hoc Networks Java
E-Mail Server Using Multithreaded Sockets Java
Integrating Speech Engine With Web Navigator Java
XML Enable SQL Server Java
Network Analyzer Java
Public Key Validation for DNS security Extension Java
Java Productivity Aids Java
Image Water Marking
Call Center Management System ASP Net
Online Shopping ASP Net
Textile Web Services ASP Net
130. Information Theoretic Text Similarity Measurement Using Approximate Word Sense
Disambiguation
131. Chaos based Encryption for a Structured Video Codec
132. Synchronization Specifier and Presenter for Authoring System
133. Tackling the exposed node problem in IEEE 802.11 MAC
134. Design and Deployment of a Reliable File Transfer Protocol over Asymmetric Satellite
Networks
135. Robust HTML to DOM conversion and applications
136. Detection of recurring patterns in protein structure by superimposition and geometric
hashing
137. QoS based Routing Algorithms in Internet
138. Object Based Video Segmentation
139. Reconfigurable Packet Classifier
140. Design and Evaluation of an IEEE 802.11 Based Dual MAC for MANETs
141. Optimizing the evaluation of complex similarity predicates on large datasets
142. Dynamic Adaption of DCF and PCF mode of IEEE 802.11 WLAN
143. Information Hiding Using Fractal Encoding
144. Verification of Communicating Reactive State Machines
145. Dynamic Slicing of Programs
146. Semi Supervised Information Extraction Using Hidden Markov Mode
147. Slicing of Synchronous Programs
148. Fast Algorithms for the Modified Discrete Cosine Transform
149. Video Streaming in Wireless Environments
150. Design and Implementation of Traffic Engineering Extensions for OSPF
151. Route Repair in Mobile Adhoc Networks
152. Design of Multi-threaded Label Distribution Protocol for MPLS Emulator
153. Filter Object Framework for MICO - Static Model
154. DSP Based Virtual Private Network
155. Design and Implementation of RSVP-TE over MPLS Emulator
156. TAX: Tree Algebra for XML Implementation
157. Filter Object Framework for MICO - Dynamic Model
158. A Reconfigurable Scheduling Co-Processor
159. A Hybrid Approach to Semi-Supervised Learning
160. Interactive Deduplication using Active Learning
161. Security Issues in Mobile Agents
162. Filter Object Framework for MICO - Dynamic Model
163. Multi-threaded Label Distribution Protocol for MPLS Emulator
164. Traffic Engineering Extensions to OSPF
165. Development of basic TGREP simulator
166. Development of QoS enhancement in VOIP applicationDevelopment of QoS
enhancement in VOIP application
167. Building a Distributed Computing Environment in KreSIT
168. Development of an API for using SMS as transport layer.
169. Voice message transfer using Personalised Repository based Speech-Coding
techniques
170. Telematic Application - Global Position Aware Vehicle
44. Incorporating Quality Considerations into Project Time/Cost Tradeoff Analysis and
Decision Making.
45. Enhance the Email Performance Through SMTP- New Approach
46. ETHEREAL System
47. Load Balancer in client-server architectures
48. Without packet Reordering dynamic load balancing
49. Without Load Balancing in MANET: Single Path Routing Vs. Multi Path Routing
50. Push Vs Pull: Quantative Comparison for Data Broadcast
51. Graphical Search Engine
52. GSM Based LAN Monitoring
53. Image Restoration
54. Information Retrieval SMS Server
55. LAN Based Bit Torrent
56. Quicklook approach to IDS
57. Generating Windows Presentation Foundation using templates
58. Bypassing Vista USA and correctly launching interactive process from a windows service.
59. CAPTCHA
60. AntiSqlFilter-Blocking SQL Injection Hacker Attacks
61. Java SIP Signaling Comptroller
62. A Text Watermarking Algorithm based on Word Classification and Inter-word Space
Statistics & Multi word features
63. Multicast Application and Approach to Security issues using key management
64. Webcam Image Tracker.
65. Human Head Internal Rendering with Mouth and Text To Speech Synthesizer
66. Hybrid Constraint Satisfaction Problem Solver
67. Hybrid Query Expansion
68. Web Based Artificial Intelligence Simulations
69. Circular Target Detection and Pattern Detection
70. Web Attacks Alerter Using Feature Extraction and SNORT
71. Grid Extension Framework for Large Scale Parallel Financial Modeling
72. Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices
Using the J2ME technology
73. Secure Mobile Banking & Security Issues
74. Efficient Way To Capturing and sending images and videos from mobile to PC and ViceVersa
75. Barcode Capture and Recognition for EAN Barcodes Using Cell phone Camera
76. Interactive Multiplayer Mobile Games Using Bluetooth
77. Treating Patients Diabetes Using Mobile and PC
78. Mobile Based Software Inspection
79. Enterprise Mobile Service Platform Using JMS & J2ME
80. A Secure Mobile Agent System Model Based on Extended Elementary Object System
81. Direct Manipulation Technique for Wireless Networking
82. GPRS Traffic Performance Measurements
83. J2ME end-to-end security for M-commerce.
84. Robust Distributed Speech Recognition using Speech Enhancement
85. Hybrid wireless-optical broadband access network (woban): prototype Development and
Research challenges
86. Quality of Resilience as a Network Reliability Characterization Tool
87. Handover Keying and its Uses
88. New Adversary and New Threats: Security in Unattended Sensor Networks
89. Wireless Data Traffic Decade of Change
90. Dimensioning Network Links: A New Look at Equivalent Bandwidth
91. Media Handling for Multimedia Conferencing in Multihop Cellular Networks
92. Risk Homeostasis and Network Security
93. Network Anomaly detection and classification via opportunistic sampling.
94. Self-addressable Memory-Based FSM: a Scalable Intrusion Detection Engine
95. Accurate Anomaly Detection Through Parallelism
96. Counting Bloom Filters for Pattern Matching and Anti-evasion at the Wire Speed
97. A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion
Detection
98. Parallelizing XML Processing Pipelines via Map Reduce
99. Application of Mobile Agent Systems to First Responder Training With Flexibility
100. Advance IP Traceback Scheme
101. An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average
Number of Hops
102. Multi-input Fuzzy Logic Controller for Brushless dc Motor Drives
103. On the Performance of Ad Hoc Networks with Multiuser Detection, Rate Control and
Hybrid ARQ
104. Two-Rule-Based Linguistic Fuzzy Controllers
105. A Unified Log-Based Relevance Feedback Scheme for Image Retrieval
106. The Impact of Loss Recovery on Congestion Control for Reliable Multicast
107. Dynamic Location Strategy for Hot Mobile Subscribers in personal Communications
108. Simulation-based Comparisons of Tahoe, Reno, and SACK TCP
109. Network Simulation Creator and Animator/NAM Enhanced Simulation Animation (NS2)
110. MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks
111. A Robust Spanning Tree Topology for Data Collection and Dissemination in Distributed
Environments
112. Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
113. Generation of Reliable PINs from Fingerprints
114. Physical Implementation and Evaluation of Ad Hoc Network Routing Protocols using
Unmodi ed Simulation Models
115. A Visualization and Analysis Tool for NS-2 Wireless Simulations: iNSpect
116. Impact of Node Mobility on MANET Routing Protocols Models
117. Dynamic Signature Verification Using Discriminative Training
118. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its
Application to Singular-Point Detection and Fingerprint Indexing
119. A Signal Processing Module for the Analysis of Heart Sounds and Heart Murmurs
120. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless
Sensor Networks
121. Ann Based Control Patterns Estimator For UPFC Used In Power Flow Problem
122. UPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink Programs
123. A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks
Wearable devices
Smart consumer appliances
Speech enable appliances
Consumer accessibility appliances and services
Economics of security and protection
Knowledge for global defense
Security in network, systems, and applications
Trust, privacy, and safeness
Business continuity and availability
Cryptography and algorithms encryption
Rapid Internet attacks and network
Applications and network vulnerabilities
System advanced paradigms
Data-centered information systems
User-centric information systems
Pervasive and ubiquitous systems
Mobile learning and communications
Open and distance education systems
Management and control
Digital telecommunications management
Control and monitoring systems
Measurement and management systems
Human/Machine interface and man-in-the-loop control
Energy and power systems control
Self-monitoring, self-diagnosing, self-management systems
Digital analysis and processing
Digital information processing (Voice/Data/Video)
Computer graphics and animation
Virtual reality/3D graphics/Games
Computer modeling/simulation
Graphic/Image/Photo/Hand-writing analysis and processing
Pattern recognition / Computer vision
Natural language processing / robust processing
Speech recognition and processing
Mobile devices and biotechnologies
Robotics/Mobile devices/ Mobile networks
Handled and wearable computing and devices
Vehicular navigation and control
Nanotechnologies/Systems-on-the-chip/Networks-on-the-chip/ Haptic phenomena
Biotechnologies/Bioinformatics/Biometrics/Biomedical systems
Computational biochemistry
Biological data management
Software robustness for digital society
Software as a service
Software specification and design methodologies
Software development and deployment
Industrial systems
TELEMED: Telemedicine and eHealth
Telemedicine software and devices
Virtual telemedicine
Wireless telemedicine
Electronic imagery and visualization frameworks
Color imaging and multidimensional projections
Personal, adaptive, and content-based image retrieval imaging
Imaging interfaces and navigation
Medical image processing
Computer vision and resolution
Telemedicine and tele health
Tele pathology and digital imaging
Tele cardiology
Tele rehabilitation
Clinical telemedicine
Internet imaging localization and archiving
Video techniques for medical images
Remote medicine and Internet
Safety in telemedicine
Telemedicine portals
Java RMI: Remote method invocation is a java specific implementation of a distributed object
model. There are more general approaches to developing distributed applications of a Common
Object Request Broker Architecture (CORBA). , But these generally requires writing language
neutral interfaces in a tannery Interface Description Language (IDL) that must be compiled
separately from your Application. This adds to the complexity of developing distributed
applications .By contrast RMI provides you with a simple elegant interface to distributing
objects that are implemented in the Java Language.
BUILDING DISTRIBUTED CHAT APPLICATION
In this chat application you can send text messages as well as handwritten messages to the
active participants.
The server enables clients to register themselves and maintains table of active patricians. When
a participant wishes to send message to the other participants that are currently logged on a
message is sent to the server application and is then distributed to the other participants.
The client connects to the server and sends text messages and line drawings to the other
participants on the server.
The server is general purpose and can handle number of participants that each get their own
thread for server to client communication. The server expects any client that connect to it to
implement the chat interface provides a call back mechanism allowing the servers to notify the
clients when new data have arrived (as well as send data to the client). The clients in this
model are also acting as servers. They are exporting an object that is use to remotely invoke
method that is defined in chat interface.
The sever also exports a remote object that the client use to post messages to other clients,
register themselves so that the server has a handle on there call back mechanism and query the
server for the list of participants.
For making the file transfer or LAN chat we are using computers serial port that is
communication port for interfacing.
If we want to do wired application then we can provide cable between computers but if we
want wireless application we
can use IR or FM.
The basic application will not change for wired or wireless application it is the external
attachment for the com port.
The com port is provided to the computers for communication purposes. It communicates
serially. Here we open the com port by providing and set its baud rate, no of bits, parity and no
of stop bits before starting the communication. The file is send as ascii character as the
chatting string.
It is an online banking system, in which customer can access his bank account through
internet. He can also add check, buy items, and can do administration by internet.
This project is based on servlet technology. There are seven servlets for the execution of the
projects.
Registration
login
Adding amount
withdrawing amount
Transferring amount
Shopping
Changing password.
Account balance report.
Registration
In the registration process we provide information such as personal details, account
information, and contact information.
Personal details includes name ,surname. account information includes ,username password,
Contact information includes mob no. etc
Login
Log in servlet helps to log in to users account by providing username and password.
The username and password are provided at the time of registration. Only successful login can
authorize user to do transaction.
Adding amount
Adding amount is used to add checks and cash to amount here acc no and password is needed.
Withdraw amount
Withdraw amount is used to withdraw cash , here also acc no and password is needed
Transfer amount
It is used to do the money transactions. We should know the account number of the person
whom the money is to be transferred. here user has to provide his account number and
password.
Shopping
Using the shopping servlet we can products over internet it same as we transfer amount. User
have to select product for purchase. User have to provide his acc no and password.
Change password
It is used to change password for security reasons. Here user have to provide acc no and old
password for identity.
Account balance report
Account balance report provide balance sheet of user account .it describe the ser transactions
such as adding withdrawing ,shopping, etc
Using sms one can send command over a distance. In this project we connect a handset to a
computer by using data cable. Inside the home we can connect home equipments to computers
by a specially designed circuit.
Most commonly we prefer computers parallel port for interfacing as one can easily monitor
equipments using it.
We are developing the application for the computer which is inside the home and to which
phone and interfacing kit is connected. Here we have to decide operational commands for
operating home equipments that is making it on or off.
We send sms from external mobile to the mobi8le which is connected to the computer. The
sms contains the operational commands.
The mobile which is connected to the computer receives the sms and it is provided to the port
and from port program reads it.
On the basis of the operational command the program sets to the port to a particular state to
operate the desired instrument.
We can use our mobile missed call as a password to the application. For lot of security reasons
one can require a very secure password. And a mobile missed call is a unique one. Here we
connect our mobile phone to a computer where the application is running. The application may
be of different types. Only we are providing a very secure login to that application. The
number which we have already predefined as a mobile password can act as password. Missed
call for another mobile can not authorised user to login.
Here in this case we connect mobile phone to computers communication port .Then by the
programming we set comm port's baud rate to 9600,number of stop bits as 8bits, Parity as none
,and 1 stop bit. There are number of commands to operate mobile phone when it is connected
to computer. The mobile is Connected to computer by using a data cable. The command which
we provide to operate mobile phones are called as AT Commands.
ABSTRACT
New ideas and invention are the parts of an innovators life. He always try to look upon the
solutions to the problem from a technical point of view.
An project is a perfect balance cocktail of the practical aspects of the humanities and
economics. The project provides a deal with a problem existing in society from a technical
point of view. Our project is also a solution approach towards students technical approach.
The mission of the project named Discussion Forum is to create an integrated online
discussion forum for students. Our goal is to focus on various technical issues and interrelated
connections between the members of the forum.
INTRODUCTION
In response to many requests from colleagues this project established an online discussion
forum for technical student. The forum con now open to students from any country.
This section of the project has been designed to help students in all aspects of career
development. We have included some useful information as well as the ability to do some
serious job searching with extensive engineering Job Databases.
The engineers international careers section was written by resident careers counselor with
many years of experience in the industry, particular within the engineering disciplines. This
guide will assist in getting ahead in students career.
If we are not sure where to start job searching, we can take of this project help. We provide
with all the information need to assist in finding that great job. It might all seem a bit daunting
at first but it will guide through. Getting ahead is what its all about.
Discussions tool is a virtual version of a classroom. If our instructor includes discussion-type
activities in the online course site, the Discussion board is where we will meet other student,
ask question and perhaps post some assignments.
51. Java-RMI-chat
52. Sending & receiving SMS-through-vb.
53. Home automation using mobile (SMS).
54. File transfer & LAN-chat (wired & wireless) (Java)
55. Voice operated PC Applications (VB)
56. Stepper motor controlling using (VB,C,C++)
57. VOICE MAIL USING Java.
58. Electronic banking (Servlet)
59. Electronic shopping (Servlet)
60. Sending SMS with internet (Java)
61. Sending email with internet (Java)
62. Automation using internet (controlling equipments ) (Java)
63. Using your mobile miss call as password (VB, /.net)
64. Agile Manufacturing using Genetic Algorithm. (Java)
65. CRM for Airlines Industry (VB/VB.Net)
66. Pattern Detection using Web Log Data (VB)
67. Image Codec (Matlab)
68. Core Banking (Java, Oracle)
69. Cross Compiler (C/C++) ABSTRACT
70. MIS (VB.Net)
71. Intelligent Search Engine (Java, XML)
72. PATAL (Java)
73. ERP System (VB.Net) ABSTRACT
74. Video transmission over network (Java) ABSTRACT
75. Remote desktop system (Java)
76. Credit card approval system (VB)
77. Effort & billing tracking system for IT Projects (VB/SQL Server)
78. Assurance allocation technique using mobile agent (Java)
80. Process & flow tracking for biomass distribution project (VB)
81. ERP implementation (.net)
82. Java parallel processing framework (Java)
83. Unified modelling language editor as a tool (Java) 84. e-Learning Portal (Java, XML)
85. Duplicate Bill on Internet & Bar Code Generation (VB .net)
86. Client Monitoring System (Java)
87. Preventing Network Data congestion Collapse using Network Border Patrol (Java)
ABSTRACT
88. On-line image processing (Java)
89. WISDOM : Web Intra Page Informative Structure Mining Based on Document Object
Model (Java)
90. Road Way Mapping System (Java)
91. Development of HTTP Caching Proxy Server (Java)
92. Portfolio Management (VB)
93. Motion Detection for security system (Java)
94. Process Optimization using ANN (Java)
95. Smart Stock Application (VB .net)
96. SMS Gateway (Java)
. A New Kind of Cluster based Key Management Protocol in Wireless Sensor Network
.
Analyses of VOIP services using vex DO Revision System
IEEE TRANSACTION ON NETWORKS & SECURUTY
Routing/Scheduling System
GPS Based Vehicle Parameter Monitoring With Intelligent Data Analysis
Global Positioning System with AI
BLUETOOTH ENABLED SECURITY SYSTEM & ACCESS CONTROL
PROJECTS
Wireless Code Modulation For Secure Communication Using Encryption &
Decryption
Bluetooth Enabled Wireless Network Synchronization
Wireless Heart Beat Rate Monitoring & A Cardiac Pacemaker Simulation
Mobile Messenger
Wireless AI Based Intelli-Robo For Materials Handling
Wireless AI Based Fire Fighting Robot For Relief Operation
Wireless Industrial Security Robot With Motion Detection System
Wireless AI Based Mobile Robot For Multi Specialty Operations
Smart / Proximity Based College Campus Card & Access Control System
Smart / Proximity Based Employee Id Cards & Access Control System
Smart Card / Proximity Based Bio Medical Health Card Design
Smart Card / Proximity Based Human Resources Management System
Smart Card / Proximity Based Membership Management System
Smart / Proximity Based Punctuality Monitoring System For Public
Transport System
C To C Communication Microcontroller To Microcontroller
Communication System With LCD Display
Wireless Temperature Monitor & Controller Based On Vhf Transmission
Wireless Motor Speed Controller Using RF Module
Electrical Parameters In Industries Is Monitoring Through Pc Using Wireless
Data Transfer
ADVANCED ROBOTICS SOLUTIONS
Artificial Intelligence, Fuzzy Logic, Neural Networks
Wireless AI Based Mobile Robot For Multi Specialty Operations
Wireless AI Based Fire Fighting Robot For Relief Operations
Wireless AI Based Intelli-robot For Materials Handling
Integrated Rule Based Control Of Robot Using Fuzzy System & Neural
Networks
AI Based Fire Fighting Robot For Relief Operations
AI Based Intelli-robot For Materials Handling
AI Based Mobile Robot For Multi Specialty Operations
Industrial Security Robot With Motion Detection System
Microcontroller Controlled Robot Arm For Paint Spraying
Production Monitoring Robot
Two Axis Robot With Artificial Intelligence
Three Axis Robot With Artificial Intelligence
Four Axis Robot With Artificial Intelligence
Five Axis Robot With Artificial Intelligence
Wireless Industrial Security Robot
Alive Human Detector Robot With Counter Using Wireless Pc Interfacing
Display
Smart Multi Functional Power Meter With LCD Display
Digital Energy Meter & Voice Annunciation With Proximity Card Contact
Less
Intelligent Power Sharing Of Transformers With Auto Protection
Prepaid Digital Energy Meter Billing & Cost Indicator With Voice
Annunciation
Multiple Starter With Overload & High, Low Voltage Protection
Prepaid Electricity Billing Automation & Cost Indicator
Industrial Power Management System
Smart Power Monitoring For Efficient Energy Management
Distribution & Sub Station Automation With SCADA
Automatic Phase Changer [censored] Change Over & Load Breaker
Microcontroller Based SCADA For Substation By WAP
Microcontroller Controlled Power Supply For Testing Application
Power Line Monitoring System
ELECTRICAL PROJECTS
Noise Less Speed Control Of DC Motor Using PWM Converter
Remote Control Of AC / DC Motor With Parameter Monitoring
Remote On / Off Of An AC / DC Motor
Remote On/Off Controller For AC Motors With Parameter Monitoring
Remote Speed Control Of AC / DC Motor
Remote Switching System For Home Appliances And
Hardware
Substation Monitoring System - Electrical Transmission And Distribution
Process
Electrical Network Automation & Communication Systems
Remote Data Monitoring & Data Analysis For Power Station
Post Paid Electricity Billing Automation
Power Sharing Of Transformer With Overload Protection
EB Theft Monitoring And Control System
Artificial Intelligent Solar Tracking System With True Graph & PC Interface
MECHANICAL, MODEL BASED & MECHATRONICS EMBEDDED
PROJECTS
Smart Solar Tracking System For Optimal Power Generation
GPS Based Intelligent Guided Vehicle With Collision Mitigation
Automatic Electrolyte Battery Filling Using Conveyer System
SCADA & PLC BASED EMBEDDED PROJECTS
INSTRUMENTATION
Electrical Station Variables Reader/Controller With True Graph And SCADA
Microcontroller Based SCADA For Substation By WAP
Multi Channel Voltage Scanner SCADA
Multi Parameter Measurement System SCADA
Plc Based Bottle Filling Station With Conveyors
Automatic Anesthesia Controller Using Infusion Pump With Heart Beat
Rate
Interest
15. sIncentive-Based Scheduling for Market-Like Computational Grids
Reference: http://www.seminarprojects.com/Thread-ieee-project-list#ixzz0w2swwG00