File

advertisement
Information Technology Projects and Ideas
1. INTRUDER ALARM SYSTEM
2. FACE DETECTION USING HSV (BY PERFORMING SKIN SEARCH OF INPUT
IMAGE)
3. WIRELESS AUDIENCE POLLING SYSTEM
4. MANAGE PRISONS (CONTROLLING CRIME)
5. PATIENT MONITORING
6. AUTOMATIC AND DYNAMIC GENERATION OF RANDOM IMAGES
7. OPTIMIZATION TECHNIQUES FOR NETWORKS USING COGNITIVE APPROACH
8. SYNCHRONISED TELE MEDICINE USING WAP
9. MULTI-LINGUISTIC PEOPLE SEARCH
10. ATM USING FINGER PRINTS
11. GSM BASED WIRELESS DISTRIBUTED ENERGY BILLING SYSTEM
12. MECHANISMS FOR TEMPORAL PARTITIONING IN THE COMMUNICATION
SYSTEM OF AN INTEGRATED ARCHITECTURE AND ASSESSMENT OF
PERFORMANCE
13. DATA GUARD - THE ULTIMATE PROTECTOR
14. CONTENT AUTHENTICATION OF DIGITAL IMAGES USING FRAGILE AND SEMIFRAGILE WATERMARKING TECHNIQUES
15. WEBCAM BASED HUMAN TO MACHINE INTERACTION (WEBCAM MOUSE)
16. VIDEO MINING PATTERN RECOVERY VS. PATTERN RECOGNITION
17. CODE-X FOR SECURE TRANSACTION MANAGEMENT IN A MULTI CLIENT /
SERVER TERRA FIRMA
18. RELATIONAL DATA OBFUSCATION
19. TCP MODELLING FOR CONGESTION CONTROL
20. Q-ROUTING IN DYNAMIC NETWORKS USING MOBILE AGENTS
21. SPARE BAND WIDTH ALLOCATION USING RESOURCE MANAGEMENT CELL
22. TOUCH SCREEN BASED SMS IN REAL TIME ENVIRONMENT
23. Development of a user friendly ,feature-rich, practical Appraisal Tracker.
24. Development of a split screen application for the data entry of the shipments.
25. Development of an Interest Calculation system for a retail bank
26. Development of an agent-based information push mechanism
27. Development of a feature-rich, practical online application for the Training and Placement
Dept. of the college.
28. Development of a Defect Tracking System
29. Development of a Miles Acquisition System (MAS)
30. Development of a feature-rich, practical online leave management system
31. ONLINE LEAVE MANAGEMENT SYSTEM
32. ONLINE ON-REQUEST COURSES COORDINATION SYSTEM (ORS)
33. BIDDERS ANALYSIS SOFTWARE FOR A TENDER
Online Index Recommendations for High-Dimensional Databases Using Query Workloads /Jee
Efficient and Secure Content Processing (Java)
Controlling IP Spoofing through Inter domain Packet Filters (Java)
Rough sets based Search Engine for grid service discovery (Net)
Trustworthy Computing under Resource Constraints with the DOWN policy (Net)
Credit Card Fraud Detection using Hidden Markov Model (Net)
Hba: Distributed Metadata Management for Large cluster-based storage system (Net)
Minimizing file download time in Stochastic Peer-to-Peer networks (Net)
Statistical Techniques for detecting Traffic anomalies through Packet Header Data (Net)
The Effect of Pairs in Program Design Tasks (Net)
Rate Allocation and Network Life Time Problems (Net)
Distributed cache updating for the Dynamic source routing protocol /Java
An Adaptive Programming Model for Fault-Tolerant Distributed Computing /Java
Face Recognition Using Laplacian faces /Java
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
/Java
Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized
Paintings /Net
A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
/Java
Noise Reduction by Fuzzy Image Filtering /Java
Online Handwritten Script Recognition /Java
ODAM: An Optimized Distributed Association Rule Mining Algorithm /Java
Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and
Compression Applications /Java
Workflow Mining: Discovering Process Models from Event Logs /Net
An Agent Based Intrusion Detection, Response and Blocking using signature method in Active
Networks /Java
A Novel Secure Communication Protocol for Ad Hoc networks [SCP] /Java
ITP: An Image Transport Protocol for the Internet /Java
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet
Episodes(HIDS) /JEE
Incremental deployment service of Hop by hop multicast routing protocol /Java
Network border patrol: preventing congestion collapse and promoting fairness in the Internet
/Java
Location-Aided Routing (LAR) in Mobile Ad Hoc Networks /Java
Neural Networks for Handwritten character and Digits /VC++
Selective Encryption of Still Image /VB,C
An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
/Java
Neural Network-Based Face Detection /VC++
Homogenous Network Control and Implementation /Java
XML Data Stores: Emerging Practices /Java
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks /Java
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
/Java
Mobile Agents In Distributed Multimedia Database Systems /Java
Wireless Traffic Viewer Using JME JME
JME Mail Client Server JME
Monitoring And Managing The Clusters Using JMX JME
Peer-To-Peer Messaging JME
Mobile Information Provider JME
Mobile Bank WAP
Video Steganography Using Mobile Simulation JME
Network Traffic Anomaly Detector JME
ERP for Leather Company JEE
Online Web shop JEE
Online Fashion Studios JEE
ERP for Small Business JEE
Bulk Billing System JEE
SN Java Project Titles Language
Optimal Multicast Routing in Mobile Ad-Hoc Networks Java
Homogenous Network Control and Implementation Java
Performance Evaluation of RMI Java
Network Component for XML Migration Java
A Secure Routing Protocol for mobile Ad-hoc Network Java
Retrieving Files Using Content Based Searching and presenting it in Carousel view Java
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
Java
Java Network File Sharing System Java
Image Transformation using Grid Java
Java Visual Editor with Compiler Java
Embedding In Video Steganography Java
Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java
Image Rendering For Grid Technology Java
Scalable Wireless AD-HOC Network Simulation Using XTC Java
ATM Networks For Online Monitoring System Java
Network Border Patrol Preventing Congestion Collapse Java
Shortest Node Finder In Wireless Ad-Hoc Networks Java
TCP/IP Pocket Controlling Monitor Java
Network Security System In DNS Using Ad-Hoc Networks Java
E-Mail Server Using Multithreaded Sockets Java
Integrating Speech Engine With Web Navigator Java
XML Enable SQL Server Java
Network Analyzer Java
Public Key Validation for DNS security Extension Java
Java Productivity Aids Java
Image Water Marking
Call Center Management System ASP Net
Online Shopping ASP Net
Textile Web Services ASP Net
Auction System ASP Net
Online Quiz ASP Net
Online Bank ASP Net
Online Voting System ASP Net
Securing Image URL ASP Net
Web Services ASP Net
Smart Knowledge Provider ASP Net
Online Book Shop ASP Net
Electronic Fund Transfer ASP Net
Work Flow Management System ASP Net
Online Customer Care ASP Net
CVS Root File Changing Utility C# Net
C# MP Compressor C# Net
Convolution Filters Using Image Processing C# Net
Database Schema Comparison Utility C# C# Net
Displacement filters, including swirl using GDI+ C# Net
Edge Detection Filters C# Net
Flood Fill Algorithms in C# and GDI+ C# Net
Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# Net
Hiding binary data in HTML documents C# Net
Hiding Messages in MIDI Songs C# Net
Hiding messages in the Noise of a Picture C# Net
Image Processing C# Net
Windows Management Instrumentation WMI Implementation C# Net
Image Processing for Bilinear Filters and Resizing C# Net
Image processing for HSL color space C# Net
Image Processing for Per Pixel Filters using GDI+ C# Net
Multithreaded Chat Server C# Net
Reading and Writing AVI files using steganography C# Net
Steganography for Hiding Data in Wave Audio Files C# Net
TCPIP Chat client server Using C# C# Net
Neural Networks for Unicode Optical Character Recognition C# Net
Using Trigonometry and Pythagoras to Watermark an Image C# Net
Library Management System C# Net
Steganography for FTP through a Proxy Server C# Net
Artificial intelligence network load balancing using Ant Colony Optimization C# Net
Neural Networks for Handwriting Detection System Using Brain Net VB Net
Library Management system VB Net
Windows Management Instrument (WMI) Net VB Net
Wallpaper Changer Utility VB Net
Win Application for Word Processing VB Net
Screen capture Utility VB Net
HTML Editor VB Net
Image Converter VB Net
Internet History Viewer VB Net
VB Net Smart Mail Transfer Protocol VB Net
Windows Multi File Search utility VB Net
Message Digest VB Net
FTP Explorer VB Net
Convolution Filter VB Net
Find and Replace utility VB Net
Apartment Management System VB Net
Computerized Information Software VB Net
Employee Management System VB Net
Hotel Management System VB Net
Human Resources Management System VB Net
Inventory System VB Net
Membership Management System VB Net
Patient Care System VB Net
Send SMS To Cell Phone Through SMTP Mail VB Net
Trainee Management System VB Net
Cryptographically Using Secure Server/Client Protocol VC++
Intrusion Detection Prevention And Trace back Systems VC++
Neural Network for Recognition of Handwritten and Digits VC++
The File Digest program and the C++ implementation of some Message-Digest algorithms
VC++
File Encryption and Encrypted text embedding in an image VC++
Performance Evaluation of DISTANCE Routing Algorithm in MANET VC++
courtesy
1. Design of Intranet Mail System
2. Mirroring
3. Development of a Distributed Systems Simulator for Event Based Middleware
4. A Smart phone Application to remotely a PC over the internet
5. Network Protocol Verification Using Linear Temporal Logic
6. Virtual Routing Network Emulation Frame Work
7. A Multihoming Solution for effective load balancing
8. Implementing a Linux Cluster
9. Improving the efficiency of Memory Management in Linux by Efficient Page
10. Replacement Policies.
11. Experimenting with Code Optimizations on SUIF (Stanford University Intermediate Format)
12. Intranet Caching Protocol
13. A DBMS with SQL Interpreter
14. Developing an Organically Growing Peer to Peer Network
15. Analysis of Routing Models in Event Base Middlewares
16. Analysis of Event Models in Event based Middle ware
17. Integration of Heterogeneous Databases Into XML Format with Translator
18. Information Management and Representation Using Topic Maps
19. Face Recognition Using Artificial Neural Networks
20. Video Conferencing with Multicast Support
21. Collaborative Span Filtering Using Centralized Incrementally Learning Spam Rules
22. Database
23. Hierarchical Data Back Up
24. Automated Generation of Cycle Level Simulators for Embedded Processors.
25. Mini Projects By M.Techs
26. Fingerprint Image Enhancement
27. Dept Library Management System
28. Linux Kernel Enhancement
29. Cloth Animation & Dynamics.
30. Linux Kernel (Memory Management)
31. Image Steganography
32. Web Enabled Opinion Poll System For NITC
33. Application Of Bayesian Networks To Data Mining
34. Triple crypt Using Vector Displacement Algorithm
35. Network Analysis
36. Feed Forward Neural Networks
37. IP Sniffer
38. Project Management System
39. Cryptographic Engine
40. Fault-Tolerant TCP
41. Enhancing The Algorithms
42. 2 mail
43. Mini Projects by B.Techs ( Currently reports are not available )
44. Time Table Information System
45. Online Library System
46. Implementing an interface for transliteration
47. Simulation of the IA64 Instruction Set Architecture
48. Simple FTP Client
49. Text Editor for Linux Platform
50. Exam Server
51. Online Bulletin Board
52. Project Server
53. Developing GUI for IP Tables Configuration
54. Academic planner
55. Online Election Software for Hostel Election
56. Performance Evaluation of Routing Algorithm using NS2
57. Alumni Software
58. Bandwidth management Tool
59. Implementation of Scalar Optimizations
60. Online Banking
61. Distributed Workgroup File Indexer
62. Managing Linux Distributions
63. Network Sniffer
64. Simulating Routing Algorithms in Java
65. A Tool For Network Auditing(ping and Port Scanning, TCP/IP Finger printing
66. An alternative semantics for error and exceptional handling
67. Online Counseling software
68. Web application
69. Instant messenger system
70. course home page generator
71. Web application
72. An Interpretor for lambda calculus with some extensions
73. course home page generator
74. Probabilistic Techniques for cache replacement
75. Implementation of Download wizard for simultaneous downloads
76. Online Share Trading
77. Online Counseling
78. Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH
79. Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH
80. Using Genetic Algorithms for testcase generation for finite state machines
81. A study of the Linux Operating system, Development of useful System programs
82. subsequently implementing a GUI Providing a certain useful functionality
83. Online Shopping
84. Text to Speech conversion
85. Hostel elections voting software
86. Code optimization: Implementation of scalar optimizations
87. A Web based academic monitoring system
88. To output the timing schedule
89. Code optimization: Implementation of scalar optimizations
90. Online Objective test
91. Performance Evaluation of Routing Algorithm using NS2
92. IA64 ISA Simulation
93. Text to Speech conversion
94. Auction simulator using agents
95. Customizing Proxy Web server
96. Auction simulator using agents
97. Implementation of cryptographic protocols in oblivious signature based envelope (
98. OSBE to handle cyclic policy interdependency)
99. NITC Student information system
100. Implementation of the gaming software
101. Online Library Management system
102. Project Server
103. My SQL Administrative tool kit
104. Error handling for syntax analysis
105. Online Student Registration
106. Final Project by M.Techs ( currently reports are not available)
107. Operating system enhancements to prevent the misuse of system calls.
108. Type systems and applications to safety.
109. Spatial and temporal database (queries for retrieving data)
110. Adaptive distributed event model.
111. Improving TCP performance in adhoc networks.
112. Model checking for protocol verification.
113. Type systems and it's application to safe and efficient code.
114. Exact functional context matching for web services.
115. A new methodology for representation of TCP performance in TCPSF.
116. Adaptive event based middleware architecture.
117. Intelligent agents.
118. Optimizing pattern matching algorithm in intrusion detection.
119. Information retrieval from textual corpus.
120. Direction queries in spatio-temporal databases.
121. Secure routing.
122. Audio processing of movies.
123. Final Projects By MCA ( currently reports are not available)
124. Secure Conferencing System
125. Web based Linux Administration
126. Wireless Search Engine
127. Hostel Election Software
128. Performance Enhancement of HTTP using improved TCP Functionalities
129. Adding Functionalities to Libpcap
130. Performance Evaluation of an Efficient Multicast Routing Protocol
131. Development of an OS Framework for a MIPS Simulator
132. Secure Mail Server
133. Development of an OS Framework for a MIPS Simulator
134. Development of an OS Framework for a MIPS Simulator
135. Academic per-to-peer Network
136. Secure Mail Server
137. Distributed System simulator for Publish-Subscribe Model
138. Data Integration
139. Web based Linux Administration
140. Interface for Mobile Phone and PDA using J2ME
141. Distributed System simulator for Publish-Subscribe Model
142. Distributed System simulator for Publish-Subscribe Model
143. Contact Reminder
144. Direct Information System
145. Course Home Page Generator
146. Campus Online Help Desk
147. Online Class Register
148. Mail Server Utility
149. Hostel Election Software
150. Collaborative Web Browsing
151. Web based Application for Multiple Clients
152. Testing Tool
1. Scalable infrastructure for index based information extraction over large document collections
2. Efficient inference algorithm for large state space graphical model
3. Information Extraction in Diverse Setting
4. Anomaly Detection
5. Information Retrieval in Resource Constrained Environments
6. Dynamic Data Dissimination in Resource Constrained Environment
7. Using Multiple Decomposition Methods and Combining a Multitude of Experts
8. Using a multitude of experts in time series forecasting
9. Forecasting
10. Matchmaking algorithms for Semantic Web Services
11. To Coordinate Collaborative Software Development Based on SDLC Models
12. Collaborative Platform for Open Source
13. Feedback Based Self-Configuring Systems
14. Towards Evaluating Lexico-Semantic Networks
15. Semantic Searching using NLP techniques
16. Word Sense Disambiguation Engine for Multiple Languages
17. Marathi Sentence Generation from UNL.
18. Automating News Gathering and Classification
19. RFID Data Management
20. RFID Data Management
21. Performance Analysis of Telephony Routing Protocols
22. Load Sensitive Routing algorithm and its application in traffic engineering
23. Energy Efficient Event Reliable Transport in Wireless Sensor Networks
24. Inter-operability of IEEE 802.11 with IEEE 802.11e
25. Intelligent Car Transportation System (IntelliCarTS)
26. Design and Implementation of WiFiRE protocol
27. Design and Implementation of WiFiRE protocol
28. Design and implementation of PSTN/VoIP gateway with inbuilt PBX.
29. Extending Shikav to support animation of networking protocols
30. Formal Specification and Verification of WiFiRe
31. Performance Analysis of WiFi-Re(Wireless Fidelity - Rural Extension)
32. Design and Implementation of PSTN to VoIP Gateway in built Asterisk PBX
33. Optimized and delay sensitive service provisioning over SLiT networks
34. Detecting and Blocking Skype
35. Design of an Infrastructure using WiFi for Road Naviation
36. Approximation Algorithm for Facility location and related problems
37. Wireless Security
38. Context Aware Service Oriented Architecture
39. Web Monitoring for Lightweight Devices
40. Web based Named Entity Recognition
41. Learning relevance order over graphically linked objects
42. Exploiting Local Regularities in Text Segmentation using Conditional Random Fields
43. Statistical Learners for Information Extraction:An Empiricial Approach
44. Recurring Functional Sites in Protein Structures detected with allowance for Substitution of
Amino Acids.
45. Web Monitoring for Lightweight Devices
46. Compression in Flash-based Databases
47. Topology-Aware Failure Diagnosis For Distributed Enterprise Systems.
48. Object-level Partitioning of Applications
49. Power Aware duty scheduling in Wireless Sensor Networks
50. Building Cluster Environment For Interactive Users.
51. Overload Control of Web Services with SEDA
52. P-AODV: Extension of AODV for Partially Connected Ad Hoc Networks
53. Hybrid Mechanism for Enhancing the Performance of Streaming Service in D-T MA
54. WiMax MAC over WiFi PHY for rural communication
55. A Contention Window Differentiation Mechanism for providing QoS in 802.11
56. Video over variable bandwidth links
57. Improving RFID System to read the tags efficiently
58. RFID Security
59. Object-level Partitioning of Applications
60. On supporting Design evolution and treaceablity
61. Improve Forecasting Performance Using Decomposition and Combining
62. Using Multitude of Time Series Forecasting Models to Improve Forecast
63. Short Term Load Forecasting
64. Integrated Case Based Reasoning And Rule Based Reasoning for Insurance
65. Hybrid Model Based Reasoning in Finance
66. Efficient Causality Tracking in Optimistic Distributed Simulation
67. Publish-Subscribe systems for P2P Networks
68. Secure Routers
69. DNS based Multihoming
70. Indian Internet Tomography
71. Performance Study of Infiniband Based Cluster
72. Optimal Router Buffer Size
73. Why Disks fail in India and what can be done about it
74. Estimating latencies and buffer requirements in multimedia networks
75. Receiver feedback based rate adaptation of multimedia sources.
76. Statistical models for Information Extraction from webpages
77. Tools for comparative analysis of extraction algorithms
78. Aggregate queries on uncertain results of data integration systems
79. Improving performance of large scale data integration systems
80. Forecasting using Neural Networks
81. Forecasting using Genetic Algorithms.
82. Enterprise Application Integration
83. Use of wavelets in Forecasting
84. Information Extraction
85. Visual Layout Driven Information Extraction from Websites
86. Information Extraction using a Database
87. Deduplication and Soft matching
88. Entity Recognition on the Web
89. Middleware for group communication in hybrid network.
90. A Collision-free tag reading mechanism for RFID Network with Mobile Readers.
91. Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers
92. Performance Analysis of Telephony Routing over IP
93. An Efficient OSPF Based Load Sensitive Routing Algorithm.
94. Performance Analysis of IEEE 802.16 MAC
95. VoIP over wireless network
96. Measurement Based Performance Characterization of Software Servers
97. Quality of Service Provisioning in IEEE 802.11 Wireless LANs
98. Fine-grained symmetric multiprocessor software architecture for TCP/IP stack on the UNM
platform
99. Embedded Real Time Systems
100. Vehicle Driver Rating System
101. Image Classification Using Neural Networks and Fuzzy Logic
102. Dynamic Topology Extraction for Component Based Enterprise Application Environments
103. Database In Smart Cards
104. Low Bit Rate Speech Coding
105. Code Generation for Lazy Functional Languages
106. Spectral methods for Graph Partitioning
107. QOS Architecture for Mobile Nodes
108. Digital video browser and multimedia content search
109. XML agents in Smart Cards
110. Computational Geometry in Drug Design
111. Pure Optical router for Optical routing without electronic intervention
112. FPGA implementation of 802.11 MAC.
113. 3D View Morphing
114. Learning Paths for Information Extraction
115. Application of Geometric invariants in finding structural properties in biological molecules
116. Content Cognizant data dissemination
117. Autonomic Computing and Self Healing Systems
118. NOT AVIALBLE Data Mining
119. QoS in Wireless Networks
120. NOT AVIALBLE Data Mining (title yet to be decided)
121. Building VoIP over DEP Network
122. Secure Update Semantics in XML databases (Area)
123. Hardware - Software Codesign using hierarchical Finite State machines
124. Design and Deployment of a Transfer Control Protocol over Asymmetric Satellite Networks
125. Semi Automatic generation of properties for verification
126. Protein prediction.
127. Streaming in Networks
128. NOT AVAILABLE DEP networking (title yet to be decided)
129. Information Retrieval
130. Information Theoretic Text Similarity Measurement Using Approximate Word Sense
Disambiguation
131. Chaos based Encryption for a Structured Video Codec
132. Synchronization Specifier and Presenter for Authoring System
133. Tackling the exposed node problem in IEEE 802.11 MAC
134. Design and Deployment of a Reliable File Transfer Protocol over Asymmetric Satellite
Networks
135. Robust HTML to DOM conversion and applications
136. Detection of recurring patterns in protein structure by superimposition and geometric
hashing
137. QoS based Routing Algorithms in Internet
138. Object Based Video Segmentation
139. Reconfigurable Packet Classifier
140. Design and Evaluation of an IEEE 802.11 Based Dual MAC for MANETs
141. Optimizing the evaluation of complex similarity predicates on large datasets
142. Dynamic Adaption of DCF and PCF mode of IEEE 802.11 WLAN
143. Information Hiding Using Fractal Encoding
144. Verification of Communicating Reactive State Machines
145. Dynamic Slicing of Programs
146. Semi Supervised Information Extraction Using Hidden Markov Mode
147. Slicing of Synchronous Programs
148. Fast Algorithms for the Modified Discrete Cosine Transform
149. Video Streaming in Wireless Environments
150. Design and Implementation of Traffic Engineering Extensions for OSPF
151. Route Repair in Mobile Adhoc Networks
152. Design of Multi-threaded Label Distribution Protocol for MPLS Emulator
153. Filter Object Framework for MICO - Static Model
154. DSP Based Virtual Private Network
155. Design and Implementation of RSVP-TE over MPLS Emulator
156. TAX: Tree Algebra for XML Implementation
157. Filter Object Framework for MICO - Dynamic Model
158. A Reconfigurable Scheduling Co-Processor
159. A Hybrid Approach to Semi-Supervised Learning
160. Interactive Deduplication using Active Learning
161. Security Issues in Mobile Agents
162. Filter Object Framework for MICO - Dynamic Model
163. Multi-threaded Label Distribution Protocol for MPLS Emulator
164. Traffic Engineering Extensions to OSPF
165. Development of basic TGREP simulator
166. Development of QoS enhancement in VOIP applicationDevelopment of QoS enhancement
in VOIP application
167. Building a Distributed Computing Environment in KreSIT
168. Development of an API for using SMS as transport layer.
169. Voice message transfer using Personalised Repository based Speech-Coding techniques
170. Telematic Application - Global Position Aware Vehicle
171. Framework for cascading Payments in P2P
172. Implementation of Virtual Private Database (VPDmechanism for POSTGRES.)
173. Implementation of an ASP based Supply Chain Management System
174. Development of Orchestration Server based on BPEL4WS standard (tentatively named as
"ORCSERV").
175. Development of LBX: Low-Bandwidth X
176. Development of Thin LINUX desktop with or without X
177. Source code management (like Rational Clearcase)
178. Grid Computing
179. Linux Clustering
180. A leave planner
181. A software life cycle maintainer
182. Developing wireless components
183. Congestion Window Control
184. Implement SIP call control for voice Telephony.
185. Implement Registration Server and Presence Server for SIP.
186. Implement security framework for P to P file system
187. GNUTELLA client for LINUX
188. Matchmaking website
189. Productivity Enhancement tool for Animation industry
190. Web-based presentation of Soil-biotechnology (SBT)
191. Implementation of Soil-biotechnology(SBT)
192. Semantic WEB
193. E-Commerce related project
194. User Interfaces for Web Applications
195. Exploring XUL as a GUI development kit
196. Business Card Manager
197. PCI Interface to Wireless LAN
198. GUI Front-end for Postgres
199. Low cost affordable raid storage
200. Optimization on postgres optimizer
201. Embedded Systems for Automobiles
202. Document Manager
203. WorkFlow Management System
204. Characterization of JVM
205. Performance Evaluation and Modeling of Servlet Containers
206. MAC Layer Scheduling in Ad-hoc Networks
1. Granite Business management system
2. Virtual classroom
3. Dijkstra algorithm for shortest path
4. Implementation of BPCS-Steganography
5. Job portal
6. Pragmatic general multicast
7. Log browser
8. Online matrimonial system
9. Online health care system
10. Factory management system
11. T-Blogger
12. Online bug tracking and customer support system
13. Online call logging and customer support system
14. E-Banking transaction system and portal for bank officials and customer
15. Online book shop management system
16. Advance vehicle and highway management system
17. Acturial projection system
18. Developing port scanning and detection system
19. Development of simple IP subnet calculator tool
20. College management system
21. Library management system
22. Tax management system
23. Payroll information system
24. Medical management system
25. Vehicles with Intelligent Systems for Transport Automation
26. Advanced public bus transportation system for India
27. Automatic Medicine Announcement System
28. Intelligent Multi-sensor System for Control of Boilers and Furnaces
29. Dedicated Short range road side communication for vehicles
30. Accident prevention system for hairpin bend zone
31. Sequential switching for industrial application
32. RFID based car parking system
33. Intelligent Greenhouse
34. RFID reader enabled mobile with environment alert and mobile tracking
35. Active Learning Methods for Image Retrieval
36. Remote Switching Control System for Home Appliances
37. Real native and persistent layer for Java & .Net
38. Global Insurance Management System
39. A Smart System for Remote Monitoring of Patients and SMS Messaging upon Critical
Condition
40. Role Based Access Control
41. Rich Internet Application Using Flux Frame for Managing Workflow in healthcare domain
42. Effective Monitoring of Web navigation using Code Check
43. Customer Support Protocol
44. Online Employee Time Management System
45. Insurance Management System
46. Development of Customer relationship Management System to increase Sales
47. Intelligent Call Routing & Management using IVR in Asterisk Server
48. Human Age Estimation
49. An Intelligent Dictionary Based encoding Algorithm for data compressing for High Speed
Transformation Over Internet
50. Motion Detecting System
51. Project Management System
52. Process Monitoring System
53. Web Based help desk
54. Honey Pots- A Security System to Identify Black Hat Community in Networks
55. Water Marking Relational Databases Using Optimization technique
56. Quantum Key Distribution for 3rd party authentication
57. OMR Sheet Reader
a) Multi player strategy game: Project ideas on Visual basic,Java,Database
b) You can develop a speech reponse application using some hardware interface using the
Microsoft SAPI SDK
c) You can develop a Microsoft Word like application in VB ( a text editor basically)
d) Timetable generation (user will input subjects, faculty times, class room times) : User will
also input subject seriality and topics to be taken for the week
e) CD library management
f) Admission procedure
g) Online passport registeration
h) You can develop a LAN administrator tool (socket programming comes easy in VB) which
will monitor application on a LAN and provide functions
i) Voice Mail Systems
j) Computer Telephony Integration
k) Interfacing alphanumeric LCD x using VB
l) Registry Editor
m) NAT
n) honeypots
o) Creation of a DMZ
p) Creation of a sniffer and a port scanner
q) GSM
r) Library Management System
s) Hotel Management System
t) Examination result according to the classes
u) Ice cream parlour management system
v) Pizza hut - account management system
1. E-Campus
2. ERP/CRM
3. Virtual University
4. Flexible Network Monitoring Tool Based on a Data Stream Management System
5. Remote Service Monitor.
6. Desk FM Monitor
7. Verifying Delivery, Authorization and Integrity of Electronic Messages
8. A Utility-Based Incentive Scheme for P2P File Sharing in MANETs
9. Java Dynamic Data Viewer
10. E-learning
11. Satellite Image Processing.
12. Color Image Segmentation
13. File System Workload Analysis
14. E-form Application for Employee Management Using Hibernate Vs JDBC
15. E-Job Card and Timesheet Using Hibernate Vs JDBC
16. IP Spoofing Detection Approach (ISDA) for Network Intrusion Detection System
17. CSI-KNN-based Intrusion Detection System
18. Host Based IDS
19. Voice Over IP
20. Online Video/Audio Conference
21. Anomaly Detection/One-Class Classification Algorithm
22. Anomaly Detection/One-Class Classification Algorithm
23. Intranet Based Email System
24. Automatic Java Media Manager
25. Session Initiation Protocol (SIP) in Java
26. Effective Decision Tree Algorithm
27. A Hackers Approach to Improve the A.I. Behind CAPTCHA
28. Advanced Computer Cluster Architecture
29. Fair and dynamic Bandwidth Distribution Architecture
30. Network based Gaming Server.(NGS)
31. Code Database Servers-A Centralized Compiler Architecture
32. Code Review Tool Using Existing Third Party Implementations
33. Web Application Server Development Using SMS
34. Data Recovery In Ext2 files system and Adding secure deletion to your favorite file System
35. All in One Steganography
36. Design considerations for computer-telephony application programming interfaces and
related components
37. Services in Converged Network (Value-Added Services)
38. Peer To Peer Secure Internet Telephony (SIP)
39. Model Checking of Software Components: Combining Java Pathfinder and Behavior
Protocol Model Checker
40. Effectively Tuning and Optimizing the Database
41. Soundbox: A Graphical Interface to Digital
42. Directory Retrieval Using Voice Form Filling Online
43. Polyphonic Wizards
44. Incorporating Quality Considerations into Project Time/Cost Tradeoff Analysis and Decision
Making.
45. Enhance the Email Performance Through SMTP- New Approach
46. ETHEREAL System
47. Load Balancer in client-server architectures
48. Without packet Reordering dynamic load balancing
49. Without Load Balancing in MANET: Single Path Routing Vs. Multi Path Routing
50. Push Vs Pull: Quantative Comparison for Data Broadcast
51. Graphical Search Engine
52. GSM Based LAN Monitoring
53. Image Restoration
54. Information Retrieval SMS Server
55. LAN Based Bit Torrent
56. Quicklook approach to IDS
57. Generating Windows Presentation Foundation using templates
58. Bypassing Vista USA and correctly launching interactive process from a windows service.
59. CAPTCHA
60. AntiSqlFilter-Blocking SQL Injection Hacker Attacks
61. Java SIP Signaling Comptroller
62. A Text Watermarking Algorithm based on Word Classification and Inter-word Space
Statistics & Multi word features
63. Multicast Application and Approach to Security issues using key management
64. Webcam Image Tracker.
65. Human Head Internal Rendering with Mouth and Text To Speech Synthesizer
66. Hybrid Constraint Satisfaction Problem Solver
67. Hybrid Query Expansion
68. Web Based Artificial Intelligence Simulations
69. Circular Target Detection and Pattern Detection
70. Web Attacks Alerter Using Feature Extraction and SNORT
71. Grid Extension Framework for Large Scale Parallel Financial Modeling
72. Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices
Using the J2ME technology
73. Secure Mobile Banking & Security Issues
74. Efficient Way To Capturing and sending images and videos from mobile to PC and ViceVersa
75. Barcode Capture and Recognition for EAN Barcodes Using Cell phone Camera
76. Interactive Multiplayer Mobile Games Using Bluetooth
77. Treating Patients Diabetes Using Mobile and PC
78. Mobile Based Software Inspection
79. Enterprise Mobile Service Platform Using JMS & J2ME
80. A Secure Mobile Agent System Model Based on Extended Elementary Object System
81. Direct Manipulation Technique for Wireless Networking
82. GPRS Traffic Performance Measurements
83. J2ME end-to-end security for M-commerce.
84. Robust Distributed Speech Recognition using Speech Enhancement
85. Hybrid wireless-optical broadband access network (woban): prototype Development and
Research challenges
86. Quality of Resilience as a Network Reliability Characterization Tool
87. Handover Keying and its Uses
88. New Adversary and New Threats: Security in Unattended Sensor Networks
89. Wireless Data Traffic Decade of Change
90. Dimensioning Network Links: A New Look at Equivalent Bandwidth
91. Media Handling for Multimedia Conferencing in Multihop Cellular Networks
92. Risk Homeostasis and Network Security
93. Network Anomaly detection and classification via opportunistic sampling.
94. Self-addressable Memory-Based FSM: a Scalable Intrusion Detection Engine
95. Accurate Anomaly Detection Through Parallelism
96. Counting Bloom Filters for Pattern Matching and Anti-evasion at the Wire Speed
97. A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion
Detection
98. Parallelizing XML Processing Pipelines via Map Reduce
99. Application of Mobile Agent Systems to First Responder Training With Flexibility
100. Advance IP Traceback Scheme
101. An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number
of Hops
102. Multi-input Fuzzy Logic Controller for Brushless dc Motor Drives
103. On the Performance of Ad Hoc Networks with Multiuser Detection, Rate Control and
Hybrid ARQ
104. Two-Rule-Based Linguistic Fuzzy Controllers
105. A Unified Log-Based Relevance Feedback Scheme for Image Retrieval
106. The Impact of Loss Recovery on Congestion Control for Reliable Multicast
107. Dynamic Location Strategy for Hot Mobile Subscribers in personal Communications
108. Simulation-based Comparisons of Tahoe, Reno, and SACK TCP
109. Network Simulation Creator and Animator/NAM Enhanced Simulation Animation (NS2)
110. MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks
111. A Robust Spanning Tree Topology for Data Collection and Dissemination in Distributed
Environments
112. Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
113. Generation of Reliable PINs from Fingerprints
114. Physical Implementation and Evaluation of Ad Hoc Network Routing Protocols using
Unmodi ed Simulation Models
115. A Visualization and Analysis Tool for NS-2 Wireless Simulations: iNSpect
116. Impact of Node Mobility on MANET Routing Protocols Models
117. Dynamic Signature Verification Using Discriminative Training
118. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its
Application to Singular-Point Detection and Fingerprint Indexing
119. A Signal Processing Module for the Analysis of Heart Sounds and Heart Murmurs
120. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor
Networks
121. Ann Based Control Patterns Estimator For UPFC Used In Power Flow Problem
122. UPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink Programs
123. A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks
124. Simulation Study of BlackHole Attack In MANET: Detection and Prevention
125. Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc
Networks
126. Maximum Confidence Hidden Markov Modeling for Face Recognition
127. A Statistics Based Design of MAC Protocols with Distributed Collision Resolution for Ad
Hoc Networks
128. Power Flow Control with UPFC
129. Scalable Urban Network Simulator
130. Control Setting of Unified Power Flow Controller Through Load Flow Calculation
o managing cash and bank accounts
o General Accounting
o Cost Accounting
No multivariate analysis in the activities of the organization
o The chart of accounts, a tool for cost accounting and analysis of multidimensional
o Financial statements and reports from the organizations
o The data warehouse & data mining in the multivariate analysis of financial and accounting
information for managing an organization.
o assist in the monitoring, budgeting and financial controlling
o simulation in forecasting systems aid decision making
o Study of "computer literacy" in organization and business Systems ERP / BI / EDI / OLAP /
DSS / ES / the organist. If ...
o market research software to production....
o Impact of the implementation of IS in an organization
o Elasticity and extensibility of software: a challenge for the global accessibility of information
systems
o Portability: a challenge for the global accessibility of information systems
o Adaptability of software: a challenge for the global accessibility of information systems
o The modular computer systems: challenge for the successful deployment of computer systems
o Communication of players and software deployment
o The warning system and its importance in information systems: case ... ..
o Ergonomics Information Systems
o Comparative study of models of LCM: software development: case ....
o The re-engineering and implementation of information systems
o The object paradigm in application development management: case
o Outsourcing: an opportunity to computerize its services without investment in the purchase of
software systems
o Choosing a computer case ....
o XML as a tool for integrating information systems
o Studies of quality criteria for information systems management using the approach of TQM
o Design, development of integrated information systems
o The security of information systems in organizations
o Connections vs. Graph Web and accessibility of information
o Design, Development and Implementation of Information Systems such as ERP / MRP / BI: IT
systems help to:
Expertise: SE
Decision making: DSS
Management costs: (Standard, ABC)
Personnel Management: Payroll / salaries / fees (s / status, s / contract), social security, insurance
(life, health ... etc), working time
asset management
Commercial Management
o management of stocks and stores: Cas ...
o Management of sales (wholesale and retail)
o Order Management and Procurement
o management of billing
o customer management (CRM)
No vendor management (CRM)
o management of logistics / supply
o management of marketing information
o bar codes and computer systems sales
o Modeling and Optimization in the supply chain (SCM) The implementation of WLAN in
organizations and institutions
o VoIP and Wlan: a solution of the future in the landlocked country?
o streaming over WLAN: an opportunity for optimizing bandwidth in a mobile environment
o A comparative study of the prioritization of packets vs. streaming in optimizing bandwidth for
multimedia applications
o Study of the responsiveness and interactivity for Internet companies
o Appropriation of ICT in strengthening marketing and sales capabilities: competitiveness,
o ICT and creativity
o The ICT & Competitiveness
o ICT and the effectiveness
o ICT and efficiency
o Studies of open access infrastructure in regional integration and their impact on the economies
of countries
o Future developments on multimedia networking web: the case of TV on the Web / mobile
phones.
o The standard transmission of VoIP and Video on the Live network
o The educational games Multimedia
o The standards of 3G/4G mobile telephony
o Impact of Technology on 3G/4G integration of information systems Iimplémentation
payments by electronic cards in eCommerce. case of ....
o Design and development of application of the eCommerce payment électroniquedans
o The electronic payment cards, smart monney
o The security of electronic payments
o The computer systems and electronic payment
o Electronic banking: Opportunities and Challenges
o Legal and Tax Aspects of eCommerce
o eBanking and its evolution into the m-Banking
o The challenges of nomadism in eBanking
o The e / m-commerce and inter-operability systemic convergence technology.
o tele-clearing interbank electronic exchanges
o The electronic signature and legal challenges of eCommerce
o Internet eXchange Point (IXP) and its impact in the management of Internet resources
o E-Marketing, a new Eldorado of the conquest of markets
o The intranet: an EDI system effectively and efficiently in the enterprise
o Intranet and Supply Chain Management (SCM)
o Intranet and financial management (ERP)
o Intranet and staff management (HRM)
o Intranet: the headquarters of the Economic Intelligence (Business Intelligence-BI) and
technological convergence.
o Role of Intranet / Internet in disseminating information in real time (Real time systems)
o The ATM (Automatic Teller Machines) in the banking
o Post Service (ATM and POS) and customer service
o Internet service business strategy
o Study on the role of countries of the region in the production of web content
o Challenges and opportunities to appropriate ICT
o The net and communication strategies
o information systems as a solution to the redundancy of tasks and information to optimize
Disruptive and enabling technologies
Wireless and user mobility
Ubiquitous systems
On-line interactions
High speed electronics, storage, networking
eHealth and nanomedicine
Biological informatics and computing
Internet
IP-based networking and applications
Best effort and QoS
e-Learning and mobile learning
Service-oriented platforms
Peer-to-Peer Systems and applications
Web-advertising and Web-publishing
Multimedia and Webcasting
eCommerce
Trust, privacy, security
Internet macro and micro payment systems
On-line banking
Agent-based e-commerce
e-Business applications
Infrastructure for e-Commerce
Mobile commerce
Consumer-oriented devices and services
Mobile TV and IPTV
Consumer-oriented e-commerce
Smart and digital homes
Wearable devices
Smart consumer appliances
Speech enable appliances
Consumer accessibility appliances and services
Economics of security and protection
Knowledge for global defense
Security in network, systems, and applications
Trust, privacy, and safeness
Business continuity and availability
Cryptography and algorithms encryption
Rapid Internet attacks and network
Applications and network vulnerabilities
System advanced paradigms
Data-centered information systems
User-centric information systems
Pervasive and ubiquitous systems
Mobile learning and communications
Open and distance education systems
Management and control
Digital telecommunications management
Control and monitoring systems
Measurement and management systems
Human/Machine interface and man-in-the-loop control
Energy and power systems control
Self-monitoring, self-diagnosing, self-management systems
Digital analysis and processing
Digital information processing (Voice/Data/Video)
Computer graphics and animation
Virtual reality/3D graphics/Games
Computer modeling/simulation
Graphic/Image/Photo/Hand-writing analysis and processing
Pattern recognition / Computer vision
Natural language processing / robust processing
Speech recognition and processing
Mobile devices and biotechnologies
Robotics/Mobile devices/ Mobile networks
Handled and wearable computing and devices
Vehicular navigation and control
Nanotechnologies/Systems-on-the-chip/Networks-on-the-chip/ Haptic phenomena
Biotechnologies/Bioinformatics/Biometrics/Biomedical systems
Computational biochemistry
Biological data management
Software robustness for digital society
Software as a service
Software specification and design methodologies
Software development and deployment
Programming languages and supporting tools
Patterns/Anti-patterns/Artifacts/Frameworks
Agile/Generic/Agent-oriented programming
Neuronal networks/Fuzzy logic/Temporal logic/ Genetic Algorithms
Reasoning models/Model checking/Modular reasoning/
Program verification/validation/correctness
Embedded and real-time systems
Consumer-oriented digital economics
Online consumer decision support & advertising
Semiotic engineering of online services
Human factors in computer systems
Personal information management
Consumer trust in digital society
Interaction in smart environments
Mobile consumers and interactive spaces
Hedonic and perceived digital quality
Usability, aesthetics, and accessibility
Multimodal and interactive interfaces
Intelligent user interfaces
Government services in the context of digital society
ICT support for collaboration
EKNOW: Information and knowledge management
Knowledge data systems
Linguistic knowledge representation
Knowledge acquisition, processing, and management
Cognitive science and knowledge agent-based systems
Knowledge modeling and virtualization
Context-aware and self-management systems
Imprecision/Uncertainty/Incompleteness in databases
Geographic and spatial data infrastructures
Information technologies
Optimization and information technology
Business process integration and management
Information management systems
Information ethics and legal evaluations
On-demand business transformation
Informational mining/retrieval/classification
Multi-criteria decision theory
Organizational information systems
e-Business, e-Science systems
Decision support systems
Zero-knowledge systems
Expert systems
Tutoring systems
Digital libraries
Databases and mobility in databases
Industrial systems
TELEMED: Telemedicine and eHealth
Telemedicine software and devices
Virtual telemedicine
Wireless telemedicine
Electronic imagery and visualization frameworks
Color imaging and multidimensional projections
Personal, adaptive, and content-based image retrieval imaging
Imaging interfaces and navigation
Medical image processing
Computer vision and resolution
Telemedicine and tele health
Tele pathology and digital imaging
Tele cardiology
Tele rehabilitation
Clinical telemedicine
Internet imaging localization and archiving
Video techniques for medical images
Remote medicine and Internet
Safety in telemedicine
Telemedicine portals
Download