SlideShare a Scribd company logo
1 of 6
Download to read offline
IGEEKS TECHNOLOGIES 
Software Training Division 
Academic Projects for BE,ME,MCA,BCA and PHD Students 
IGeekS Technologies (Make Final Year Project) 
No: 19, MN Complex, 2nd Cross, 
Sampige Main Road, Malleswaram, Bangalore- 560003. 
Phone No: 080-32487434 /9590544567 
Mail: training@Igeekstechnologies.com , nanduigeeks2010@gmail.com 
Website: www.igeekstechnologies.com 
Land mark : Near to Mantri Mall, Malleswaram Bangalore
S.No PROJECT TITLE Technology Used 
JAVA Projects 
Image Processing 
1 A Personal Authentication Based on IRIS Recognition (IEEE) Java Swings, Applets 
2 Noise Reduction By Fuzzy Image Filtering (IEEE) JDK 1.6, Java Swing 
3 Script identification through temporal Sequence of the Strokes (IEEE) JDK 1.5, Java Swing 
4 Image Processing Editor JAVA 
5 Learn to Personalized Image Search from the Photo Sharing Websites (IEEE -2012) 
JDK 1.5, Java Swing, 
JDBC,HTML,JSP 
6 
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI 
Problems(IEEE-2014) 
JDK 1.6,JSP,HTML,MYSQL 
Networking / Network Security / Wireless Communications 
7 Multiple Routing configurations for Fast IP network Recovery (IEEE) 
JDK 1.5, Java Swing, SQL 
server 
8 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks (IEEE-2011) JDK 1.5, Java Swing 
9 Mobility Management Approaches for Mobile IP Networks (IEEE) JDK1.6,Java Swing, MS access 
10 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks (IEEE) JDK1.6,Java Swing, SQL Server 
11 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks (IEEE-2011) JDK1.6,Java Swing 
12 
Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common 
Interest (IEEE) 
JDK1.6,Java Swing, SQL Server 
13 Packet-Hiding Methods for Preventing Selective Jamming Attacks (IEEE-2012) JDK 1.5, Java Swing, RMI 
Label-Based DV-Hop Localization against Wormhole Attacks In Wireless Sensor Networks 
14 
(IEEE-2010) 
Java,J2ME(J2ME Wireless 
Toolkit) 
15 Achieving Network Level Privacy in Wireless Sensor Networks (IEEE-2010) 
Java,J2ME(J2ME Wireless 
Toolkit) 
16 Distributed Cache Updating Using Dynamic Source Routing Protocol (IEEE) 
Java Networking, Swing, 
MySQL 
17 Online Modeling of Proactive Moderation System for Auction Fraud Detection (IEEE-2012) 
JDK 1.5, Java Swing, 
JDBC,HTML,JSP 
18 Host-to-Host Congestion Control for TCP (IEEE-2010) Java, Eclipse 
19 Participatory Privacy: Enabling Privacy in Participatory Sensing (IEEE – 2013) JDK 1.5, JSP, HTML, MySQL) 
20 Embedding the Secure Data In An Audio/Video and Image Files JDK 1.5, Java Swing 
21 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks (IEEE-2011) J A V A , J F C ( S w in g ) 
22 Privacy- and Integrity-Preserving Range Queries in Sensor Networks (IEEE-2012) JDK 1.6, Java Swing, RMI,JDBC 
23 
Design and Implementation of Addressing Mental Health Epidemic among University 
Students via Web-based, Self-Screening and Referral System (IEEE-2011) 
JAVA, J2EE 
24 Secure Data Transmission JAVA 
25 Intrusion Detection System JAVA 
26 Bandwidth Recycling in IEEE 802.16 Networks (IEEE-2010) Java,Eclipse, MS Access 
27 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring (IEEE 2013) JDK 1.5,JSP,HTML,MYSQL 
28 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks (IEEE -2013) JDK 1.6, Java Swing, RMI 
29 Nymble: Blocking Misbehaving Users in Anonym zing Networks (IEEE-2011) Java,J2ME ,Tomcat 
30 
SAT:A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh 
Networks (IEEE-2011) 
Java,J2ME(J2MWireless 
Toolkit) 
31 Modeling and Detection of Camouflaging Worm. (IEEE-2011) Jdk1.6, java swing, Eclipse 
32 
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning 
Tree (IEEE-2011) 
Jdk1.6, java swing 
33 TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 
34 Vampire attacks: Draining life from wireless ad-hoc sensor networks (IEEE2013) JDK 1.5,RMI,SWING 
35 Fully Anonymous Profile Matching in Mobile Social Networks (IEEE 2013-Networking) JDK 1.5,JSP,HTML,MYSQL 
36 Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks (IEEE 2013) JDK 1.5, Java Swing, RMI 
37 An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System(IEEE2012) JDK1.6,Java Swing 
38 
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation 
Analysis(IEEE 2014) 
JDK 1.6,JSP,HTML,MYSQL 
39 
Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding 
Cryptographic Scheme and Evaluating Its Performance (IEEE-2014) 
JDK 1.6,JSP,HTML,MYSQL
40 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage ( IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 
41 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 
42 
Decentralized Access Control with Anonymous Authentication of Data Stored in 
Clouds(IEEE-2014) 
JDK 1.6,JSP,HTML,MYSQL 
43 Personalized Web search Using Browsing History And Domain Knowledge (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 
Cloud Computing 
44 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 
(IEEE-2013) 
JDK 1.5,JSP,HTML,MYSQL 
45 Ensuring Data Storage Security in Cloud Computing (IEEE-2010) Java, Swing, RMI, J2ME 
46 Secure and Practical Outsourcing of Linear Programming in Cloud Computing (IEEE -2011) Java, JSP, JDBC, Java Script 
47 Cloud Computing Security: From Single to Multi-Clouds (IEEE-2012, Cloud Computing) JDK 1.5,JSP,HTML,MYSQL 
48 Privacy-Preserving Public Auditing for Secure Cloud Storage (IEEE -2013) J D K 1 . 5,JSP,HTML,MYSQL 
49 Ensuring Distributed ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD (IEEE-2012) JDK 1.5,JSP,HTML,MYSQL 
50 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization (IEEE-2013) J DK 1.5,JSP,HTML,MYSQL 
51 
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social 
Video Sharing in the Clouds. (IEEE 2013 -Cloud Computing) 
JDK 1.5,JSP,HTML,MYSQL 
52 
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability 
(IEEE 2014) 
JDK 1.6,JSP,HTML,MYSQL 
53 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud(IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 
Knowledge And Data Engineering Projects 
54 Dealing With Concept Drifts in Process Mining (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 
56 Anomaly Detection via Online Oversampling Principal Component Analysis. (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 
57 Ranking Spatial Data by Quality Preferences (IEEE-2011) Java,Jsp,Servlet,Jdbc 
58 Extended XML Tree Pattern Matching: Theories and Algorithms (IEEE-2011) Java,Jsp,xml 
59 Slicing: A New Approach to Privacy Preserving Data Publishing (IEEE-2012) 
JDK 1.5,Swing, JDBC, HTML, 
JSP 
60 Ranking Model Adaptation For Domain-pecific Search (IEEE-2012) 
JDK1.5,Swing,Jdbc,html,jsp, 
Android 
61 Multiparty Access Control for Online Social Networks: Model and Mechanisms (IEEE-2013) 
JDK1.5,Swing,Jdbc,html,jsp, 
Android 
62 A system to Filter Unwanted Messages from OSN Uses Walls (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 
63 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 
64 Supporting Privacy Protection in Personalized Web Search (IEEE-2014) J D K 1.6,JSP,HTML,MYSQL 
Mobile Computing Projects 
65 Fast Data Collection in Tree-Based Wireless Sensor Networks (IEEE2012-Mobile computing) JDK 1.5, Java Swing,J2ME 
66 Staying Connected in a Mobile Healthcare System Experiences (IEEE-2010) Java, Jsp,J2ME,Mysql 
67 Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks (IEEE2010) Java RMI, SWING,J2ME 
68 Location Based Intelligent Mobile Organizer (IEEE) Android 2.2 Eclipse , JDK 6 
69 Remote PC Administration Using J2ME JAVA, J2ME, MIDP2.0, CLDC1.1 
70 VAS for Hand Held Device-MM7 Protocol implementation JAVA,J2ME, Servlets 
71 Mobile Invoice (Mobile Billing) Java, JSP, J2ME 
72 SIP – Session Initiation Protocol (M-Conference) J2ME,JAVA,SIP API 
73 M-banking JAVA, WML, Nokia Tool Kit 
74 Online shopping Android Applicatin 
Android SDK 2.1,JDK 
6.0,SQLite 
75 Mobi Thesaurus (Dictionary for Mobile Devices) 
J2ME2.1, J2SE 2.1.4, J2ME 
WTK2.0. 
76 Mobi Travel Guide – Smart way to travel 
Android Google Api 1.5, 
Android 
77 Restaurant Table Order Management System Android 2.2 Eclipse , JDK 6 
78 Mobile Location Alarm Android, Eclipse ,Sun JDK 5 
79 Twitter Client for Android based smart phone Android SDK 2.1,JDK 6.0,SQLite 
80 Android Event Scheduler /Reminder Application Android 2.2 Eclipse , JDK 6
81 Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor S/B (IEEE-2009) Android 
Embedded with Android ( Hardware + Software projects) 
82 CHILD ACTIVITY RECOGNIZATION USING ACCELEROMETER AND RFID READER Hardware+Android 
83 CENTRALIZED LPG CYLINDERS THEFT DETECTION SYSTEM WITH SECURITY ALERTS Hardware+Android 
84 NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection Hardware+Android 
85 REACTIVE NAVIGATION OF MULTIPLE MOVING AGENTS IN ROOM ENVIRONMENT Hardware+Android 
86 HEALTH @ HOME – Remote monitoring of vital signs Hardware+Android 
87 ADVANCED SOFESTICAED TECHINQUES IN VEHICLES FOR PREVENTION OF ACCIDENTS Hardware+Android 
88 GPS based child tracking with server & SMS alert to parents Hardware+Android 
89 REMOTE ELECTRONIC LAB USING WIRELESS NETWORK TECHNOLOGY Hardware+Android 
90 
MEMS (Accelerometer) based robot motion control with fire, gas detection & control system 
with voice alert 
Hardware+Android 
91 Speech based monitoring using Android phone Hardware+Android 
92 A FAIR FARE SYSTEM TO DETECT TAMPERING USING ANDROID PHONE Hardware+Android 
93 Building Lighting Automation through the Integration with Wireless Sensor Network Hardware+Android 
94 
Speech Recognition Based Wireless Automation Of Home Loads With Fault Identification 
For Physically Challenged 
Hardware+Android 
95 More Efficient Home Energy Management System using Android Phone Hardware+Android 
96 Lab automation using Android phone through Bluetooth technology Hardware+Android 
97 Human detection in natural disaster using PIR sensor Hardware+Android 
98 EVIDENCE COLLECTION FROM CAR BLACK BOXES USING SMART PHONES Hardware+Android 
99 ANDROID BASED TEMPERATURE AND VOLTAGE MEASUREMENT Hardware+Android 
100 ROBOTIC AID FOR SURVILENCE OF HUMAN BEINGS USING ZIGBEE Hardware+Android 
101 AUTOMATIC ORDERING AND BILLING IN HOTELS Hardware+Android 
102 Industrial Automation for Mobile Device using Bluetooth Technology Hardware+Android 
103 Android Based Robot Control Hardware+Android 
104 
Health at the home:Remote health monitoring for patients and senior citizens at the home 
by using centralized web server Hardware+Android 
105 
Transport/Travel Management System: Detection of Aggressive driving of commercial 
vehicles, along with Fuel theft detection, using centralized web server Hardware+Android 
106 
Intelligent Food Management System: Maintenance of Agro and Non-Agro Foods in Cold 
Storage/Warehouse 
Hardware+Android 
Web Applications Development(J2EE) 
107 Value added sales tax information system Java, Jsp,servlet,oracle 
108 Tanrox Work Force (Activity Control System) J2EE,Struts,MySql 
109 Virtual office Management Java,servlet, Jsp,sql, MS access 
110 Intranet Mailing System Java, Jsp,sql server 
111 Collaborative White Board – core java Java ,swing 
112 DCMS(Distributed channel management system) Java, Jsp,servlet,oracle 10g 
113 Router Guide Java, My SQL 4.0 
114 Text Editor – Core Java Java 
115 Online Examination Java,servlet, Jsp,sql server 
116 Customer Relationship Management –(CRM) Java, Jsp,sql server 
117 ORKUT USING JAVA JAVA 
118 Telecom Inventory Management System Java, JSP, Tomcat, MYSQL 
119 Global Tracker Java, JSP, Tomcat, MYSQL 
120 Online Rental House Web Portal Java, JSP, Tomcat, MYSQL 
121 Online University Java, JSP, Tomcat, MYSQL 
122 Company Information Tracking System (CITS) Java, JSP, Tomcat, MYSQL 
123 Steel Production Planning & Control 
Servlet, jdbc, j2ee, oracle 9i, 
tomcat 5.5 
124 NetSuite Multi-Channel Retail Management Suite Java, JSP, Tomcat, MYSQL 
Dotnet IEEE Projects 
125 Long-Term Cross-Session Relevance Feedback Using Virtual Features (IEEE) .Net, c#.Net, SQL Server 
126 Digital Image Tracing by Sequential Multiple Watermarking (IEEE) .Net 2003, C#.Net
127 
Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light 
(IEEE) 
C#.Net, Visual Studio 2005 
128 Neural Networks for Unicode Optical Character Recognition C#.Net, Visual Studio 2005 
129 Cloud OS-Cloud Computing 
ASP.Net Ajax Cloud Platform, 
SQL Server 
130 Image Recognition with Neural Networks C#.Net, Visual Studio 2005 
131 SpyNet C#.Net, Visual Studio 2005 
132 
Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption 
(IEEE -2013) 
Visual Studio 2005/2008/ 
ASP.NetwithC#,SQL Server 
2008 
133 
Privacy Preserving Delegated Access Control in Public Clouds. (IEEE Transactions -Cloud 
Computing -IEEE 2013) (IEEE-2013) 
Visual Studio 2005/2008/ 
ASP.NetwithC#,SQL Server 
2008 
134 Energy Maps for Mobile Wireless Networks (IEEE) Visual Studio 2005/ 2008 
135 
Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks 
(IEEE TRANSACTIONS ON CLOUD COMPUTING ( IEEE-2013) 
Visual Studio 2005/2008/ 
ASP.NetwithC#,SQL Server 
2008 
136 
Privacy Preserving Data Sharing With Anonymous ID Assignment (IEEE TRANSACTIONS ON 
FORENSICS AND SECURITY (IEEE-2013) 
Visual Studio 2005/2008/ 
ASP.NetwithC#,SQL Server 
2008 
137 
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing 
(IEEE-2010) 
.Net, SQL Server 2005 
138 Visual Data Mining of Web Navigational Data (IEEE-2010) Visual Studio 2005/ 2008 
139 Fuzzy Keyword Search over Encrypted Data in Cloud Computing (IEEE-2010) .Net, SQL Server 2005 
140 An economic approach for scalable and highly-available distributed applications (IEEE-2010) .Net, SQL Server 2005 
141 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (IEEE2010) .Net, SQL Server 2005 
142 Exploring Application-Level Semantics for Data Compression (IEEE-2011) .Net, SQL Server 2005 
143 Bridging Socially-Enhanced Virtual Communities (IEEE-2011) .Net, SQL Server 2005 
144 
Efficient Computation of Range Aggregates against Uncertain Location Based Queries 
(IEEE-2011) 
.Net, SQL Server 2005 
145 
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques 
(IEEE-2011) 
.Net 2008, SQL Server 2005 
146 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks.(IEEE2013) C#.Net, Visual Studio 2008 
147 Monitoring Service System from A Language – Action Perspective (IEEE-2011) .Net, SQL Server 2005 
148 
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection 
(IEEE-2011) 
.Net, SQL Server 2005 
149 
Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks. 
(IEEE-2013) 
Visual Studio 2005/Visual 
Studio 2008 
150 
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected 
False Data in Wireless Sensor Networks (IEEE-2012) 
C#.Net, Visual Studio 2008 
151 
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous 
Wireless Sensor Networks (IEEE-2013) .Net, SQL Server 2005 
152 
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using 
Attribute-based Encryption (IEEE-2013) 
C#.Net, Asp.Net, SQLServer 
2008 
153 SCALABLE LEARNING OF COLLECTIVE BEHAVIOUR (IEEE-2012) C#.Net, Asp.Net, SQLServer 2005 
154 Towards Secure and Dependable Storage Services in Cloud Computing (IEEE-2012) 
C#.Net, Asp.Net, SQLServer 
2005 
155 Bridging Social and Data Networks (IEEE-2012,Knowledge and Data Engineering) 
C#.Net, Asp.Net, SQLServer 
2005 
156 
Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click 
Points (IEEE-2012, Image Processing) 
C#.Net, Asp.Net, SQLServer 
2005 
157 Data Integrity Proofs in Cloud Storage (IEEE-2011) .Net, SQL Server 2005 
158 EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS (IEEE-2012) 
C#.Net, Asp.Net, SQLServer 
2005 
159 
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- 
Healthcare Emergency (IEEE-2013) 
C#.Net, SQLServer 2005 
160 Local Directional Number Pattern for Face Analysis: Face and Expression Recognition(IEEE- C#.Net, Visual Studio 2008
2013) 
161 LBP-BASED EDGE-TEXTURE FEATURES FOR OBJECT RECOGINITION (IEEE-2014) 
C#.Net, Asp.Net, SQLServer 
2008 
162 
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud 
(IEEE-2014) 
C#.Net, Asp.Net, SQLServer 
2008 
163 Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data (IEEE-2014) 
C#.Net, Asp.Net, SQLServer 
2008 
164 
SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY 
NETWORKS (IEEE-2014) 
C#.Net, Asp.Net, SQLServer 
2008 
Dotnet Application Projects 
165 Online Adventure/Check out My Trip/Online Tourism Visual Studio 2005/ 2008 
166 Automated Reformatory Visual Studio 2005/ 2008 
167 Corporate based credential cluster Visual Studio 2005/ 2008 
168 E2M Conference Visual Studio 2005/ 2008 
169 GISS Visual Studio 2005/ 2008 
170 Resort Management System Visual Studio 2005/ 2008 
171 Online Tender Visual Studio 2005/ 2008 
172 H o s p i t a l M a n a g e m e n t Visual Studio 2005/ 2008 
173 G a s A g e n c y S y s t e m Visual Studio 2005/ 2008 
174 Insurance on Internet Visual Studio 2005/ 2008 
175 Intelligent Transportation Visual Studio 2005/ 2008 
176 Webmart Visual Studio 2005/ 2008 
177 Course Milestone Visual Studio 2005/ 2008 
178 Client Server Based Live Meeting Visual Studio 2005/ 2008 
179 Courier Automation Visual Studio 2005/ 2008 
180 Vehicle Monitoring System Visual Studio 2005/ 2008 
181 Online Auction Visual Studio 2005/ 2008 
182 Steganography Visual Studio 2005/ 2008 
183 Hotel Management Visual Studio 2005/ 2008 
184 Construction Plus System Visual Studio 2005/ 2008 
185 Online Shopping Visual Studio 2005/ 2008 
186 College Management System Visual Studio 2005/ 2008 
187 Online Examination Enabled with Ajax Visual Studio 2005/ 2008 
188 Desktop Activity Recorder for PC Monitoring Visual Studio 2005/ 2008

More Related Content

What's hot

Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...zettanetworks
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
 
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering ijistjournal
 

What's hot (12)

Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
 
2013 2014 ieee java project titles
2013 2014 ieee java project titles2013 2014 ieee java project titles
2013 2014 ieee java project titles
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance System
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
C6524029320
C6524029320C6524029320
C6524029320
 
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
 

Similar to IGEEKS TECHNOLOGIES Software Training Projects

Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titlesBe,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titlesigeeks1234
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangaloreIGEEKS TECHNOLOGIES
 
IEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects Bangalore
IEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects BangaloreIEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects Bangalore
IEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects BangaloreIGEEKS TECHNOLOGIES
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIGEEKS TECHNOLOGIES
 
IEEE Projects Low Cost
IEEE Projects Low Cost IEEE Projects Low Cost
IEEE Projects Low Cost Hari Krishnan
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018IGEEKS TECHNOLOGIES
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018IGEEKS TECHNOLOGIES
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resumehunlan lin
 
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...IRJET Journal
 
SOFTORIX Project TitlesList
SOFTORIX Project TitlesListSOFTORIX Project TitlesList
SOFTORIX Project TitlesListguest6071d14
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17Java Team
 
Java 2016-17 titles
Java 2016-17 titlesJava 2016-17 titles
Java 2016-17 titlespraba123456
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17Senthil Kumar
 
Pantech final year software projects (java)
Pantech   final year software projects (java)Pantech   final year software projects (java)
Pantech final year software projects (java)Senthil Kumar
 
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxWSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxAbhinavAshish21
 

Similar to IGEEKS TECHNOLOGIES Software Training Projects (20)

Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titlesBe,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangalore
 
IEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects Bangalore
IEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects BangaloreIEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects Bangalore
IEEE 2014 DIPLOMA(ECE,E&I,EEE,CS,IS) Projects Bangalore
 
Ieee 2013 projects download
Ieee 2013 projects downloadIeee 2013 projects download
Ieee 2013 projects download
 
Diploma bca 2013 projects
Diploma  bca  2013 projectsDiploma  bca  2013 projects
Diploma bca 2013 projects
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project List
 
Project by Koushik
Project by KoushikProject by Koushik
Project by Koushik
 
IEEE Projects Low Cost
IEEE Projects Low Cost IEEE Projects Low Cost
IEEE Projects Low Cost
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resume
 
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
 
SOFTORIX Project TitlesList
SOFTORIX Project TitlesListSOFTORIX Project TitlesList
SOFTORIX Project TitlesList
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17
 
Java 2016-17 titles
Java 2016-17 titlesJava 2016-17 titles
Java 2016-17 titles
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17
 
Pantech final year software projects (java)
Pantech   final year software projects (java)Pantech   final year software projects (java)
Pantech final year software projects (java)
 
Satish resume
Satish resume Satish resume
Satish resume
 
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxWSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
 
Ready project list final
Ready project list finalReady project list final
Ready project list final
 

More from IGEEKS TECHNOLOGIES

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020IGEEKS TECHNOLOGIES
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020IGEEKS TECHNOLOGIES
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020IGEEKS TECHNOLOGIES
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220IGEEKS TECHNOLOGIES
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesIGEEKS TECHNOLOGIES
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreIGEEKS TECHNOLOGIES
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksIGEEKS TECHNOLOGIES
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionIGEEKS TECHNOLOGIES
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchIGEEKS TECHNOLOGIES
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionIGEEKS TECHNOLOGIES
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process miningIGEEKS TECHNOLOGIES
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 

More from IGEEKS TECHNOLOGIES (20)

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titles
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects Bangalore
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process mining
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

IGEEKS TECHNOLOGIES Software Training Projects

  • 1. IGEEKS TECHNOLOGIES Software Training Division Academic Projects for BE,ME,MCA,BCA and PHD Students IGeekS Technologies (Make Final Year Project) No: 19, MN Complex, 2nd Cross, Sampige Main Road, Malleswaram, Bangalore- 560003. Phone No: 080-32487434 /9590544567 Mail: training@Igeekstechnologies.com , nanduigeeks2010@gmail.com Website: www.igeekstechnologies.com Land mark : Near to Mantri Mall, Malleswaram Bangalore
  • 2. S.No PROJECT TITLE Technology Used JAVA Projects Image Processing 1 A Personal Authentication Based on IRIS Recognition (IEEE) Java Swings, Applets 2 Noise Reduction By Fuzzy Image Filtering (IEEE) JDK 1.6, Java Swing 3 Script identification through temporal Sequence of the Strokes (IEEE) JDK 1.5, Java Swing 4 Image Processing Editor JAVA 5 Learn to Personalized Image Search from the Photo Sharing Websites (IEEE -2012) JDK 1.5, Java Swing, JDBC,HTML,JSP 6 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems(IEEE-2014) JDK 1.6,JSP,HTML,MYSQL Networking / Network Security / Wireless Communications 7 Multiple Routing configurations for Fast IP network Recovery (IEEE) JDK 1.5, Java Swing, SQL server 8 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks (IEEE-2011) JDK 1.5, Java Swing 9 Mobility Management Approaches for Mobile IP Networks (IEEE) JDK1.6,Java Swing, MS access 10 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks (IEEE) JDK1.6,Java Swing, SQL Server 11 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks (IEEE-2011) JDK1.6,Java Swing 12 Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest (IEEE) JDK1.6,Java Swing, SQL Server 13 Packet-Hiding Methods for Preventing Selective Jamming Attacks (IEEE-2012) JDK 1.5, Java Swing, RMI Label-Based DV-Hop Localization against Wormhole Attacks In Wireless Sensor Networks 14 (IEEE-2010) Java,J2ME(J2ME Wireless Toolkit) 15 Achieving Network Level Privacy in Wireless Sensor Networks (IEEE-2010) Java,J2ME(J2ME Wireless Toolkit) 16 Distributed Cache Updating Using Dynamic Source Routing Protocol (IEEE) Java Networking, Swing, MySQL 17 Online Modeling of Proactive Moderation System for Auction Fraud Detection (IEEE-2012) JDK 1.5, Java Swing, JDBC,HTML,JSP 18 Host-to-Host Congestion Control for TCP (IEEE-2010) Java, Eclipse 19 Participatory Privacy: Enabling Privacy in Participatory Sensing (IEEE – 2013) JDK 1.5, JSP, HTML, MySQL) 20 Embedding the Secure Data In An Audio/Video and Image Files JDK 1.5, Java Swing 21 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks (IEEE-2011) J A V A , J F C ( S w in g ) 22 Privacy- and Integrity-Preserving Range Queries in Sensor Networks (IEEE-2012) JDK 1.6, Java Swing, RMI,JDBC 23 Design and Implementation of Addressing Mental Health Epidemic among University Students via Web-based, Self-Screening and Referral System (IEEE-2011) JAVA, J2EE 24 Secure Data Transmission JAVA 25 Intrusion Detection System JAVA 26 Bandwidth Recycling in IEEE 802.16 Networks (IEEE-2010) Java,Eclipse, MS Access 27 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring (IEEE 2013) JDK 1.5,JSP,HTML,MYSQL 28 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks (IEEE -2013) JDK 1.6, Java Swing, RMI 29 Nymble: Blocking Misbehaving Users in Anonym zing Networks (IEEE-2011) Java,J2ME ,Tomcat 30 SAT:A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks (IEEE-2011) Java,J2ME(J2MWireless Toolkit) 31 Modeling and Detection of Camouflaging Worm. (IEEE-2011) Jdk1.6, java swing, Eclipse 32 A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree (IEEE-2011) Jdk1.6, java swing 33 TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 34 Vampire attacks: Draining life from wireless ad-hoc sensor networks (IEEE2013) JDK 1.5,RMI,SWING 35 Fully Anonymous Profile Matching in Mobile Social Networks (IEEE 2013-Networking) JDK 1.5,JSP,HTML,MYSQL 36 Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks (IEEE 2013) JDK 1.5, Java Swing, RMI 37 An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System(IEEE2012) JDK1.6,Java Swing 38 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis(IEEE 2014) JDK 1.6,JSP,HTML,MYSQL 39 Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL
  • 3. 40 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage ( IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 41 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 42 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds(IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 43 Personalized Web search Using Browsing History And Domain Knowledge (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL Cloud Computing 44 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 45 Ensuring Data Storage Security in Cloud Computing (IEEE-2010) Java, Swing, RMI, J2ME 46 Secure and Practical Outsourcing of Linear Programming in Cloud Computing (IEEE -2011) Java, JSP, JDBC, Java Script 47 Cloud Computing Security: From Single to Multi-Clouds (IEEE-2012, Cloud Computing) JDK 1.5,JSP,HTML,MYSQL 48 Privacy-Preserving Public Auditing for Secure Cloud Storage (IEEE -2013) J D K 1 . 5,JSP,HTML,MYSQL 49 Ensuring Distributed ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD (IEEE-2012) JDK 1.5,JSP,HTML,MYSQL 50 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization (IEEE-2013) J DK 1.5,JSP,HTML,MYSQL 51 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds. (IEEE 2013 -Cloud Computing) JDK 1.5,JSP,HTML,MYSQL 52 Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability (IEEE 2014) JDK 1.6,JSP,HTML,MYSQL 53 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud(IEEE-2014) JDK 1.6,JSP,HTML,MYSQL Knowledge And Data Engineering Projects 54 Dealing With Concept Drifts in Process Mining (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL 56 Anomaly Detection via Online Oversampling Principal Component Analysis. (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 57 Ranking Spatial Data by Quality Preferences (IEEE-2011) Java,Jsp,Servlet,Jdbc 58 Extended XML Tree Pattern Matching: Theories and Algorithms (IEEE-2011) Java,Jsp,xml 59 Slicing: A New Approach to Privacy Preserving Data Publishing (IEEE-2012) JDK 1.5,Swing, JDBC, HTML, JSP 60 Ranking Model Adaptation For Domain-pecific Search (IEEE-2012) JDK1.5,Swing,Jdbc,html,jsp, Android 61 Multiparty Access Control for Online Social Networks: Model and Mechanisms (IEEE-2013) JDK1.5,Swing,Jdbc,html,jsp, Android 62 A system to Filter Unwanted Messages from OSN Uses Walls (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 63 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL 64 Supporting Privacy Protection in Personalized Web Search (IEEE-2014) J D K 1.6,JSP,HTML,MYSQL Mobile Computing Projects 65 Fast Data Collection in Tree-Based Wireless Sensor Networks (IEEE2012-Mobile computing) JDK 1.5, Java Swing,J2ME 66 Staying Connected in a Mobile Healthcare System Experiences (IEEE-2010) Java, Jsp,J2ME,Mysql 67 Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks (IEEE2010) Java RMI, SWING,J2ME 68 Location Based Intelligent Mobile Organizer (IEEE) Android 2.2 Eclipse , JDK 6 69 Remote PC Administration Using J2ME JAVA, J2ME, MIDP2.0, CLDC1.1 70 VAS for Hand Held Device-MM7 Protocol implementation JAVA,J2ME, Servlets 71 Mobile Invoice (Mobile Billing) Java, JSP, J2ME 72 SIP – Session Initiation Protocol (M-Conference) J2ME,JAVA,SIP API 73 M-banking JAVA, WML, Nokia Tool Kit 74 Online shopping Android Applicatin Android SDK 2.1,JDK 6.0,SQLite 75 Mobi Thesaurus (Dictionary for Mobile Devices) J2ME2.1, J2SE 2.1.4, J2ME WTK2.0. 76 Mobi Travel Guide – Smart way to travel Android Google Api 1.5, Android 77 Restaurant Table Order Management System Android 2.2 Eclipse , JDK 6 78 Mobile Location Alarm Android, Eclipse ,Sun JDK 5 79 Twitter Client for Android based smart phone Android SDK 2.1,JDK 6.0,SQLite 80 Android Event Scheduler /Reminder Application Android 2.2 Eclipse , JDK 6
  • 4. 81 Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor S/B (IEEE-2009) Android Embedded with Android ( Hardware + Software projects) 82 CHILD ACTIVITY RECOGNIZATION USING ACCELEROMETER AND RFID READER Hardware+Android 83 CENTRALIZED LPG CYLINDERS THEFT DETECTION SYSTEM WITH SECURITY ALERTS Hardware+Android 84 NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection Hardware+Android 85 REACTIVE NAVIGATION OF MULTIPLE MOVING AGENTS IN ROOM ENVIRONMENT Hardware+Android 86 HEALTH @ HOME – Remote monitoring of vital signs Hardware+Android 87 ADVANCED SOFESTICAED TECHINQUES IN VEHICLES FOR PREVENTION OF ACCIDENTS Hardware+Android 88 GPS based child tracking with server & SMS alert to parents Hardware+Android 89 REMOTE ELECTRONIC LAB USING WIRELESS NETWORK TECHNOLOGY Hardware+Android 90 MEMS (Accelerometer) based robot motion control with fire, gas detection & control system with voice alert Hardware+Android 91 Speech based monitoring using Android phone Hardware+Android 92 A FAIR FARE SYSTEM TO DETECT TAMPERING USING ANDROID PHONE Hardware+Android 93 Building Lighting Automation through the Integration with Wireless Sensor Network Hardware+Android 94 Speech Recognition Based Wireless Automation Of Home Loads With Fault Identification For Physically Challenged Hardware+Android 95 More Efficient Home Energy Management System using Android Phone Hardware+Android 96 Lab automation using Android phone through Bluetooth technology Hardware+Android 97 Human detection in natural disaster using PIR sensor Hardware+Android 98 EVIDENCE COLLECTION FROM CAR BLACK BOXES USING SMART PHONES Hardware+Android 99 ANDROID BASED TEMPERATURE AND VOLTAGE MEASUREMENT Hardware+Android 100 ROBOTIC AID FOR SURVILENCE OF HUMAN BEINGS USING ZIGBEE Hardware+Android 101 AUTOMATIC ORDERING AND BILLING IN HOTELS Hardware+Android 102 Industrial Automation for Mobile Device using Bluetooth Technology Hardware+Android 103 Android Based Robot Control Hardware+Android 104 Health at the home:Remote health monitoring for patients and senior citizens at the home by using centralized web server Hardware+Android 105 Transport/Travel Management System: Detection of Aggressive driving of commercial vehicles, along with Fuel theft detection, using centralized web server Hardware+Android 106 Intelligent Food Management System: Maintenance of Agro and Non-Agro Foods in Cold Storage/Warehouse Hardware+Android Web Applications Development(J2EE) 107 Value added sales tax information system Java, Jsp,servlet,oracle 108 Tanrox Work Force (Activity Control System) J2EE,Struts,MySql 109 Virtual office Management Java,servlet, Jsp,sql, MS access 110 Intranet Mailing System Java, Jsp,sql server 111 Collaborative White Board – core java Java ,swing 112 DCMS(Distributed channel management system) Java, Jsp,servlet,oracle 10g 113 Router Guide Java, My SQL 4.0 114 Text Editor – Core Java Java 115 Online Examination Java,servlet, Jsp,sql server 116 Customer Relationship Management –(CRM) Java, Jsp,sql server 117 ORKUT USING JAVA JAVA 118 Telecom Inventory Management System Java, JSP, Tomcat, MYSQL 119 Global Tracker Java, JSP, Tomcat, MYSQL 120 Online Rental House Web Portal Java, JSP, Tomcat, MYSQL 121 Online University Java, JSP, Tomcat, MYSQL 122 Company Information Tracking System (CITS) Java, JSP, Tomcat, MYSQL 123 Steel Production Planning & Control Servlet, jdbc, j2ee, oracle 9i, tomcat 5.5 124 NetSuite Multi-Channel Retail Management Suite Java, JSP, Tomcat, MYSQL Dotnet IEEE Projects 125 Long-Term Cross-Session Relevance Feedback Using Virtual Features (IEEE) .Net, c#.Net, SQL Server 126 Digital Image Tracing by Sequential Multiple Watermarking (IEEE) .Net 2003, C#.Net
  • 5. 127 Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light (IEEE) C#.Net, Visual Studio 2005 128 Neural Networks for Unicode Optical Character Recognition C#.Net, Visual Studio 2005 129 Cloud OS-Cloud Computing ASP.Net Ajax Cloud Platform, SQL Server 130 Image Recognition with Neural Networks C#.Net, Visual Studio 2005 131 SpyNet C#.Net, Visual Studio 2005 132 Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption (IEEE -2013) Visual Studio 2005/2008/ ASP.NetwithC#,SQL Server 2008 133 Privacy Preserving Delegated Access Control in Public Clouds. (IEEE Transactions -Cloud Computing -IEEE 2013) (IEEE-2013) Visual Studio 2005/2008/ ASP.NetwithC#,SQL Server 2008 134 Energy Maps for Mobile Wireless Networks (IEEE) Visual Studio 2005/ 2008 135 Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks (IEEE TRANSACTIONS ON CLOUD COMPUTING ( IEEE-2013) Visual Studio 2005/2008/ ASP.NetwithC#,SQL Server 2008 136 Privacy Preserving Data Sharing With Anonymous ID Assignment (IEEE TRANSACTIONS ON FORENSICS AND SECURITY (IEEE-2013) Visual Studio 2005/2008/ ASP.NetwithC#,SQL Server 2008 137 Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing (IEEE-2010) .Net, SQL Server 2005 138 Visual Data Mining of Web Navigational Data (IEEE-2010) Visual Studio 2005/ 2008 139 Fuzzy Keyword Search over Encrypted Data in Cloud Computing (IEEE-2010) .Net, SQL Server 2005 140 An economic approach for scalable and highly-available distributed applications (IEEE-2010) .Net, SQL Server 2005 141 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (IEEE2010) .Net, SQL Server 2005 142 Exploring Application-Level Semantics for Data Compression (IEEE-2011) .Net, SQL Server 2005 143 Bridging Socially-Enhanced Virtual Communities (IEEE-2011) .Net, SQL Server 2005 144 Efficient Computation of Range Aggregates against Uncertain Location Based Queries (IEEE-2011) .Net, SQL Server 2005 145 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques (IEEE-2011) .Net 2008, SQL Server 2005 146 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks.(IEEE2013) C#.Net, Visual Studio 2008 147 Monitoring Service System from A Language – Action Perspective (IEEE-2011) .Net, SQL Server 2005 148 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection (IEEE-2011) .Net, SQL Server 2005 149 Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks. (IEEE-2013) Visual Studio 2005/Visual Studio 2008 150 BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks (IEEE-2012) C#.Net, Visual Studio 2008 151 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks (IEEE-2013) .Net, SQL Server 2005 152 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption (IEEE-2013) C#.Net, Asp.Net, SQLServer 2008 153 SCALABLE LEARNING OF COLLECTIVE BEHAVIOUR (IEEE-2012) C#.Net, Asp.Net, SQLServer 2005 154 Towards Secure and Dependable Storage Services in Cloud Computing (IEEE-2012) C#.Net, Asp.Net, SQLServer 2005 155 Bridging Social and Data Networks (IEEE-2012,Knowledge and Data Engineering) C#.Net, Asp.Net, SQLServer 2005 156 Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points (IEEE-2012, Image Processing) C#.Net, Asp.Net, SQLServer 2005 157 Data Integrity Proofs in Cloud Storage (IEEE-2011) .Net, SQL Server 2005 158 EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS (IEEE-2012) C#.Net, Asp.Net, SQLServer 2005 159 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency (IEEE-2013) C#.Net, SQLServer 2005 160 Local Directional Number Pattern for Face Analysis: Face and Expression Recognition(IEEE- C#.Net, Visual Studio 2008
  • 6. 2013) 161 LBP-BASED EDGE-TEXTURE FEATURES FOR OBJECT RECOGINITION (IEEE-2014) C#.Net, Asp.Net, SQLServer 2008 162 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud (IEEE-2014) C#.Net, Asp.Net, SQLServer 2008 163 Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data (IEEE-2014) C#.Net, Asp.Net, SQLServer 2008 164 SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS (IEEE-2014) C#.Net, Asp.Net, SQLServer 2008 Dotnet Application Projects 165 Online Adventure/Check out My Trip/Online Tourism Visual Studio 2005/ 2008 166 Automated Reformatory Visual Studio 2005/ 2008 167 Corporate based credential cluster Visual Studio 2005/ 2008 168 E2M Conference Visual Studio 2005/ 2008 169 GISS Visual Studio 2005/ 2008 170 Resort Management System Visual Studio 2005/ 2008 171 Online Tender Visual Studio 2005/ 2008 172 H o s p i t a l M a n a g e m e n t Visual Studio 2005/ 2008 173 G a s A g e n c y S y s t e m Visual Studio 2005/ 2008 174 Insurance on Internet Visual Studio 2005/ 2008 175 Intelligent Transportation Visual Studio 2005/ 2008 176 Webmart Visual Studio 2005/ 2008 177 Course Milestone Visual Studio 2005/ 2008 178 Client Server Based Live Meeting Visual Studio 2005/ 2008 179 Courier Automation Visual Studio 2005/ 2008 180 Vehicle Monitoring System Visual Studio 2005/ 2008 181 Online Auction Visual Studio 2005/ 2008 182 Steganography Visual Studio 2005/ 2008 183 Hotel Management Visual Studio 2005/ 2008 184 Construction Plus System Visual Studio 2005/ 2008 185 Online Shopping Visual Studio 2005/ 2008 186 College Management System Visual Studio 2005/ 2008 187 Online Examination Enabled with Ajax Visual Studio 2005/ 2008 188 Desktop Activity Recorder for PC Monitoring Visual Studio 2005/ 2008