IGeekS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines.
This document provides a list of 74 academic projects available for students in various technologies like Java, networking, cloud computing, data mining, and more. The projects are designed for students in BE, ME, MCA, BCA, and diploma programs. It includes the project title, technology used and contact details of IgeekS Technologies who provide the projects.
IEEE 2013 projects titles for BE,MCA,ME,BCA and Diploma Students in Bangalore..IGSLabs Technologies Private Limited is No:1 Academic project center in Bangalore..
Enhanced Authentication Mechanism in WLAN via MMBSPSRAJESH DUVVURU
ย
The ability to provide a Quality of Service (QoS) is one of the
challenging aspects of any Wireless Network. This paper
concentrates in improvising the speedy authentication
mechanism in Wireless Local Area Network (WLAN). To
fulfill the specified important issue, this work introduces a
novel Multi Merged Bio-Cryptographic Security-Aware
Packet Scheduling (MMBSPS) algorithm. In merging the
different biometric images, it is commenced with the new
merging mechanism called Triple Equally Segmented Bio-
Image (TESB) algorithm and later it is encrypted with the
RSA algorithm for efficient security. Matlab tool is used for
conducting the simulations on Multi Merged Bio-Images
(MMBI) and Bio-Images. The results of MMBSPS algorithm
is presented in contrast with the EMBSPS and EBSPS
algorithms. In the results, it is observed that, MMBSPS
algorithm is working better than existing EMBSPS and
EBSPS algorithms with respect to the speedy authentication
besides assuring security in WLAN. It is also observed the
overall performance of MMBSPS is improved by
approximately 23% in terms of authentication mechanism in
WLAN.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
ย
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
11.biometric data security using recursive visual cryptographyAlexander Decker
ย
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
This document provides a list of 74 academic projects available for students in various technologies like Java, networking, cloud computing, data mining, and more. The projects are designed for students in BE, ME, MCA, BCA, and diploma programs. It includes the project title, technology used and contact details of IgeekS Technologies who provide the projects.
IEEE 2013 projects titles for BE,MCA,ME,BCA and Diploma Students in Bangalore..IGSLabs Technologies Private Limited is No:1 Academic project center in Bangalore..
Enhanced Authentication Mechanism in WLAN via MMBSPSRAJESH DUVVURU
ย
The ability to provide a Quality of Service (QoS) is one of the
challenging aspects of any Wireless Network. This paper
concentrates in improvising the speedy authentication
mechanism in Wireless Local Area Network (WLAN). To
fulfill the specified important issue, this work introduces a
novel Multi Merged Bio-Cryptographic Security-Aware
Packet Scheduling (MMBSPS) algorithm. In merging the
different biometric images, it is commenced with the new
merging mechanism called Triple Equally Segmented Bio-
Image (TESB) algorithm and later it is encrypted with the
RSA algorithm for efficient security. Matlab tool is used for
conducting the simulations on Multi Merged Bio-Images
(MMBI) and Bio-Images. The results of MMBSPS algorithm
is presented in contrast with the EMBSPS and EBSPS
algorithms. In the results, it is observed that, MMBSPS
algorithm is working better than existing EMBSPS and
EBSPS algorithms with respect to the speedy authentication
besides assuring security in WLAN. It is also observed the
overall performance of MMBSPS is improved by
approximately 23% in terms of authentication mechanism in
WLAN.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
ย
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
11.biometric data security using recursive visual cryptographyAlexander Decker
ย
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
ย
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher.
VTU Computer Science Engineering & Information Science Engineering Project Ti...zettanetworks
ย
Zetta Networks is one of the pioneer in IT training companies in the country. Zetta Networks is providing quality education to IT Aspirants, Corporate giants, institutions. Zetta Networks is committed to create great software brains of high caliber, who stay ahead in technology way ahead of others.
This document lists 71 IEEE projects from 2013 available for students through JP Infotech. The projects cover a wide range of domains including cloud computing, data mining, secure computing, networking, mobile computing, and more. Most projects are designed using the Java programming language. JP Infotech provides full support for students working on these projects, including document/presentation reviews, live explanations, assignments, mock interviews, certification, and placement assistance. Students can also propose their own projects for support.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
ย
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
ย
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a dayโs widely using
visual cryptography for authentication purpose.
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
ย
This document proposes a contactless biometric security system using finger knuckle patterns for authentication. Finger knuckle patterns provide accurate identification similar to fingerprints but can be captured contactless. The proposed system uses a convolutional neural network and Speedup Robust Feature algorithm for fast and accurate matching of knuckle patterns from images. This combination allows recognition within the shortest time for a live security system. An illumination controller is also used to standardize lighting and improve image quality. The system aims to securely authenticate users by matching their knuckle patterns against a stored database.
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
ย
1) The document describes a Security System for Data using Steganography and Cryptography (SSDSC) that encrypts documents using AES encryption, hides the encrypted data in an image using LEAST SIGNIFICANT BIT steganography, and transmits the image over the internet while keeping the document contents secure.
2) It detects objects in the cover image that are suitable for hiding data, hides the encrypted data in the least significant bits of pixels in the selected regions, and extracts and decrypts the data on the receiving end.
3) Testing showed the hidden and cover images were nearly identical with only small pixel differences, and over 97% similarity, demonstrating the effectiveness of the system in concealing
IRJET - IoT based Portable Attendance SystemIRJET Journal
ย
This document describes the design and implementation of a portable IoT-based fingerprint attendance system. The system uses a fingerprint sensor module connected to a NodeMCU ESP8266 microcontroller to scan and identify fingerprints. Registered user fingerprints and attendance data are stored in a Firebase database in the cloud. When a fingerprint is scanned, it is matched to the database to mark the user as present. An OLED display shows the user name. This system provides a wireless, portable alternative to traditional paper-based attendance methods that saves time and prevents fake attendance issues. It accurately tracks attendance using biometric fingerprint identification and IoT connectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
ย
This document presents a method for low bandwidth, high security image transmission using steganography and cryptography techniques. The secret image is first scrambled using Arnold transform and decomposed using discrete wavelet transform. Referable values from the frequency components are embedded into the least significant bits of frames in a cover video. The secret key used for embedding is then encrypted with a second key using a Twisted Exchange algorithm and hidden in a cover audio file. At the receiver, the encrypted key is extracted from the audio and decrypted to recover the secret key, which is used to extract the secret image values from the video frames. Image compression using Haar wavelet transform is also used to reduce bandwidth. The proposed method aims to provide secure, robust and imper
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering ijistjournal
ย
This summarizes a research paper that proposes using an Adaptive Resonance Theory 2 (ART2) neural network to cluster user request patterns for video on demand (VoD) programs. The ART2 clusters are used to identify groups of users with similar browsing activities. Popular videos are then prefetched to the proxy server's cache based on the cluster profiles before users arrive, reducing waiting times. The paper presents the ART2 algorithm and discusses performance evaluation based on hits and accuracy metrics. Simulation results showed the proposed clustering and prefetching approach significantly increased the streaming server's performance.
This document provides a list of 154 academic projects completed by IgeekS Technologies for students in various engineering fields such as BE, ME, MCA and Diploma. The projects cover a range of technologies including Java, image processing, networking, cloud computing, data mining, mobile computing and embedded systems. For each project, the document lists the title, technology used and a brief description. IgeekS Technologies provides these projects to help students complete their final year engineering projects.
This document lists 81 final year projects developed by IGSLABS Technologies Pvt Ltd for diploma and BCA students. It provides the project titles, technologies used such as Java, .NET, Android, and describes IGSLABS as a company that provides final year projects located at www.makefinalyearproject.com and can be contacted by email or phone.
IEEE 2017-18 Final Year Project List by igeeks technologies,bangalore,www.makefinalyearproject.com,Cal Mr.Nandu Project Director-09590544567,Email :nanduigeeks2010@gmail.com
This document lists 84 projects with their corresponding technologies. The projects cover a wide range of domains including embedded systems, wireless networks, image processing, computer vision, cryptography, and more. The technologies used include languages and frameworks such as Java, C#, .NET, Android, VHDL as well as technologies like SQL Server, XML, and Bluetooth.
The document lists various IEEE projects from 2012 in the areas of cloud computing, networking, wireless networking, and image processing. The cloud computing projects focused on securely outsourcing linear equations, remote data integrity checking, and network throughput optimization. The networking projects addressed topics like collective multicast, failure localization, and streaming media distribution. Wireless networking and image processing projects also explored related technical challenges.
IGEEKS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines
IGEEKS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
ย
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher.
VTU Computer Science Engineering & Information Science Engineering Project Ti...zettanetworks
ย
Zetta Networks is one of the pioneer in IT training companies in the country. Zetta Networks is providing quality education to IT Aspirants, Corporate giants, institutions. Zetta Networks is committed to create great software brains of high caliber, who stay ahead in technology way ahead of others.
This document lists 71 IEEE projects from 2013 available for students through JP Infotech. The projects cover a wide range of domains including cloud computing, data mining, secure computing, networking, mobile computing, and more. Most projects are designed using the Java programming language. JP Infotech provides full support for students working on these projects, including document/presentation reviews, live explanations, assignments, mock interviews, certification, and placement assistance. Students can also propose their own projects for support.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
ย
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
ย
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a dayโs widely using
visual cryptography for authentication purpose.
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
ย
This document proposes a contactless biometric security system using finger knuckle patterns for authentication. Finger knuckle patterns provide accurate identification similar to fingerprints but can be captured contactless. The proposed system uses a convolutional neural network and Speedup Robust Feature algorithm for fast and accurate matching of knuckle patterns from images. This combination allows recognition within the shortest time for a live security system. An illumination controller is also used to standardize lighting and improve image quality. The system aims to securely authenticate users by matching their knuckle patterns against a stored database.
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
ย
1) The document describes a Security System for Data using Steganography and Cryptography (SSDSC) that encrypts documents using AES encryption, hides the encrypted data in an image using LEAST SIGNIFICANT BIT steganography, and transmits the image over the internet while keeping the document contents secure.
2) It detects objects in the cover image that are suitable for hiding data, hides the encrypted data in the least significant bits of pixels in the selected regions, and extracts and decrypts the data on the receiving end.
3) Testing showed the hidden and cover images were nearly identical with only small pixel differences, and over 97% similarity, demonstrating the effectiveness of the system in concealing
IRJET - IoT based Portable Attendance SystemIRJET Journal
ย
This document describes the design and implementation of a portable IoT-based fingerprint attendance system. The system uses a fingerprint sensor module connected to a NodeMCU ESP8266 microcontroller to scan and identify fingerprints. Registered user fingerprints and attendance data are stored in a Firebase database in the cloud. When a fingerprint is scanned, it is matched to the database to mark the user as present. An OLED display shows the user name. This system provides a wireless, portable alternative to traditional paper-based attendance methods that saves time and prevents fake attendance issues. It accurately tracks attendance using biometric fingerprint identification and IoT connectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
ย
This document presents a method for low bandwidth, high security image transmission using steganography and cryptography techniques. The secret image is first scrambled using Arnold transform and decomposed using discrete wavelet transform. Referable values from the frequency components are embedded into the least significant bits of frames in a cover video. The secret key used for embedding is then encrypted with a second key using a Twisted Exchange algorithm and hidden in a cover audio file. At the receiver, the encrypted key is extracted from the audio and decrypted to recover the secret key, which is used to extract the secret image values from the video frames. Image compression using Haar wavelet transform is also used to reduce bandwidth. The proposed method aims to provide secure, robust and imper
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering ijistjournal
ย
This summarizes a research paper that proposes using an Adaptive Resonance Theory 2 (ART2) neural network to cluster user request patterns for video on demand (VoD) programs. The ART2 clusters are used to identify groups of users with similar browsing activities. Popular videos are then prefetched to the proxy server's cache based on the cluster profiles before users arrive, reducing waiting times. The paper presents the ART2 algorithm and discusses performance evaluation based on hits and accuracy metrics. Simulation results showed the proposed clustering and prefetching approach significantly increased the streaming server's performance.
This document provides a list of 154 academic projects completed by IgeekS Technologies for students in various engineering fields such as BE, ME, MCA and Diploma. The projects cover a range of technologies including Java, image processing, networking, cloud computing, data mining, mobile computing and embedded systems. For each project, the document lists the title, technology used and a brief description. IgeekS Technologies provides these projects to help students complete their final year engineering projects.
This document lists 81 final year projects developed by IGSLABS Technologies Pvt Ltd for diploma and BCA students. It provides the project titles, technologies used such as Java, .NET, Android, and describes IGSLABS as a company that provides final year projects located at www.makefinalyearproject.com and can be contacted by email or phone.
IEEE 2017-18 Final Year Project List by igeeks technologies,bangalore,www.makefinalyearproject.com,Cal Mr.Nandu Project Director-09590544567,Email :nanduigeeks2010@gmail.com
This document lists 84 projects with their corresponding technologies. The projects cover a wide range of domains including embedded systems, wireless networks, image processing, computer vision, cryptography, and more. The technologies used include languages and frameworks such as Java, C#, .NET, Android, VHDL as well as technologies like SQL Server, XML, and Bluetooth.
The document lists various IEEE projects from 2012 in the areas of cloud computing, networking, wireless networking, and image processing. The cloud computing projects focused on securely outsourcing linear equations, remote data integrity checking, and network throughput optimization. The networking projects addressed topics like collective multicast, failure localization, and streaming media distribution. Wireless networking and image processing projects also explored related technical challenges.
IGEEKS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines
IGEEKS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines
Hunlan Lin is a student at the University of Washington expected to graduate in June 2013 with degrees in Electrical Engineering and Computer Engineering and a GPA of 3.89. He has experience with both hardware and software skills including C, Java, Android, microprocessors, and CAD tools. For projects, he has worked on a tracheotomy surgical simulation mobile app, a genome alignment hardware system, and designed a wireless drum set. He also had an internship at Indeed where he built resume importing and indexing features.
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...IRJET Journal
ย
This document proposes a system to track and monitor the location of individuals within a defined area using GPS. The system uses an ESP8266 microcontroller interfaced with GPS modules to acquire location data and update it to a cloud database. An administrator can then monitor locations in real-time through a mobile app or web interface by requesting location coordinates from the cloud. The system aims to provide easier tracking of individuals compared to conventional camera-based methods while eliminating the need for continuous human monitoring.
Softorix Technologies is an inventive, software and hardware-led solutions provider. With a core team of well-qualified professionals representing diverse functional areas such as Information Technology, Embedded Systems and advanced digital signal processing (DSP), we understand the studentsโ needs, and develop their quality of professional life by simply making the technology readily usable for them. We Practice exclusively in image processing, simulation, optimization, customization and system integration.
Our project methodology includes techniques for initiating a project, developing the requirements, making clear assignments to the project team, developing a dynamic schedule, reporting status to executives and problem solving. In today's competitive environment, students want to ensure that they are getting guidance in an organization that can meet their professional needs. With our well equipped team of solid Information Systems Professionals, who study, design, develop, enhance, customize, implement, maintain and support various aspects of Information Technology, students can be sure that Softorix is just that sort of organization.
The document lists over 850 project codes for various technology projects related to areas like cloud computing, big data, Android, machine learning, computer vision, and networking. Each project listing includes a project code, title, application area, and relevant technologies. The projects involve developing techniques for tasks such as automatically detecting errors in databases, analyzing marketing data, securing exam systems, generating cryptographic keys, and more. The document provides a high-level overview of the wide range of technical projects available.
The document lists over 850 project codes for various technology projects related to areas like cloud computing, big data, Android, machine learning, computer vision, and networking. Each project listing includes a project code, title, application area, and relevant technologies. The projects involve developing techniques for tasks such as automatic error correction in databases, theft detection in smart grids, exam management systems, key generation, marketing analysis, data sharing, learning support, and more.
Satish Lokkoju is seeking a challenging position that allows growth in skills like embedded systems, computer vision, and machine learning. He has a B.E. in electrical engineering and an M.Sc. in economics. His 5.5 years of experience includes developing video and audio algorithms at Samsung and an H.264 encoder at Squid Design Systems. Current projects involve image segmentation and facial tracking. He is proficient in C/C++, ARM, and DSP tools and holds a patent in coding unit partitioning.
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxAbhinavAshish21
ย
The document discusses wireless sensor networks and data link layer applications. It provides information on seven layers of networking that are applicable to wireless sensor networks, including the physical, data link, network, transport, session, presentation, and application layers. It also summarizes Samsung's SmartThings smart home network and various technologies used for smart home IoT devices like hazard sensors and their wireless connectivity.
Ocular Systems provides project guidance to final year students of BE, BTech, ME, MTech, Diploma, MCA, MCS, etc. For project guidance contact us: www.ocularsystems.in or call us on 9970119370
Similar to Be ieee 2014 15 computer&inforamation science&mca titles (20)
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020IGEEKS TECHNOLOGIES
ย
IGeekS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)).
IGeekS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)).
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020IGEEKS TECHNOLOGIES
ย
IGeekS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)).
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220IGEEKS TECHNOLOGIES
ย
IGeekS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)).
IGEEKS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the studentโs in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines.
BE Mechanical Engineering Final Year Academic Projects BangaloreIGEEKS TECHNOLOGIES
ย
We provides latest 2013 - 2014 Mini and Main Mechanical Engineering Projects, Project Ideas, Project Topics for final Year Mechanical and Automobile Engineering Students with Abstract, Source Code and Reports on Pneumatics, Hydraulics and Fluid mechanics Bangalore.
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
ย
This paper proposes privacy-preserving algorithms for determining an optimal meeting location for a group of users. It addresses the privacy issues in location-based services (LBS) that require sharing of user locations. Two algorithms are presented that allow each user to provide a single location preference to the solver while preserving privacy from other users and the service provider. The paper evaluates the security and privacy of the algorithms through theoretical analysis and implementation on mobile devices. A user study provides insights into privacy concerns with LBS and the usability of the proposed solutions.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
ย
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
ย
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
ย
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
ย
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
ย
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
ย
(๐๐๐ ๐๐๐) (๐๐๐ฌ๐ฌ๐จ๐ง ๐)-๐๐ซ๐๐ฅ๐ข๐ฆ๐ฌ
๐๐ข๐ฌ๐๐ฎ๐ฌ๐ฌ ๐ญ๐ก๐ ๐๐๐ ๐๐ฎ๐ซ๐ซ๐ข๐๐ฎ๐ฅ๐ฎ๐ฆ ๐ข๐ง ๐ญ๐ก๐ ๐๐ก๐ข๐ฅ๐ข๐ฉ๐ฉ๐ข๐ง๐๐ฌ:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง ๐ญ๐ก๐ ๐๐๐ญ๐ฎ๐ซ๐ ๐๐ง๐ ๐๐๐จ๐ฉ๐ ๐จ๐ ๐๐ง ๐๐ง๐ญ๐ซ๐๐ฉ๐ซ๐๐ง๐๐ฎ๐ซ:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
BรI TแบฌP Bแป TRแปข TIแบพNG ANH LแปP 8 - Cแบข NฤM - FRIENDS PLUS - NฤM HแปC 2023-2024 (B...
ย
Be ieee 2014 15 computer&inforamation science&mca titles
1. IGEEKS TECHNOLOGIES
Software Training Division
Academic Projects for BE,ME,MCA,BCA and PHD Students
IGeekS Technologies (Make Final Year Project)
No: 19, MN Complex, 2nd Cross,
Sampige Main Road, Malleswaram, Bangalore- 560003.
Phone No: 080-32487434 /9590544567
Mail: training@Igeekstechnologies.com , nanduigeeks2010@gmail.com
Website: www.igeekstechnologies.com
Land mark : Near to Mantri Mall, Malleswaram Bangalore
2. S.No PROJECT TITLE Technology Used
JAVA Projects
Image Processing
1 A Personal Authentication Based on IRIS Recognition (IEEE) Java Swings, Applets
2 Noise Reduction By Fuzzy Image Filtering (IEEE) JDK 1.6, Java Swing
3 Script identification through temporal Sequence of the Strokes (IEEE) JDK 1.5, Java Swing
4 Image Processing Editor JAVA
5 Learn to Personalized Image Search from the Photo Sharing Websites (IEEE -2012)
JDK 1.5, Java Swing,
JDBC,HTML,JSP
6
Captcha as Graphical PasswordsโA New Security Primitive Based on Hard AI
Problems(IEEE-2014)
JDK 1.6,JSP,HTML,MYSQL
Networking / Network Security / Wireless Communications
7 Multiple Routing configurations for Fast IP network Recovery (IEEE)
JDK 1.5, Java Swing, SQL
server
8 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks (IEEE-2011) JDK 1.5, Java Swing
9 Mobility Management Approaches for Mobile IP Networks (IEEE) JDK1.6,Java Swing, MS access
10 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks (IEEE) JDK1.6,Java Swing, SQL Server
11 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks (IEEE-2011) JDK1.6,Java Swing
12
Enhancing Search Performance in Unstructured P2P Networks Based on Usersโ Common
Interest (IEEE)
JDK1.6,Java Swing, SQL Server
13 Packet-Hiding Methods for Preventing Selective Jamming Attacks (IEEE-2012) JDK 1.5, Java Swing, RMI
Label-Based DV-Hop Localization against Wormhole Attacks In Wireless Sensor Networks
14
(IEEE-2010)
Java,J2ME(J2ME Wireless
Toolkit)
15 Achieving Network Level Privacy in Wireless Sensor Networks (IEEE-2010)
Java,J2ME(J2ME Wireless
Toolkit)
16 Distributed Cache Updating Using Dynamic Source Routing Protocol (IEEE)
Java Networking, Swing,
MySQL
17 Online Modeling of Proactive Moderation System for Auction Fraud Detection (IEEE-2012)
JDK 1.5, Java Swing,
JDBC,HTML,JSP
18 Host-to-Host Congestion Control for TCP (IEEE-2010) Java, Eclipse
19 Participatory Privacy: Enabling Privacy in Participatory Sensing (IEEE โ 2013) JDK 1.5, JSP, HTML, MySQL)
20 Embedding the Secure Data In An Audio/Video and Image Files JDK 1.5, Java Swing
21 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks (IEEE-2011) J A V A , J F C ( S w in g )
22 Privacy- and Integrity-Preserving Range Queries in Sensor Networks (IEEE-2012) JDK 1.6, Java Swing, RMI,JDBC
23
Design and Implementation of Addressing Mental Health Epidemic among University
Students via Web-based, Self-Screening and Referral System (IEEE-2011)
JAVA, J2EE
24 Secure Data Transmission JAVA
25 Intrusion Detection System JAVA
26 Bandwidth Recycling in IEEE 802.16 Networks (IEEE-2010) Java,Eclipse, MS Access
27 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring (IEEE 2013) JDK 1.5,JSP,HTML,MYSQL
28 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks (IEEE -2013) JDK 1.6, Java Swing, RMI
29 Nymble: Blocking Misbehaving Users in Anonym zing Networks (IEEE-2011) Java,J2ME ,Tomcat
30
SAT:A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh
Networks (IEEE-2011)
Java,J2ME(J2MWireless
Toolkit)
31 Modeling and Detection of Camouflaging Worm. (IEEE-2011) Jdk1.6, java swing, Eclipse
32
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning
Tree (IEEE-2011)
Jdk1.6, java swing
33 TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL
34 Vampire attacks: Draining life from wireless ad-hoc sensor networks (IEEE2013) JDK 1.5,RMI,SWING
35 Fully Anonymous Profile Matching in Mobile Social Networks (IEEE 2013-Networking) JDK 1.5,JSP,HTML,MYSQL
36 Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks (IEEE 2013) JDK 1.5, Java Swing, RMI
37 An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System(IEEE2012) JDK1.6,Java Swing
38
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis(IEEE 2014)
JDK 1.6,JSP,HTML,MYSQL
39
Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding
Cryptographic Scheme and Evaluating Its Performance (IEEE-2014)
JDK 1.6,JSP,HTML,MYSQL
3. 40 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage ( IEEE-2014) JDK 1.6,JSP,HTML,MYSQL
41 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL
42
Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds(IEEE-2014)
JDK 1.6,JSP,HTML,MYSQL
43 Personalized Web search Using Browsing History And Domain Knowledge (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL
Cloud Computing
44
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
(IEEE-2013)
JDK 1.5,JSP,HTML,MYSQL
45 Ensuring Data Storage Security in Cloud Computing (IEEE-2010) Java, Swing, RMI, J2ME
46 Secure and Practical Outsourcing of Linear Programming in Cloud Computing (IEEE -2011) Java, JSP, JDBC, Java Script
47 Cloud Computing Security: From Single to Multi-Clouds (IEEE-2012, Cloud Computing) JDK 1.5,JSP,HTML,MYSQL
48 Privacy-Preserving Public Auditing for Secure Cloud Storage (IEEE -2013) J D K 1 . 5,JSP,HTML,MYSQL
49 Ensuring Distributed ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD (IEEE-2012) JDK 1.5,JSP,HTML,MYSQL
50 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization (IEEE-2013) J DK 1.5,JSP,HTML,MYSQL
51
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social
Video Sharing in the Clouds. (IEEE 2013 -Cloud Computing)
JDK 1.5,JSP,HTML,MYSQL
52
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
(IEEE 2014)
JDK 1.6,JSP,HTML,MYSQL
53 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud(IEEE-2014) JDK 1.6,JSP,HTML,MYSQL
Knowledge And Data Engineering Projects
54 Dealing With Concept Drifts in Process Mining (IEEE-2014) JDK 1.6,JSP,HTML,MYSQL
56 Anomaly Detection via Online Oversampling Principal Component Analysis. (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL
57 Ranking Spatial Data by Quality Preferences (IEEE-2011) Java,Jsp,Servlet,Jdbc
58 Extended XML Tree Pattern Matching: Theories and Algorithms (IEEE-2011) Java,Jsp,xml
59 Slicing: A New Approach to Privacy Preserving Data Publishing (IEEE-2012)
JDK 1.5,Swing, JDBC, HTML,
JSP
60 Ranking Model Adaptation For Domain-pecific Search (IEEE-2012)
JDK1.5,Swing,Jdbc,html,jsp,
Android
61 Multiparty Access Control for Online Social Networks: Model and Mechanisms (IEEE-2013)
JDK1.5,Swing,Jdbc,html,jsp,
Android
62 A system to Filter Unwanted Messages from OSN Uses Walls (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL
63 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data (IEEE-2013) JDK 1.5,JSP,HTML,MYSQL
64 Supporting Privacy Protection in Personalized Web Search (IEEE-2014) J D K 1.6,JSP,HTML,MYSQL
Mobile Computing Projects
65 Fast Data Collection in Tree-Based Wireless Sensor Networks (IEEE2012-Mobile computing) JDK 1.5, Java Swing,J2ME
66 Staying Connected in a Mobile Healthcare System Experiences (IEEE-2010) Java, Jsp,J2ME,Mysql
67 Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks (IEEE2010) Java RMI, SWING,J2ME
68 Location Based Intelligent Mobile Organizer (IEEE) Android 2.2 Eclipse , JDK 6
69 Remote PC Administration Using J2ME JAVA, J2ME, MIDP2.0, CLDC1.1
70 VAS for Hand Held Device-MM7 Protocol implementation JAVA,J2ME, Servlets
71 Mobile Invoice (Mobile Billing) Java, JSP, J2ME
72 SIP โ Session Initiation Protocol (M-Conference) J2ME,JAVA,SIP API
73 M-banking JAVA, WML, Nokia Tool Kit
74 Online shopping Android Applicatin
Android SDK 2.1,JDK
6.0,SQLite
75 Mobi Thesaurus (Dictionary for Mobile Devices)
J2ME2.1, J2SE 2.1.4, J2ME
WTK2.0.
76 Mobi Travel Guide โ Smart way to travel
Android Google Api 1.5,
Android
77 Restaurant Table Order Management System Android 2.2 Eclipse , JDK 6
78 Mobile Location Alarm Android, Eclipse ,Sun JDK 5
79 Twitter Client for Android based smart phone Android SDK 2.1,JDK 6.0,SQLite
80 Android Event Scheduler /Reminder Application Android 2.2 Eclipse , JDK 6
4. 81 Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor S/B (IEEE-2009) Android
Embedded with Android ( Hardware + Software projects)
82 CHILD ACTIVITY RECOGNIZATION USING ACCELEROMETER AND RFID READER Hardware+Android
83 CENTRALIZED LPG CYLINDERS THEFT DETECTION SYSTEM WITH SECURITY ALERTS Hardware+Android
84 NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection Hardware+Android
85 REACTIVE NAVIGATION OF MULTIPLE MOVING AGENTS IN ROOM ENVIRONMENT Hardware+Android
86 HEALTH @ HOME โ Remote monitoring of vital signs Hardware+Android
87 ADVANCED SOFESTICAED TECHINQUES IN VEHICLES FOR PREVENTION OF ACCIDENTS Hardware+Android
88 GPS based child tracking with server & SMS alert to parents Hardware+Android
89 REMOTE ELECTRONIC LAB USING WIRELESS NETWORK TECHNOLOGY Hardware+Android
90
MEMS (Accelerometer) based robot motion control with fire, gas detection & control system
with voice alert
Hardware+Android
91 Speech based monitoring using Android phone Hardware+Android
92 A FAIR FARE SYSTEM TO DETECT TAMPERING USING ANDROID PHONE Hardware+Android
93 Building Lighting Automation through the Integration with Wireless Sensor Network Hardware+Android
94
Speech Recognition Based Wireless Automation Of Home Loads With Fault Identification
For Physically Challenged
Hardware+Android
95 More Efficient Home Energy Management System using Android Phone Hardware+Android
96 Lab automation using Android phone through Bluetooth technology Hardware+Android
97 Human detection in natural disaster using PIR sensor Hardware+Android
98 EVIDENCE COLLECTION FROM CAR BLACK BOXES USING SMART PHONES Hardware+Android
99 ANDROID BASED TEMPERATURE AND VOLTAGE MEASUREMENT Hardware+Android
100 ROBOTIC AID FOR SURVILENCE OF HUMAN BEINGS USING ZIGBEE Hardware+Android
101 AUTOMATIC ORDERING AND BILLING IN HOTELS Hardware+Android
102 Industrial Automation for Mobile Device using Bluetooth Technology Hardware+Android
103 Android Based Robot Control Hardware+Android
104
Health at the home:Remote health monitoring for patients and senior citizens at the home
by using centralized web server Hardware+Android
105
Transport/Travel Management System: Detection of Aggressive driving of commercial
vehicles, along with Fuel theft detection, using centralized web server Hardware+Android
106
Intelligent Food Management System: Maintenance of Agro and Non-Agro Foods in Cold
Storage/Warehouse
Hardware+Android
Web Applications Development(J2EE)
107 Value added sales tax information system Java, Jsp,servlet,oracle
108 Tanrox Work Force (Activity Control System) J2EE,Struts,MySql
109 Virtual office Management Java,servlet, Jsp,sql, MS access
110 Intranet Mailing System Java, Jsp,sql server
111 Collaborative White Board โ core java Java ,swing
112 DCMS(Distributed channel management system) Java, Jsp,servlet,oracle 10g
113 Router Guide Java, My SQL 4.0
114 Text Editor โ Core Java Java
115 Online Examination Java,servlet, Jsp,sql server
116 Customer Relationship Management โ(CRM) Java, Jsp,sql server
117 ORKUT USING JAVA JAVA
118 Telecom Inventory Management System Java, JSP, Tomcat, MYSQL
119 Global Tracker Java, JSP, Tomcat, MYSQL
120 Online Rental House Web Portal Java, JSP, Tomcat, MYSQL
121 Online University Java, JSP, Tomcat, MYSQL
122 Company Information Tracking System (CITS) Java, JSP, Tomcat, MYSQL
123 Steel Production Planning & Control
Servlet, jdbc, j2ee, oracle 9i,
tomcat 5.5
124 NetSuite Multi-Channel Retail Management Suite Java, JSP, Tomcat, MYSQL
Dotnet IEEE Projects
125 Long-Term Cross-Session Relevance Feedback Using Virtual Features (IEEE) .Net, c#.Net, SQL Server
126 Digital Image Tracing by Sequential Multiple Watermarking (IEEE) .Net 2003, C#.Net
5. 127
Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light
(IEEE)
C#.Net, Visual Studio 2005
128 Neural Networks for Unicode Optical Character Recognition C#.Net, Visual Studio 2005
129 Cloud OS-Cloud Computing
ASP.Net Ajax Cloud Platform,
SQL Server
130 Image Recognition with Neural Networks C#.Net, Visual Studio 2005
131 SpyNet C#.Net, Visual Studio 2005
132
Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption
(IEEE -2013)
Visual Studio 2005/2008/
ASP.NetwithC#,SQL Server
2008
133
Privacy Preserving Delegated Access Control in Public Clouds. (IEEE Transactions -Cloud
Computing -IEEE 2013) (IEEE-2013)
Visual Studio 2005/2008/
ASP.NetwithC#,SQL Server
2008
134 Energy Maps for Mobile Wireless Networks (IEEE) Visual Studio 2005/ 2008
135
Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
(IEEE TRANSACTIONS ON CLOUD COMPUTING ( IEEE-2013)
Visual Studio 2005/2008/
ASP.NetwithC#,SQL Server
2008
136
Privacy Preserving Data Sharing With Anonymous ID Assignment (IEEE TRANSACTIONS ON
FORENSICS AND SECURITY (IEEE-2013)
Visual Studio 2005/2008/
ASP.NetwithC#,SQL Server
2008
137
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
(IEEE-2010)
.Net, SQL Server 2005
138 Visual Data Mining of Web Navigational Data (IEEE-2010) Visual Studio 2005/ 2008
139 Fuzzy Keyword Search over Encrypted Data in Cloud Computing (IEEE-2010) .Net, SQL Server 2005
140 An economic approach for scalable and highly-available distributed applications (IEEE-2010) .Net, SQL Server 2005
141 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (IEEE2010) .Net, SQL Server 2005
142 Exploring Application-Level Semantics for Data Compression (IEEE-2011) .Net, SQL Server 2005
143 Bridging Socially-Enhanced Virtual Communities (IEEE-2011) .Net, SQL Server 2005
144
Efficient Computation of Range Aggregates against Uncertain Location Based Queries
(IEEE-2011)
.Net, SQL Server 2005
145
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
(IEEE-2011)
.Net 2008, SQL Server 2005
146 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks.(IEEE2013) C#.Net, Visual Studio 2008
147 Monitoring Service System from A Language โ Action Perspective (IEEE-2011) .Net, SQL Server 2005
148
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
(IEEE-2011)
.Net, SQL Server 2005
149
Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks.
(IEEE-2013)
Visual Studio 2005/Visual
Studio 2008
150
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected
False Data in Wireless Sensor Networks (IEEE-2012)
C#.Net, Visual Studio 2008
151
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous
Wireless Sensor Networks (IEEE-2013) .Net, SQL Server 2005
152
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption (IEEE-2013)
C#.Net, Asp.Net, SQLServer
2008
153 SCALABLE LEARNING OF COLLECTIVE BEHAVIOUR (IEEE-2012) C#.Net, Asp.Net, SQLServer 2005
154 Towards Secure and Dependable Storage Services in Cloud Computing (IEEE-2012)
C#.Net, Asp.Net, SQLServer
2005
155 Bridging Social and Data Networks (IEEE-2012,Knowledge and Data Engineering)
C#.Net, Asp.Net, SQLServer
2005
156
Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click
Points (IEEE-2012, Image Processing)
C#.Net, Asp.Net, SQLServer
2005
157 Data Integrity Proofs in Cloud Storage (IEEE-2011) .Net, SQL Server 2005
158 EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS (IEEE-2012)
C#.Net, Asp.Net, SQLServer
2005
159
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency (IEEE-2013)
C#.Net, SQLServer 2005
160 Local Directional Number Pattern for Face Analysis: Face and Expression Recognition(IEEE- C#.Net, Visual Studio 2008
6. 2013)
161 LBP-BASED EDGE-TEXTURE FEATURES FOR OBJECT RECOGINITION (IEEE-2014)
C#.Net, Asp.Net, SQLServer
2008
162
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
(IEEE-2014)
C#.Net, Asp.Net, SQLServer
2008
163 Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data (IEEE-2014)
C#.Net, Asp.Net, SQLServer
2008
164
SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY
NETWORKS (IEEE-2014)
C#.Net, Asp.Net, SQLServer
2008
Dotnet Application Projects
165 Online Adventure/Check out My Trip/Online Tourism Visual Studio 2005/ 2008
166 Automated Reformatory Visual Studio 2005/ 2008
167 Corporate based credential cluster Visual Studio 2005/ 2008
168 E2M Conference Visual Studio 2005/ 2008
169 GISS Visual Studio 2005/ 2008
170 Resort Management System Visual Studio 2005/ 2008
171 Online Tender Visual Studio 2005/ 2008
172 H o s p i t a l M a n a g e m e n t Visual Studio 2005/ 2008
173 G a s A g e n c y S y s t e m Visual Studio 2005/ 2008
174 Insurance on Internet Visual Studio 2005/ 2008
175 Intelligent Transportation Visual Studio 2005/ 2008
176 Webmart Visual Studio 2005/ 2008
177 Course Milestone Visual Studio 2005/ 2008
178 Client Server Based Live Meeting Visual Studio 2005/ 2008
179 Courier Automation Visual Studio 2005/ 2008
180 Vehicle Monitoring System Visual Studio 2005/ 2008
181 Online Auction Visual Studio 2005/ 2008
182 Steganography Visual Studio 2005/ 2008
183 Hotel Management Visual Studio 2005/ 2008
184 Construction Plus System Visual Studio 2005/ 2008
185 Online Shopping Visual Studio 2005/ 2008
186 College Management System Visual Studio 2005/ 2008
187 Online Examination Enabled with Ajax Visual Studio 2005/ 2008
188 Desktop Activity Recorder for PC Monitoring Visual Studio 2005/ 2008