SlideShare a Scribd company logo
1 of 2
Final Year Project List for the Year 2012

S.No Project Title                      Description
1     Decremental algorithm for         Routing in a stochastic and dynamic (time-dependent)
      adaptive routing incorporating    network is a crucial transportation problem. A new variant
      traveler information              of adaptive routing, which assumes perfect online
                                        information of continuous real-time link travel time, is
                                        proposed. Driver's speed profile is taken into consideration
                                        to realistically estimate travel times, which also involves the
                                        stochasticity of links in a dynamic network. An adaptive
                                        approach is suggested to tackle the continuous dynamic
                                        shortest path problem. A decremental algorithm is
                                        consequently developed to reduce optimization time. The
                                        impact of the proposed adaptive routing and the
                                        performance of the decremental approach are evaluated in
                                        static and dynamic networks under different traffic
                                        conditions. The proposed approach can be incorporated into
                                        vehicle navigation systems.
2     Design a Global authentication    Self-explanatory, can be discussed further
      system for Distributed Wireless
      Networks
3     Design an IP-IP tunnel for        Self-explanatory, can be discussed further
      remote authentication for
      resource utilization
4     Decryptiong GSM encryption        Require Radio Receiver(hardware) and GSM basic concepts
      using Programmable Radio
      Receivers
5     GSM Speech Coder Indirect         GSM speech coder indirect identification algorithm based on
      Identification Algorithm          sending novel identification pilot signals through the GSM
                                        speech channel. Each GSM subsystem disturbs identification
                                        pilot, while speech coder uniquely changes the tempo-
                                        spectral characteristics of the proposed pilot signal. Speech
                                        coder identification algorithm identifies speech coder with
                                        the usage of robust linear frequency cepstral coefficient
                                        (LFCC) feature extraction procedure and fast artificial neural
                                        networks. First step of speech coder identification algorithm
                                        is the exact position detection of the identification pilot
                                        signal using normalized cross correlation approach. Next
                                        stage is time-domain windowing of the input signal to
                                        convolve each frame of the input speech signal and window
                                        spectrum. Consecutive step is a short-time Fast Fourier
                                        Transformation to produce the magnitude spectrum of each
                                        windowed frame. Further, a noise reduction with spectral
subtraction based on spectral smoothing is carried out. In
                                     last steps we perform the frequency filtering and Discrete
                                     Cosine Transformation to receive 24 uncorrelated cepstral
                                     coefficients per frame as a result. Speech coder
                                     identification is completed with fast artificial neural network
                                     classification using the input feature vector of 24 LFCC
                                     coefficients, giving a result of identified speech coder.
6   Distributed fault detection of   Wireless Sensor Networks (WSNs) have become a new
    wireless sensor networks         information collection and monitoring solution for a variety
                                     of applications. Faults occurring to sensor nodes are
                                     common due to the sensor device itself and the harsh
                                     environment where the sensor nodes are deployed. In order
                                     to ensure the network quality of service it is necessary for
                                     the WSN to be able to detect the faults and take actions to
                                     avoid further degradation of the service.
7   Efficient code distribution in   The need to re-programme a wireless sensor network may
    wireless sensor networks         arise from changing application requirements, bug fixes, or
                                     during the application development cycle. Once deployed, it
                                     will be impractical at best to reach each individual node.
                                     Thus, a scheme is required to wirelessly re-programme the
                                     nodes.
8   A novel agent-based user-        Wireless sensor networks generally have three kinds of
    network communication model      objects: sensor nodes, sinks, and users that send queries and
    in wireless sensor networks      receive data via the sinks. In addition, the user and the sinks
                                     are mostly connected to each other by infrastructure
                                     networks. The users, however, should receive the data from
                                     the sinks through multi-hop communications between
                                     disseminating sensor nodes if such users move into the
                                     sensor networks without infrastructure networks. To
                                     support mobile users, previous work has studied various
                                     user mobility models. Nevertheless, such approaches are
                                     not compatible with the existing data-centric routing
                                     algorithms, and it is difficult for the mobile users to gather
                                     data efficiently from sensor nodes due to their mobility
    You can also present any other idea relevant to Data Communication,
    Communication Networks, Wireless Networks or Digital Communication
    for further discussion

More Related Content

What's hot

A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video trafficprasanna9
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Routing protocols
Routing protocolsRouting protocols
Routing protocolsmehulpatira
 

What's hot (18)

A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
J0525460
J0525460J0525460
J0525460
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Self Healing
Self HealingSelf Healing
Self Healing
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video traffic
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Hz2414081415
Hz2414081415Hz2414081415
Hz2414081415
 
Presentation1
Presentation1Presentation1
Presentation1
 

Viewers also liked

Prolog Code [Family Tree] by Shahzeb Pirzada
Prolog Code [Family Tree] by Shahzeb PirzadaProlog Code [Family Tree] by Shahzeb Pirzada
Prolog Code [Family Tree] by Shahzeb PirzadaShahzeb Pirzada
 
City School Network- Routing & Switching Final Report
City School Network- Routing & Switching Final ReportCity School Network- Routing & Switching Final Report
City School Network- Routing & Switching Final ReportShahzeb Pirzada
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechNetwork Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechManju Nath
 
project on OSPF
project on OSPFproject on OSPF
project on OSPFOm Prakash
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching reportExpress News
 

Viewers also liked (7)

Prolog Code [Family Tree] by Shahzeb Pirzada
Prolog Code [Family Tree] by Shahzeb PirzadaProlog Code [Family Tree] by Shahzeb Pirzada
Prolog Code [Family Tree] by Shahzeb Pirzada
 
City School Network- Routing & Switching Final Report
City School Network- Routing & Switching Final ReportCity School Network- Routing & Switching Final Report
City School Network- Routing & Switching Final Report
 
644
644644
644
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechNetwork Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
 
project on OSPF
project on OSPFproject on OSPF
project on OSPF
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching report
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 

Similar to Final year project list for the year 2012

2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstractMukundhan Elumalai
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
 
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksOn quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksIEEEFINALYEARPROJECTS
 
On quality of monitoring for multi channel wireless
On quality of monitoring for multi channel wirelessOn quality of monitoring for multi channel wireless
On quality of monitoring for multi channel wirelessShakas Technologies
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
secured communication over wireless broadcast networks
secured communication over wireless broadcast networkssecured communication over wireless broadcast networks
secured communication over wireless broadcast networksVenkatesh Reddy
 
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksOn quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksJPINFOTECH JAYAPRAKASH
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGeetha336913
 
firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptxmayurbankar2
 

Similar to Final year project list for the year 2012 (20)

2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksOn quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networks
 
On quality of monitoring for multi channel wireless
On quality of monitoring for multi channel wirelessOn quality of monitoring for multi channel wireless
On quality of monitoring for multi channel wireless
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
secured communication over wireless broadcast networks
secured communication over wireless broadcast networkssecured communication over wireless broadcast networks
secured communication over wireless broadcast networks
 
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksOn quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networks
 
C0941017
C0941017C0941017
C0941017
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptx
 

Final year project list for the year 2012

  • 1. Final Year Project List for the Year 2012 S.No Project Title Description 1 Decremental algorithm for Routing in a stochastic and dynamic (time-dependent) adaptive routing incorporating network is a crucial transportation problem. A new variant traveler information of adaptive routing, which assumes perfect online information of continuous real-time link travel time, is proposed. Driver's speed profile is taken into consideration to realistically estimate travel times, which also involves the stochasticity of links in a dynamic network. An adaptive approach is suggested to tackle the continuous dynamic shortest path problem. A decremental algorithm is consequently developed to reduce optimization time. The impact of the proposed adaptive routing and the performance of the decremental approach are evaluated in static and dynamic networks under different traffic conditions. The proposed approach can be incorporated into vehicle navigation systems. 2 Design a Global authentication Self-explanatory, can be discussed further system for Distributed Wireless Networks 3 Design an IP-IP tunnel for Self-explanatory, can be discussed further remote authentication for resource utilization 4 Decryptiong GSM encryption Require Radio Receiver(hardware) and GSM basic concepts using Programmable Radio Receivers 5 GSM Speech Coder Indirect GSM speech coder indirect identification algorithm based on Identification Algorithm sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem disturbs identification pilot, while speech coder uniquely changes the tempo- spectral characteristics of the proposed pilot signal. Speech coder identification algorithm identifies speech coder with the usage of robust linear frequency cepstral coefficient (LFCC) feature extraction procedure and fast artificial neural networks. First step of speech coder identification algorithm is the exact position detection of the identification pilot signal using normalized cross correlation approach. Next stage is time-domain windowing of the input signal to convolve each frame of the input speech signal and window spectrum. Consecutive step is a short-time Fast Fourier Transformation to produce the magnitude spectrum of each windowed frame. Further, a noise reduction with spectral
  • 2. subtraction based on spectral smoothing is carried out. In last steps we perform the frequency filtering and Discrete Cosine Transformation to receive 24 uncorrelated cepstral coefficients per frame as a result. Speech coder identification is completed with fast artificial neural network classification using the input feature vector of 24 LFCC coefficients, giving a result of identified speech coder. 6 Distributed fault detection of Wireless Sensor Networks (WSNs) have become a new wireless sensor networks information collection and monitoring solution for a variety of applications. Faults occurring to sensor nodes are common due to the sensor device itself and the harsh environment where the sensor nodes are deployed. In order to ensure the network quality of service it is necessary for the WSN to be able to detect the faults and take actions to avoid further degradation of the service. 7 Efficient code distribution in The need to re-programme a wireless sensor network may wireless sensor networks arise from changing application requirements, bug fixes, or during the application development cycle. Once deployed, it will be impractical at best to reach each individual node. Thus, a scheme is required to wirelessly re-programme the nodes. 8 A novel agent-based user- Wireless sensor networks generally have three kinds of network communication model objects: sensor nodes, sinks, and users that send queries and in wireless sensor networks receive data via the sinks. In addition, the user and the sinks are mostly connected to each other by infrastructure networks. The users, however, should receive the data from the sinks through multi-hop communications between disseminating sensor nodes if such users move into the sensor networks without infrastructure networks. To support mobile users, previous work has studied various user mobility models. Nevertheless, such approaches are not compatible with the existing data-centric routing algorithms, and it is difficult for the mobile users to gather data efficiently from sensor nodes due to their mobility You can also present any other idea relevant to Data Communication, Communication Networks, Wireless Networks or Digital Communication for further discussion