SlideShare a Scribd company logo
1 of 27
Academic peer to peer Network
Academic planner
Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
/Java
Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
Java
Adaptive distributed event model.
Adaptive event based middleware architecture.
Adaptive Programming Model for Fault-Tolerant Distributed Computing /Java
Adding Functionalities to Libpcap
Agent Based Intrusion Detection, Response and Blocking using signature method in
Active Networks /Java
AI Firewall
alternative semantics for error and exceptional handling
Alumni Software
Analysis of Event Models in Event based Middle ware
Analysis of Routing Models in Event Base Middle wares
Anomaly Detection
Anti - Viruses
Apartment Management System VB Net
Application Of Bayesian Networks To Data Mining
Approximation Algorithm for Facility location and related problems
Artificial intelligence network load balancing using Ant Colony Optimization C#
Net
ATM Networks For Online Monitoring System Java
Auction simulator using agents
Auction System ASP Net
Audio processing of movies.
Automated Generation of Cycle Level Simulators for Embedded Processors.
Automated Robot for Military System (ARMS)
Automatic Remote Backup
Automating News Gathering and Classification
Automation With The Concept Of Jini
Bandwidth management Tool
Barcode Genration
Biometric - The Security System
Bug trading
Bulk Billing System JEE
C# MP Compressor C# Net
Call Center Management System ASP Net
Campus Online Help Desk
Cargo Management System
Cloth Animation & Dynamics.
Code optimization. Implementation of scalar optimizations
Code optimization: Implementation of scalar optimizations
Collaborative Platform for Open Source
Collaborative Span Filtering Using Centralized Incrementally Learning Spam Rules
Collaborative Web Browsing
Collage Management System
Computerized Information Software VB Net
Contact Reminder
Context Aware Service Oriented Architecture
Controlling IP Spoofing through Inter domain Packet Filters (Java)
Convolution Filter VB Net
Convolution Filters Using Image Processing C# Net
course home page generator
Credit Card Fraud Detection using Hidden Markov Model (Net)
Cryptographic Engine
Cryptographically Using Secure Server/Client Protocol VC++
Customizing Proxy Web server
CVS Root File Changing Utility C# Net
Data Integration
Database
Database Schema Comparison Utility C# C# Net
DBMS with SQL Interpreter
Dept Library Management System
Design and Implementation of PSTN to VoIP Gateway in built Asterisk PBX
Design and implementation of PSTN/VoIP gateway with inbuilt PBX.
Design and Implementation of WiFiRE protocol
Design of an Infrastructure using WiFi for Road Naviation
Design of Intranet Mail System
Detecting and Blocking Skype
Developing an Organically Growing Peer to Peer Network
Developing GUI for IP Tables Configuration
Development of a Distributed Systems Simulator for Event Based Middleware
Development of an OS Framework for a MIPS Simulator
Digital Image Processing
Digital Image Processing Techniques for the Detection and Removal of Cracks in
Digitized Paintings /Net
Direct Information System
Direction queries in spatio-temporal databases.
Displacement filters, including swirl using GDI+ C# Net
Distributed Ant Robotics
Distributed cache updating for the Dynamic source routing protocol /Java
Distributed Database Architecture for Global Roaming in Next-Generation Mobile
Networks /Java
Distributed Parallel Virtual Machine
Distributed System simulator for Publish-Subscribe Model
Distributed Workgroup File Indexer
DSP Simulator
Dynamic Data Dissimination in Resource Constrained Environment
E -Wheel Software
Edge Detection Filters C# Net
Efficient and Secure Content Processing (Java)
Efficient inference algorithm for large state space graphical model
Electronic Fund Transfer ASP Net
Electronic Transaction
E-Mail Server Using Multithreaded Sockets Java
E-Mail Server Using SMTP
Embedding In Video Steganography Java
Employee info and payroll system
Employee Management System VB Net
Energy Efficient Event Reliable Transport in Wireless Sensor Networks
Enhancing The Algorithms
Enterprise Resource Planning
ERP for Leather Company JEE
ERP for Small Business JEE
Error handling for syntax analysis
Error Tracking System
E-shoping
Ethernet - Billing System
Exact functional context matching for web services.
Exam Server
Experimenting with Code Optimizations on SUIF (Stanford University Intermediate
Format)
Extending Shikav to support animation of networking protocols
E-Zest
Face Recognition Using Artificial Neural Networks
Face Recognition Using Laplacian faces /Java
Fault-Tolerant TCP
Feed Forward Neural Networks
Feedback Based Self-Configuring Systems
File Encryption and Encrypted text embedding in an image VC++
Final Project by M.Techs ( currently reports are not available)
Final Projects By MCA ( currently reports are not available)
Find and Replace utility VB Net
Fingerprint Image Enhancement
Firewell
Flood Fill Algorithms in C# and GDI+ C# Net
FLOW WELL AUTOMATION SYSTEM
Forecasting
Formal Specification and Verification of WiFiRe
FTP Explorer VB Net
Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java
Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C#
Net
Graphical library system
Graphical Representation Of Online Shares & Stocks
Hba: Distributed Metadata Management for Large cluster-based storage system
(Net)
Hiding binary data in HTML documents C# Net
Hiding Messages in MIDI Songs C# Net
Hiding messages in the Noise of a Picture C# Net
Hierarchical Data Back Up
Homogenous Network Control and Implementation /Java
Homogenous Network Control and Implementation Java
Honynet
Hostel Election Software
Hostel elections voting software
Hotel Management System VB Net
HR Consultant
HTML Editor VB Net
Human Resources Management System VB Net
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous
Internet Episodes(HIDS) /JEE
IA64 ISA Simulation
Image Converter VB Net
Image Processing
Image Processing Application
Image Processing C# Net
Image Processing for Bilinear Filters and Resizing C# Net
Image processing for HSL color space C# Net
Image Processing for Per Pixel Filters using GDI+ C# Net
Image Rendering For Grid Technology Java
Image Steganography
Image Transformation using Grid Java
Image Water Marking
Implementation of cryptographic protocols in oblivious signature based envelope
(
Implementation of Download wizard for simultaneous downloads
Implementation of Scalar Optimizations
Implementation of the gaming software
Implementing a Linux Cluster
Implementing an interface for transliteration
Improving TCP performance in adhoc networks.
Improving the efficiency of Memory Management in Linux by Efficient Page
Incremental deployment service of Hop by hop multicast routing protocol /Java
Information Extraction in Diverse Setting
Information Management and Representation Using Topic Maps
Information retrieval from textual corpus.
Information Retrieval in Resource Constrained Environments
Instant messenger system
Integrating Speech Engine With Web Navigator Java
Integration of Heterogeneous Databases Into XML Format with Translator
Intelligent agents.
Intelligent Car Transportation System (IntelliCarTS)
Interface for Mobile Phone and PDA using J2ME
Internet History Viewer VB Net
Internet On Demand - Web Browser And Copier
Inter-operability of IEEE 802.11 with IEEE 802.11e
Interpretor for lambda calculus with some extensions
Intranet Caching Protocol
Intranet Mailing System
Intruder Detection System
Intrusion Detection Prevention And Trace back Systems VC++
Intrusion Detection System & Bandwidth Limitation
Intrusion Prevention System
Inventory System VB Net
IP Sniffer
ITP: An Image Transport Protocol for the Internet /Java
Java Network File Sharing System Java
Java Productivity Aids Java
Java Visual Editor with Compiler Java
Java-Debugger
JDBC Database Interfacing Tool
Jini The Distributed System
JME Mail Client Server JME
Lending Tree Project
Library Management System C# Net
Library Management system VB Net
LIC management
Linux Kernel (Memory Management)
Linux Kernel Enhancement
Load Balancing Using Process Migration in Linux
Load Sensitive Routing algorithm and its application in traffic engineering
Location-Aided Routing (LAR) in Mobile Ad Hoc Networks /Java
Mail Server Utility
Managing Linux Distributions
Man-Machine Interface - A Robot
Marathi Sentence Generation from UNL.
Marketing administration system
Matchmaking algorithms for Semantic Web Services
Medical agency
Medical Transcription Server
Membership Management System VB Net
Message Digest VB Net
Message Management System
Microcomputer Based Robot
Mini Projects by B.Techs ( Currently reports are not available )
Mini Projects By M.Techs
Minimizing file download time in Stochastic Peer-to-Peer networks (Net)
Mirroring
Mobile Agents In Distributed Multimedia Database Systems /Java
Mobile Bank WAP
Mobile Information Provider JME
Mobotric
Model checking for protocol verification.
Monitoring And Managing The Clusters Using JMX JME
Multi User Chatting System
Multihoming Solution for effective load balancing
Multi-Tasking Sockets
Multithreaded Chat Server C# Net
My SQL Administrative tool kit
near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic
algorithm /Java
Net Banking
Net on TV Channel
Network Analysis
Network Analyzer Java
Network Based University Collage Co-Ordiantion Syatem
Network Border Patrol Preventing Congestion Collapse Java
Network border patrol: preventing congestion collapse and promoting fairness in
the Internet /Java
Network Component for XML Migration Java
Network MAnagement And Internet Tools
Network Management Tool
Network Monitoring
Network Monitoring Based on Java
Network Monitoring System
Network Protocol Verification Using Linear Temporal Logic
Network Security System In DNS Using Ad-Hoc Networks Java
Network Sniffer
Network Traffic Anomaly Detector JME
Network Vigilator
Networks Based Performance Analysis Tool
Neural Network for Recognition of Handwritten and Digits VC++
Neural Network-Based Face Detection /VC++
Neural Networks for Handwriting Detection System Using Brain Net VB Net
Neural Networks for Handwritten character and Digits /VC++
Neural Networks for Unicode Optical Character Recognition C# Net
new methodology for representation of TCP performance in TCPSF.
NITC Student information system
Noise Reduction by Fuzzy Image Filtering /Java
Novel Secure Communication Protocol for Ad Hoc networks [SCP] /Java
Ocr in Hindi
ODAM: An Optimized Distributed Association Rule Mining Algorithm /Java
Office Automation
Online Bank ASP Net
Online Banking
Online Book Shop ASP Net
Online Bulletin Board
Online Class Register
Online Counseling
Online Counseling software
Online Customer Care ASP Net
Online Education
Online Election Software for Hostel Election
Online Examination
Online Fashion Studios JEE
Online Handwritten Script Recognition /Java
Online Library Management system
Online Library System
Online Objective test
Online Oucation
Online Quiz ASP Net
Online Share Trading
Online Shopping
Online Shopping ASP Net
Online Student Registration
Online Test
Online Voting System ASP Net
Online Web shop JEE
Ooline Polling
Operating system enhancements to prevent the misuse of system calls.
Opticall Character Recognition
Optimal Multicast Routing in Mobile Ad-Hoc Networks Java
Optimized and delay sensitive service provisioning over SLiT networks
Optimizing pattern matching algorithm in intrusion detection.
OSBE to handle cyclic policy interdependency)
Parallel Processing Application
Parellel Processing Thro' Job Distribution
Patient Care System VB Net
PC (Net) To Phone
Peer-To-Peer Messaging JME
Performance Analysis of Telephony Routing Protocols
Performance Analysis of WiFi-Re(Wireless Fidelity - Rural Extension)
Performance Enhancement of HTTP using improved TCP Functionalities
Performance Evaluation of an Efficient Multicast Routing Protocol
Performance Evaluation of DISTANCE Routing Algorithm in MANET VC++
Performance Evaluation of RMI Java
Performance Evaluation of Routing Algorithm using NS2
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic
Algorithm /Java
Probabilistic Techniques for cache replacement
Project Management System
Project Server
Project Status Information System
Public Key Validation for DNS security Extension Java
Query builder
Railway reservation
Rate Allocation and Network Life Time Problems (Net)
Reading and Writing AVI files using steganography C# Net
Remote PC Access in Cyber Cafe
Re-ordering of packets using Retransmission Timer
Replacement Policies.
Retrieving Files Using Content Based Searching and presenting it in Carousel
view Java
RFID Data Management
Rough sets based Search Engine for grid service discovery (Net)
SAS
Scalable Wireless AD-HOC Network Simulation Using XTC Java
SCET Intra Net
SCET's Invition For Online Tender
Screen capture Utility VB Net
Securable Network in three-party Protocol
Secure Conferencing System
Secure Mail Server
Secure Net Auction System
Secure Routing Protocol for mobile Ad-hoc Network Java
Secure routing.
Securing Image URL ASP Net
Security Robot
Selective Encryption of Still Image /VB,C
Self-Interested Routing in Online Environments
Semantic Searching using NLP techniques
Send SMS To Cell Phone Through SMTP Mail VB Net
Share trading system
Shortest Node Finder In Wireless Ad-Hoc Networks Java
Simple FTP Client
Simulating Routing Algorithms in Java
Simulation of the IA64 Instruction Set Architecture
Smart Card
Smart Divece Controller
Smart Knowledge Provider ASP Net
SN Java Project Titles Language
Spatial and temporal database (queries for retrieving data)
Speed Age Courier System
Statistical Techniques for detecting Traffic anomalies through Packet Header
Data (Net)
Steganography - an Art of Hiding Digital Information
Steganography for FTP through a Proxy Server C# Net
Steganography for Hiding Data in Wave Audio Files C# Net
Structure and Texture Filling-In of Missing Image Blocks in Wireless
Transmission and Compression Applications /Java
subsequently implementing a GUI Providing a certain useful functionality
Task Management System
TCP/IP Pocket Controlling Monitor Java
TCPIP Chat client server Using C# C# Net
Tele communication System
Telecontrolled Utilities
Testing Tools
Text Editor for Linux Platform
Text to Speech conversion
Text to Speech Technology
Textile Web Services ASP Net
The Application of Stock Technology
The Complete Personal Mobile System
The Effect of Pairs in Program Design Tasks (Net)
The File Digest program and the C++ implementation of some Message-Digest
algorithms VC++
Time Table Information System
To Coordinate Collaborative Software Development Based on SDLC Models
Tool For Network Auditing(ping and Port Scanning, TCP/IP Finger printing
Towards Evaluating Lexico-Semantic Networks
Trainee Management System VB Net
Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH
Triple crypt Using Vector Displacement Algorithm
Trustworthy Computing under Resource Constraints with the DOWN policy (Net)
Type systems and applications to safety.
Type systems and it's application to safe and efficient code.
Upware (Packet Analyzer, IPFW, IPRTR )
Using a multitude of experts in time series forecasting
Using Genetic Algorithms for testcase generation for finite state machines
Using Multiple Decomposition Methods and Combining a Multitude of Experts
Using Trigonometry and Pythagoras to Watermark an Image C# Net
Utilities to Compressess, Decompressers and Split Merge Files
VB Net Smart Mail Transfer Protocol VB Net
Video Conferencing with Multicast Support
Video Steganography Using Mobile Simulation JME
Virtual Class Room
Virtual Routing Network Emulation Frame Work
Voice Chating & Voice Mail
Voice Controlled application
Voice Organization
Wallpaper Changer Utility VB Net
We - Crm (Custember Relationship)
Web + Mail Crowler
Web application
Web based academic monitoring system
Web Based Administration of Lunix Sever
Web based Application for Multiple Clients
Web based Linux Administration
Web based Named Entity Recognition
Web Based Proxy Sever
Web Enabled Opinion Poll System For NITC
Web Monitoring for Lightweight Devices
Web Server
Web Services ASP Net
Web-Based Library Management System
Webified Irc (Internet Relay Chat)
Webopedia (Web Sever)
Win Application for Word Processing VB Net
Windows Management Instrument (WMI) Net VB Net
Windows Management Instrumentation WMI Implementation C# Net
Windows Multi File Search utility VB Net
Wireless Application Protocol
Wireless Search Engine
Wireless Security
Wireless Traffic Viewer Using JME JME
Wireless Voice Over IP
Word Sense Disambiguation Engine for Multiple Languages
Work Flow Management System ASP Net
Workflow Mining: Discovering Process Models from Event Logs /Net
XML Data Stores: Emerging Practices /Java
XML Enable SQL Server Java
XTC, a Practical Topology Control Algorithm for Ad-Hoc Networks /Java
Yarn Quality Management System
Accident prevention system for hairpin bend zone
Accurate Anomaly Detection Through Parallelism
Active Learning Methods for Image Retrieval
Acturial projection system
Advance IP Traceback Scheme
Advance vehicle and highway management system
Advanced Computer Cluster Architecture
Advanced public bus transportation system for India
Aggregate queries on uncertain results of data integration systems
Agile/Generic/Agent-oriented programming
All in One Steganography
Anomaly Detection/One-Class Classification Algorithm
AntiSqlFilter-Blocking SQL Injection Hacker Attacks
Application of Geometric invariants in finding structural properties in
biological molecules
Applications and network vulnerabilities
Automatic Java Media Manager
Automatic Medicine Announcement System
Autonomic Computing and Self Healing Systems
Barcode Capture and Recognition for EAN Barcodes Using Cell phone Camera
Biological data management
Biotechnologies/Bioinformatics/Biometrics/Biomedical systems
Using Multitude of Time Series Forecasting Models to Improve Forecast
Building a Distributed Computing Environment in KreSIT
Building Cluster Environment For Interactive Users.
Building VoIP over DEP Network
Business Card Manager
Business continuity and availability
Business process integration and management
Bypassing Vista USA and correctly launching interactive process from a windows
service.
CAPTCHA
Chaos based Encryption for a Structured Video Codec
Characterization of JVM
Code Database Servers-A Centralized Compiler Architecture
Code Review Tool Using Existing Third Party Implementations
Cognitive science and knowledge agent-based systems
College management system
Collision-free tag reading mechanism for RFID Network with Mobile Readers.
Color Image Segmentation
Compression in Flash-based Databases
Computational biochemistry
Computational Geometry in Drug Design
Computer graphics and animation
Computer modeling/simulation
Congestion Window Control
Consumer accessibility appliances and services
Consumer trust in digital society
Consumer-oriented devices and services
Consumer-oriented digital economics
Consumer-oriented e-commerce
Content Cognizant data dissemination
Contention Window Differentiation Mechanism for providing QoS in 802.11
Context-aware and self-management systems
Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers
Performance Analysis of Telephony Routing over IP
Control and monitoring systems
Control Setting of Unified Power Flow Controller Through Load Flow Calculation
Counting Bloom Filters for Pattern Matching and Anti-evasion at the Wire Speed
Cryptography and algorithms encryption
CSI-KNN-based Intrusion Detection System
Customer Support Protocol
Data Recovery In Ext2 files system and Adding secure deletion to your favorite
file System
Database In Smart Cards
Data-centered information systems
Decision support systems
Dedicated Short range road side communication for vehicles
Deduplication and Soft matching
Design and Deployment of a Reliable File Transfer Protocol over Asymmetric
Satellite Networks
Code Generation for Lazy Functional Languages
Design and Deployment of a Transfer Control Protocol over Asymmetric Satellite
Networks
Design and Evaluation of an IEEE 802.11 Based Dual MAC for MANETs
Design and Implementation of RSVP-TE over MPLS Emulator
Design and Implementation of Traffic Engineering Extensions for OSPF
Design considerations for computer-telephony application programming interfaces
and related components
Design of Multi-threaded Label Distribution Protocol for MPLS Emulator
Desk FM Monitor
3D View Morphing
Learning Paths for Information Extraction
Detection of recurring patterns in protein structure by superimposition and
geometric hashing
Developing port scanning and detection system
Developing wireless components
Development of an API for using SMS as transport layer.
Development of basic TGREP simulator
Development of Customer relationship Management System to increase Sales
Development of LBX: Low-Bandwidth X
Development of Orchestration Server based on BPEL4WS standard (tentatively named
as "ORCSERV").
Development of QoS enhancement in VOIP applicationDevelopment of QoS enhancement
in VOIP application
Development of simple IP subnet calculator tool
Semi Automatic generation of properties for verification
Protein prediction.
Development of Thin LINUX desktop with or without X
Digital analysis and processing
Digital information processing (Voice/Data/Video)
Digital telecommunications management
Digital video browser and multimedia content search
Dijkstra algorithm for shortest path
Dimensioning Network Links: A New Look at Equivalent Bandwidth
Direct Manipulation Technique for Wireless Networking
Directory Retrieval Using Voice Form Filling Online
DNS based Multihoming
Document Manager
DSP Based Virtual Private Network
Dynamic Adaption of DCF and PCF mode of IEEE 802.11 WLAN
Dynamic Location Strategy for Hot Mobile Subscribers in personal Communications
Dynamic Signature Verification Using Discriminative Training
Dynamic Slicing of Programs
Dynamic Topology Extraction for Component Based Enterprise Application
Environments
E-Banking transaction system and portal for bank officials and customer
e-Business, e-Science systems
E-Campus
E-Commerce related project
Economics of security and protection
Effective Decision Tree Algorithm
Effective Monitoring of Web navigation using Code Check
Effectively Tuning and Optimizing the Database
Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average
Number of Hops
Efficient Causality Tracking in Optimistic Distributed Simulation
Efficient OSPF Based Load Sensitive Routing Algorithm.
Efficient Way To Capturing and sending images and videos from mobile to PC and
Vice-Versa
E-form Application for Employee Management Using Hibernate Vs JDBC
E-Job Card and Timesheet Using Hibernate Vs JDBC
EKNOW: Information and knowledge management
E-learning
Embedded and real-time systems
Embedded Real Time Systems
Embedded Systems for Automobiles
Energy and power systems control
Enhance the Email Performance Through SMTP- New Approach
Enterprise Application Integration
Enterprise Mobile Service Platform Using JMS & J2ME
Entity Recognition on the Web
ERP/CRM
Estimating latencies and buffer requirements in multimedia networks
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication
Systems
ETHEREAL System
Expert systems
Exploiting Local Regularities in Text Segmentation using Conditional Random
Fields
Exploring XUL as a GUI development kit
Factory management system
Fair and dynamic Bandwidth Distribution Architecture
Fast Algorithms for the Modified Discrete Cosine Transform
File System Workload Analysis
Filter Object Framework for MICO - Dynamic Model
Filter Object Framework for MICO - Static Model
Fine-grained symmetric multiprocessor software architecture for TCP/IP stack on
the UNM platform
Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its
Application to Singular-Point Detection and Fingerprint Indexing
Implement SIP call control for voice Telephony.
Flexible Network Monitoring Tool Based on a Data Stream Management System
Forecasting using Genetic Algorithms.
Forecasting using Neural Networks
FPGA implementation of 802.11 MAC.
Framework for cascading Payments in P2P
Framework for Distributed Key Management Schemes in Heterogeneous Wireless
Sensor Networks
Generating Windows Presentation Foundation using templates
Generation of Reliable PINs from Fingerprints
Geographic and spatial data infrastructures
Global Insurance Management System
GNUTELLA client for LINUX
Government services in the context of digital society
GPRS Traffic Performance Measurements
Granite Business management system
Graphic/Image/Photo/Hand-writing analysis and processing
Graphical Search Engine
Grid Computing
Grid Extension Framework for Large Scale Parallel Financial Modeling
GSM Based LAN Monitoring
GUI Front-end for Postgres
Hackers Approach to Improve the A.I. Behind CAPTCHA
Handled and wearable computing and devices
Handover Keying and its Uses
Hardware - Software Codesign using hierarchical Finite State machines
Hedonic and perceived digital quality
Honey Pots- A Security System to Identify Black Hat Community in Networks
Host Based IDS
Human Age Estimation
Human factors in computer systems
Human Head Internal Rendering with Mouth and Text To Speech Synthesizer
Human/Machine interface and man-in-the-loop control
Hybrid Approach to Semi-Supervised Learning
Hybrid Constraint Satisfaction Problem Solver
Hybrid Mechanism for Enhancing the Performance of Streaming Service in D-T MA
Hybrid Model Based Reasoning in Finance
Hybrid Query Expansion
Hybrid wireless-optical broadband access network (woban): prototype Development
and Research challenges
ICT support for collaboration
Image Classification Using Neural Networks and Fuzzy Logic
Image Restoration
Impact of Node Mobility on MANET Routing Protocols Models
Implement Registration Server and Presence Server for SIP.
Implement security framework for P to P file system
Implementation of an ASP based Supply Chain Management System
Implementation of BPCS-Steganography
Implementation of Soil-biotechnology(SBT)
Implementation of Virtual Private Database (VPDmechanism for POSTGRES.)
Imprecision/Uncertainty/Incompleteness in databases
Improve Forecasting Performance Using Decomposition and Combining
Improving performance of large scale data integration systems
Improving RFID System to read the tags efficiently
Incorporating Quality Considerations into Project Time/Cost Tradeoff Analysis
and Decision Making.
Indian Internet Tomography
Information ethics and legal evaluations
Information Extraction
Information Extraction using a Database
Information Hiding Using Fractal Encoding
Information management systems
Information Retrieval
Information Retrieval SMS Server
Information technologies
Information Theoretic Text Similarity Measurement Using Approximate Word Sense
Disambiguation
Informational mining/retrieval/classification
Insurance Management System
Integrated Case Based Reasoning And Rule Based Reasoning for Insurance
Intelligent Call Routing & Management using IVR in Asterisk Server
Intelligent Dictionary Based encoding Algorithm for data compressing for High
Speed Transformation Over Internet
Intelligent Greenhouse
Intelligent Multi-sensor System for Control of Boilers and Furnaces
Intelligent user interfaces
Interaction in smart environments
Interactive Deduplication using Active Learning
Interactive Multiplayer Mobile Games Using Bluetooth
Intranet Based Email System
Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile
Devices Using the J2ME technology
IP Spoofing Detection Approach (ISDA) for Network Intrusion Detection System
J2ME end-to-end security for M-commerce.
Java Dynamic Data Viewer
Java SIP Signaling Comptroller
Job portal
Knowledge acquisition, processing, and management
Knowledge data systems
Knowledge for global defense
Knowledge modeling and virtualization
LAN Based Bit Torrent
Learning relevance order over graphically linked objects
leave planner
Library management system
Linguistic knowledge representation
Linux Clustering
Load Balancer in client-server architectures
Log browser
Low Bit Rate Speech Coding
Low cost affordable raid storage
MAC Layer Scheduling in Ad-hoc Networks
Management and control
Matchmaking website
Maximum Confidence Hidden Markov Modeling for Face Recognition
Measurement Based Performance Characterization of Software Servers
Media Handling for Multimedia Conferencing in Multihop Cellular Networks
Medical management system
Middleware for group communication in hybrid network.
Mobile Based Software Inspection
Mobile consumers and interactive spaces
Mobile learning and communications
Mobile TV and IPTV
MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks
Model Checking of Software Components: Combining Java Pathfinder and Behavior
Protocol Model Checker
Motion Detecting System
Multicast Application and Approach to Security issues using key management
Multi-criteria decision theory
Multi-input Fuzzy Logic Controller for Brushless dc Motor Drives
Multimodal and interactive interfaces
Multi-threaded Label Distribution Protocol for MPLS Emulator
Nanotechnologies/Systems-on-the-chip/Networks-on-the-chip/ Haptic phenomena
Natural language processing / robust processing
Network Anomaly detection and classification via opportunistic sampling.
Network based Gaming Server.(NGS)
Network Simulation Creator and Animator/NAM Enhanced Simulation Animation (NS2)
Neuronal networks/Fuzzy logic/Temporal logic/ Genetic Algorithms
New Adversary and New Threats: Security in Unattended Sensor Networks
NOT AVAILABLE DEP networking (title yet to be decided)
NOT AVIALBLE Data Mining
NOT AVIALBLE Data Mining (title yet to be decided)
Object Based Video Segmentation
Object-level Partitioning of Applications
OMR Sheet Reader
On supporting Design evolution and treaceablity
On the Performance of Ad Hoc Networks with Multiuser Detection, Rate Control and
Hybrid ARQ
On-demand business transformation
Online book shop management system
Online bug tracking and customer support system
Online call logging and customer support system
Online consumer decision support & advertising
Online Employee Time Management System
Online health care system
Online matrimonial system
Online Video/Audio Conference
Open and distance education systems
Text Watermarking Algorithm based on Word Classification and Inter-word Space
Statistics & Multi word features
Optimal Router Buffer Size
Optimization and information technology
Optimization on postgres optimizer
Optimizing the evaluation of complex similarity predicates on large datasets
Organizational information systems
Web Based Artificial Intelligence Simulations
Circular Target Detection and Pattern Detection
Overload Control of Web Services with SEDA
P-AODV: Extension of AODV for Partially Connected Ad Hoc Networks
Parallelizing XML Processing Pipelines via Map Reduce
Pattern recognition / Computer vision
Patterns/Anti-patterns/Artifacts/Frameworks
Payroll information system
PCI Interface to Wireless LAN
Peer To Peer Secure Internet Telephony (SIP)
Performance Analysis of IEEE 802.16 MAC
Performance Evaluation and Modeling of Servlet Containers
Performance Study of Infiniband Based Cluster
Pervasive and ubiquitous systems
Physical Implementation and Evaluation of Ad Hoc Network Routing Protocols using
Unmodi ed Simulation Models
Polyphonic Wizards
Power Aware duty scheduling in Wireless Sensor Networks
Power Flow Control with UPFC
Pragmatic general multicast
Process Monitoring System
Productivity Enhancement tool for Animation industry
Program verification/validation/correctness
Programming languages and supporting tools
Project Management System
Publish-Subscribe systems for P2P Networks
Pure Optical router for Optical routing without electronic intervention
Self-addressable Memory-Based FSM: a Scalable Intrusion Detection Engine
Push Vs Pull: Quantative Comparison for Data Broadcast
QOS Architecture for Mobile Nodes
QoS based Routing Algorithms in Internet
QoS in Wireless Networks
Application of Mobile Agent Systems to First Responder Training With Flexibility
Quality of Resilience as a Network Reliability Characterization Tool
Quality of Service Provisioning in IEEE 802.11 Wireless LANs
Quantum Key Distribution for 3rd party authentication
Quicklook approach to IDS
Rapid Internet attacks and network
Real native and persistent layer for Java & .Net
Reasoning models/Model checking/Modular reasoning/
Receiver feedback based rate adaptation of multimedia sources.
Reconfigurable Packet Classifier
Reconfigurable Scheduling Co-Processor
Recurring Functional Sites in Protein Structures detected with allowance for
Substitution of Amino Acids.
Robust Spanning Tree Topology for Data Collection and Dissemination in
Distributed Environments
Remote Service Monitor.
Remote Switching Control System for Home Appliances
RFID based car parking system
RFID reader enabled mobile with environment alert and mobile tracking
RFID Security
Rich Internet Application Using Flux Frame for Managing Workflow in healthcare
domain
Risk Homeostasis and Network Security
Robotics/Mobile devices/ Mobile networks
Robust Distributed Speech Recognition using Speech Enhancement
Ann Based Control Patterns Estimator For UPFC Used In Power Flow Problem
Robust HTML to DOM conversion and applications
Role Based Access Control
Route Repair in Mobile Adhoc Networks
Satellite Image Processing.
Scalable Urban Network Simulator
Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad
hoc Networks
Secure Mobile Agent System Model Based on Extended Elementary Object System
Secure Mobile Banking & Security Issues
Secure Routers
Secure Update Semantics in XML databases (Area)
Security in network, systems, and applications
Security Issues in Mobile Agents
Self-monitoring, self-diagnosing, self-management systems
Semantic WEB
Semi Supervised Information Extraction Using Hidden Markov Mode
Semiotic engineering of online services
Sequential switching for industrial application
Services in Converged Network (Value-Added Services)
Session Initiation Protocol (SIP) in Java
Short Term Load Forecasting
Signal Processing Module for the Analysis of Heart Sounds and Heart Murmurs
Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion
Detection
Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks
Simulation Study of BlackHole Attack In MANET: Detection and Prevention
Simulation-based Comparisons of Tahoe, Reno, and SACK TCP
Slicing of Synchronous Programs
Smart and digital homes
Smart consumer appliances
Smart System for Remote Monitoring of Patients and SMS Messaging upon Critical
Condition
Software as a service
Software development and deployment
software life cycle maintainer
Software robustness for digital society
Software specification and design methodologies
Measurement and management systems
Soundbox: A Graphical Interface to Digital
Source code management (like Rational Clearcase)
Spectral methods for Graph Partitioning
Speech enable appliances
Speech recognition and processing
Statistical Learners for Information Extraction:An Empiricial Approach
Statistical models for Information Extraction from webpages
Statistics Based Design of MAC Protocols with Distributed Collision Resolution
for Ad Hoc Networks
Streaming in Networks
Synchronization Specifier and Presenter for Authoring System
System advanced paradigms
Tackling the exposed node problem in IEEE 802.11 MAC
Mobile devices and biotechnologies
Tax management system
TAX: Tree Algebra for XML Implementation
T-Blogger
Telematic Application - Global Position Aware Vehicle
The Impact of Loss Recovery on Congestion Control for Reliable Multicast
Tools for comparative analysis of extraction algorithms
Topology-Aware Failure Diagnosis For Distributed Enterprise Systems.
Traffic Engineering Extensions to OSPF
Treating Patients Diabetes Using Mobile and PC
Trust, privacy, and safeness
Two-Rule-Based Linguistic Fuzzy Controllers
Unified Log-Based Relevance Feedback Scheme for Image Retrieval
UPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink Programs
Use of wavelets in Forecasting
User Interfaces for Web Applications
User-centric information systems
Utility-Based Incentive Scheme for P2P File Sharing in MANETs
Vehicle Driver Rating System
Vehicles with Intelligent Systems for Transport Automation
Vehicular navigation and control
Verification of Communicating Reactive State Machines
Verifying Delivery, Authorization and Integrity of Electronic Messages
Personal information management
Video over variable bandwidth links
Video Streaming in Wireless Environments
Virtual classroom
Virtual reality/3D graphics/Games
Usability, aesthetics, and accessibility
Virtual University
Visual Layout Driven Information Extraction from Websites
Visualization and Analysis Tool for NS-2 Wireless Simulations: iNSpect
Voice message transfer using Personalised Repository based Speech-Coding
techniques
Voice Over IP
VoIP over wireless network
Water Marking Relational Databases Using Optimization technique
Wearable devices
Web Application Server Development Using SMS
Web Attacks Alerter Using Feature Extraction and SNORT
Web Based help desk
Web Monitoring for Lightweight Devices
Web-based presentation of Soil-biotechnology (SBT)
Webcam Image Tracker.
Why Disks fail in India and what can be done about it
WiMax MAC over WiFi PHY for rural communication
Wireless Data Traffic Decade of Change
Without Load Balancing in MANET: Single Path Routing Vs. Multi Path Routing
Without packet Reordering dynamic load balancing
WorkFlow Management System
XML agents in Smart Cards
Zero-knowledge systems
Active Learning Methods for Interactive Image Retrieval
Active Queue Management for Fair Resource Allocation in Wireless Networks
Active Source Routing Protocol for Mobile AD-HOC Networks
Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
Adaptive Programming Model for Fault-Tolerant Distributed Computing
Adaptive Security and Authentication for DNS System
Advertisement Posting Website ASP .Net
Agent Based Intrusion Detection, Response and Blocking using signature method in
Active Networks
Apartment Management System
Application of BPCS steganography to wavelet compressed video
Artificial intelligence network load balancing using Ant Colony Optimization
ASP .Net Project Titles
ATM Networks for Online Monitoring System
Auction System
Authenticating Network Attached Storage - IEEE
Automatic Dependent Surveillance-Broadcasting
Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless
Networks
Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
Benefit Based Data Caching In Ad Hoc Networks
BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
Building Intelligent Shopping Assistant using Data mining technique for Web
Services
Bulk Billing System
C# MP3 Compressor
CAC Connection Admission Control using ATM Networks Implementation
Call Center Management System
Clinical telemedicine
COACS: Co - Operative and adaptive caching system for MANETs
Color imaging and multidimensional projections
Computer vision and resolution
Computerized Information Software
Controlling IP Spoofing Through Inter Domain Packet Filters
Convolution Filter
Convolution Filters
Credit Card Fraud Detection Using Hidden Markov Models
Crypt kit A real time cryptographic system for security over the networks - IEEE
Cryptographically Using Secure Server/Client Protocol
CVS Root File Changing Utility
Data Minimization And Storage Using XML Enable SQL Server
Data mining implementation for Credit Cards Application Processing System
Data Security in Ad hoc Networks Using Multi Path Routing
Database Schema Comparison Utility C#
Databases and mobility in databases
Defect Tracking Tool - Enterprise Project and Defect Tracking System
Designing Less - Structured P2p Systems for the Expected High Churn
Digital Image Processing with Multi Domain Approach
Digital libraries
Digital Signature Verification using Artificial Neural Networks / Digital
Signature Verification
Digital Steganography: Hiding Data within Data
Digital Water Marking For Video Piracy Detection
Displacement filters, including swirl using GDI+
Distributed and Scalable Routing Table Manager for the Next Generation of IP
Routers
Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
Distributed cache updating for the Dynamic source routing protocol
Distributed Component Router Based CRM Customer Relationship Management
Distributed Component Router based Supply Chain Management System SCM
Distributed Data mining in Credit Card Fraud Detection Analysis
Distributed Database Architecture for Global Roaming in Next-Generation Mobile
Networks
Distributed Node Migration by Effective Fault Tolerance
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
Dynamic Character & Pattern Recognition using Neural Networks
Dynamic Control for Active Network System
Dynamic Signature Verification Using Pattern Recognition
Dynamic University Linking & Data integrity Maintenance
E“Secure Transaction Design & Implementation
Edge Detection Filters
Effective Packet Analyzing and Filtering System for ATM Network
Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat
Structuring Elements
Efficient and Secure Content Processing and Distribution by Cooperative
Intermediaries
Efficient Association Rule Mining Algorithm In Distributed Databases
Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
Efficient Contiguous Data & Video Streamer with Buffer Management
Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular
Networks
efficient message digest algorithm (MD) for data security
Efficient Resource Allocation For Wireless Multicast
Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy
Case
E-HealthCare - Distributed HealthCare and A Strategic Management System
Electronic Fund Transfer
Electronic imagery and visualization frameworks
Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation
for MANET
E-Logistics for Warehouse Management - Implementation of Authenticated and
Dynamic Logistics Support System & Management
E-Mail Server Using Multithreaded Sockets
Embedding in Video Steganography
Employee Management System
Encryption and Decryption technique for secure communication in WLAN
E-Recruitment System - Dynamic Online Professional Recruitment & Management
System
ERP Application integrated Enterprise Solutions with Strategic advantages
ERP for Leather Company
ERP for Small Business
E-Sales Order Processing System
Estimation of Defects Based On Defect Decay Model: ED3M
Evaluating the Performance of Versatile RMI Approach In Java
Face Recognition Using Laplacian faces
Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
File Encryption and Encrypted text embedding in an image
Find and Replace utility
Flood Fill Algorithms in C# and GDI+
FTP Explorer
Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under
Information Provision
Genetic Algorithm Based Train Simulation Using Concurrent Engineering
Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
Geometric Approach to Improving Active Packet Loss Measurement
GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video
Streaming Over Error-Prone Networks
Grid information Retrieval System
Hardware enhanced association rule mining with Hashing and Pipelining
HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
Hiding binary data in HTML documents
Hiding Messages in MIDI Songs
Hiding messages in the Noise of a Picture
High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural
Networks
Homogeneous Networks & Control Implementation
Homogenous Network Control and Implementation
Hopfield model of neural network for pattern recognition
Hotel Management System
HTML Editor
Human Resources Management System
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous
Internet Episodes (HIDS)
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous
Internet Episodes(HIDS)
Image Compression and Analysis with MSE & PSNR Technique - IEEE
Image Converter 2005
Image Processing
Image Processing for Bilinear Filters and Resizing
Image Processing for Convolution Filters
Image Processing for Edge Detection Filters
Image processing for HSL color space
Image Processing for Per Pixel Filters using GDI+
Image Processing Techniques for the Detection and Removal of Cracks in Digitized
Paintings
Image Rendering for Grid Technology
Image Stream Transfer Using Real-Time Transmission Protocol
Image Water Marking and Combustion
Imaging interfaces and navigation
Incremental deployment service of Hop by hop multicast routing protocol
Industrial systems
Integrated Development Environment using JSWING IDE JSWING
Integrating Speech Engine with Web Navigator
Intelli WAP System Implementation / WAP based information Retrieval System
Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
Internet History Viewer
Internet imaging localization and archiving
Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
Intrusion Detection Prevention And Trace back Systems
Inventory Manage System
Inventory System
ITP: An Image Transport Protocol for the Internet
J2EE Project Titles
J2me Implementation of POP3 Client System / J2ME Mail Client Server
Implementation / Mail Downloader Using J2ME
J2ME Mail Client Server
J2ME Project Titles
Java Network File Sharing System
Java Productivity Aids
Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log
Reader
Java Visual Editor with Compiler
Job Order System
Library Management System
Localized Sensor Area Coverage With Low Communication Overhead
Location Aided Routing for Mobile Ad-Hoc Networks
Location Aided Routing in Mobile ADHOC Networks for Secured Routing
Location Based Spatial Query Processing In Wireless Broadcast Environments
Material Forecasting and Management Solution
Medical image processing
Membership Management System
Memory Learning Framework for Effective Image Retrieval
Message Digest
Messaging Service over TCP/IP in Local Area Network
Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
Mobile Agents In Distributed Multimedia Database Systems
Mobile Bank
Mobile Banking Design & Implementation - IEEE
Mobile Information Provider
Mobile shop shopping cart System
Modeling & Automated Containment of Worms
Monitoring And Managing The Clusters Using JMX
Multi Router Traffic Monitor Implementation
Multi Router Traffic Monitoring System
Multi Server Communication In Distributed Management System
Multicast Live Video Broadcasting Using Real Time Transmission Protocol
Multicast Routing With Delay and Delay Variation Constraints For Collaborative
Applications On Overlay Networks
Multithreaded Chat Server
Multithreaded Peer to Peer Communication using Distributed Frameworks
near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic
algorithm
Network Analyze
Network Analyzer
Network Analyzer & Network Monitoring Tool using SNMP
Network Border Patrol for Congestion Collapse Preventing System
Network Border Patrol Preventing Congestion Collapse
Network border patrol: preventing congestion collapse and promoting fairness in
the Internet
Network Component for XML Migration
Network Packer Sniffer Implementation
Network Security System in DNS using AD-HOC Networks
Network Traffic Anomaly Detector
Network Traffic, Packet Analyzer and Sniffer
Neural Network for Recognition of Handwritten and Digits
Neural Network for Recognition of Handwritten and Digits Backpropagation
Neural Network-Based Face Detection
Neural Networks for Handwriting Detection System Using Brain Net
Neural Networks for Handwritten character and Digits
Neural Networks for Unicode Optical Character Recognition
New Model for Dissemination of XML Content
Noise Reduction by Fuzzy Image Filtering
Novel Framework for Semantic Annotation and Personalized Retrieval of Sports
Video
Novel Secure Communication Protocol for Ad Hoc networks [SCP]
OCGRR: A New Scheduling Algorithm for Differentiated Services Network
ODAM: An Optimized Distributed Association Rule Mining Algorithm
On Guaranteed Smooth Switching For Buffered Crossbar Switches
Online Bank
Online Book Shop
Online Customer Care
Online Fashion Studios
Online Handwritten Script Recognition
Online Handwritten Script Recognition - IEEE
Online Index Recommendations for High-Dimensional Databases Using Query
Workloads
Online Issue Tracking - Project Management Solutions
Online Quiz
Online Shopping
Online Voting System
Online Web shop
Optimal Cryptographic Technique
Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing
Protocol (AMRoute)
Optimal Multicast Routing in Mobile Ad-Hoc Networks
Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A
High Capacity Approach
Patient Care System
Patient Management System
Peer to Peer Messaging System using JXTA
Peer-To-Peer Messaging
Performance Evaluation of DISTANCE Routing Algorithm in MANET
Performance Evaluation of RMI
Performance of a Speculative Transmission Scheme for Scheduling Latency
Reduction
Personal Authentication Using 3-D Finger Geometry
Personal, adaptive, and content-based image retrieval imaging
Precise Termination Condition of the Probabilistic Packet Marking Algorithm
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic
Algorithm
Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
Probabilistic Packet Marking For Large Scale IP Trace Back
Property Management System
Protection of Database Security via Collaborative Inference Detection
Protocol Scrubbing: Network Security Through Transparent Flow Modification
Proxy Server - Design and Implementation
Public Key Validation for DNS security Extension
Public Key Validation For DNS Security Extensions
Public Key Validation for DNS Security Extensions Domain Naming Server
Query Routing Optimization In Sensor Communication Networks
QUIVER: Consistent Object Sharing For Edge Services
Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
Reading and Writing AVI files using steganography
Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through
Multigrade Security
Reduction of Network Density for Wireless Ad-Hoc Networks
Remote Computing using Thin Clients
Remote medicine and Internet
Reputation Based Trust Model for Peer to Peer eCommerce Communities
Retrieving Files Using Content Based Search
Retrieving Files using Content Based Searching and displaying them in Carousel
View
Retrieving Files Using Content Based Searching and presenting it in Carousel
view
Routing and Security in Mobile Ad Hoc Networks
RTF to XML Converter
Safety in telemedicine
Sales and Purchase Management System
Scalable and Efficient End-To-End Network Topology Inference
Scalable Wireless Ad-Hoc Network Simulation using XTC
Screen capture Utility
Scribe Automation
Secure Data Hiding and Extraction Using BPCS
Secure Optimal Cyclic Cryptographic System
Secure Password-Based Protocol for Downloading a Private Key - IEEE
Secure Routing Protocol for mobile Ad-hoc Network
Securing Image URL
Securing User-Controlled Routing Infrastructures
Security In Large Networks Using Mediator Protocols
Selective Encryption of Still Image
Send SMS To Cell Phone Through SMTP Mail
Shortest Node Finder In Wireless Ad-Hoc Networks
Signature Based Indexing Method for Efficient Content Based Retrieval of
Relative Temporal Patterns
Smart Knowledge Provider
Static Image Hand Gesture Recognition using Neural Networks
Statistical Techniques for Detecting Traffic Anomalies through Packet Header
Data
Steganography for FTP through a Proxy Server
Steganography for Hiding Data in Wave Audio Files
Structure and Texture Filling-In of Missing Image Blocks in Wireless
Transmission and Compression App
TCPIP Chat client server Using C#
Tele cardiology
Tele pathology and digital imaging
Tele rehabilitation
TELEMED: Telemedicine and eHealth
Telemedicine and tele health
Telemedicine portals
Telemedicine software and devices
Temporal Portioning of Communication Resources in an Integrated Architecture
Textile Management System
Textile Web Services
The File Digest program and the C++ implementation of some Message-Digest
algorithms
Towards multi model interfaces for intrusion detection - IEEE
Trainee Management System
Trustworthy Computing Under Resource Constraints With The Down Policy
Truth Discovery with Multiple Conflicting Information Providers on Web
Tutoring systems
Two Techniques for Fast Computation of Constrained Shortest Paths
Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented
Systems
Using Trigonometry and Pythagoras to Watermark an Image
VB .Net Smart Mail Transfer Protocol
Video Steganography Using Mobile Simulation
Video techniques for medical images
Virtual Private Network
Virtual telemedicine
Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded
Structured Light
Voice Enabled Smart Browser
VOIP Flexible & Efficient Voice Communicator, Voice Over IP
VVoIP Voice with Video Over IP Networks
Wallpaper Changer Utility
Watermarking Relational Databases Using Optimization Based Techniques
Wavelet Based Compression and Decompression Using Steganography
Web Based Content Management System
Web Services
Win Application for Word Processing
Windows Management Instrument (WMI) .Net 2005
Windows Management Instrumentation WMI Implementation
Windows Multi File Search utility
Wireless telemedicine
Wireless Traffic Viewer Using J2ME
Work Flow Management System
Workflow Mining: Discovering Process Models from Event Logs
XML Enabled SQL SERVER
XTC Algorithm based Scalable Wireless AD-HOC Networking
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
A Distributed Database Architecture for Global Roaming in Next-Generation Mobile
Networks IEEE
Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS
Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management
Advanced Host Monitor Enterprise
Advanced instant Messenger & Message Broadcasting
Agent-Based Testing for Web Application
Allocating Applications in Distributed Computing using JINI
Analyzing Network Traffic in order to Detect possible Intrusions by RED
Algorithm
Anteater-A Service Oriented Architecture for High Performance Data Mining
Anti-phishing Strategy Based on Visual Similarity Assessment
Application Installer
Asp web traffic analyzer
ASP.net Ad Agency Project
ASP.net Ad Release Management
ASP.net Bank to Customer Internet Banking Solution
Asset Management Solution (AMS)
Asynchronous Server Interaction using AJAX and XML
Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to
Avoid Traffic & Congestion
ATM Card & CMS application Back Office Management
Authenticating Network Attached Storage - IEEE
Authentication of Digital Images by Encryption and Decryption with Primary Key
Implementation using LSB Algorithm and Steganography
Bandwidth Congestion Control using Authentication Service for Automatic and
Dynamic Reconfiguration System
Bluetooth based Mobile Phone Photo Browser
Bluetooth equipped mobile phones to support synchronous interaction with public
displays
Bug Tracking System - Comprehensive Bug Tracking & Change Management
CAC Connection Admission Control using ATM Networks Implementation
Call Centre Management System
CALTOOL Computer Aided Learning Tool
Career tracer - communicator between job seekers and job providers
Cargo Tracking System Design & implementation
Client FTP Frame
Communication Systems
Complete email system with an email server and an email client
Component based Architecture for WAP Compliant Transactional Services
Components Framework for Developer Network using MVC Pattern
Computer Resource Management System (CRMS)
Computerized system for Extracting Abstract from the given source document,
Abstract solutions
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP
Updates
Content management systems (CMS) for University & Education portal
Context Oriented Search Engine with Web Crawler
Control System for the Maintenance of Computers
Converting RTF into XML using the TEI Lite DTD
Credit card system - web-based system facilitates on line operations
CRM based Sales of Fleet & Services Management
Cross-Layer Optimization in TCP/IP networks
Crypt kit A real time cryptographic system for security over the networks - IEEE
Cryptography
Data and Video Streaming System
Data Communication and File Transferring using Decreased Latency and Block
Tracker
Data Encryption and Compression System with Optimization
Data Hiding in Audio Files with PBE Encryption
Data Mining
Data Security in Ad hoc Networks Using Multipath Routing
DDE Thin Client Midlet for Limited Devices using Java Communication
Dealership Management System - Dealers information & Dealings Process Manager
Defect Tracking Tool - Enterprise Project and Defect Tracking System
Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server
Denial of Service against the Domain Name System
Design & Development of a Distributed, Scalable File Sharing & Access System
with Security
Design & Implementation of Online Bidding & Auction
Designing Test Automation System using Native System Input Events
Development of Web enabled Online, Dynamic ATM Card Management System
Digital Image Processing Frequency Domain
Digital Image Processing Time Domain
Digital Image Processing with Multi Domain Approach IEEE
Digital Rights Management (DRM) using SOAP
Digital Signature Verification using Artificial Neural Networks
Digital Signatures System Design & Implementation
Digital Water Marking for Video Piracy Detection
Distance Learning System Implementation
Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
Distributed Database System for online Shopping & Store
Distributed Cache Updating for the Dynamic Source Routing Protocol
Distributed Channel Management System
Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic
Peer Groups
Distributed File Sharing System for Peer to Peer Network
Distributed Token Circulation in Mobile Ad Hoc Networks
Distributed Web Service for On-Line Coursework Submission
Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
Document Archival Management System Electronic Archival Design
Duplex Messaging for Enterprise Systems
Dynamic Character & Pattern Recognition using Neural Networks
Dynamic College information System & Data integrity Maintenance
Dynamic Server Replication System
Dynamic Load Balancing in Distributed Systems in The Presence Of Delays A
Regeneration Theory Approach
Dynamic Signature Verification Using Pattern Recognition
EAI Approach Implementation of EAI in Hotel Management System
E-Boutique - web portal design and implementation
eCareer & Consultancy Service Online
E-Commerce Shopping cart for B2B Implementation
Effective & Efficient Freight Management System
Effective Packet Analyzing and Filtering System for ATM Network
Efficient Contiguous Data & Video Streamer with Buffer Management
Efficient Monitoring, Managing, Detection of Networks & its Components using
SNMP Protocol
Efficient Network Routing Protocol with Effective Data Transfer without Packet
Loss Over the ADHOC Networks
eGovernance Design & Implementation System
EJB Implementation Of Distributed Online Stock Maintenance and Trading
E-Learning - web portal design and implementation
Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation
for MANET™S - IEEE
E-Mail & SMS Assistant Design & Implementation
EMail Server Using Multithreaded Sockets
Embedding in Video Steganography
Employee Profile Management System An Effective Employee Management Resource
Employee Training Tracking System
E-Music web-based design system provides online Music
Enterprise Mailing System validation with DNS query using MX Records
ER Schema Analyzer with Data Streaming
ERP & CRM, An Effective implementation of ERP with CRM Solutions
eSearch - A Search Engine Design & Implementation
eSearch - Web based search engine
ESecure Transaction Design & Implementation
eTutor - Online Tutorial, revolutionizing the tutoring industry
Evaluating the Performance of Versatile RMI Approach in Java
Exam Scheduler in ASP.net
Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols
Fast Algorithms for Mining Association Rules
File Transfer Protocol - FTP Implementation
Monitoring & Managing the Clusters using JMX IEEE
Financial Accounts - Integrated Financial Accounting Solutions
Fine Grained Layered Multicast using STAIR
Fire wall - Customized Firewall for internet security & inter-network traffic
gateway
Fully Distributed Proactively Secure Threshold Multi signature Scheme
Genetic Algorithm Based Train Simulation Using Concurrent Engineering
Graphical Network Browser
Grid Computing
Grid information Retrieval System
Heterogeneous Networks Control and Implementation
Hierarchical Modeling and Analysis for Grid Service Reliability
Homogeneous Networks & Control Implementation
Homogenous Network Control and Implementation
Honey Pots A Security System to Identify Black Hat Community in the Networks
Hospital Management system
HR Consultancy and Applicant Database Management with XML
Human Resource Management Solutions (HRMS)
Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous
Internet Episodes
Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile
Ad Hoc Networks
Image Compression and Analysis with MSE & PSNR Technique IEEE
Image Compression and Decompression using Huffman™s
Image File compression & Transmission across the Network by MDA (Message Digest
Algorithm)
Image Manipulation for Face Recognition
Image Processing
XTC Algorithm based Scalable Wireless AD-HOC Networking IEEE
Image Rendering for Grid Technology
Image Stream Transfer Using Real Time Transmission Protocol
IMAP - Internet Mail Access Protocol using Internet Engineering Task Force
Implementation of Broadcast Messaging System using Multi Threading
Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and
Administration in IP Network
Implementation of Packet Filtering Firewall in Linux Systems
Implementation of Peer-to-Peer Communication System with a Centralized Name
Server in Linux Network
Implementation of Secured & Encrypted Data Transmission over the Web
Implementation of Security Kernel and Firewall using Java
Implementation of Wireless Application Protocol Gateway in Mobile Network
Implementation of Wireless Communication Gateway for PC To Mobile Network Route
using Internet Protocol
Information Forensics and Security
Insertion of Links of navigation into the Web Pages
Instant Messaging and Presence Technology for College Campuses
Instant Smart Messenger System
Insurance System, Online Insurance Solutions Provider
Integrated & Distributed Enterprise Resource Planning with Customer Relationship
Management Support
Integrated Data Persistence & Synchronization in PDA™s
Integrated Mail Transfer Agents using JAF
Integrating Data and Voice Networks - VoIP
Intelli Mobile Banking System Design & Implementation
Intelli Shopping Cart & Assistant System
Intelli WAP System Implementation / WAP based information Retrieval System
Inter Office Messaging System IOMS, Office Automation System
Internet Banking Project in ASP.net
Intranet Mailing System design and implementation
Intranet Transformation of Voice with Data using Voice Over Internet Protocol
(VOIP)
Intrusion Detection in Wireless Ad-hoc Network
Investigation and Analysis of Packets Transformation in an Ethernet Network
System
Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions
J Chat A Chatting System over the Internet or local networks
J2EE based Quick Car Rental Services Implementation
J2me Implementation of POP3 Client System / J2ME Mail Client Server
Implementation / Mail Downloader Using J2ME
Java based Spam Filter implementation
Java Grid Using Grid Computing System
JAVA J2ME Bluetooth based Application for PDA / Mobile Devices
Java Network File Sharing System
Java Network Flow Analyzer
Java Network Monitor / Java Network Browser
Java RMI-based application which manages load balancing on heterogeneous
clusters
Java SMTP, POP, Web Email Server
Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request
Java Visual Editor with Compiler
Java-to-XML Data Binding tool
JChart for complex business & scientific charts
JEDITOR - Customized Java Editor
Job Portal Implementation with intelli power features
Jobs.com A Service Provider for Employer & Employee
JSAFE - Rijndael Algorithm based Encryption & Decryption
JSP - Personal information Manager
JSP based Shopping Cart Implementation
Knowledge and Data Engineering
Learning Technologies
Location Aided Routing for Mobile Ad Hoc Networks
Location Aided Routing in Mobile ADHOC Networks for Secured Routing IEEE
Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks
Logistics - freight forwarding software solution logistics
Loyalty Business Tracker Application System
Media Gateway Control Protocol Network
Media Streaming in Mobile using J2ME Toolkit
Media streaming using J2ME
Mobile Agent Software for Payroll Processing System
Mobile Agents in a Distributed Multimedia Database System IEEE Approach
Mobile Agents in Distributed Multimedia Database Systems
Mobile Banking Design & Implementation - IEEE
Mobile based Network Monitoring System
Mobile Clients Support GUI Systems design
Mobile Computing
Mobile Info Service Provider Online Data & information Access System
Modeling and using imperfect Context Information
Modern English Spell Checking tool Design & Implementation
Multi Language Mailing system Design & implementation
Multi Router Traffic Monitor Implementation
Multi Threaded implementation with Pull / Push Technology
Multimedia
Multimedia Messaging Service - MMS
Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems
Multiplex SMS relay over GSM using AT commands
Multithreaded Networked Data Injector & Extraction Server & Client for
Cryptographic Services
Multithreaded Peer to Peer Communication using Distributed Frameworks
Natural Language-Based Interface for Querying a Video Database
Net Banking Services & Solutions
Net Banking Services Design & Implementation
Net Conference Design & Implementation
Net Monitoring and Management using SNMP
Network Administrators to Monitor VPN and SSL Connections
Network Analyzer & Network Monitoring Tool using SNMP
Network Analyzer, Design & Implementation
Network Border Patrol for Congestion Collapse Preventing System
Network Component Development for XML Document Migration
Network Component for XML Migration
Network Document Management & Versioning System
Network Load Balancing and Redistribution of the Traffic Over the Networks using
Grid Computing System
Network Packer Sniffer Implementation
Network Proctor & Action Coordinator - The Network Monitoring Daemon IEEE
Network Security
Network Security System in DNS using AD-HOC Networks IEEE
Network Time Tracker system
Network Traffic Anomaly Detector IEEE
Network Traffic, Packet Analyzer and Sniffer
Networking
Network-Wide Prediction of BGP Routes
Neural Network based Character Pattern Identification System
Neural Networks for Handwritten character and Digits
News Feed Syndication Generation over Heterogeneous Networks
NIRA: A New Inter-Domain Routing Architecture
On Demand Audio / Video Streaming and rendering Over IP using UDP
On Self-Fish Routing in Internet Like Environments
Online Airline Reservation Web portal for Traveling service provider
On-Line Analytical Processing - Maintenance of Data collection & Reports
Online ATM Banking & online transactions
Online Auction & Bidding System With Multi Brand & Product Selection
Online Auction with featured shopping cart
Online Body Shopping System with Auto Mailing feature
On-Line Book store with online Shopping cart
Online Detection and Prevention of Phishing Attacks
Online Distributed Human resources Management System
Online E Banking provides online transactions
Online Enterprise Resources Planning Web Enabled ERP implementation with
Distributed Database system
Online Event Management with featured intelli system
Online Handwritten Script Recognition IEEE
Online Health Care Management Solutions
Online Hospital info System with interactive Services & Universal Medical Portal
with Adviser
Online Job Consultancy Services
Online PDA Primary Domain Controller System
Online Portfolio Manager Equity Trading & Mutual Funds management
Online Resume Mart System Design
Online Task Management with fully featured intelli System
Online Tutorials - global forum for educators and students
Online VRS - Vehicle Reservation System
Online Web based Complete Recruitment System
Online web enabled Bug Tracking System
Online Web Shop Mall - Web Shop Site
Online Workflow Service Manager & Automation
OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET
Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing
Protocol (AMRoute) IEEE
Optimizing the Execution of multiple data analysis queries on Parallel &
Distributed Environments
P2P (peer-to-peer networking) messaging system-using JXTA IEEE
Patient Keeper: Medical Application on mobile Phone
Pattern Analysis
Peer-to-Peer implementation Multithreaded Technology with tuple space
Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit
time IEEE
Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time
IEEE
pFusion: A P2P Architecture for Internet-Scale Content-Based Search and
Retrieval
Pharmaceutical Distribution Automation Software system
Portable and Generic tool for Web Applications
Pre Active Circulated Cache Updating using on Demand Routing Protocol
Proactive Port Scanning for Secure Computing Environment
Professional time and task management tool
Project based Time & efforts Tracking System Implementation
Project Scrutinizer Efficient Project Tracking System
Project Tracking & It Portfolio Management System
Proxy Server - TransProxy
Public Key Validation for DNS Security Extensions Domain Naming Server
Public-Key Cryptography Extensions into Kerberos
RAT (Remote Assistance Tool) is a Java Application
Remote City Mapping Implementation using J2ME
Remote Computing using Thin Clients
Remote Desktop Capture system
Remote Electricity Billing System Automation & Implementation EJB
Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE)
Remote Viewer A Remote Desktop viewer for an Intranet Environment
Resource Planning Tool Design & Implementation (RPT)
Retrieving Files using Content Based Searching and Displaying them in Carousel
View
Retrieving Files Using Content Based Searching and presenting it in Carousel
view
Robust Spanning Tree Topology Doe Data Collection and Dissemination in
Distributed Environments
Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc
Networks
Route Reservation in Ad Hoc Wireless Networks
Routing and Security in Mobile Ad Hoc Networks
Routing Simulator - An Efficient end to end Packet Delivery system
Sales force Automation Implemenation
Sales Order Processing and invoicing (SOPI)
Scalable Wireless Ad-Hoc Network Simulation using XTC IEEE
Schema based Enterprise Charting & Reporting for Desktops
Scripting JAX-WS
Secure (RSA) Chat Server
Secure Computing
Secure Data Hiding and Extractions using BPCS
Secure Electronic Transaction System
Secure Optimal Cyclic Cryptographic System
Secure Password-Based Protocol for Downloading a Private Key
Secure Routing Protocol for mobile Ad-hoc Network
Secure Web Cache Proxy Server
Secure web conferencing on any platform using Java
Secured Network manager
Secured Network Manager & Tracker using JMX
Selective Encryption of Still Image
Semantic Web-Based Approach to Knowledge Management for Grid Applications
SFTP Server - Synchronous File Transfer Communicator
Shares & Stock Management system Portfolio Manager Implementation
Simple a Pre-Provisioning Scheme to Enable Fast Restoration
SIP - Session Initialization Protocol, Chatting
Site-based Mapping for parallel proxy servers with fewer TCP connections
SLA-Driven Clustering of QOS Aware Application Servers
Smart Network Access Using Mobile Bluetooth, J2ME
SMTP based JAVA MAIL CLIENT Graphical User Interface system
SNMP Trap Gateway - Network Management
Software Engineering
Software Implementation of a Genetic Algorithm Based Approach to Network
Intrusion Detection
Software Routing Packet Filtering & Capturing
SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing
Defense
Static Image Hand Gesture Recognition using Neural Networks
System to Mobile Communication
TCP-LP: Low Priority Service via End™Point Congestion Control
Telecom Inventory maintenance and services Application with error tracking
Thin Client Network Implementation
Time Synchronization system using java
Tool for Performance Profiling of Web Sites
Training Organization Management System Implementation
Trustworthy Mobile Agent Infrastructure for Network Management
Two Factor Authentication using Mobile Phones
Ultimate Online Jobsite with intelli Search engine
Unified Interface for Multiple Naming Service using JNDI
uPortal University Portal & Education Grid information Service Provider
User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony
vehicle Insurance Project in ASP.net
Versioning Control System using JAVA
Vertical Market Information Providing System Implementation
Video Transmission using SIP - IEEE
Virtual Private Network using JAVA
Voice based XML Phone Survey System
Voice Web Browser Implementation
VOIP Flexible & Efficient Voice Communicator, Voice Over IP
VoIP Voice with Video Over IP Networks
VPersonalized E-mail Management at Network Edges
VSAT Simulation and Smart Cache Loader
WAP based information Retrieval System
Web based Chatting - Multi User Voice Chat
WAP based Route Tracing and Mailing
WAP Enabled Greeting Card System - WAP Enabled Device User to send greeting card
to other WAP Enabled Devices
Watermark Based Digital Rights Management
Web Applications
Web Based Bug Tracking System Implementation
Web based Customer Support System
Web based Distributor Information Providing Services
Web based Job Site Management system A Exclusive Job Portal with Mega features
Web based Matrimonial Services, A Desi Matrimony web Portal
Web based Online Book Store
Web based Online Library System
Workflow based Complaint Management System
Web Enabled Automated Manufacturing System - WEAMS
Web Enabled Supply Chain Management
Web Testing Tool Application - Designed to test & measure performance
Wireless Application Programming with J2ME and Bluetooth
Wireless Communication
wireless distributed intrusion detection system and a new attack model
Wireless Sensor Networks
XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
XML Data Stores: Emerging Practices
XML Migration - Implementation for XML format from Database System
XML Parser for EMail Resumes / Resume Tracking & allotment using XML
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Zero Installation of Client DB Driver using RPC

More Related Content

Similar to Project list

Enabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid ChowEnabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid ChowMyNOG
 
HTML Online Course HTML Course Online online html courses html online training
HTML Online Course  HTML Course Online online html courses html online trainingHTML Online Course  HTML Course Online online html courses html online training
HTML Online Course HTML Course Online online html courses html online trainingEvanta Technologies
 
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...Cisco DevNet
 
DEVNET-1159 Deep Dive with the Cisco WAN Automation Engine
DEVNET-1159	Deep Dive with the Cisco WAN Automation EngineDEVNET-1159	Deep Dive with the Cisco WAN Automation Engine
DEVNET-1159 Deep Dive with the Cisco WAN Automation EngineCisco DevNet
 
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...Cisco DevNet
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcway2004
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcway2004
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytech
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytech
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcway2004
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcway2004
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 

Similar to Project list (20)

Enabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid ChowEnabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid Chow
 
HTML Online Course HTML Course Online online html courses html online training
HTML Online Course  HTML Course Online online html courses html online trainingHTML Online Course  HTML Course Online online html courses html online training
HTML Online Course HTML Course Online online html courses html online training
 
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...
 
DEVNET-1159 Deep Dive with the Cisco WAN Automation Engine
DEVNET-1159	Deep Dive with the Cisco WAN Automation EngineDEVNET-1159	Deep Dive with the Cisco WAN Automation Engine
DEVNET-1159 Deep Dive with the Cisco WAN Automation Engine
 
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...DEVNET-1129	WAN Automation Engine - Develop Traffic Aware Applications Using ...
DEVNET-1129 WAN Automation Engine - Develop Traffic Aware Applications Using ...
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 

More from Mumbai Academisc

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Project list

  • 1. Academic peer to peer Network Academic planner Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs /Java Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs Java Adaptive distributed event model. Adaptive event based middleware architecture. Adaptive Programming Model for Fault-Tolerant Distributed Computing /Java Adding Functionalities to Libpcap Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks /Java AI Firewall alternative semantics for error and exceptional handling Alumni Software Analysis of Event Models in Event based Middle ware Analysis of Routing Models in Event Base Middle wares Anomaly Detection Anti - Viruses Apartment Management System VB Net Application Of Bayesian Networks To Data Mining Approximation Algorithm for Facility location and related problems Artificial intelligence network load balancing using Ant Colony Optimization C# Net ATM Networks For Online Monitoring System Java Auction simulator using agents Auction System ASP Net Audio processing of movies. Automated Generation of Cycle Level Simulators for Embedded Processors. Automated Robot for Military System (ARMS) Automatic Remote Backup Automating News Gathering and Classification Automation With The Concept Of Jini Bandwidth management Tool Barcode Genration Biometric - The Security System Bug trading Bulk Billing System JEE C# MP Compressor C# Net Call Center Management System ASP Net Campus Online Help Desk Cargo Management System Cloth Animation & Dynamics. Code optimization. Implementation of scalar optimizations Code optimization: Implementation of scalar optimizations Collaborative Platform for Open Source Collaborative Span Filtering Using Centralized Incrementally Learning Spam Rules Collaborative Web Browsing Collage Management System Computerized Information Software VB Net Contact Reminder Context Aware Service Oriented Architecture Controlling IP Spoofing through Inter domain Packet Filters (Java) Convolution Filter VB Net Convolution Filters Using Image Processing C# Net course home page generator Credit Card Fraud Detection using Hidden Markov Model (Net) Cryptographic Engine Cryptographically Using Secure Server/Client Protocol VC++ Customizing Proxy Web server CVS Root File Changing Utility C# Net Data Integration Database Database Schema Comparison Utility C# C# Net
  • 2. DBMS with SQL Interpreter Dept Library Management System Design and Implementation of PSTN to VoIP Gateway in built Asterisk PBX Design and implementation of PSTN/VoIP gateway with inbuilt PBX. Design and Implementation of WiFiRE protocol Design of an Infrastructure using WiFi for Road Naviation Design of Intranet Mail System Detecting and Blocking Skype Developing an Organically Growing Peer to Peer Network Developing GUI for IP Tables Configuration Development of a Distributed Systems Simulator for Event Based Middleware Development of an OS Framework for a MIPS Simulator Digital Image Processing Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings /Net Direct Information System Direction queries in spatio-temporal databases. Displacement filters, including swirl using GDI+ C# Net Distributed Ant Robotics Distributed cache updating for the Dynamic source routing protocol /Java Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks /Java Distributed Parallel Virtual Machine Distributed System simulator for Publish-Subscribe Model Distributed Workgroup File Indexer DSP Simulator Dynamic Data Dissimination in Resource Constrained Environment E -Wheel Software Edge Detection Filters C# Net Efficient and Secure Content Processing (Java) Efficient inference algorithm for large state space graphical model Electronic Fund Transfer ASP Net Electronic Transaction E-Mail Server Using Multithreaded Sockets Java E-Mail Server Using SMTP Embedding In Video Steganography Java Employee info and payroll system Employee Management System VB Net Energy Efficient Event Reliable Transport in Wireless Sensor Networks Enhancing The Algorithms Enterprise Resource Planning ERP for Leather Company JEE ERP for Small Business JEE Error handling for syntax analysis Error Tracking System E-shoping Ethernet - Billing System Exact functional context matching for web services. Exam Server Experimenting with Code Optimizations on SUIF (Stanford University Intermediate Format) Extending Shikav to support animation of networking protocols E-Zest Face Recognition Using Artificial Neural Networks Face Recognition Using Laplacian faces /Java Fault-Tolerant TCP Feed Forward Neural Networks Feedback Based Self-Configuring Systems File Encryption and Encrypted text embedding in an image VC++ Final Project by M.Techs ( currently reports are not available) Final Projects By MCA ( currently reports are not available) Find and Replace utility VB Net Fingerprint Image Enhancement Firewell
  • 3. Flood Fill Algorithms in C# and GDI+ C# Net FLOW WELL AUTOMATION SYSTEM Forecasting Formal Specification and Verification of WiFiRe FTP Explorer VB Net Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# Net Graphical library system Graphical Representation Of Online Shares & Stocks Hba: Distributed Metadata Management for Large cluster-based storage system (Net) Hiding binary data in HTML documents C# Net Hiding Messages in MIDI Songs C# Net Hiding messages in the Noise of a Picture C# Net Hierarchical Data Back Up Homogenous Network Control and Implementation /Java Homogenous Network Control and Implementation Java Honynet Hostel Election Software Hostel elections voting software Hotel Management System VB Net HR Consultant HTML Editor VB Net Human Resources Management System VB Net Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) /JEE IA64 ISA Simulation Image Converter VB Net Image Processing Image Processing Application Image Processing C# Net Image Processing for Bilinear Filters and Resizing C# Net Image processing for HSL color space C# Net Image Processing for Per Pixel Filters using GDI+ C# Net Image Rendering For Grid Technology Java Image Steganography Image Transformation using Grid Java Image Water Marking Implementation of cryptographic protocols in oblivious signature based envelope ( Implementation of Download wizard for simultaneous downloads Implementation of Scalar Optimizations Implementation of the gaming software Implementing a Linux Cluster Implementing an interface for transliteration Improving TCP performance in adhoc networks. Improving the efficiency of Memory Management in Linux by Efficient Page Incremental deployment service of Hop by hop multicast routing protocol /Java Information Extraction in Diverse Setting Information Management and Representation Using Topic Maps Information retrieval from textual corpus. Information Retrieval in Resource Constrained Environments Instant messenger system Integrating Speech Engine With Web Navigator Java Integration of Heterogeneous Databases Into XML Format with Translator Intelligent agents. Intelligent Car Transportation System (IntelliCarTS) Interface for Mobile Phone and PDA using J2ME Internet History Viewer VB Net Internet On Demand - Web Browser And Copier Inter-operability of IEEE 802.11 with IEEE 802.11e Interpretor for lambda calculus with some extensions Intranet Caching Protocol
  • 4. Intranet Mailing System Intruder Detection System Intrusion Detection Prevention And Trace back Systems VC++ Intrusion Detection System & Bandwidth Limitation Intrusion Prevention System Inventory System VB Net IP Sniffer ITP: An Image Transport Protocol for the Internet /Java Java Network File Sharing System Java Java Productivity Aids Java Java Visual Editor with Compiler Java Java-Debugger JDBC Database Interfacing Tool Jini The Distributed System JME Mail Client Server JME Lending Tree Project Library Management System C# Net Library Management system VB Net LIC management Linux Kernel (Memory Management) Linux Kernel Enhancement Load Balancing Using Process Migration in Linux Load Sensitive Routing algorithm and its application in traffic engineering Location-Aided Routing (LAR) in Mobile Ad Hoc Networks /Java Mail Server Utility Managing Linux Distributions Man-Machine Interface - A Robot Marathi Sentence Generation from UNL. Marketing administration system Matchmaking algorithms for Semantic Web Services Medical agency Medical Transcription Server Membership Management System VB Net Message Digest VB Net Message Management System Microcomputer Based Robot Mini Projects by B.Techs ( Currently reports are not available ) Mini Projects By M.Techs Minimizing file download time in Stochastic Peer-to-Peer networks (Net) Mirroring Mobile Agents In Distributed Multimedia Database Systems /Java Mobile Bank WAP Mobile Information Provider JME Mobotric Model checking for protocol verification. Monitoring And Managing The Clusters Using JMX JME Multi User Chatting System Multihoming Solution for effective load balancing Multi-Tasking Sockets Multithreaded Chat Server C# Net My SQL Administrative tool kit near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm /Java Net Banking Net on TV Channel Network Analysis Network Analyzer Java Network Based University Collage Co-Ordiantion Syatem Network Border Patrol Preventing Congestion Collapse Java Network border patrol: preventing congestion collapse and promoting fairness in the Internet /Java Network Component for XML Migration Java Network MAnagement And Internet Tools Network Management Tool
  • 5. Network Monitoring Network Monitoring Based on Java Network Monitoring System Network Protocol Verification Using Linear Temporal Logic Network Security System In DNS Using Ad-Hoc Networks Java Network Sniffer Network Traffic Anomaly Detector JME Network Vigilator Networks Based Performance Analysis Tool Neural Network for Recognition of Handwritten and Digits VC++ Neural Network-Based Face Detection /VC++ Neural Networks for Handwriting Detection System Using Brain Net VB Net Neural Networks for Handwritten character and Digits /VC++ Neural Networks for Unicode Optical Character Recognition C# Net new methodology for representation of TCP performance in TCPSF. NITC Student information system Noise Reduction by Fuzzy Image Filtering /Java Novel Secure Communication Protocol for Ad Hoc networks [SCP] /Java Ocr in Hindi ODAM: An Optimized Distributed Association Rule Mining Algorithm /Java Office Automation Online Bank ASP Net Online Banking Online Book Shop ASP Net Online Bulletin Board Online Class Register Online Counseling Online Counseling software Online Customer Care ASP Net Online Education Online Election Software for Hostel Election Online Examination Online Fashion Studios JEE Online Handwritten Script Recognition /Java Online Library Management system Online Library System Online Objective test Online Oucation Online Quiz ASP Net Online Share Trading Online Shopping Online Shopping ASP Net Online Student Registration Online Test Online Voting System ASP Net Online Web shop JEE Ooline Polling Operating system enhancements to prevent the misuse of system calls. Opticall Character Recognition Optimal Multicast Routing in Mobile Ad-Hoc Networks Java Optimized and delay sensitive service provisioning over SLiT networks Optimizing pattern matching algorithm in intrusion detection. OSBE to handle cyclic policy interdependency) Parallel Processing Application Parellel Processing Thro' Job Distribution Patient Care System VB Net PC (Net) To Phone Peer-To-Peer Messaging JME Performance Analysis of Telephony Routing Protocols Performance Analysis of WiFi-Re(Wireless Fidelity - Rural Extension) Performance Enhancement of HTTP using improved TCP Functionalities Performance Evaluation of an Efficient Multicast Routing Protocol Performance Evaluation of DISTANCE Routing Algorithm in MANET VC++ Performance Evaluation of RMI Java
  • 6. Performance Evaluation of Routing Algorithm using NS2 Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm /Java Probabilistic Techniques for cache replacement Project Management System Project Server Project Status Information System Public Key Validation for DNS security Extension Java Query builder Railway reservation Rate Allocation and Network Life Time Problems (Net) Reading and Writing AVI files using steganography C# Net Remote PC Access in Cyber Cafe Re-ordering of packets using Retransmission Timer Replacement Policies. Retrieving Files Using Content Based Searching and presenting it in Carousel view Java RFID Data Management Rough sets based Search Engine for grid service discovery (Net) SAS Scalable Wireless AD-HOC Network Simulation Using XTC Java SCET Intra Net SCET's Invition For Online Tender Screen capture Utility VB Net Securable Network in three-party Protocol Secure Conferencing System Secure Mail Server Secure Net Auction System Secure Routing Protocol for mobile Ad-hoc Network Java Secure routing. Securing Image URL ASP Net Security Robot Selective Encryption of Still Image /VB,C Self-Interested Routing in Online Environments Semantic Searching using NLP techniques Send SMS To Cell Phone Through SMTP Mail VB Net Share trading system Shortest Node Finder In Wireless Ad-Hoc Networks Java Simple FTP Client Simulating Routing Algorithms in Java Simulation of the IA64 Instruction Set Architecture Smart Card Smart Divece Controller Smart Knowledge Provider ASP Net SN Java Project Titles Language Spatial and temporal database (queries for retrieving data) Speed Age Courier System Statistical Techniques for detecting Traffic anomalies through Packet Header Data (Net) Steganography - an Art of Hiding Digital Information Steganography for FTP through a Proxy Server C# Net Steganography for Hiding Data in Wave Audio Files C# Net Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications /Java subsequently implementing a GUI Providing a certain useful functionality Task Management System TCP/IP Pocket Controlling Monitor Java TCPIP Chat client server Using C# C# Net Tele communication System Telecontrolled Utilities Testing Tools Text Editor for Linux Platform Text to Speech conversion Text to Speech Technology
  • 7. Textile Web Services ASP Net The Application of Stock Technology The Complete Personal Mobile System The Effect of Pairs in Program Design Tasks (Net) The File Digest program and the C++ implementation of some Message-Digest algorithms VC++ Time Table Information System To Coordinate Collaborative Software Development Based on SDLC Models Tool For Network Auditing(ping and Port Scanning, TCP/IP Finger printing Towards Evaluating Lexico-Semantic Networks Trainee Management System VB Net Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH Triple crypt Using Vector Displacement Algorithm Trustworthy Computing under Resource Constraints with the DOWN policy (Net) Type systems and applications to safety. Type systems and it's application to safe and efficient code. Upware (Packet Analyzer, IPFW, IPRTR ) Using a multitude of experts in time series forecasting Using Genetic Algorithms for testcase generation for finite state machines Using Multiple Decomposition Methods and Combining a Multitude of Experts Using Trigonometry and Pythagoras to Watermark an Image C# Net Utilities to Compressess, Decompressers and Split Merge Files VB Net Smart Mail Transfer Protocol VB Net Video Conferencing with Multicast Support Video Steganography Using Mobile Simulation JME Virtual Class Room Virtual Routing Network Emulation Frame Work Voice Chating & Voice Mail Voice Controlled application Voice Organization Wallpaper Changer Utility VB Net We - Crm (Custember Relationship) Web + Mail Crowler Web application Web based academic monitoring system Web Based Administration of Lunix Sever Web based Application for Multiple Clients Web based Linux Administration Web based Named Entity Recognition Web Based Proxy Sever Web Enabled Opinion Poll System For NITC Web Monitoring for Lightweight Devices Web Server Web Services ASP Net Web-Based Library Management System Webified Irc (Internet Relay Chat) Webopedia (Web Sever) Win Application for Word Processing VB Net Windows Management Instrument (WMI) Net VB Net Windows Management Instrumentation WMI Implementation C# Net Windows Multi File Search utility VB Net Wireless Application Protocol Wireless Search Engine Wireless Security Wireless Traffic Viewer Using JME JME Wireless Voice Over IP Word Sense Disambiguation Engine for Multiple Languages Work Flow Management System ASP Net Workflow Mining: Discovering Process Models from Event Logs /Net XML Data Stores: Emerging Practices /Java XML Enable SQL Server Java XTC, a Practical Topology Control Algorithm for Ad-Hoc Networks /Java Yarn Quality Management System Accident prevention system for hairpin bend zone
  • 8. Accurate Anomaly Detection Through Parallelism Active Learning Methods for Image Retrieval Acturial projection system Advance IP Traceback Scheme Advance vehicle and highway management system Advanced Computer Cluster Architecture Advanced public bus transportation system for India Aggregate queries on uncertain results of data integration systems Agile/Generic/Agent-oriented programming All in One Steganography Anomaly Detection/One-Class Classification Algorithm AntiSqlFilter-Blocking SQL Injection Hacker Attacks Application of Geometric invariants in finding structural properties in biological molecules Applications and network vulnerabilities Automatic Java Media Manager Automatic Medicine Announcement System Autonomic Computing and Self Healing Systems Barcode Capture and Recognition for EAN Barcodes Using Cell phone Camera Biological data management Biotechnologies/Bioinformatics/Biometrics/Biomedical systems Using Multitude of Time Series Forecasting Models to Improve Forecast Building a Distributed Computing Environment in KreSIT Building Cluster Environment For Interactive Users. Building VoIP over DEP Network Business Card Manager Business continuity and availability Business process integration and management Bypassing Vista USA and correctly launching interactive process from a windows service. CAPTCHA Chaos based Encryption for a Structured Video Codec Characterization of JVM Code Database Servers-A Centralized Compiler Architecture Code Review Tool Using Existing Third Party Implementations Cognitive science and knowledge agent-based systems College management system Collision-free tag reading mechanism for RFID Network with Mobile Readers. Color Image Segmentation Compression in Flash-based Databases Computational biochemistry Computational Geometry in Drug Design Computer graphics and animation Computer modeling/simulation Congestion Window Control Consumer accessibility appliances and services Consumer trust in digital society Consumer-oriented devices and services Consumer-oriented digital economics Consumer-oriented e-commerce Content Cognizant data dissemination Contention Window Differentiation Mechanism for providing QoS in 802.11 Context-aware and self-management systems Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers Performance Analysis of Telephony Routing over IP Control and monitoring systems Control Setting of Unified Power Flow Controller Through Load Flow Calculation Counting Bloom Filters for Pattern Matching and Anti-evasion at the Wire Speed Cryptography and algorithms encryption CSI-KNN-based Intrusion Detection System Customer Support Protocol Data Recovery In Ext2 files system and Adding secure deletion to your favorite file System Database In Smart Cards
  • 9. Data-centered information systems Decision support systems Dedicated Short range road side communication for vehicles Deduplication and Soft matching Design and Deployment of a Reliable File Transfer Protocol over Asymmetric Satellite Networks Code Generation for Lazy Functional Languages Design and Deployment of a Transfer Control Protocol over Asymmetric Satellite Networks Design and Evaluation of an IEEE 802.11 Based Dual MAC for MANETs Design and Implementation of RSVP-TE over MPLS Emulator Design and Implementation of Traffic Engineering Extensions for OSPF Design considerations for computer-telephony application programming interfaces and related components Design of Multi-threaded Label Distribution Protocol for MPLS Emulator Desk FM Monitor 3D View Morphing Learning Paths for Information Extraction Detection of recurring patterns in protein structure by superimposition and geometric hashing Developing port scanning and detection system Developing wireless components Development of an API for using SMS as transport layer. Development of basic TGREP simulator Development of Customer relationship Management System to increase Sales Development of LBX: Low-Bandwidth X Development of Orchestration Server based on BPEL4WS standard (tentatively named as "ORCSERV"). Development of QoS enhancement in VOIP applicationDevelopment of QoS enhancement in VOIP application Development of simple IP subnet calculator tool Semi Automatic generation of properties for verification Protein prediction. Development of Thin LINUX desktop with or without X Digital analysis and processing Digital information processing (Voice/Data/Video) Digital telecommunications management Digital video browser and multimedia content search Dijkstra algorithm for shortest path Dimensioning Network Links: A New Look at Equivalent Bandwidth Direct Manipulation Technique for Wireless Networking Directory Retrieval Using Voice Form Filling Online DNS based Multihoming Document Manager DSP Based Virtual Private Network Dynamic Adaption of DCF and PCF mode of IEEE 802.11 WLAN Dynamic Location Strategy for Hot Mobile Subscribers in personal Communications Dynamic Signature Verification Using Discriminative Training Dynamic Slicing of Programs Dynamic Topology Extraction for Component Based Enterprise Application Environments E-Banking transaction system and portal for bank officials and customer e-Business, e-Science systems E-Campus E-Commerce related project Economics of security and protection Effective Decision Tree Algorithm Effective Monitoring of Web navigation using Code Check Effectively Tuning and Optimizing the Database Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Efficient Causality Tracking in Optimistic Distributed Simulation Efficient OSPF Based Load Sensitive Routing Algorithm. Efficient Way To Capturing and sending images and videos from mobile to PC and
  • 10. Vice-Versa E-form Application for Employee Management Using Hibernate Vs JDBC E-Job Card and Timesheet Using Hibernate Vs JDBC EKNOW: Information and knowledge management E-learning Embedded and real-time systems Embedded Real Time Systems Embedded Systems for Automobiles Energy and power systems control Enhance the Email Performance Through SMTP- New Approach Enterprise Application Integration Enterprise Mobile Service Platform Using JMS & J2ME Entity Recognition on the Web ERP/CRM Estimating latencies and buffer requirements in multimedia networks Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems ETHEREAL System Expert systems Exploiting Local Regularities in Text Segmentation using Conditional Random Fields Exploring XUL as a GUI development kit Factory management system Fair and dynamic Bandwidth Distribution Architecture Fast Algorithms for the Modified Discrete Cosine Transform File System Workload Analysis Filter Object Framework for MICO - Dynamic Model Filter Object Framework for MICO - Static Model Fine-grained symmetric multiprocessor software architecture for TCP/IP stack on the UNM platform Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing Implement SIP call control for voice Telephony. Flexible Network Monitoring Tool Based on a Data Stream Management System Forecasting using Genetic Algorithms. Forecasting using Neural Networks FPGA implementation of 802.11 MAC. Framework for cascading Payments in P2P Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Generating Windows Presentation Foundation using templates Generation of Reliable PINs from Fingerprints Geographic and spatial data infrastructures Global Insurance Management System GNUTELLA client for LINUX Government services in the context of digital society GPRS Traffic Performance Measurements Granite Business management system Graphic/Image/Photo/Hand-writing analysis and processing Graphical Search Engine Grid Computing Grid Extension Framework for Large Scale Parallel Financial Modeling GSM Based LAN Monitoring GUI Front-end for Postgres Hackers Approach to Improve the A.I. Behind CAPTCHA Handled and wearable computing and devices Handover Keying and its Uses Hardware - Software Codesign using hierarchical Finite State machines Hedonic and perceived digital quality Honey Pots- A Security System to Identify Black Hat Community in Networks Host Based IDS Human Age Estimation Human factors in computer systems Human Head Internal Rendering with Mouth and Text To Speech Synthesizer
  • 11. Human/Machine interface and man-in-the-loop control Hybrid Approach to Semi-Supervised Learning Hybrid Constraint Satisfaction Problem Solver Hybrid Mechanism for Enhancing the Performance of Streaming Service in D-T MA Hybrid Model Based Reasoning in Finance Hybrid Query Expansion Hybrid wireless-optical broadband access network (woban): prototype Development and Research challenges ICT support for collaboration Image Classification Using Neural Networks and Fuzzy Logic Image Restoration Impact of Node Mobility on MANET Routing Protocols Models Implement Registration Server and Presence Server for SIP. Implement security framework for P to P file system Implementation of an ASP based Supply Chain Management System Implementation of BPCS-Steganography Implementation of Soil-biotechnology(SBT) Implementation of Virtual Private Database (VPDmechanism for POSTGRES.) Imprecision/Uncertainty/Incompleteness in databases Improve Forecasting Performance Using Decomposition and Combining Improving performance of large scale data integration systems Improving RFID System to read the tags efficiently Incorporating Quality Considerations into Project Time/Cost Tradeoff Analysis and Decision Making. Indian Internet Tomography Information ethics and legal evaluations Information Extraction Information Extraction using a Database Information Hiding Using Fractal Encoding Information management systems Information Retrieval Information Retrieval SMS Server Information technologies Information Theoretic Text Similarity Measurement Using Approximate Word Sense Disambiguation Informational mining/retrieval/classification Insurance Management System Integrated Case Based Reasoning And Rule Based Reasoning for Insurance Intelligent Call Routing & Management using IVR in Asterisk Server Intelligent Dictionary Based encoding Algorithm for data compressing for High Speed Transformation Over Internet Intelligent Greenhouse Intelligent Multi-sensor System for Control of Boilers and Furnaces Intelligent user interfaces Interaction in smart environments Interactive Deduplication using Active Learning Interactive Multiplayer Mobile Games Using Bluetooth Intranet Based Email System Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology IP Spoofing Detection Approach (ISDA) for Network Intrusion Detection System J2ME end-to-end security for M-commerce. Java Dynamic Data Viewer Java SIP Signaling Comptroller Job portal Knowledge acquisition, processing, and management Knowledge data systems Knowledge for global defense Knowledge modeling and virtualization LAN Based Bit Torrent Learning relevance order over graphically linked objects leave planner Library management system Linguistic knowledge representation
  • 12. Linux Clustering Load Balancer in client-server architectures Log browser Low Bit Rate Speech Coding Low cost affordable raid storage MAC Layer Scheduling in Ad-hoc Networks Management and control Matchmaking website Maximum Confidence Hidden Markov Modeling for Face Recognition Measurement Based Performance Characterization of Software Servers Media Handling for Multimedia Conferencing in Multihop Cellular Networks Medical management system Middleware for group communication in hybrid network. Mobile Based Software Inspection Mobile consumers and interactive spaces Mobile learning and communications Mobile TV and IPTV MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks Model Checking of Software Components: Combining Java Pathfinder and Behavior Protocol Model Checker Motion Detecting System Multicast Application and Approach to Security issues using key management Multi-criteria decision theory Multi-input Fuzzy Logic Controller for Brushless dc Motor Drives Multimodal and interactive interfaces Multi-threaded Label Distribution Protocol for MPLS Emulator Nanotechnologies/Systems-on-the-chip/Networks-on-the-chip/ Haptic phenomena Natural language processing / robust processing Network Anomaly detection and classification via opportunistic sampling. Network based Gaming Server.(NGS) Network Simulation Creator and Animator/NAM Enhanced Simulation Animation (NS2) Neuronal networks/Fuzzy logic/Temporal logic/ Genetic Algorithms New Adversary and New Threats: Security in Unattended Sensor Networks NOT AVAILABLE DEP networking (title yet to be decided) NOT AVIALBLE Data Mining NOT AVIALBLE Data Mining (title yet to be decided) Object Based Video Segmentation Object-level Partitioning of Applications OMR Sheet Reader On supporting Design evolution and treaceablity On the Performance of Ad Hoc Networks with Multiuser Detection, Rate Control and Hybrid ARQ On-demand business transformation Online book shop management system Online bug tracking and customer support system Online call logging and customer support system Online consumer decision support & advertising Online Employee Time Management System Online health care system Online matrimonial system Online Video/Audio Conference Open and distance education systems Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics & Multi word features Optimal Router Buffer Size Optimization and information technology Optimization on postgres optimizer Optimizing the evaluation of complex similarity predicates on large datasets Organizational information systems Web Based Artificial Intelligence Simulations Circular Target Detection and Pattern Detection Overload Control of Web Services with SEDA P-AODV: Extension of AODV for Partially Connected Ad Hoc Networks Parallelizing XML Processing Pipelines via Map Reduce
  • 13. Pattern recognition / Computer vision Patterns/Anti-patterns/Artifacts/Frameworks Payroll information system PCI Interface to Wireless LAN Peer To Peer Secure Internet Telephony (SIP) Performance Analysis of IEEE 802.16 MAC Performance Evaluation and Modeling of Servlet Containers Performance Study of Infiniband Based Cluster Pervasive and ubiquitous systems Physical Implementation and Evaluation of Ad Hoc Network Routing Protocols using Unmodi ed Simulation Models Polyphonic Wizards Power Aware duty scheduling in Wireless Sensor Networks Power Flow Control with UPFC Pragmatic general multicast Process Monitoring System Productivity Enhancement tool for Animation industry Program verification/validation/correctness Programming languages and supporting tools Project Management System Publish-Subscribe systems for P2P Networks Pure Optical router for Optical routing without electronic intervention Self-addressable Memory-Based FSM: a Scalable Intrusion Detection Engine Push Vs Pull: Quantative Comparison for Data Broadcast QOS Architecture for Mobile Nodes QoS based Routing Algorithms in Internet QoS in Wireless Networks Application of Mobile Agent Systems to First Responder Training With Flexibility Quality of Resilience as a Network Reliability Characterization Tool Quality of Service Provisioning in IEEE 802.11 Wireless LANs Quantum Key Distribution for 3rd party authentication Quicklook approach to IDS Rapid Internet attacks and network Real native and persistent layer for Java & .Net Reasoning models/Model checking/Modular reasoning/ Receiver feedback based rate adaptation of multimedia sources. Reconfigurable Packet Classifier Reconfigurable Scheduling Co-Processor Recurring Functional Sites in Protein Structures detected with allowance for Substitution of Amino Acids. Robust Spanning Tree Topology for Data Collection and Dissemination in Distributed Environments Remote Service Monitor. Remote Switching Control System for Home Appliances RFID based car parking system RFID reader enabled mobile with environment alert and mobile tracking RFID Security Rich Internet Application Using Flux Frame for Managing Workflow in healthcare domain Risk Homeostasis and Network Security Robotics/Mobile devices/ Mobile networks Robust Distributed Speech Recognition using Speech Enhancement Ann Based Control Patterns Estimator For UPFC Used In Power Flow Problem Robust HTML to DOM conversion and applications Role Based Access Control Route Repair in Mobile Adhoc Networks Satellite Image Processing. Scalable Urban Network Simulator Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc Networks Secure Mobile Agent System Model Based on Extended Elementary Object System Secure Mobile Banking & Security Issues Secure Routers Secure Update Semantics in XML databases (Area)
  • 14. Security in network, systems, and applications Security Issues in Mobile Agents Self-monitoring, self-diagnosing, self-management systems Semantic WEB Semi Supervised Information Extraction Using Hidden Markov Mode Semiotic engineering of online services Sequential switching for industrial application Services in Converged Network (Value-Added Services) Session Initiation Protocol (SIP) in Java Short Term Load Forecasting Signal Processing Module for the Analysis of Heart Sounds and Heart Murmurs Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks Simulation Study of BlackHole Attack In MANET: Detection and Prevention Simulation-based Comparisons of Tahoe, Reno, and SACK TCP Slicing of Synchronous Programs Smart and digital homes Smart consumer appliances Smart System for Remote Monitoring of Patients and SMS Messaging upon Critical Condition Software as a service Software development and deployment software life cycle maintainer Software robustness for digital society Software specification and design methodologies Measurement and management systems Soundbox: A Graphical Interface to Digital Source code management (like Rational Clearcase) Spectral methods for Graph Partitioning Speech enable appliances Speech recognition and processing Statistical Learners for Information Extraction:An Empiricial Approach Statistical models for Information Extraction from webpages Statistics Based Design of MAC Protocols with Distributed Collision Resolution for Ad Hoc Networks Streaming in Networks Synchronization Specifier and Presenter for Authoring System System advanced paradigms Tackling the exposed node problem in IEEE 802.11 MAC Mobile devices and biotechnologies Tax management system TAX: Tree Algebra for XML Implementation T-Blogger Telematic Application - Global Position Aware Vehicle The Impact of Loss Recovery on Congestion Control for Reliable Multicast Tools for comparative analysis of extraction algorithms Topology-Aware Failure Diagnosis For Distributed Enterprise Systems. Traffic Engineering Extensions to OSPF Treating Patients Diabetes Using Mobile and PC Trust, privacy, and safeness Two-Rule-Based Linguistic Fuzzy Controllers Unified Log-Based Relevance Feedback Scheme for Image Retrieval UPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink Programs Use of wavelets in Forecasting User Interfaces for Web Applications User-centric information systems Utility-Based Incentive Scheme for P2P File Sharing in MANETs Vehicle Driver Rating System Vehicles with Intelligent Systems for Transport Automation Vehicular navigation and control Verification of Communicating Reactive State Machines Verifying Delivery, Authorization and Integrity of Electronic Messages Personal information management
  • 15. Video over variable bandwidth links Video Streaming in Wireless Environments Virtual classroom Virtual reality/3D graphics/Games Usability, aesthetics, and accessibility Virtual University Visual Layout Driven Information Extraction from Websites Visualization and Analysis Tool for NS-2 Wireless Simulations: iNSpect Voice message transfer using Personalised Repository based Speech-Coding techniques Voice Over IP VoIP over wireless network Water Marking Relational Databases Using Optimization technique Wearable devices Web Application Server Development Using SMS Web Attacks Alerter Using Feature Extraction and SNORT Web Based help desk Web Monitoring for Lightweight Devices Web-based presentation of Soil-biotechnology (SBT) Webcam Image Tracker. Why Disks fail in India and what can be done about it WiMax MAC over WiFi PHY for rural communication Wireless Data Traffic Decade of Change Without Load Balancing in MANET: Single Path Routing Vs. Multi Path Routing Without packet Reordering dynamic load balancing WorkFlow Management System XML agents in Smart Cards Zero-knowledge systems Active Learning Methods for Interactive Image Retrieval Active Queue Management for Fair Resource Allocation in Wireless Networks Active Source Routing Protocol for Mobile AD-HOC Networks Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks Adaptive Programming Model for Fault-Tolerant Distributed Computing Adaptive Security and Authentication for DNS System Advertisement Posting Website ASP .Net Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks Apartment Management System Application of BPCS steganography to wavelet compressed video Artificial intelligence network load balancing using Ant Colony Optimization ASP .Net Project Titles ATM Networks for Online Monitoring System Auction System Authenticating Network Attached Storage - IEEE Automatic Dependent Surveillance-Broadcasting Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks Benefit Based Data Caching In Ad Hoc Networks BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Building Intelligent Shopping Assistant using Data mining technique for Web Services Bulk Billing System C# MP3 Compressor CAC Connection Admission Control using ATM Networks Implementation Call Center Management System Clinical telemedicine COACS: Co - Operative and adaptive caching system for MANETs Color imaging and multidimensional projections Computer vision and resolution Computerized Information Software Controlling IP Spoofing Through Inter Domain Packet Filters Convolution Filter Convolution Filters
  • 16. Credit Card Fraud Detection Using Hidden Markov Models Crypt kit A real time cryptographic system for security over the networks - IEEE Cryptographically Using Secure Server/Client Protocol CVS Root File Changing Utility Data Minimization And Storage Using XML Enable SQL Server Data mining implementation for Credit Cards Application Processing System Data Security in Ad hoc Networks Using Multi Path Routing Database Schema Comparison Utility C# Databases and mobility in databases Defect Tracking Tool - Enterprise Project and Defect Tracking System Designing Less - Structured P2p Systems for the Expected High Churn Digital Image Processing with Multi Domain Approach Digital libraries Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification Digital Steganography: Hiding Data within Data Digital Water Marking For Video Piracy Detection Displacement filters, including swirl using GDI+ Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE Distributed cache updating for the Dynamic source routing protocol Distributed Component Router Based CRM Customer Relationship Management Distributed Component Router based Supply Chain Management System SCM Distributed Data mining in Credit Card Fraud Detection Analysis Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Distributed Node Migration by Effective Fault Tolerance Dual-Link Failure Resiliency through Backup Link Mutual Exclusion Dynamic Character & Pattern Recognition using Neural Networks Dynamic Control for Active Network System Dynamic Signature Verification Using Pattern Recognition Dynamic University Linking & Data integrity Maintenance E“Secure Transaction Design & Implementation Edge Detection Filters Effective Packet Analyzing and Filtering System for ATM Network Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Efficient Association Rule Mining Algorithm In Distributed Databases Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks Efficient Contiguous Data & Video Streamer with Buffer Management Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks efficient message digest algorithm (MD) for data security Efficient Resource Allocation For Wireless Multicast Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case E-HealthCare - Distributed HealthCare and A Strategic Management System Electronic Fund Transfer Electronic imagery and visualization frameworks Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management E-Mail Server Using Multithreaded Sockets Embedding in Video Steganography Employee Management System Encryption and Decryption technique for secure communication in WLAN E-Recruitment System - Dynamic Online Professional Recruitment & Management System ERP Application integrated Enterprise Solutions with Strategic advantages ERP for Leather Company
  • 17. ERP for Small Business E-Sales Order Processing System Estimation of Defects Based On Defect Decay Model: ED3M Evaluating the Performance of Versatile RMI Approach In Java Face Recognition Using Laplacian faces Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks File Encryption and Encrypted text embedding in an image Find and Replace utility Flood Fill Algorithms in C# and GDI+ FTP Explorer Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision Genetic Algorithm Based Train Simulation Using Concurrent Engineering Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM Geometric Approach to Improving Active Packet Loss Measurement GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks Grid information Retrieval System Hardware enhanced association rule mining with Hashing and Pipelining HBA Distributed Metadata Management for Large Cluster-Based Storage Systems Hiding binary data in HTML documents Hiding Messages in MIDI Songs Hiding messages in the Noise of a Picture High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks Homogeneous Networks & Control Implementation Homogenous Network Control and Implementation Hopfield model of neural network for pattern recognition Hotel Management System HTML Editor Human Resources Management System Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) Image Compression and Analysis with MSE & PSNR Technique - IEEE Image Converter 2005 Image Processing Image Processing for Bilinear Filters and Resizing Image Processing for Convolution Filters Image Processing for Edge Detection Filters Image processing for HSL color space Image Processing for Per Pixel Filters using GDI+ Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings Image Rendering for Grid Technology Image Stream Transfer Using Real-Time Transmission Protocol Image Water Marking and Combustion Imaging interfaces and navigation Incremental deployment service of Hop by hop multicast routing protocol Industrial systems Integrated Development Environment using JSWING IDE JSWING Integrating Speech Engine with Web Navigator Intelli WAP System Implementation / WAP based information Retrieval System Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization Internet History Viewer Internet imaging localization and archiving Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks Intrusion Detection Prevention And Trace back Systems Inventory Manage System Inventory System ITP: An Image Transport Protocol for the Internet J2EE Project Titles J2me Implementation of POP3 Client System / J2ME Mail Client Server
  • 18. Implementation / Mail Downloader Using J2ME J2ME Mail Client Server J2ME Project Titles Java Network File Sharing System Java Productivity Aids Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader Java Visual Editor with Compiler Job Order System Library Management System Localized Sensor Area Coverage With Low Communication Overhead Location Aided Routing for Mobile Ad-Hoc Networks Location Aided Routing in Mobile ADHOC Networks for Secured Routing Location Based Spatial Query Processing In Wireless Broadcast Environments Material Forecasting and Management Solution Medical image processing Membership Management System Memory Learning Framework for Effective Image Retrieval Message Digest Messaging Service over TCP/IP in Local Area Network Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks Mobile Agents In Distributed Multimedia Database Systems Mobile Bank Mobile Banking Design & Implementation - IEEE Mobile Information Provider Mobile shop shopping cart System Modeling & Automated Containment of Worms Monitoring And Managing The Clusters Using JMX Multi Router Traffic Monitor Implementation Multi Router Traffic Monitoring System Multi Server Communication In Distributed Management System Multicast Live Video Broadcasting Using Real Time Transmission Protocol Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks Multithreaded Chat Server Multithreaded Peer to Peer Communication using Distributed Frameworks near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Network Analyze Network Analyzer Network Analyzer & Network Monitoring Tool using SNMP Network Border Patrol for Congestion Collapse Preventing System Network Border Patrol Preventing Congestion Collapse Network border patrol: preventing congestion collapse and promoting fairness in the Internet Network Component for XML Migration Network Packer Sniffer Implementation Network Security System in DNS using AD-HOC Networks Network Traffic Anomaly Detector Network Traffic, Packet Analyzer and Sniffer Neural Network for Recognition of Handwritten and Digits Neural Network for Recognition of Handwritten and Digits Backpropagation Neural Network-Based Face Detection Neural Networks for Handwriting Detection System Using Brain Net Neural Networks for Handwritten character and Digits Neural Networks for Unicode Optical Character Recognition New Model for Dissemination of XML Content Noise Reduction by Fuzzy Image Filtering Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video Novel Secure Communication Protocol for Ad Hoc networks [SCP] OCGRR: A New Scheduling Algorithm for Differentiated Services Network ODAM: An Optimized Distributed Association Rule Mining Algorithm On Guaranteed Smooth Switching For Buffered Crossbar Switches
  • 19. Online Bank Online Book Shop Online Customer Care Online Fashion Studios Online Handwritten Script Recognition Online Handwritten Script Recognition - IEEE Online Index Recommendations for High-Dimensional Databases Using Query Workloads Online Issue Tracking - Project Management Solutions Online Quiz Online Shopping Online Voting System Online Web shop Optimal Cryptographic Technique Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) Optimal Multicast Routing in Mobile Ad-Hoc Networks Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach Patient Care System Patient Management System Peer to Peer Messaging System using JXTA Peer-To-Peer Messaging Performance Evaluation of DISTANCE Routing Algorithm in MANET Performance Evaluation of RMI Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction Personal Authentication Using 3-D Finger Geometry Personal, adaptive, and content-based image retrieval imaging Precise Termination Condition of the Probabilistic Packet Marking Algorithm Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks Probabilistic Packet Marking For Large Scale IP Trace Back Property Management System Protection of Database Security via Collaborative Inference Detection Protocol Scrubbing: Network Security Through Transparent Flow Modification Proxy Server - Design and Implementation Public Key Validation for DNS security Extension Public Key Validation For DNS Security Extensions Public Key Validation for DNS Security Extensions Domain Naming Server Query Routing Optimization In Sensor Communication Networks QUIVER: Consistent Object Sharing For Edge Services Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks Reading and Writing AVI files using steganography Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security Reduction of Network Density for Wireless Ad-Hoc Networks Remote Computing using Thin Clients Remote medicine and Internet Reputation Based Trust Model for Peer to Peer eCommerce Communities Retrieving Files Using Content Based Search Retrieving Files using Content Based Searching and displaying them in Carousel View Retrieving Files Using Content Based Searching and presenting it in Carousel view Routing and Security in Mobile Ad Hoc Networks RTF to XML Converter Safety in telemedicine Sales and Purchase Management System Scalable and Efficient End-To-End Network Topology Inference Scalable Wireless Ad-Hoc Network Simulation using XTC Screen capture Utility
  • 20. Scribe Automation Secure Data Hiding and Extraction Using BPCS Secure Optimal Cyclic Cryptographic System Secure Password-Based Protocol for Downloading a Private Key - IEEE Secure Routing Protocol for mobile Ad-hoc Network Securing Image URL Securing User-Controlled Routing Infrastructures Security In Large Networks Using Mediator Protocols Selective Encryption of Still Image Send SMS To Cell Phone Through SMTP Mail Shortest Node Finder In Wireless Ad-Hoc Networks Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns Smart Knowledge Provider Static Image Hand Gesture Recognition using Neural Networks Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data Steganography for FTP through a Proxy Server Steganography for Hiding Data in Wave Audio Files Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App TCPIP Chat client server Using C# Tele cardiology Tele pathology and digital imaging Tele rehabilitation TELEMED: Telemedicine and eHealth Telemedicine and tele health Telemedicine portals Telemedicine software and devices Temporal Portioning of Communication Resources in an Integrated Architecture Textile Management System Textile Web Services The File Digest program and the C++ implementation of some Message-Digest algorithms Towards multi model interfaces for intrusion detection - IEEE Trainee Management System Trustworthy Computing Under Resource Constraints With The Down Policy Truth Discovery with Multiple Conflicting Information Providers on Web Tutoring systems Two Techniques for Fast Computation of Constrained Shortest Paths Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems Using Trigonometry and Pythagoras to Watermark an Image VB .Net Smart Mail Transfer Protocol Video Steganography Using Mobile Simulation Video techniques for medical images Virtual Private Network Virtual telemedicine Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light Voice Enabled Smart Browser VOIP Flexible & Efficient Voice Communicator, Voice Over IP VVoIP Voice with Video Over IP Networks Wallpaper Changer Utility Watermarking Relational Databases Using Optimization Based Techniques Wavelet Based Compression and Decompression Using Steganography Web Based Content Management System Web Services Win Application for Word Processing Windows Management Instrument (WMI) .Net 2005 Windows Management Instrumentation WMI Implementation Windows Multi File Search utility Wireless telemedicine Wireless Traffic Viewer Using J2ME
  • 21. Work Flow Management System Workflow Mining: Discovering Process Models from Event Logs XML Enabled SQL SERVER XTC Algorithm based Scalable Wireless AD-HOC Networking XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks IEEE Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management Advanced Host Monitor Enterprise Advanced instant Messenger & Message Broadcasting Agent-Based Testing for Web Application Allocating Applications in Distributed Computing using JINI Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm Anteater-A Service Oriented Architecture for High Performance Data Mining Anti-phishing Strategy Based on Visual Similarity Assessment Application Installer Asp web traffic analyzer ASP.net Ad Agency Project ASP.net Ad Release Management ASP.net Bank to Customer Internet Banking Solution Asset Management Solution (AMS) Asynchronous Server Interaction using AJAX and XML Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion ATM Card & CMS application Back Office Management Authenticating Network Attached Storage - IEEE Authentication of Digital Images by Encryption and Decryption with Primary Key Implementation using LSB Algorithm and Steganography Bandwidth Congestion Control using Authentication Service for Automatic and Dynamic Reconfiguration System Bluetooth based Mobile Phone Photo Browser Bluetooth equipped mobile phones to support synchronous interaction with public displays Bug Tracking System - Comprehensive Bug Tracking & Change Management CAC Connection Admission Control using ATM Networks Implementation Call Centre Management System CALTOOL Computer Aided Learning Tool Career tracer - communicator between job seekers and job providers Cargo Tracking System Design & implementation Client FTP Frame Communication Systems Complete email system with an email server and an email client Component based Architecture for WAP Compliant Transactional Services Components Framework for Developer Network using MVC Pattern Computer Resource Management System (CRMS) Computerized system for Extracting Abstract from the given source document, Abstract solutions Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Content management systems (CMS) for University & Education portal Context Oriented Search Engine with Web Crawler Control System for the Maintenance of Computers Converting RTF into XML using the TEI Lite DTD Credit card system - web-based system facilitates on line operations CRM based Sales of Fleet & Services Management Cross-Layer Optimization in TCP/IP networks Crypt kit A real time cryptographic system for security over the networks - IEEE Cryptography Data and Video Streaming System Data Communication and File Transferring using Decreased Latency and Block
  • 22. Tracker Data Encryption and Compression System with Optimization Data Hiding in Audio Files with PBE Encryption Data Mining Data Security in Ad hoc Networks Using Multipath Routing DDE Thin Client Midlet for Limited Devices using Java Communication Dealership Management System - Dealers information & Dealings Process Manager Defect Tracking Tool - Enterprise Project and Defect Tracking System Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server Denial of Service against the Domain Name System Design & Development of a Distributed, Scalable File Sharing & Access System with Security Design & Implementation of Online Bidding & Auction Designing Test Automation System using Native System Input Events Development of Web enabled Online, Dynamic ATM Card Management System Digital Image Processing Frequency Domain Digital Image Processing Time Domain Digital Image Processing with Multi Domain Approach IEEE Digital Rights Management (DRM) using SOAP Digital Signature Verification using Artificial Neural Networks Digital Signatures System Design & Implementation Digital Water Marking for Video Piracy Detection Distance Learning System Implementation Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE Distributed Database System for online Shopping & Store Distributed Cache Updating for the Dynamic Source Routing Protocol Distributed Channel Management System Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic Peer Groups Distributed File Sharing System for Peer to Peer Network Distributed Token Circulation in Mobile Ad Hoc Networks Distributed Web Service for On-Line Coursework Submission Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks Document Archival Management System Electronic Archival Design Duplex Messaging for Enterprise Systems Dynamic Character & Pattern Recognition using Neural Networks Dynamic College information System & Data integrity Maintenance Dynamic Server Replication System Dynamic Load Balancing in Distributed Systems in The Presence Of Delays A Regeneration Theory Approach Dynamic Signature Verification Using Pattern Recognition EAI Approach Implementation of EAI in Hotel Management System E-Boutique - web portal design and implementation eCareer & Consultancy Service Online E-Commerce Shopping cart for B2B Implementation Effective & Efficient Freight Management System Effective Packet Analyzing and Filtering System for ATM Network Efficient Contiguous Data & Video Streamer with Buffer Management Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol Efficient Network Routing Protocol with Effective Data Transfer without Packet Loss Over the ADHOC Networks eGovernance Design & Implementation System EJB Implementation Of Distributed Online Stock Maintenance and Trading E-Learning - web portal design and implementation Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET™S - IEEE E-Mail & SMS Assistant Design & Implementation EMail Server Using Multithreaded Sockets Embedding in Video Steganography Employee Profile Management System An Effective Employee Management Resource Employee Training Tracking System E-Music web-based design system provides online Music Enterprise Mailing System validation with DNS query using MX Records
  • 23. ER Schema Analyzer with Data Streaming ERP & CRM, An Effective implementation of ERP with CRM Solutions eSearch - A Search Engine Design & Implementation eSearch - Web based search engine ESecure Transaction Design & Implementation eTutor - Online Tutorial, revolutionizing the tutoring industry Evaluating the Performance of Versatile RMI Approach in Java Exam Scheduler in ASP.net Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols Fast Algorithms for Mining Association Rules File Transfer Protocol - FTP Implementation Monitoring & Managing the Clusters using JMX IEEE Financial Accounts - Integrated Financial Accounting Solutions Fine Grained Layered Multicast using STAIR Fire wall - Customized Firewall for internet security & inter-network traffic gateway Fully Distributed Proactively Secure Threshold Multi signature Scheme Genetic Algorithm Based Train Simulation Using Concurrent Engineering Graphical Network Browser Grid Computing Grid information Retrieval System Heterogeneous Networks Control and Implementation Hierarchical Modeling and Analysis for Grid Service Reliability Homogeneous Networks & Control Implementation Homogenous Network Control and Implementation Honey Pots A Security System to Identify Black Hat Community in the Networks Hospital Management system HR Consultancy and Applicant Database Management with XML Human Resource Management Solutions (HRMS) Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks Image Compression and Analysis with MSE & PSNR Technique IEEE Image Compression and Decompression using Huffman™s Image File compression & Transmission across the Network by MDA (Message Digest Algorithm) Image Manipulation for Face Recognition Image Processing XTC Algorithm based Scalable Wireless AD-HOC Networking IEEE Image Rendering for Grid Technology Image Stream Transfer Using Real Time Transmission Protocol IMAP - Internet Mail Access Protocol using Internet Engineering Task Force Implementation of Broadcast Messaging System using Multi Threading Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and Administration in IP Network Implementation of Packet Filtering Firewall in Linux Systems Implementation of Peer-to-Peer Communication System with a Centralized Name Server in Linux Network Implementation of Secured & Encrypted Data Transmission over the Web Implementation of Security Kernel and Firewall using Java Implementation of Wireless Application Protocol Gateway in Mobile Network Implementation of Wireless Communication Gateway for PC To Mobile Network Route using Internet Protocol Information Forensics and Security Insertion of Links of navigation into the Web Pages Instant Messaging and Presence Technology for College Campuses Instant Smart Messenger System Insurance System, Online Insurance Solutions Provider Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support Integrated Data Persistence & Synchronization in PDA™s Integrated Mail Transfer Agents using JAF Integrating Data and Voice Networks - VoIP
  • 24. Intelli Mobile Banking System Design & Implementation Intelli Shopping Cart & Assistant System Intelli WAP System Implementation / WAP based information Retrieval System Inter Office Messaging System IOMS, Office Automation System Internet Banking Project in ASP.net Intranet Mailing System design and implementation Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP) Intrusion Detection in Wireless Ad-hoc Network Investigation and Analysis of Packets Transformation in an Ethernet Network System Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions J Chat A Chatting System over the Internet or local networks J2EE based Quick Car Rental Services Implementation J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME Java based Spam Filter implementation Java Grid Using Grid Computing System JAVA J2ME Bluetooth based Application for PDA / Mobile Devices Java Network File Sharing System Java Network Flow Analyzer Java Network Monitor / Java Network Browser Java RMI-based application which manages load balancing on heterogeneous clusters Java SMTP, POP, Web Email Server Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request Java Visual Editor with Compiler Java-to-XML Data Binding tool JChart for complex business & scientific charts JEDITOR - Customized Java Editor Job Portal Implementation with intelli power features Jobs.com A Service Provider for Employer & Employee JSAFE - Rijndael Algorithm based Encryption & Decryption JSP - Personal information Manager JSP based Shopping Cart Implementation Knowledge and Data Engineering Learning Technologies Location Aided Routing for Mobile Ad Hoc Networks Location Aided Routing in Mobile ADHOC Networks for Secured Routing IEEE Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks Logistics - freight forwarding software solution logistics Loyalty Business Tracker Application System Media Gateway Control Protocol Network Media Streaming in Mobile using J2ME Toolkit Media streaming using J2ME Mobile Agent Software for Payroll Processing System Mobile Agents in a Distributed Multimedia Database System IEEE Approach Mobile Agents in Distributed Multimedia Database Systems Mobile Banking Design & Implementation - IEEE Mobile based Network Monitoring System Mobile Clients Support GUI Systems design Mobile Computing Mobile Info Service Provider Online Data & information Access System Modeling and using imperfect Context Information Modern English Spell Checking tool Design & Implementation Multi Language Mailing system Design & implementation Multi Router Traffic Monitor Implementation Multi Threaded implementation with Pull / Push Technology Multimedia Multimedia Messaging Service - MMS Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems Multiplex SMS relay over GSM using AT commands Multithreaded Networked Data Injector & Extraction Server & Client for Cryptographic Services
  • 25. Multithreaded Peer to Peer Communication using Distributed Frameworks Natural Language-Based Interface for Querying a Video Database Net Banking Services & Solutions Net Banking Services Design & Implementation Net Conference Design & Implementation Net Monitoring and Management using SNMP Network Administrators to Monitor VPN and SSL Connections Network Analyzer & Network Monitoring Tool using SNMP Network Analyzer, Design & Implementation Network Border Patrol for Congestion Collapse Preventing System Network Component Development for XML Document Migration Network Component for XML Migration Network Document Management & Versioning System Network Load Balancing and Redistribution of the Traffic Over the Networks using Grid Computing System Network Packer Sniffer Implementation Network Proctor & Action Coordinator - The Network Monitoring Daemon IEEE Network Security Network Security System in DNS using AD-HOC Networks IEEE Network Time Tracker system Network Traffic Anomaly Detector IEEE Network Traffic, Packet Analyzer and Sniffer Networking Network-Wide Prediction of BGP Routes Neural Network based Character Pattern Identification System Neural Networks for Handwritten character and Digits News Feed Syndication Generation over Heterogeneous Networks NIRA: A New Inter-Domain Routing Architecture On Demand Audio / Video Streaming and rendering Over IP using UDP On Self-Fish Routing in Internet Like Environments Online Airline Reservation Web portal for Traveling service provider On-Line Analytical Processing - Maintenance of Data collection & Reports Online ATM Banking & online transactions Online Auction & Bidding System With Multi Brand & Product Selection Online Auction with featured shopping cart Online Body Shopping System with Auto Mailing feature On-Line Book store with online Shopping cart Online Detection and Prevention of Phishing Attacks Online Distributed Human resources Management System Online E Banking provides online transactions Online Enterprise Resources Planning Web Enabled ERP implementation with Distributed Database system Online Event Management with featured intelli system Online Handwritten Script Recognition IEEE Online Health Care Management Solutions Online Hospital info System with interactive Services & Universal Medical Portal with Adviser Online Job Consultancy Services Online PDA Primary Domain Controller System Online Portfolio Manager Equity Trading & Mutual Funds management Online Resume Mart System Design Online Task Management with fully featured intelli System Online Tutorials - global forum for educators and students Online VRS - Vehicle Reservation System Online Web based Complete Recruitment System Online web enabled Bug Tracking System Online Web Shop Mall - Web Shop Site Online Workflow Service Manager & Automation OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) IEEE Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments P2P (peer-to-peer networking) messaging system-using JXTA IEEE
  • 26. Patient Keeper: Medical Application on mobile Phone Pattern Analysis Peer-to-Peer implementation Multithreaded Technology with tuple space Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time IEEE Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time IEEE pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval Pharmaceutical Distribution Automation Software system Portable and Generic tool for Web Applications Pre Active Circulated Cache Updating using on Demand Routing Protocol Proactive Port Scanning for Secure Computing Environment Professional time and task management tool Project based Time & efforts Tracking System Implementation Project Scrutinizer Efficient Project Tracking System Project Tracking & It Portfolio Management System Proxy Server - TransProxy Public Key Validation for DNS Security Extensions Domain Naming Server Public-Key Cryptography Extensions into Kerberos RAT (Remote Assistance Tool) is a Java Application Remote City Mapping Implementation using J2ME Remote Computing using Thin Clients Remote Desktop Capture system Remote Electricity Billing System Automation & Implementation EJB Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE) Remote Viewer A Remote Desktop viewer for an Intranet Environment Resource Planning Tool Design & Implementation (RPT) Retrieving Files using Content Based Searching and Displaying them in Carousel View Retrieving Files Using Content Based Searching and presenting it in Carousel view Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed Environments Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc Networks Route Reservation in Ad Hoc Wireless Networks Routing and Security in Mobile Ad Hoc Networks Routing Simulator - An Efficient end to end Packet Delivery system Sales force Automation Implemenation Sales Order Processing and invoicing (SOPI) Scalable Wireless Ad-Hoc Network Simulation using XTC IEEE Schema based Enterprise Charting & Reporting for Desktops Scripting JAX-WS Secure (RSA) Chat Server Secure Computing Secure Data Hiding and Extractions using BPCS Secure Electronic Transaction System Secure Optimal Cyclic Cryptographic System Secure Password-Based Protocol for Downloading a Private Key Secure Routing Protocol for mobile Ad-hoc Network Secure Web Cache Proxy Server Secure web conferencing on any platform using Java Secured Network manager Secured Network Manager & Tracker using JMX Selective Encryption of Still Image Semantic Web-Based Approach to Knowledge Management for Grid Applications SFTP Server - Synchronous File Transfer Communicator Shares & Stock Management system Portfolio Manager Implementation Simple a Pre-Provisioning Scheme to Enable Fast Restoration SIP - Session Initialization Protocol, Chatting Site-based Mapping for parallel proxy servers with fewer TCP connections SLA-Driven Clustering of QOS Aware Application Servers Smart Network Access Using Mobile Bluetooth, J2ME
  • 27. SMTP based JAVA MAIL CLIENT Graphical User Interface system SNMP Trap Gateway - Network Management Software Engineering Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Software Routing Packet Filtering & Capturing SSL Back-End Forwarding Scheme in Cluster-Based Web Servers StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense Static Image Hand Gesture Recognition using Neural Networks System to Mobile Communication TCP-LP: Low Priority Service via End™Point Congestion Control Telecom Inventory maintenance and services Application with error tracking Thin Client Network Implementation Time Synchronization system using java Tool for Performance Profiling of Web Sites Training Organization Management System Implementation Trustworthy Mobile Agent Infrastructure for Network Management Two Factor Authentication using Mobile Phones Ultimate Online Jobsite with intelli Search engine Unified Interface for Multiple Naming Service using JNDI uPortal University Portal & Education Grid information Service Provider User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony vehicle Insurance Project in ASP.net Versioning Control System using JAVA Vertical Market Information Providing System Implementation Video Transmission using SIP - IEEE Virtual Private Network using JAVA Voice based XML Phone Survey System Voice Web Browser Implementation VOIP Flexible & Efficient Voice Communicator, Voice Over IP VoIP Voice with Video Over IP Networks VPersonalized E-mail Management at Network Edges VSAT Simulation and Smart Cache Loader WAP based information Retrieval System Web based Chatting - Multi User Voice Chat WAP based Route Tracing and Mailing WAP Enabled Greeting Card System - WAP Enabled Device User to send greeting card to other WAP Enabled Devices Watermark Based Digital Rights Management Web Applications Web Based Bug Tracking System Implementation Web based Customer Support System Web based Distributor Information Providing Services Web based Job Site Management system A Exclusive Job Portal with Mega features Web based Matrimonial Services, A Desi Matrimony web Portal Web based Online Book Store Web based Online Library System Workflow based Complaint Management System Web Enabled Automated Manufacturing System - WEAMS Web Enabled Supply Chain Management Web Testing Tool Application - Designed to test & measure performance Wireless Application Programming with J2ME and Bluetooth Wireless Communication wireless distributed intrusion detection system and a new attack model Wireless Sensor Networks XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data XML Data Stores: Emerging Practices XML Migration - Implementation for XML format from Database System XML Parser for EMail Resumes / Resume Tracking & allotment using XML XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks Zero Installation of Client DB Driver using RPC