Wednesday, June 30, 2010
Tuesday, June 29, 2010
Some words for Ujwal
I want to be with you, But you're millions of miles away. I wish you would call just to ask about my day. It would make things so much better if I could hear your voice, I guess I can't complain too much, it just wasn't your choice. You were always there for me through both the good times and the bad. You were always there to laugh with me, or to help me when I'm sad. Down at the mall even though we had no money, Laughing at anything and everything, yet none of it was funny. Driving around the block, or baking things all day, We never really ran out of things to say. You're locked up only a few hours away now, but it seems so far. I wish I could be down there, where you are. Why do two best friends you'll ever know, Have to be split up, because one is gone? Now that we're so far apart, I love you even more. Maybe we both love too much, But, hey, that's what friends are for. Each time they say your name, A tear forms in my eye, How can I be happy, If all I seem to do is cry? You weren't supposed to leave me, This has to be a dream. I cant accept your absence, And take goodbye for what it means. You left me lost and broken, I still can't find my way. days have passed real slowly, But it's harder every day. I will never forget you, Though we are far apart, I miss you so much, And love you with all my heart.
Gourinath
Gourinath
Results 2010
hey friends..
very soon our results will be hosted on
www.shimoga.net/dipresults.aspx
www.mlbpbgm.com
and also on the same site too... so keep an eye on this
Gourinath
very soon our results will be hosted on
www.shimoga.net/dipresults.aspx
www.mlbpbgm.com
and also on the same site too... so keep an eye on this
Gourinath
JAVA Based Project list as per IEEE
1. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks – IEEE
2. A Reputation Based Trust Model for Peer to Peer eCommerce Communities – IEEE
3. XTC Algorithm based Scalable Wireless AD-HOC Networking – IEEE
4. Mobile Banking Design & Implementation - IEEE
5. Retrieving Files using Content Based Searching and displaying them in Carousel View – IEEE
6. Distributed Data mining in Credit Card Fraud Detection Analysis – IEEE
7. E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management – IEEE
8. Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader
9. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
10. VOIP – Flexible & Efficient Voice Communicator, Voice Over IP
11. Authenticating Network Attached Storage - IEEE
12. Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET'S - IEEE
13. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) – IEEE
14. Digital Image Processing with Multi Domain Approach – IEEE
15. Static Image Hand Gesture Recognition using Neural Networks
16. CAC – Connection Admission Control using ATM Networks Implementation – IEEE
17. Distributed Component Router based Supply Chain Management System – SCM – IEEE
18. Intelli WAP System Implementation / WAP based information Retrieval System
19. Proxy Server - Design and Implementation
20. Public Key Validation for DNS Security Extensions – Domain Naming Server
21. E-Recruitment System - Dynamic Online Professional Recruitment & Management System
22. Secure Password-Based Protocol for Downloading a Private Key - IEEE
23. Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
24. Network Security System in DNS using AD-HOC Networks – IEEE
25. Secure Optimal Cyclic Cryptographic System – IEEE
26. Multithreaded Peer to Peer Communication using Distributed Frameworks– IEEE
27. Building Intelligent Shopping Assistant using Data mining technique for Web Services – IEEE
28. Network Analyzer & Network Monitoring Tool using SNMP
29. Remote Computing using Thin Clients
30. VVoIP – Voice with Video Over IP Networks
31. Dynamic Character & Pattern Recognition using Neural Networks
32. Online Handwritten Script Recognition - IEEE
33. Towards multi model interfaces for intrusion detection - IEEE
34. Proxy Server - A Smart Sharing System with Fire wall Protection, Customized Firewall for internet security & inter-network traffic gateway – IEEE
35. Location Aided Routing in Mobile ADHOC Networks for Secured Routing – IEEE
36. Network Border Patrol for Congestion Collapse Preventing System – IEEE
37. Defect Tracking Tool - Enterprise Project and Defect Tracking System – IEEE
38. Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification
39. Multi Router Traffic Monitor Implementation
40. Homogeneous Networks & Control Implementation
41. A/I Net A Network that Integrates ATM and IP - IEEE
42. E–Secure Transaction – Design & Implementation – IEEE
43. Image Compression and Analysis with MSE & PSNR Technique - IEEE
44. Crypt kit – A real time cryptographic system for security over the networks - IEEE
45. Efficient Contiguous Data & Video Streamer with Buffer Management
46. Distributed Component Router Based CRM – Customer Relationship Management– IEEE
47. Network Traffic, Packet Analyzer and Sniffer
48. Digital Steganography: Hiding Data within Data
49. Integrated Development Environment using JSWING – IDE JSWING
50. ERP Application – integrated Enterprise Solutions with Strategic advantages
51. Grid information Retrieval System
52. Network Packer Sniffer Implementation
53. Online Issue Tracking - Project Management Solutions
54. E-HealthCare - Distributed HealthCare and A Strategic Management System
55. Data mining implementation for Credit Cards Application Processing System
56. Dynamic University Linking & Data integrity Maintenance
57. E-Sales Order Processing System
58. RTF to XML Converter
59. Material Forecasting and Management Solution
60. Effective & Efficient Freight Management System
61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
62. XML Migration - Implementation for XML format from Database System
63. Shares & Stock Management system – Portfolio Manager Implementation
64. Online Task Management with fully featured intelli System
65. Vertical Market Information Providing System Implementation
66. Insertion of Links of navigation into the Web Pages
67. Inter Office Messaging System – IOMS, Office Automation System
68. Web based Matrimonial Services, A Desi Matrimony web Portal
69. Online Auction & Bidding System With Multi Brand & Product Selection
70. Online Body Shopping System with Auto Mailing feature
71. Online Job Consultancy Services
72. Net Banking Services & Solutions
73. Online Web Shop Mall - Web Shop Site
74. Intelli Shopping Cart & Assistant System
75. Online VRS - Vehicle Reservation System
76. Distributed Web Service for On-Line Coursework Submission
77. Document Archival Management System – Electronic Archival Design
78. Remote Electricity Billing System Automation & Implementation – EJB
79. Dynamic College information System & Data integrity Maintenance
80. Computerized system for Extracting Abstract from the given source document, Abstract solutions
81. eCareer & Consultancy Service Online
82. eGovernance Design & Implementation System
83. EAI Approach – Implementation of EAI in Hotel Management System
84. Online Event Management with featured intelli system
85. Online Hospital info System with interactive Services & Universal Medical Portal with Adviser
86. Human Resource Management Solutions (HRMS)
87. Online Web based Complete Recruitment System
88. Distributed Database System for online Shopping & Store
89. Web based Distributor Information Providing Services
90. Insurance System, Online Insurance Solutions Provider
91. Integrating Data and Voice Networks - VoIP
92. Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
93. Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
94. Mobile based Network Monitoring System
95. System to Mobile Communication
96. Video Transmission using SIP - IEEE
97. Web based Chatting - Multi User Voice Chat
98. Network Traffic Anomaly Detector – IEEE
99. SIP - Session Initialization Protocol, Chatting
100. Monitoring & Managing the Clusters using JMX – IEEE
101. Mobile Agents in a Distributed Multimedia Database System – IEEE Approach
102. Peer-to-Peer implementation Multithreaded Technology with tuple space
103. Network Proctor & Action Coordinator - The Network Monitoring Daemon – IEEE
104. P2P (peer-to-peer networking) messaging system-using JXTA – IEEE
105. Secured Network manager
106. Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time – IEEE
107. Scalable Wireless Ad-Hoc Network Simulation using XTC – IEEE
108. Voice Web Browser Implementation
109. Network Analyzer, Design & Implementation
110. Routing Simulator - An Efficient end to end Packet Delivery system
111. Remote Viewer – A Remote Desktop viewer for an Intranet Environment
112. Remote City Mapping Implementation using J2ME
113. Mobile Clients Support GUI Systems design
114. JAVA J2ME – Bluetooth based Application for PDA / Mobile Devices
115. Bluetooth equipped mobile phones to support synchronous interaction with public displays
116. Bluetooth based Mobile Phone Photo Browser
117. IMAP - Internet Mail Access Protocol using Internet Engineering Task Force
118. Online PDA – Primary Domain Controller System
119. Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request
120. Portable and Generic tool for Web Applications
121. Network Document Management & Versioning System
122. Dynamic Server Replication System
123. Instant Smart Messenger System
124. Multi Threaded implementation with Pull / Push Technology
125. Tool for Performance Profiling of Web Sites
126. Network Time Tracker system
127. Workflow based Complaint Management System
128. Project Scrutinizer – Efficient Project Tracking System
129. Project Tracking & It Portfolio Management System
130. JSP based Shopping Cart Implementation
131. ERP & CRM, An Effective implementation of ERP with CRM Solutions
132. Financial Accounts - Integrated Financial Accounting Solutions
133. Multi Language Mailing system – Design & implementation
134. uPortal – University Portal & Education Grid information Service Provider
135. AD HOC NETWORK BASED PROJECTS
136. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) – IEEE
137. XTC Algorithm based Scalable Wireless AD-HOC Networking – IEEE
138. Network Security System in DNS using AD-HOC Networks – IEEE
139. Location Aided Routing in Mobile ADHOC Networks for Secured Routing – IEEE
140. J2ME PROJECTS
141. Mobile Banking Design & Implementation - IEEE
142. Intelli WAP System Implementation / WAP based information Retrieval System
143. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
144. Remote City Mapping Implementation using J2ME
145. Mobile Clients Support GUI Systems design
146. JAVA J2ME – Bluetooth based Application for PDA / Mobile Devices
147. Bluetooth equipped mobile phones to support synchronous interaction with public displays
148. Bluetooth based Mobile Phone Photo Browser
149. Mobile Info Service Provider – Online Data & information Access System
150. IMAGE PROCESSING PROJECTS
151. Digital Image Processing with Multi Domain Approach – IEEE
152. Static Image Hand Gesture Recognition using Neural Networks
153. Digital Signature Verification using Artificial Neural Networks
154. Dynamic Character & Pattern Recognition using Neural Networks
155. Image Compression and Analysis with MSE & PSNR Technique – IEEE
156. Online Handwritten Script Recognition – IEEE
157. COMMUNICATION PROJECTS
158. ? System to Mobile Communication
159. ? Video Transmission using SIP - IEEE
160. ? Efficient Contiguous Data & Video Streamer with Buffer Management
161. ? Web based Chatting - Multi User Voice Chat
162. ? SIP - Session Initialization Protocol, Chatting
163. ? VOIP – Flexible & Efficient Voice Communicator, Voice Over IP
164. ? VVoIP – Voice with Video Over IP Networks
165. SECURITY PROJECTS
166. ? Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET'S - IEEE
167. ? Crypt kit – A real time cryptographic system for security over the networks - IEEE
168. ? Secure Optimal Cyclic Cryptographic System
169. ? JSAFE - Rijndael Algorithm based Encryption & Decryption
170. ? Secured Network manager
171. ? E–Secure Transaction – Design & Implementation
172. ? Fire wall - Customized Firewall for internet security & inter-network traffic gateway
173. ? Secure Password-Based Protocol for Downloading a Private Key
174. NETWORKING PROJECTS
175. ? A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks – IEEE
176. ? Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
177. ? Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
178. ? Authenticating Network Attached Storage - IEEE
179. ? CAC – Connection Admission Control using ATM Networks Implementation
180. ? Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
181. ? Efficient Contiguous Data & Video Streamer with Buffer Management
182. ? Dynamic Server Replication System
183. ? Mobile based Network Monitoring System
184. ? Monitoring & Managing the Clusters using JMX – IEEE
185. ? Multi Router Traffic Monitor Implementation
186. ? Grid information Retrieval System
187. ? Homogeneous Networks & Control Implementation
188. ? Location Aided Routing in Mobile ADHOC Networks for Secured Routing – IEEE
189. ? Mobile Agents in a Distributed Multimedia Database System – IEEE Approach
190. ? Multithreaded Peer to Peer Communication using Distributed Frameworks
191. ? Network Analyzer & Network Monitoring Tool using SNMP
192. ? Network Border Patrol for Congestion Collapse Preventing System
193. ? Network Packer Sniffer Implementation
194. ? Network Proctor & Action Coordinator - The Network Monitoring Daemon – IEEE
195. ? Network Security System in DNS using AD-HOC Networks – IEEE
196. ? Network Traffic Anomaly Detector – IEEE
197. ? Network Traffic, Packet Analyzer and Sniffer
198. ? Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) – IEEE
199. ? P2P (peer-to-peer networking) messaging system-using JXTA – IEEE
200. ? Peer-to-Peer implementation Multithreaded Technology with tuple space
201. ? Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time – IEEE
202. ? Public Key Validation for DNS Security Extensions – Domain Naming Server
203. ? Remote Computing using Thin Clients
204. ? Retrieving Files using Content Based Searching and Displaying them in Carousel View
205. ? Routing Simulator - An Efficient end to end Packet Delivery system
206. ? Secured Network manager
207. ? VOIP – Flexible & Efficient Voice Communicator, Voice Over IP
208. ? XTC Algorithm based Scalable Wireless AD-HOC Networking – IEEE
209. Modern English Spell Checking tool Design & Implementation
210. Web Based Bug Tracking System Implementation
211. E-Mail & SMS Assistant – Design & Implementation
212. Mobile Agent Software for Payroll Processing System
213. J2EE based Quick Car Rental Services Implementation
214. Application Installer
215. Online ATM Banking & online transactions
216. On-Line Book store with online Shopping cart
217. Proxy Server - TransProxy
218. Career tracer - communicator between job seekers and job providers
219. J Chat – A Chatting System over the Internet or local networks
220. Client FTP Frame
221. Online Airline Reservation Web portal for Traveling service provider
222. Computer Resource Management System (CRMS)
223. Content management systems (CMS) for University & Education portal
224. Credit card system - web-based system facilitates on line operations
225. Control System for the Maintenance of Computers
226. Web based Customer Support System
227. Distributed Channel Management System
228. Digital Signatures System Design & Implementation
229. Distance Learning System Implementation
230. Online E Banking provides online transactions
231. E-Boutique - web portal design and implementation
232. eSearch - Web based search engine
233. Employee Training Tracking System
234. E-Learning - web portal design and implementation
235. E-Music web-based design system provides online Music
236. Web Enabled Automated Manufacturing System - WEAMS
237. Fire wall - Customized Firewall for internet security & inter-network traffic gateway
238. File Transfer Protocol - FTP Implementation
239. Hospital Management system
240. HR Consultancy and Applicant Database Management with XML
241. Intranet Mailing System design and implementation
242. Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions
243. Web based Online Library System
244. Web based Online Book Store
245. Jobs.com – A Service Provider for Employer & Employee
246. JChart for complex business & scientific charts
247. JSAFE - Rijndael Algorithm based Encryption & Decryption
248. Loyalty Business Tracker Application System
249. Mobile Clients Support GUI Systems design
250. Net Banking Services Design & Implementation
251. Net Conference Design & Implementation
252. Design & Implementation of Online Bidding & Auction
253. Online Resume Mart System Design
254. Online Tutorials - global forum for educators and students
255. JEDITOR - Customized Java Editor
256. eTutor - Online Tutorial, revolutionizing the tutoring industry
257. Pharmaceutical Distribution Automation Software system
258. Remote Desktop Capture system
259. eSearch - A Search Engine Design & Implementation
260. SMTP based JAVA MAIL CLIENT Graphical User Interface system
261. Java based Spam Filter implementation
262. Telecom Inventory maintenance and services Application with error tracking
263. Project based Time & efforts Tracking System Implementation
264. Training Organization Management System Implementation
265. Web Testing Tool Application - Designed to test & measure performance
266. Web based Job Site Management system – A Exclusive Job Portal with Mega features
267. Employee Profile Management System – An Effective Employee Management Resource
268. Development of Web enabled Online, Dynamic ATM Card Management System
269. Time Synchronization system using java
270. ATM Card & CMS application Back Office Management
271. Honey Pots – A Security System to Identify Black Hat Community in the Networks
272. Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP)
273. Bandwidth Congestion Control using Authentication Service for Automatic and Dynamic Reconfiguration System
274. Network Load Balancing and Redistribution of the Traffic Over the Networks using Grid Computing System
275. Media Streaming in Mobile using J2ME Toolkit
276. Efficient Network Routing Protocol with Effective Data Transfer without Packet Loss Over the ADHOC Networks
277. Data Communication and File Transferring using Decreased Latency and Block Tracker
278. Authentication of Digital Images by Encryption and Decryption with Primary Key Implementation using LSB Algorithm and Steganography
279. Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol
280. Implementation of Security Kernel and Firewall using Java
281. Media streaming using J2ME
282. Unified Interface for Multiple Naming Service using JNDI
283. Multiplex SMS relay over GSM using AT commands
284. Zero Installation of Client DB Driver using RPC
285. Integrated Data Persistence & Synchronization in PDA's
286. Distributed Cache Updating for the Dynamic Source Routing Protocol
287. Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic Peer Groups
288. An Agent-Based Testing for Web Application
289. TCP-LP: Low Priority Service via End–Point Congestion Control
290. On Self-Fish Routing in Internet Like Environments
291. Schema based Enterprise Charting & Reporting for Desktops
292. ER – Schema Analyzer with Data Streaming
293. Data Hiding in Audio Files with PBE Encryption
294. Duplex Messaging for Enterprise Systems
295. Integrated Mail Transfer Agents using JAF
296. Designing Test Automation System using Native System Input Events
297. Components Framework for Developer Network using MVC Pattern
298. Asynchronous Server Interaction using AJAX and XML
299. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
300. An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management
301. An Anti-phishing Strategy Based on Visual Similarity Assessment
302. News Feed Syndication Generation over Heterogeneous Networks
303. Enterprise Mailing System validation with DNS query using MX Records
304. Component based Architecture for WAP Compliant Transactional Services
305. On Demand Audio / Video Streaming and rendering Over IP using UDP
306. Proactive Port Scanning for Secure Computing Environment
307. DDE Thin Client Midlet for Limited Devices using Java Communication
308. Denial of Service against the Domain Name System
309. Digital Rights Management (DRM) using SOAP
310. Multithreaded Networked Data Injector & Extraction Server & Client for Cryptographic Services
311. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
312. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
313. Anteater-A Service Oriented Architecture for High Performance Data Mining
314. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
315. Cross-Layer Optimization in TCP/IP networks
316. Data Security in Ad hoc Networks Using Multipath Routing
317. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server
318. Distributed Token Circulation in Mobile Ad Hoc Networks
319. Versioning Control System using JAVA
320. Virtual Private Network using JAVA
321. Voice based XML Phone Survey System
322. VSAT Simulation and Smart Cache Loader
323. WAP based information Retrieval System
324. WAP based Route Tracing and Mailing
325. WAP Enabled Greeting Card System - WAP Enabled Device User to send greeting card to other WAP Enabled Devices
326. Web Enabled Supply Chain Management
327. Wireless Application Programming with J2ME and Bluetooth
328. Workflow based Complaint Management System
329. XML Parser for E–Mail Resumes / Resume Tracking & allotment using XML
330. Instant Messaging and Presence Technology for College Campuses
331. Intrusion Detection in Wireless Ad-hoc Network
332. Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols
333. Fine Grained Layered Multicast using STAIR
334. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks
335. Network-Wide Prediction of BGP Routes
336. NIRA: A New Inter-Domain Routing Architecture
337. Online Detection and Prevention of Phishing Attacks
338. OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET
339. A Natural Language-Based Interface for Querying a Video Database
340. A Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc Networks
341. A Secure Routing Protocol for mobile Ad-hoc Network
342. A Trustworthy Mobile Agent Infrastructure for Network Management
343. A wireless distributed intrusion detection system and a new attack model
344. Allocating Applications in Distributed Computing using JINI
345. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
346. Routing and Security in Mobile Ad Hoc Networks
347. Scripting JAX-WS
348. Simple a Pre-Provisioning Scheme to Enable Fast Restoration
349. Site-based Mapping for parallel proxy servers with fewer TCP connections
350. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
351. Watermark Based Digital Rights Management
352. A Semantic Web-Based Approach to Knowledge Management for Grid Applications
353. A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
354. Context Oriented Search Engine with Web Crawler
355. Converting RTF into XML using the TEI Lite DTD
356. CRM based Sales of Fleet & Services Management
357. Data and Video Streaming System
358. Data Encryption and Compression System with Optimization
359. Dealership Management System - Dealers information & Dealings Process Manager
360. Defect Tracking Tool - Enterprise Project and Defect Tracking System
361. Design & Development of a Distributed, Scalable File Sharing & Access System with Security
362. Digital Image Processing – Frequency Domain
363. Digital Water Marking for Video Piracy Detection
364. Distributed Database System for online Shopping & Store
365. Distributed File Sharing System for Peer to Peer Network
366. E-Commerce Shopping cart for B2B Implementation
367. EJB Implementation Of Distributed Online Stock Maintenance and Trading
368. Graphical Network Browser
369. Heterogeneous Networks Control and Implementation
370. Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and Administration in IP Network
371. Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments
372. Patient Keeper: Medical Application on mobile Phone
373. VPersonalized E-mail Management at Network Edges
374. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
375. XML Data Stores: Emerging Practices
376. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
377. Image File compression & Transmission across the Network by MDA (Message Digest Algorithm)
378. Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE)
379. Media Gateway Control Protocol Network
380. Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm
381. Route Reservation in Ad Hoc Wireless Networks
382. Pre Active Circulated Cache Updating using on Demand Routing Protocol
383. Dynamic Load Balancing in Distributed Systems in The Presence Of Delays – A Regeneration Theory Approach
384. A Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed Environments
385. An Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS
386. A Fully Distributed Proactively Secure Threshold Multi signature Scheme
387. Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes
388. A Hierarchical Modeling and Analysis for Grid Service Reliability
389. Secure Data Hiding and Extractions using BPCS
390. SLA-Driven Clustering of QOS Aware Application Servers
391. User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony
392. Advanced Host Monitor Enterprise
393. Advanced instant Messenger & Message Broadcasting
394. Bug Tracking System - Comprehensive Bug Tracking & Change Management
395. Call Centre Management System
396. CALTOOL – Computer Aided Learning Tool
397. Cargo Tracking System Design & implementation
398. Complete email system with an email server and an email client
399. Image Compression and Decompression using Huffman's
400. Image Manipulation for Face Recognition
401. Implementation of Broadcast Messaging System using Multi Threading
402. Asset Management Solution (AMS)
403. Implementation of Packet Filtering Firewall in Linux Systems
404. Implementation of Peer-to-Peer Communication System with a Centralized Name Server in Linux Network
405. Implementation of Secured & Encrypted Data Transmission over the Web
406. Implementation of Wireless Application Protocol Gateway in Mobile Network
407. Implementation of Wireless Communication Gateway for PC To Mobile Network Route using Internet Protocol
408. Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support
409. Intelli Mobile Banking System Design & Implementation
410. Investigation and Analysis of Packets Transformation in an Ethernet Network System
411. Java Grid Using Grid Computing System
412. Java Network Flow Analyzer
413. Java Network Monitor / Java Network Browser
414. Java RMI-based application which manages load balancing on heterogeneous clusters
415. Java SMTP, POP, Web Email Server
416. Java-to-XML Data Binding tool
417. Job Portal Implementation with intelli power features
418. JSP - Personal information Manager
419. Logistics - freight forwarding software solution logistics
420. Multimedia Messaging Service - MMS
421. Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems
422. Net Monitoring and Management using SNMP
423. Network Administrators to Monitor VPN and SSL Connections
424. Network Component Development for XML Document Migration
425. Neural Network based Character Pattern Identification System
426. On-Line Analytical Processing - Maintenance of Data collection & Reports
427. Online Auction with featured shopping cart
428. Online Enterprise Resources Planning – Web Enabled ERP implementation with Distributed Database system
429. Online Health Care Management Solutions
430. Online Distributed Human resources Management System
431. Online Portfolio Manager – Equity Trading & Mutual Funds management
432. Online web enabled Bug Tracking System
433. Online Web Shop Mall - Web Shop Site
434. Online Workflow Service Manager & Automation
435. SNMP Trap Gateway - Network Management
436. Software Routing – Packet Filtering & Capturing
437. Thin Client Network Implementation
438. Ultimate Online Jobsite with intelli Search engine
439. Professional time and task management tool
440. Public-Key Cryptography Extensions into Kerberos
441. RAT (Remote Assistance Tool) is a Java Application
442. Resource Planning Tool Design & Implementation (RPT)
443. Sales force Automation Implemenation
444. Sales Order Processing and invoicing (SOPI)
445. Secure (RSA) Chat Server
446. Secure Electronic Transaction System
447. Secure Web Cache Proxy Server
448. Digital Image Processing – Time Domain
449. Secure web conferencing on any platform using Java
450. Secured Network Manager & Tracker using JMX
451. SFTP Server - Synchronous File Transfer Communicator
452. Smart Network Access Using Mobile Bluetooth, J2ME
Gourinath
Computer Science Project Topics (big list)
1. Distributed cache updating for the Dynamic source routing protocol
2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
3. Face Recognition Using Laplacian faces
4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
7. Noise Reduction by Fuzzy Image Filtering
8. Online Handwritten Script Recognition
9. ODAM: An Optimized Distributed Association Rule Mining Algorithm
10. Protocol Scrubbing: Network Security Through Transparent Flow Modification
11. Workflow Mining: Discovering Process Models from Event Logs
12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
15. ITP: An Image Transport Protocol for the Internet
16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)
17. Incremental deployment service of Hop by hop multicast routing protocol
18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
19. Application of BPCS steganography to wavelet compressed video
20. Neural Networks for Unicode Optical Character Recognition
21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
22. Neural Network-Based Face Detection
23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
25. Mobile Agents In Distributed Multimedia Database Systems
26. Image Stream Transfer Using Real-Time Transmission Protocol
27. Neural Networks for Handwritten character and Digits
28. Evaluating the Performance of Versatile RMI Approach In Java
29. Effective Packet Analyzing and Filtering System for ATM Network
30. Selective Encryption of Still Image
31. Homogenous Network Control and Implementation
32. Retrieving Files Using Content Based Searching and presenting it in Carousel view
33. Dynamic Signature Verification Using Pattern Recognition
34. Embedding in Video Steganography
35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
36. Location Aided Routing for Mobile Ad-Hoc Networks
37. Image Rendering for Grid Technology
38. Java Network File Sharing System
39. Java Visual Editor with Compiler
40. E-Mail Server Using Multithreaded Sockets
41. Network Component for XML Migration
42. Image Water Marking and Combustion
43. Image Processing for Convolution Filters
44. Artificial intelligence network load balancing using Ant Colony Optimization
45. Image Processing for Edge Detection Filters
46. Flood Fill Algorithms in C# and GDI+
47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
48. Hiding messages in the Noise of a Picture
49. Windows Management Instrumentation WMI Implementation
50. Steganography for Hiding Data in Wave Audio Files
51. Automatic Dependent Surveillance-Broadcasting(Ads-B)
52. Digital Water Marking For Video Piracy Detection
53. Encryption and Decryption technique for secure communication in WLAN
54. File Encryption and Encrypted text embedding in an image
55. Integrating Speech Engine with Web Navigator
56. Intrusion Detection Prevention And Trace back Systems
57. Java Productivity Aids
58. J2ME Mail Client Server
59. Monitoring And Managing The Clusters Using JMX
60. Network Analyze
61. Neural Network for Recognition of Handwritten and Digits Backpropagation
62. Network Traffic Anomaly Detector
63. Optimal Cryptographic Technique
64. Peer to Peer Messaging System using JXTA
65. Performance Evaluation of DISTANCE Routing Algorithm in MANET
66. Public Key Validation for DNS security Extension
67. Query Routing Optimization In Sensor Communication Networks
68. Virtual Private Network
69. Voice Enabled Smart Browser
70. XML Enabled SQL SERVER
71. An efficient message digest algorithm (MD) for data security
72. Hopfield model of neural network for pattern recognition
73. Using Trigonometry and Pythagoras to Watermark an Image
74. Hiding messages in the Noise of a Picture
75. ERP for Leather Company
76. Cryptographically Using Secure Server/Client Protocol
77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
78. Neural Networks for Handwriting Detection System Using Brain Net
79. Wireless Traffic Viewer Using J2ME
80. Video Steganography Using Mobile Simulation
81. Cryptographically Using Secure Server/Client Protocol
82. Intrusion Detection Prevention And Trace back Systems
83. Neural Network for Recognition of Handwritten and Digits
84. The File Digest program and the C++ implementation of some Message-Digest algorithms
85. File Encryption and Encrypted text embedding in an image
86. Performance Evaluation of DISTANCE Routing Algorithm in MANET
87. ERP for Leather Company
88. Online Web shop
89. Online Fashion Studios
90. ERP for Small Business
91. Bulk Billing System
92. Wireless Traffic Viewer Using J2ME
93. J2ME Mail Client Server
94. Monitoring And Managing The Clusters Using JMX
95. Peer-To-Peer Messaging
96. Mobile Information Provider
97. Mobile Bank
98. Video Steganography Using Mobile Simulation
99. Network Traffic Anomaly Detector
100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol
101. Active Source Routing Protocol for Mobile AD-HOC Networks
102. Adaptive Security and Authentication for DNS System
103. Evaluating the Performance of Versatile RMI Approach In Java
104. Dynamic Control for Active Network System
105. Effective Packet Analyzing and Filtering System for ATM Network
106. Multi Server Communication In Distributed Management System
107. Reduction of Network Density for Wireless Ad-Hoc Networks
108. Messaging Service over TCP/IP in Local Area Network
109. Secure Data Hiding and Extraction Using BPCS
110. Dynamic Signature Verification Using Pattern Recognition
111. Data Minimization And Storage Using XML Enable SQL Server
112. Retrieving Files Using Content Based Search
113. Distributed Node Migration by Effective Fault Tolerance
114. Embedding in Video Steganography
115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
116. Location Aided Routing for Mobile Ad-Hoc Networks
117. Image Rendering for Grid Technology
118. Optimal Multicast Routing in Mobile Ad-Hoc Networks
119. Scalable Wireless Ad-Hoc Network Simulation using XTC
120. Homogenous Network Control and Implementation
121. Java Network File Sharing System
122. Mobile Agents In Distributed Multimedia Database Systems
123. Java Visual Editor with Compiler
124. ATM Networks for Online Monitoring System
125. Performance Evaluation of RMI
126. Network Border Patrol Preventing Congestion Collapse
127. Network Component for XML Migration
128. Shortest Node Finder In Wireless Ad-Hoc Networks
129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
130. Distributed Cache Updating for the Dynamic Source Routing Protocol
131. Multi Router Traffic Monitoring System
132. Public Key Validation For DNS Security Extensions
133. A Secure Routing Protocol for mobile Ad-hoc Network
134. Retrieving Files Using Content Based Searching and presenting it in Carousel view
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic source routing protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermark an Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing using Ant Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
178. Textile Web Services
179. Auction System
180. Online Quiz
181. Online Bank
182. Online Voting System
183. Securing Image URL
184. Web Services
185. Smart Knowledge Provider
186. Online Book Shop
187. Electronic Fund Transfer
188. Work Flow Management System
189. Online Customer Care
190. Scribe Automation
191. Textile Management System
192. Sales and Purchase Management System
193. Human Resources Management System
194. Inventory Manage System
195. Job Order System
196. Advertisement Posting Website ASP .Net
197. Mobile shop shopping cart System
198. Patient Management System
199. Property Management System
200. Web Based Content Management System
201. Neural Networks for Handwriting Detection System Using Brain Net
202. Library Management system
203. Windows Management Instrument (WMI) .Net 2005
204. Wallpaper Changer Utility
205. Win Application for Word Processing
206. Screen capture Utility
207. HTML Editor
208. Image Converter 2005
209. Internet History Viewer
210. VB .Net Smart Mail Transfer Protocol
211. Windows Multi File Search utility
212. Message Digest
213. FTP Explorer
214. Convolution Filter
215. Find and Replace utility
216. Apartment Management System
217. Computerized Information Software
218. Employee Management System
219. Hotel Management System
220. Human Resources Management System
221. Inventory System
222. Membership Management System
223. Patient Care System
224. Send SMS To Cell Phone Through SMTP Mail
225. Trainee Management System
226. J2ME Project Titles
227. Wireless Traffic Viewer Using J2ME
228. J2ME Mail Client Server
229. Monitoring And Managing The Clusters Using JMX
230. Peer-To-Peer Messaging
231. Mobile Information Provider
232. Mobile Bank
233. Video Steganography Using Mobile Simulation
234. Network Traffic Anomaly Detector
235. J2EE Project Titles
236. ERP for Leather Company
237. Online Web shop
238. Online Fashion Studios
239. ERP for Small Business
240. Bulk Billing System
241. Distributed cache updating for the Dynamic source routing protocol
242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
243. Face Recognition Using Laplacian faces
244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
247. Noise Reduction by Fuzzy Image Filtering
248. Online Handwritten Script Recognition
249. ODAM: An Optimized Distributed Association Rule Mining Algorithm
250. Protocol Scrubbing: Network Security Through Transparent Flow Modification
251. Workflow Mining: Discovering Process Models from Event Logs
252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
253. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
255. ITP: An Image Transport Protocol for the Internet
256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
257. Incremental deployment service of Hop by hop multicast routing protocol
258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
259. Application of BPCS steganography to wavelet compressed video
260. Neural Networks for Unicode Optical Character Recognition
261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
262. Neural Network-Based Face Detection
263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System for ATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
306. Query Routing Optimization In Sensor Communication Networks
307. Virtual Private Network
308. Voice Enabled Smart Browser
309. XML Enabled SQL SERVER
310. An efficient message digest algorithm (MD) for data security
311. Hopfield model of neural network for pattern recognition
312. Using Trigonometry and Pythagoras to Watermark an Image
313. Hiding messages in the Noise of a Picture
314. ERP for Leather Company
315. Cryptographically Using Secure Server/Client Protocol
316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
317. Neural Networks for Handwriting Detection System Using Brain Net
318. Wireless Traffic Viewer Using J2ME
319. Video Steganography Using Mobile Simulation
320. Image Rendering for Grid Technology
321. Java Network File Sharing System
322. Java Visual Editor with Compiler
323. E-Mail Server Using Multithreaded Sockets
324. Network Component for XML Migration
325. Image Water Marking and Combustion
326. Image Processing for Convolution Filters
327. Artificial intelligence network load balancing using Ant Colony Optimization
328. Image Processing for Edge Detection Filters
329. Mobile Information Provider
330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case
331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
332. QUIVER: Consistent Object Sharing For Edge Services
333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
334. Geometric Approach to Improving Active Packet Loss Measurement
335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
338. Watermarking Relational Databases Using Optimization Based Techniques
339. Active Queue Management for Fair Resource Allocation in Wireless Networks
340. Benefit Based Data Caching In Ad Hoc Networks
341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks
342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction
343. Two Techniques for Fast Computation of Constrained Shortest Paths
344. Controlling IP Spoofing Through Inter Domain Packet Filters
345. A New Model for Dissemination of XML Content
346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements
347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resources in an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
Gourinath
2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
3. Face Recognition Using Laplacian faces
4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
7. Noise Reduction by Fuzzy Image Filtering
8. Online Handwritten Script Recognition
9. ODAM: An Optimized Distributed Association Rule Mining Algorithm
10. Protocol Scrubbing: Network Security Through Transparent Flow Modification
11. Workflow Mining: Discovering Process Models from Event Logs
12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
15. ITP: An Image Transport Protocol for the Internet
16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)
17. Incremental deployment service of Hop by hop multicast routing protocol
18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
19. Application of BPCS steganography to wavelet compressed video
20. Neural Networks for Unicode Optical Character Recognition
21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
22. Neural Network-Based Face Detection
23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
25. Mobile Agents In Distributed Multimedia Database Systems
26. Image Stream Transfer Using Real-Time Transmission Protocol
27. Neural Networks for Handwritten character and Digits
28. Evaluating the Performance of Versatile RMI Approach In Java
29. Effective Packet Analyzing and Filtering System for ATM Network
30. Selective Encryption of Still Image
31. Homogenous Network Control and Implementation
32. Retrieving Files Using Content Based Searching and presenting it in Carousel view
33. Dynamic Signature Verification Using Pattern Recognition
34. Embedding in Video Steganography
35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
36. Location Aided Routing for Mobile Ad-Hoc Networks
37. Image Rendering for Grid Technology
38. Java Network File Sharing System
39. Java Visual Editor with Compiler
40. E-Mail Server Using Multithreaded Sockets
41. Network Component for XML Migration
42. Image Water Marking and Combustion
43. Image Processing for Convolution Filters
44. Artificial intelligence network load balancing using Ant Colony Optimization
45. Image Processing for Edge Detection Filters
46. Flood Fill Algorithms in C# and GDI+
47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
48. Hiding messages in the Noise of a Picture
49. Windows Management Instrumentation WMI Implementation
50. Steganography for Hiding Data in Wave Audio Files
51. Automatic Dependent Surveillance-Broadcasting(Ads-B)
52. Digital Water Marking For Video Piracy Detection
53. Encryption and Decryption technique for secure communication in WLAN
54. File Encryption and Encrypted text embedding in an image
55. Integrating Speech Engine with Web Navigator
56. Intrusion Detection Prevention And Trace back Systems
57. Java Productivity Aids
58. J2ME Mail Client Server
59. Monitoring And Managing The Clusters Using JMX
60. Network Analyze
61. Neural Network for Recognition of Handwritten and Digits Backpropagation
62. Network Traffic Anomaly Detector
63. Optimal Cryptographic Technique
64. Peer to Peer Messaging System using JXTA
65. Performance Evaluation of DISTANCE Routing Algorithm in MANET
66. Public Key Validation for DNS security Extension
67. Query Routing Optimization In Sensor Communication Networks
68. Virtual Private Network
69. Voice Enabled Smart Browser
70. XML Enabled SQL SERVER
71. An efficient message digest algorithm (MD) for data security
72. Hopfield model of neural network for pattern recognition
73. Using Trigonometry and Pythagoras to Watermark an Image
74. Hiding messages in the Noise of a Picture
75. ERP for Leather Company
76. Cryptographically Using Secure Server/Client Protocol
77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
78. Neural Networks for Handwriting Detection System Using Brain Net
79. Wireless Traffic Viewer Using J2ME
80. Video Steganography Using Mobile Simulation
81. Cryptographically Using Secure Server/Client Protocol
82. Intrusion Detection Prevention And Trace back Systems
83. Neural Network for Recognition of Handwritten and Digits
84. The File Digest program and the C++ implementation of some Message-Digest algorithms
85. File Encryption and Encrypted text embedding in an image
86. Performance Evaluation of DISTANCE Routing Algorithm in MANET
87. ERP for Leather Company
88. Online Web shop
89. Online Fashion Studios
90. ERP for Small Business
91. Bulk Billing System
92. Wireless Traffic Viewer Using J2ME
93. J2ME Mail Client Server
94. Monitoring And Managing The Clusters Using JMX
95. Peer-To-Peer Messaging
96. Mobile Information Provider
97. Mobile Bank
98. Video Steganography Using Mobile Simulation
99. Network Traffic Anomaly Detector
100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol
101. Active Source Routing Protocol for Mobile AD-HOC Networks
102. Adaptive Security and Authentication for DNS System
103. Evaluating the Performance of Versatile RMI Approach In Java
104. Dynamic Control for Active Network System
105. Effective Packet Analyzing and Filtering System for ATM Network
106. Multi Server Communication In Distributed Management System
107. Reduction of Network Density for Wireless Ad-Hoc Networks
108. Messaging Service over TCP/IP in Local Area Network
109. Secure Data Hiding and Extraction Using BPCS
110. Dynamic Signature Verification Using Pattern Recognition
111. Data Minimization And Storage Using XML Enable SQL Server
112. Retrieving Files Using Content Based Search
113. Distributed Node Migration by Effective Fault Tolerance
114. Embedding in Video Steganography
115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
116. Location Aided Routing for Mobile Ad-Hoc Networks
117. Image Rendering for Grid Technology
118. Optimal Multicast Routing in Mobile Ad-Hoc Networks
119. Scalable Wireless Ad-Hoc Network Simulation using XTC
120. Homogenous Network Control and Implementation
121. Java Network File Sharing System
122. Mobile Agents In Distributed Multimedia Database Systems
123. Java Visual Editor with Compiler
124. ATM Networks for Online Monitoring System
125. Performance Evaluation of RMI
126. Network Border Patrol Preventing Congestion Collapse
127. Network Component for XML Migration
128. Shortest Node Finder In Wireless Ad-Hoc Networks
129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
130. Distributed Cache Updating for the Dynamic Source Routing Protocol
131. Multi Router Traffic Monitoring System
132. Public Key Validation For DNS Security Extensions
133. A Secure Routing Protocol for mobile Ad-hoc Network
134. Retrieving Files Using Content Based Searching and presenting it in Carousel view
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic source routing protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermark an Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing using Ant Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
178. Textile Web Services
179. Auction System
180. Online Quiz
181. Online Bank
182. Online Voting System
183. Securing Image URL
184. Web Services
185. Smart Knowledge Provider
186. Online Book Shop
187. Electronic Fund Transfer
188. Work Flow Management System
189. Online Customer Care
190. Scribe Automation
191. Textile Management System
192. Sales and Purchase Management System
193. Human Resources Management System
194. Inventory Manage System
195. Job Order System
196. Advertisement Posting Website ASP .Net
197. Mobile shop shopping cart System
198. Patient Management System
199. Property Management System
200. Web Based Content Management System
201. Neural Networks for Handwriting Detection System Using Brain Net
202. Library Management system
203. Windows Management Instrument (WMI) .Net 2005
204. Wallpaper Changer Utility
205. Win Application for Word Processing
206. Screen capture Utility
207. HTML Editor
208. Image Converter 2005
209. Internet History Viewer
210. VB .Net Smart Mail Transfer Protocol
211. Windows Multi File Search utility
212. Message Digest
213. FTP Explorer
214. Convolution Filter
215. Find and Replace utility
216. Apartment Management System
217. Computerized Information Software
218. Employee Management System
219. Hotel Management System
220. Human Resources Management System
221. Inventory System
222. Membership Management System
223. Patient Care System
224. Send SMS To Cell Phone Through SMTP Mail
225. Trainee Management System
226. J2ME Project Titles
227. Wireless Traffic Viewer Using J2ME
228. J2ME Mail Client Server
229. Monitoring And Managing The Clusters Using JMX
230. Peer-To-Peer Messaging
231. Mobile Information Provider
232. Mobile Bank
233. Video Steganography Using Mobile Simulation
234. Network Traffic Anomaly Detector
235. J2EE Project Titles
236. ERP for Leather Company
237. Online Web shop
238. Online Fashion Studios
239. ERP for Small Business
240. Bulk Billing System
241. Distributed cache updating for the Dynamic source routing protocol
242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
243. Face Recognition Using Laplacian faces
244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
247. Noise Reduction by Fuzzy Image Filtering
248. Online Handwritten Script Recognition
249. ODAM: An Optimized Distributed Association Rule Mining Algorithm
250. Protocol Scrubbing: Network Security Through Transparent Flow Modification
251. Workflow Mining: Discovering Process Models from Event Logs
252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
253. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
255. ITP: An Image Transport Protocol for the Internet
256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
257. Incremental deployment service of Hop by hop multicast routing protocol
258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
259. Application of BPCS steganography to wavelet compressed video
260. Neural Networks for Unicode Optical Character Recognition
261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
262. Neural Network-Based Face Detection
263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System for ATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
306. Query Routing Optimization In Sensor Communication Networks
307. Virtual Private Network
308. Voice Enabled Smart Browser
309. XML Enabled SQL SERVER
310. An efficient message digest algorithm (MD) for data security
311. Hopfield model of neural network for pattern recognition
312. Using Trigonometry and Pythagoras to Watermark an Image
313. Hiding messages in the Noise of a Picture
314. ERP for Leather Company
315. Cryptographically Using Secure Server/Client Protocol
316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
317. Neural Networks for Handwriting Detection System Using Brain Net
318. Wireless Traffic Viewer Using J2ME
319. Video Steganography Using Mobile Simulation
320. Image Rendering for Grid Technology
321. Java Network File Sharing System
322. Java Visual Editor with Compiler
323. E-Mail Server Using Multithreaded Sockets
324. Network Component for XML Migration
325. Image Water Marking and Combustion
326. Image Processing for Convolution Filters
327. Artificial intelligence network load balancing using Ant Colony Optimization
328. Image Processing for Edge Detection Filters
329. Mobile Information Provider
330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case
331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
332. QUIVER: Consistent Object Sharing For Edge Services
333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
334. Geometric Approach to Improving Active Packet Loss Measurement
335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
338. Watermarking Relational Databases Using Optimization Based Techniques
339. Active Queue Management for Fair Resource Allocation in Wireless Networks
340. Benefit Based Data Caching In Ad Hoc Networks
341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks
342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction
343. Two Techniques for Fast Computation of Constrained Shortest Paths
344. Controlling IP Spoofing Through Inter Domain Packet Filters
345. A New Model for Dissemination of XML Content
346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements
347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resources in an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
Gourinath
Computer Science Project's List
| | 1. Design of Intranet Mail System 2. Mirroring 3. Development of a Distributed Systems Simulator for Event Based Middleware 4. A Smart phone Application to remotely a PC over the internet 5. Network Protocol Verification Using Linear Temporal Logic 6. Virtual Routing Network Emulation Frame Work 7. A Multihoming Solution for effective load balancing 8. Implementing a Linux Cluster 9. Improving the efficiency of Memory Management in Linux by Efficient Page 10. Replacement Policies. 11. Experimenting with Code Optimizations on SUIF (Stanford University Intermediate Format) 12. Intranet Caching Protocol 13. A DBMS with SQL Interpreter 14. Developing an Organically Growing Peer to Peer Network 15. Analysis of Routing Models in Event Base Middlewares 16. Analysis of Event Models in Event based Middle ware 17. Integration of Heterogeneous Databases Into XML Format with Translator 18. Information Management and Representation Using Topic Maps 19. Face Recognition Using Artificial Neural Networks 20. Video Conferencing with Multicast Support 21. Collaborative Span Filtering Using Centralized Incrementally Learning Spam Rules 22. Database 23. Hierarchical Data Back Up 24. Automated Generation of Cycle Level Simulators for Embedded Processors. 25. Mini Projects By M.Techs 26. Fingerprint Image Enhancement 27. Dept Library Management System 28. Linux Kernel Enhancement 29. Cloth Animation & Dynamics. 30. Linux Kernel (Memory Management) 31. Image Steganography 32. Web Enabled Opinion Poll System For NITC 33. Application Of Bayesian Networks To Data Mining 34. Triple crypt Using Vector Displacement Algorithm 35. Network Analysis 36. Feed Forward Neural Networks 37. IP Sniffer 38. Project Management System 39. Cryptographic Engine 40. Fault-Tolerant TCP 41. Enhancing The Algorithms 42. 2 mail 43. Mini Projects by B.Techs ( Currently reports are not available ) 44. Time Table Information System 45. Online Library System 46. Implementing an interface for transliteration 47. Simulation of the IA64 Instruction Set Architecture 48. Simple FTP Client 49. Text Editor for Linux Platform 50. Exam Server 51. Online Bulletin Board 52. Project Server 53. Developing GUI for IP Tables Configuration 54. Academic planner 55. Online Election Software for Hostel Election 56. Performance Evaluation of Routing Algorithm using NS2 57. Alumni Software 58. Bandwidth management Tool 59. Implementation of Scalar Optimizations 60. Online Banking 61. Distributed Workgroup File Indexer 62. Managing Linux Distributions 63. Network Sniffer 64. Simulating Routing Algorithms in Java 65. A Tool For Network Auditing(ping and Port Scanning, TCP/IP Finger printing 66. An alternative semantics for error and exceptional handling 67. Online Counseling software 68. Web application 69. Instant messenger system 70. course home page generator 71. Web application 72. An Interpretor for lambda calculus with some extensions 73. course home page generator 74. Probabilistic Techniques for cache replacement 75. Implementation of Download wizard for simultaneous downloads 76. Online Share Trading 77. Online Counseling 78. Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH 79. Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH 80. Using Genetic Algorithms for testcase generation for finite state machines 81. A study of the Linux Operating system, Development of useful System programs 82. subsequently implementing a GUI Providing a certain useful functionality 83. Online Shopping 84. Text to Speech conversion 85. Hostel elections voting software 86. Code optimization: Implementation of scalar optimizations 87. A Web based academic monitoring system 88. To output the timing schedule 89. Code optimization: Implementation of scalar optimizations 90. Online Objective test 91. Performance Evaluation of Routing Algorithm using NS2 92. IA64 ISA Simulation 93. Text to Speech conversion 94. Auction simulator using agents 95. Customizing Proxy Web server 96. Auction simulator using agents 97. Implementation of cryptographic protocols in oblivious signature based envelope ( 98. OSBE to handle cyclic policy interdependency) 99. NITC Student information system 100. Implementation of the gaming software 101. Online Library Management system 102. Project Server 103. My SQL Administrative tool kit 104. Error handling for syntax analysis 105. Online Student Registration 106. Final Project by M.Techs ( currently reports are not available) 107. Operating system enhancements to prevent the misuse of system calls. 108. Type systems and applications to safety. 109. Spatial and temporal database (queries for retrieving data) 110. Adaptive distributed event model. 111. Improving TCP performance in adhoc networks. 112. Model checking for protocol verification. 113. Type systems and it's application to safe and efficient code. 114. Exact functional context matching for web services. 115. A new methodology for representation of TCP performance in TCPSF. 116. Adaptive event based middleware architecture. 117. Intelligent agents. 118. Optimizing pattern matching algorithm in intrusion detection. 119. Information retrieval from textual corpus. 120. Direction queries in spatio-temporal databases. 121. Secure routing. 122. Audio processing of movies. 123. Final Projects By MCA ( currently reports are not available) 124. Secure Conferencing System 125. Web based Linux Administration 126. Wireless Search Engine 127. Hostel Election Software 128. Performance Enhancement of HTTP using improved TCP Functionalities 129. Adding Functionalities to Libpcap 130. Performance Evaluation of an Efficient Multicast Routing Protocol 131. Development of an OS Framework for a MIPS Simulator 132. Secure Mail Server 133. Development of an OS Framework for a MIPS Simulator 134. Development of an OS Framework for a MIPS Simulator 135. Academic per-to-peer Network 136. Secure Mail Server 137. Distributed System simulator for Publish-Subscribe Model 138. Data Integration 139. Web based Linux Administration 140. Interface for Mobile Phone and PDA using J2ME 141. Distributed System simulator for Publish-Subscribe Model 142. Distributed System simulator for Publish-Subscribe Model 143. Contact Reminder 144. Direct Information System 145. Course Home Page Generator 146. Campus Online Help Desk 147. Online Class Register 148. Mail Server Utility 149. Hostel Election Software 150. Collaborative Web Browsing 151. Web based Application for Multiple Clients 152. Testing Tool |
Gourinath
Latest Seminar Topics
| | 2) BioComputers 3) Biometric Technology 4) Blue Ray – Future of DVD's 5) Blue Tooth Technology 6) Brain–computer interface (BCI) 7) Cake PHPs 8) Captchas 9) Choreography 10) Cluster computing 11) Clustering 12) Computational Intelligence and Linguistics 13) Computational neuroscience 14) Computational Photography 15) Computer Forensics 16) 4G Wireless Technology 17) A cognitive radio approach for using of virtual unlicensed spectrum 18) Advanced Encryption Standard 19) Agile Software development 20) Ajax Technology 21) AMD Processors 22) ARM architecture 23) Artificial Intelligence in Machines 24) Aspect-oriented programming (Aop) 25) ATM networks 26) Augmented Reality 27) Data over Cable System (DOCSIS) 28) Data Warehouse 29) DataBase Migration 30) Datagram Congestion Control Protocol (DCCP) 31) Digital audio 32) Digital Imaging 33) Digital Media Broadcasting 34) Digital Rights Management 35) Digital Signal Processing and their applications 36) Digital Visual Interface 37) Distributed and Parallel Computing 38) Distributed computing 39) Distributed database management system 40) Authentication and Key Agreement (AKA) 41) Automatic number plate recognition 42) Autonomic Computing 43) Auto-pilots 44) Backup and Recovery planning 45) Bandwidth estimation in broadband access networks 46) Bio Telemetry 47) Computer vision 48) Concurrent Programming and Parallel distributed O.S. 49) Content Management 50) Co-operative LINUX 51) Encrypted Text chat Using Bluetooth 52) Epsilon nets and transversal of hypergraphs 53) Evolutionary Programming 54) E-wallet 55) Ext3 Filesystem 56) eXtensible Bindings Language (XBL) 57) Facial Recognition System 58) Fiber optic communication 59) Fingerprint recognition system by neural networks 60) Firewalls 61) Flexible CRT Displays 62) Fluorescent Multilayer Disc (FMD) 63) Fluorescent Multilayer Optical Data Storage 64) Cross Platform Component Object Model 65) Crusoe Processors 66) Cryogenic Processor 67) Curl: A Gentle Slope Language For The Web 68) Cyber Crime and Security 69) Cyborgs 70) Data Management in Sensor Networks 71) Data Mining and Data Warehousing 72) Data Mining concepts & Models 73) Distributed Firewalls 74) DNA Based computer 75) DNA Computing 76) Dual Energy X-ray Absorptiometry 77) Dynamic spectrum access 78) Earth Simulator- Fastest Supercomputer 79) Gnu Emacs 80) Graphical Processing Unit 81) GRASSHOPPER Operating System 82) Grid Computing 83) Grid Data Farm for Petascale 84) GSM Security And Encryption 85) HAVi: Home Audio Video Interoperability 86) High Altitude Aeronautical Platforms 87) High Performance Computing 88) High Performance DSP Architectures 89) High Speed Data In Mobile Networks 90) Holographic Versatile Disc 91) HomeRF- localized wireless technology optimized for the home environment 92) Honeypots 93) Hyper-Threading Technology 94) IDMA – Future of Wireless Technology 95) Image compression 96) Image processing and applications 97) Improving tcp performance over mobile ad hoc networks 98) Information Extraction modes & techniques 99) Integrating Structural Design and Formal Methods in RealTime System Design 100) Elliptical Curve Cryptography(ECC) 101) Embedded Configurable Operating system 102) Embedded Linux 103) Embedded systems and vlsi an architectural approach to reduce leakage energy in memory 104) Embedded web server for remote access 105) Embeded Systems 106) Emergency Health Care System 107) Emerging trends in robotics using neural networks 108) E-MINE: A novel web mining approach 109) Media gateways 110) Mesh Based Geometric data processing 111) Micro chip production using extreme uv lithography 112) Micro Hard disk Drives 113) Micro Mouse 114) Micro Total analysis systems 115) Microcontroller Based Automation 116) Microcontroller Based Power Theft Identification 117) MIMO 118) Mining the Web: Searching, Integration and Discovery 119) Mobile ad hoc network 120) Mobile agent 121) Mobile Casts 122) Mobile Computing 123) Mobile Infrastructure Management 124) Mobile Library Management 125) Mobile Networking 126) Encrypted Hard disks 127) Form Processing 128) Fusion Memory 129) Future of business Computing 130) Future of Satellite Communication 131) Future of the internet 132) Future Programming Techniques and Concepts 133) Fuzzified Computer-Automated Crane Control System 134) GABOR Wavelet 135) Generic algorithm 136) Genetic Algorithm 137) Genetic Programming 138) Gesture recognition 139) Global Positioning System 140) Global System for Mobiles 141) Intel MMX Technology 142) Intelligent RAM : IRAM 143) Internet Cryptopraphy 144) Internet Networking 145) Internet Searching 146) Internet Telephony 147) Introduction to LaTeX 148) iSCSI: The future of Network Storage 149) Java Class Loader 150) Java Cryptography Architecture (JCA) 151) Java Messaging Service (JMS) 152) NRAM 153) NVSRAM- Non Volatile Static RAM 154) Object oriented technologies 155) Online software Distribution 156) Open Source Technology 157) OpenGL-application programming interface 158) OpenTV (OPTV) 159) Optical Disc Data Security 160) Optical networking 161) Oracle RDBMS 162) Orthogonal Frequency Division Multiplplexing 163) Ovonic Unified Memory 164) Packet Interception 165) Parallel Computations 166) Parallel Computing In Remote Sensing Data Processing 167) Parasitic computing 168) Peer to peer Networking 169) Performance Evaluation 170) Personal Mass Media – Blogging, Syndication, Podcasting, and Vidcasting 171) Personal Satellite assistant Systems 172) Pervasive computing 173) JIRO – Java-based technology 174) Knowledge discovery and Data Mining 175) Light Pen 176) LOC technology (Lab On a Chip) 177) MAC address 178) Magnetic RAM 179) Mail server Management 180) Main memory databases 181) Management Information System 182) Managing Data with emerging technologies 183) MANET:-The Art of Networking without a Network 184) Mobile Paradigm 185) Molecular Keypad Lock 186) MPEG-7 187) Multimedia Broadcasting via Satellite 188) multimedia-oriented web based instructional system 189) Multiple client's communication 190) Multiple Domain Orientation 191) Nano computing 192) Nano Ring Memory 193) Nano-technology and application 194) Narrow Band and Broad Band ISDN 195) Native Command Queuing (NCQ) 196) Natural Language Processor 197) Near Filed Communication (NFC) 198) Network Accelerators 199) Network Management and Security 200) Network Modeling and Simulation 201) Storage Farms 202) Storm botnet 203) Struts Integration 204) SUNSPOT (wireless sensor network) 205) Surface-conduction Electron-emitter Display (SED) 206) Symbian OS 207) Synchronous Optical Networking 208) Tablet PC 209) Tape Drive Technologies – LTO (linear tape open) & SDLTS (Super Digital Linear Tape) 210) Techniques for analysis, verification, validation of digital systems 211) Teleportation 212) TETRA-Terrestrial Enhanced Trunked Radio 213) The Architecture of a Moletronics Computer 214) The MBMS 215) The Mbone And Multicasting 216) Third Generation 217) Time Complexity 218) Tracking and Positioning of Mobiles in Telecommunication 219) Transient Stability Assessment using Neural Networks 220) Trends in Compiler Construction 221) Trends in Mobiles & PC's 222) Network Security 223) Neural networks and applications 224) New Age Graphics 225) New Dimension of Data Security using Neural Networks and Numerical Functions 226) New storage strategy = Disk -Disk -Tape Back up 227) Night Vision Technology 228) Nonvolatile Flash Memory 229) Plasma Displays 230) Plasmonics 231) Pluggable Authentication Modules (Pam) 232) PolyBot – Modular, self-reconfigurable robots 233) Polymer Memory 234) Porting Device Drivers For The Solaris 235) Power Line Networking 236) Proactive computing 237) Probabilistic I/o Automata 238) Public Key Encryption And Digital Signature 239) Quad core Module technology 240) Software model checking 241) Software Testing & Quality Assurance 242) Split Range Synchronization 243) SSL-TLS 244) Stealth Virus 245) Steganography – The art of hiding information 246) Stereoscopic Projection Systems 247) Trusted Network Connect (TNC) Specifications 248) Turbo Codes 249) Twd radar satellite communications 250) Ubiquitous computing 251) UMA (Unlicensed Mobile Access) 252) Unbiquitos Smart Homes 253) Unified Communication 254) Uniprocessor Virtual Memory Without TLBS 255) USB Tape Drives 256) Vertical Cavity Surface Emitting Laser 257) VHDL (VHSIC Hardware Description Language) 258) Virtual Keyboards 259) Virtual Network Computing 260) Virtual P.C. 261) Virtual Reality 262) Virtualization Technology 263) Visual Neuro Prosthetics 264) Visualization and Computer Graphics 265) Voice Over Internet Protocol 266) Voice Portals 267) Voice Roaming 268) VoIP in mobile phones 269) VQ In Converging Telephony And Ip Networks 270) Watermarking Digital Audio 271) WBM(Web based mobile) 272) Wearable Computers 273) Wi-Fi (802.11b) 274) WI-FI / WI-MAX 275) Wireless Application Protocol 276) Wireless communication system 277) Wireless Markup Language(WML) 278) Wireless sensor network 279) Wireless Technologies (bluetooth, 802.11x, IRDA) 280) X-Internet 281) ZFS File system 282) Quantum computing 283) Quantum teleportation 284) Radio Astronomy 285) RAID 286) Real Time Operating System 287) Real Time Speech Translation 288) Recognition of VoIP Speech 289) Reconfigurable computing 290) Red Tacton 291) Revolutions in the Operating System and Servers 292) Robocode 293) Robotics 294) Ruby on Rails RoR 295) SALT (Speech Application Language Tags) 296) Samba Fileserver(38) 297) Sand Box Technology 298) Satellite Networks 299) Scheduling algorithm 300) Search Engine Optimisation 301) Search for extra terrestrial intelligence using satellite communication 302) Secure Computing 303) Secure Socket Layer (SSL) 304) Security 305) Security Issues In GRID COMPUTING 306) Security of Open-Source Software 307) Security threats in the World Wide Web 308) Sensor fusion for video surveillance 309) Serial ATA (SATA) 310) Serial Attached SCSI 311) Server side Java 312) Server virtualization 313) Session Initiation Protocol (SIP) 314) Signal Integrity Fundamentals for Digital Design 315) Site Search Engine 316) Software advances in wireless communication (Cognitive Radio, Dynamic spectrum Access, etc.) |
Monday, June 28, 2010
Wednesday, June 23, 2010
Tuesday, June 22, 2010
hey buddy pass this message to one of ur friend... hope ull . . .
i know I hurt you when I went away left you crying, I remember that day I regret it, what I did to you I know it's crazy, but baby, but it's true, i Never meant for your heart to break, I can see that I made a mistake I've been thinking how I can get back to try a find a way,wishing for the day Cause I didn't know, what else with to do or go. I needed time to see, I needed a time just for me.But now I wanna show how much I love you so. I hope that I'm not too late for you to hear me say,Baby, I'm sorry. I really wanna make it up to you.There's nothing more that I wanna do. I hope that you still feel the same. Never meant to cause you pain, I'm sorry.I really miss the way we used to love.You're the only one that I dream of.Let me look into your eyes and apologize,cause baby, I'm sorry.Baby, I'm sorry.I know how hard it is for you to trust.It ain't easy to believe me.I know I was being so selfish.How could I do this?Now I'm back to try to repair,make sure this time I'm there.
Gourinath
Gourinath

