You are on page 1of 7

SOFTWARE PROJECTS TITLE -2015

SNO PROJECT TITLE DOMAIN/YEAR

EIL1 A New Operational Transformation Framework for Real-Time Group Java/2015


Editors
EIL2 A wireless Intrusion detection system and a new attack model(Synopsis) Java/2015

EIL3 Activity Management System Java2015


EIL4 An efficient association rule mining algorithm in distributed data bases Java/2015

EIL5 Audio Conference via VOIP Java/2015


EIL6 Audio Editing Tool Java/2015
EIL7 Automated Decision Making Work Flow System Java/2015
EIL8 BARCODE READER Java/2015
EIL9 Benefit based data caching in adhoc networks Java/2015
EIL10 Bluetooth Mobile Multimedia Accessories Java/2015
EIL11 Blutooth Mobile Based College Campus Java/2015
EIL 12 Capturing Router Congestion and Delay Java/2015
EIL 13 CATALOG Management System Java/2015
EIL 14 Credit Card Approval System Java/2015
EIL 15 CRM based Application cum office administration package Java/2015
EIL 16 Customer Support Service Operation Java/2015
EIL 17 Design and Implementation of Work Planner Java/2015
EIL 18 Detecting Malicious Packet Losses Java/2015
EIL 19 Distributed cache updating for the Dynamic source routing protocol Java/2015
EIL 20 DISTRIBUTED_CHANNEL_MANAGEM Java/2015
EIL 21 e-banking Java/2015
EIL 22 Energy-Efficient SINR-Based Routing for Multihop Wireless Java/2015
EIL 23 ENTERPRISE RESOURCE INFORMATION SYSTEM Java/2015
EIL2 4 Face Recognition Using Laplacianfaces Java/2015
EIL 25 File Transfer Protocol Manage Java/2015
EIL 26 Health Care System Java/2015
EIL 27 Help Desk Java/2015
EIL 28 HR Administration Java/2015
EIL 29 Image Edge Detection Java/2015
EIL 30 Image Processing Algorithm Java/2015
EIL 31 insurance system Java/2015
EIL 32 internet multi client chatting Java/2015
EIL 33 Intranet Virtual Private Network Java/2015

CSE/IT EMBEDDED INNOVATION LAB final year software project


SOFTWARE PROJECTS TITLE -2015
EIL 34 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Java/2015
Networks
EIL 35 IP-Centrex Java/2015
EIL 36 Iris Recognization Java/2015
EIL 37 Java Network File Sharing System Java/2015
EIL 38 java orkut Java/2015
EIL 39 Medical Diagnizer design implementation Java/2015
EIL 40 Minimizing File Download Time in Stochastic Peer-to-Peer Networks Java/2015
EIL 41 NetAuction Java/2015
EIL 42 Network border patrol Java/2015
EIL 43 Network Communication System Java/2015
EIL 44 Network Monitoring & Remote Management Java/2015
EIL 45 Network Security using Mediator Protocal for Ad Hoc Networks Java/2015
EIL 46 NGO SATELLITE FOR BLUETOOTH COLLEGE CAMPUS Java/2015
EIL 47 online voting system Java/2015
EIL 48 Remote Administration using MIDP Java/2015
EIL 49 Remote Network Administration Java/2015
EIL 50 Routing Between Two Nodes Java/2015
EIL 51 Shopping Cart with Automatic Detection of Top Selling Products Java/2015
EIL 52 signature based indexing method for efficient content based retrieval of Java/2015
relative temporal pattern
EIL 53 Sound Synthesizer Java/2015
EIL 54 Stegnography Java/2015
EIL 55 text editor Java/2015
EIL 56 Textiles Management Java/2015
EIL 57 Travel Desk System Java/2015
EIL 58 University Admission System Java/2015
EIL 59 Vehicle Insurance Management Tool Java/2015
EIL 60 VehicleTracking Management Tool Java/2015
EIL 61 virtual network monitoring system Java/2015
EIL 62 VOIP Audio Conference Java/2015
EIL 63 Web-Based Open ATS platform for Application Processing Java/2015
EIL 64 Wireless Mobile Ad Hoc Multimedia Messanger Java/2015
EIL 65 2D and 3D Morphing Dot Net/2015
EIL 66 Active Learning Methods for Interactive Image Retrieval Dot Net/2015
EIL 67 Analysis of Shortest Path Routing for Large Dot Net/2015
EIL 68 Biased Random Walks in Uniform Wireless Networks Dot Net/2015
EIL 69 Cell Breathing Techniques for Load Balancing in Wireless LANs Dot Net/2015
EIL 70 Computer Resource Management System (CRMS) Dot Net/2015
EIL 71 Conditional Shortest Path Routing in Dot Net/2015

CSE/IT EMBEDDED INNOVATION LAB final year software project


SOFTWARE PROJECTS TITLE -2015
EIL 72 Content Management System Dot Net/2015
EIL 73 Edge Detection in Images with Wavelet Transform Dot Net/2015
EIL 74 Energy Maps for Mobile Wireless Networks Coherence Time versus Dot Net/2015
Spreading Period
EIL 75 Enforcing Minimum-Cost Multicast Routing Dot Net
EIL 76 Explicit Load Balancing Technique for Dot Net
EIL 77 Image Edge Detection Dot Net
EIL 78 Image Recognition with Neural Networks Dot Net
EIL 79 Image Resolution Using Convolution_filter Dot Net
EIL 80 Insurance Management System Dot Net
EIL 81 MESSAGE DIGEST Dot Net
EIL 82 New Life Hospital Administration System Dot Net
EIL 83 Online Discussion Forum Dot Net
EIL 84 Online Examination Dot Net
EIL 85 Resource Allocation in OFDMA Wireless Dot Net
EIL 86 Route Stability in MANETs under the Random Direction Mobility Model Dot Net

EIL 87 Vision Processing for Real-time 3-D Data Acquisition Based on Coded Dot Net
Structured Light
EIL 88 An Integrated Approach to Sensor Role Selection VB.Net
EIL 89 Cell Breathing Techniques for Load Balancing in Wireless LANs VB.Net
EIL 90 Credit Card Approval System VB.Net
EIL 91 Edge Detection in Images with Wavelet Transform VB.Net
EIL 92 Image Edge Detection VB.Net
EIL 93 Insurance Management System VB.Net
EIL 94 Online Book Store System VB.Net
EIL 95 Online Discussion Forum VB.Net
EIL 96 Online Examination VB.Net
EIL 97 online share VB.Net
EIL 98 OnLineBanking VB.Net
EIL 99 RTO Management System VB.Net
EIL Vehicle Insurance Management Tool VB.Net
100
EIL A Machine Learning Approach for Identifying Disease-Treatment Relations Android
101 in Short Texts
EIL Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Android
102 Data
EIL A Query Formulation Language For The Data Web Android
103
EIL A Link Analysis Extension Of Correspondence Analysis For Mining Android
104 Relational Databases

CSE/IT EMBEDDED INNOVATION LAB final year software project


SOFTWARE PROJECTS TITLE -2015
EIL Live Streaming With Receiver-Based Peer-Division Multiplexing Android
105
EIL Optimal Stochastic Location Updates In Mobile Ad Hoc Networks Android
106
EIL Service-Centric Framework For A Digital Government Application Android
107
EIL Authentication Schemes for Session Passwords using Color and Images Android
108
EIL Cloud Computing For Agent-Based Urban Transportation Systems Android
109
EIL Locating Equivalent Servants Over P2p Networks [UNDER Android
110 DEVELOPMENT]
EIL Learning Semi-Riemannian Metrics For Semi Supervised Feature Android
111 Extraction
EIL Secure And Practical Outsourcing Of Linear Programming In Cloud Android
112 Computing
EIL Going Back and Forth: Efficient Multi deployment and Multi snapshotting Android
113 on Clouds
EIL EIL Monitoring Service Systems From A Language-Action Perspective Android
114
EIL A Privacy-Preserving Location Monitoring System For Wireless Sensor Android
115 Networks
116 Dynamic Audit Services For Integrity Verification Of Outsourced Storages Android
In Clouds
117 Efficient Multi-Dimensional Fuzzy Search For Personal Information Android
Management Systems
118 Extended XML Tree Pattern Matching: Theories and Algorithms Android
119 Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Android
Portfolio Selection
120 Ranking Spatial Data by Quality Preferences Android
121 Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc Android
Networks
122 A Policy Enforcing Mechanism for Trusted Ad Hoc Adhoc
123 Cooperative Caching in Wireless P2P Networks Design Implementation Adhoc
And Evaluation
124 Distributed Group Key Management with Cluster based Communication Adhoc
for Dynamic Peer Groups
125 Improving the Performance of Wireless Adhoc
126 Mesh Based Multicast Routing in MANET Stable Link Based Approach Adhoc
127 Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks Adhoc
With Anycast
128 Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks Adhoc

129 Nymble Blocking Misbehaving Users in Anonymizing Networks Adhoc


130 Optimal Jamming Attacks and Network Adhoc

CSE/IT EMBEDDED INNOVATION LAB final year software project


SOFTWARE PROJECTS TITLE -2015
131 Rate Adaptation In congested Wireless networks Adhoc
132 Relational Attribute Integrated Matching Analysis - RAIMA Adhoc
133 Route Stability in MANETs under the Random Direction Mobility Model Adhoc

134 Secure and Highly Efficient Three Level Key Management Scheme for Adhoc
135 Secure Distance-Based Localization in the Presence of Cheating Beacon Adhoc
Nodes
136 Security architecture achieving anonymity and tracebility in wireless mesh Adhoc
networks
137 Supporting Efficient and Scalable Multicasting Adhoc
138 TDMA Scheduling with Optimized Energy Adhoc
139 TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay Adhoc
in Clustered Wireless Sensor Networks
140 Virus Spread in Networks Adhoc
141 Achieving Secure, Scalable, and Fine-grained Data Cloud Computing

142 Data Integrity Proofs in Cloud Storage Cloud Computing

143 Dynamic Audit Services for Integrity Verification Cloud Computing

144 Enabling Public Auditability and Data Dynamics for Storage Security In Cloud Computing
Cloud Computing
145 Ensuring Data Storage Security in Cloud Computing Cloud Computing

146 Exploiting dynamic resource allocation for efficient Parallel data Cloud Computing
processing in th cloud
147 Fuzzy Keyword Search over Encrypted Data in Cloud Computing Cloud Computing

148 Managing Data Access on Clouds Cloud Computing

149 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Cloud Computing
Computing
150 Secure and Practical Outsourcing of Linear Programming in Cloud Cloud Computing
Computing
151 Secure Data Processing Framework for Mobile Cloud Computing Cloud Computing

152 Towards Secure and Dependable Storage Services in Cloud Computing Cloud Computing

153 A Fuzzy Self Constructing Feature Clustering Data Mining


154 A personalized ontology model Data Mining
155 Clustering with multiviewpoint based similarity measure Data Mining

CSE/IT EMBEDDED INNOVATION LAB final year software project


SOFTWARE PROJECTS TITLE -2015
156 Data Leakage Detection Data Mining
157 Optimized association rule mining using genetic algorithm Data Mining
158 A User Oriented Image Retrieval System Image Processing

159 An Improved Sobel Edge Detection Image Processing

160 Content based Image Retrieval System Using Sketches Image Processing

161 Edge Adaptive Image Steganography Based on LSB Matching Revisited Image Processing

162 Face Recognization Image Processing

163 IRIS Recognization System Image Processing

164 Robust video data hiding using forbidden zone data hiding and selective Image Processing
embedding
165 SKETCH4MATCH – content based image retrieval Image Processing

166 SVD-Based Universal Spatial Domain Image Steganalysis Image Processing

167 Dynamics of Malware Spread in Decentralized Peer Network Worms

168 Modeling and Detection of Camouflaging Worm Network Worms

169 Adaptation of a virtual campus for mobile learning devices Mobile based
170 Blutooth Mobile Based College Campus Mobile based
171 Privacy-Conscious Location-Based Queries in Mobile Environments.doc Mobile based

172 The World in a Nutshell Mobile based


173 A Mobility Management Solution Based on ID
174 A New Approach for FEC Decoding Based on the BP Algorithm in LTE and
WiMAX Systems
175 A Privacy-Preserving Location Monitoring _abstract
176 A Secuity architecture achieving anonymity and traceability in wireless
mesh networks
177 Chunk distribution in Mesh-Based Large Scale P2P Streaming
178 Continuous Neighbor Discovery in Asynchronous
179 Cross-Layer Optimization for Multimedia Transport over Multicode CDMA
Networks
180 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
Wireless Networks

CSE/IT EMBEDDED INNOVATION LAB final year software project


SOFTWARE PROJECTS TITLE -2015
181 Dynamic Authentication for Cross-Realm SOA-Based Business Processes

182 Energy-Efficient Protocol for Co Operative Networks


183 Host-to-Host Congestion Control for TCP-doc
184 Integrated file replication and consistency maintanance in p2p systems

185 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using


Portfolio Selection
186 Layered Approach Using ConditionalRandom Fields for Intrusion
Detection
187 MABS Multicast Authentication Based On Batch Signature
188 Maximizing Rewards in Wireless Networks
189 Mobility Management Approaches for Mobile-Zeroth review
190 Online Intrusion Alert Aggregation
191 Optimal and efficient graph based resource allocation algorithms for
multiservice frame based ofdma networks
192 Optimal Bandwidth Assignment for Multiple Description Coded Video
193 Power and Sub Carrier Allocation for OFDMA Networks
194 Query Processing in Multi-User Scenario for WSN
195 Secure Data Collection in Wireless Sensor Networks Using Randomized
Dispersive Routes
196 Secure High-Throughput Multicast Routing in WMN
197 Secure Network Discovery in Wireless Sensor Networks Using
Combinatorial Key Pre
198 Web Application Performance Analysis Based on Component Load Testing

199 Design and Performance Analysis of Mobility Management Schemes


based on Pointer Forwarding for Wireless Mesh Networks
200 Ranking spatial data by quality preferences
201 Scalable and Cost-Effective Interconnection of Data-Center Servers Using
Dual Server Ports

CSE/IT EMBEDDED INNOVATION LAB final year software project

You might also like