23-03-2013, 08:12 PM
I am Niyi, need project report and source code of the following project topics.
1.vehicle insurance Final Year Project
2.web traffic analyser Final Year Project
3.ad agency Final Year Project
4.best travels Final Year Project
5.internet banking Final Year Project
6.bank to customer i bank solution Final Year Project
7.mega mart ad release management Final Year Project
8.advertisement-one Final Year Project
9.ad request Final Year Project
10.savings bank - joint account Final Year Project
11.storage of marketing Final Year Project
12.advertisement-two Final Year Project
13.flight reservation Final Year Project
14.asp project Final Year Project
15.online cources project Final Year Project
16.CENTRALIZED BANKING PORTAL.
17.TRAVEL AGENT
18.TROUBLE TICKET SYSTEM
19.GREETING CARDS-E-WISHES
20.MED CLAIM PROCESSING
21.ENTERPRISE ORGANIZATION PORTAL
22.WARE HOUSE MANAGEMENT SYSTEM
23.ONLINE DEPOSIT
24.COMPUTERIZATION OF MANUFACTURING UNIT
25.ECCENTRIC SYSTEM
26.CLIENT SERVER ADMINISTRATION.
27.AIR INDIA SUPPORT TOOLS.
28.ONLINE BLOOD BANK
29.CYBER SHOPPING WINDOW
30.MY PARTY LINK31.OFFICE MANAGEMENT SYSTEM.
32.VOYAGE MANAGEMENT
33.SHIFT MANAGEMENT SYSTEM
34.E-VISA PROCESSING
35.ONLINE DISCUSSION FORUM
36.BALANCE SHEET INSTRUCTOR
37.ONLINE TEST CENTER
38.STUDENT HALT MART
39.ONLINE CD STORE
40.BUG TRACKING TOOL
41.ORGANIZATIONAL INTERNAL SURVEY.
42.E-BANKING PORTAL.
43.REAL ESTATE MANAGEMENT SYSTEM.
44.SHARE MANAGEMENT SYSTEM.
45.SKY WAYS.
46.E-GRIEVANCES
47.PACKERS & MOVERS
48.PRODUCT ANIMATION
49.RNS GROUPS
50.COURIER INFORMATION SYSTEM
51.ONLINE RECRUITMENT PROCESS
52.CHEMICAL MANAGEMENT SYSTEM
53.PAYROLL SYSTEM
54.ENTERPRISE RESOURCE PLANNING
55.REALITY EVENT ORGANIZATION
56.PROJECT FINANCE MANAGEMENT SYSTEM
57.STOCK & PORTFOLIO
58.MAILING LIST
59.CYBER BIDING GATEWAY
60.INFORMATION PORTAL
61.RADICAL APPLICATION PORTAL
62.STORES MANAGEMENT
63.INVENTORY ADMINISTRATION SCHEME
64.AUTOMATION OF GOVT. ADMINISTRATION
65.CRIME PORTAL USING 3-TIER ARCHITECTURE.
66.LAB MANAGEMENT SYSTEM.
67.STUDENT COMMUNICATION TOOL.
68.TRANSPORT AUTOMATION.
69.MULTIPLEX MOVIE TICKET BOOKING
70.INDIAN TOURISM PORTAL
71.SOFTWARE PROJECT ORGANIZATION
72.CALL CENTRE MANAGEMENT
73.COOL CAB SERVICES
74.BACK TO MY VILLAGE
75.E-FARMER
76.E MENTORING FOR WOMEN
77.CAMPUS ORKUT
78.ADVERTISING AGENCIES
79.HOSPITAL MANAGEMENT SYSTEM
80.SIGNAL INDICANT SYSTEM
81.E-MATCHMAKING
82.BUS TICKET ISSUE AGENCY
83.ONLINE DIAGNOSTIC STATION
84.AP GENCO MAILING SYSTEM
85.CUSTOMER TECH SUPPORT
86.HRMS RESOURCE PLANNING
87.PUB MAINTENANCE SYSTEM
88.PROJECT ORGANIZER
89.SMART ADS
90.E-TIME OFFICE
91.CIVIL REGISTRY
92.ADDICTION RECOVERY
93.VIRTUAL CLASS ROOM
94.SOCIAL SECURITY NUMBER95.BACKGROUND VERIFICATION
96.ISO QUALITY CERTIFICATION TOOL
97.BUDGET PLANNER
98.RACE LAPPING FEDERATION
99.TELE COMMUNICATIONS SERVICES
100.CRICKET CLUB
101.COSTCO
102.E-CHALLANS
103.CAREER GUIDANCE PLACEMENT UNIT
104.HOTEL MANAGEMENT SYSTEM
105.ONLINE SERVICE PIVOT
106.WORLD OF RECIPES
107.NEWS THAT MATTERS
108.GEO SPATIAL INFO TECH SOLUTIONS
109.CYBER HOTLIER
110.ESSBEE INDUSTRIES
111.CABLEGRAM NETWORK
112.ENTERPRISE SECURITY SERVICES
113.E-BILL SERVICES
114.CLIAM APPROVAL AND PROCESSING SYSTEM.
115.ELECTRONIC POINT OF SALE
116.AUTOMATED BALLOT VOTING�
1. Distributed cache updating for the Dynamic source routing protocol
2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
3. Face Recognition Using Laplacian faces
4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
7. Noise Reduction by Fuzzy Image Filtering
8. Online Handwritten Script Recognition
9. ODAM: An Optimized Distributed Association Rule Mining Algorithm
10. Protocol Scrubbing: Network Security Through Transparent Flow Modification
11. Workflow Mining: Discovering Process Models from Event Logs
12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
15. ITP: An Image Transport Protocol for the Internet
16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)
17. Incremental deployment service of Hop by hop multicast routing protocol
18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
19. Application of BPCS steganography to wavelet compressed video
20. Neural Networks for Unicode Optical Character Recognition
21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
22. Neural Network-Based Face Detection
23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
25. Mobile Agents In Distributed Multimedia Database Systems
26. Image Stream Transfer Using Real-Time Transmission Protocol
27. Neural Networks for Handwritten character and Digits
28. Evaluating the Performance of Versatile RMI Approach In Java
29. Effective Packet Analyzing and Filtering System for ATM Network
30. Selective Encryption of Still Image
31. Homogenous Network Control and Implementation
32. Retrieving Files Using Content Based Searching and presenting it in Carousel view
33. Dynamic Signature Verification Using Pattern Recognition
34. Embedding in Video Steganography
35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
36. Location Aided Routing for Mobile Ad-Hoc Networks
37. Image Rendering for Grid Technology
38. Java Network File Sharing System
39. Java Visual Editor with Compiler
40. E-Mail Server Using Multithreaded Sockets
41. Network Component for XML Migration
42. Image Water Marking and Combustion
43. Image Processing for Convolution Filters
44. Artificial intelligence network load balancing using Ant Colony Optimization
45. Image Processing for Edge Detection Filters
46. Flood Fill Algorithms in C# and GDI+
47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
48. Hiding messages in the Noise of a Picture
49. Windows Management Instrumentation WMI Implementation
50. Steganography for Hiding Data in Wave Audio Files
51. Automatic Dependent Surveillance-Broadcasting(Ads-B)
52. Digital Water Marking For Video Piracy Detection
53. Encryption and Decryption technique for secure communication in WLAN
54. File Encryption and Encrypted text embedding in an image
55. Integrating Speech Engine with Web Navigator
56. Intrusion Detection Prevention And Trace back Systems
57. Java Productivity Aids
58. J2ME Mail Client Server
59. Monitoring And Managing The Clusters Using JMX
60. Network Analyze
61. Neural Network for Recognition of Handwritten andDigits Backpropagation
62. Network Traffic Anomaly Detector
63. Optimal Cryptographic Technique
64. Peer to Peer Messaging System using JXTA
65. Performance Evaluation of DISTANCE Routing Algorithm in MANET
66. Public Key Validation for DNS security Extension
67. Query Routing Optimization In Sensor Communication Networks
68. Virtual Private Network
69. Voice Enabled Smart Browser
70. XML Enabled SQL SERVER
71. An efficient message digest algorithm (MD) for datasecurity
72. Hopfield model of neural network for pattern recognition
73. Using Trigonometry and Pythagoras to Watermark an Image
74. Hiding messages in the Noise of a Picture
75. ERP for Leather Company
76. Cryptographically Using Secure Server/Client Protocol
77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
78. Neural Networks for Handwriting Detection System Using Brain Net
79. Wireless Traffic Viewer Using J2ME
80. Video Steganography Using Mobile Simulation
81. Cryptographically Using Secure Server/Client Protocol
82. Intrusion Detection Prevention And Trace back Systems
83. Neural Network for Recognition of Handwritten andDigits
84. The File Digest program and the C++ implementation of some Message-Digest algorithms
85. File Encryption and Encrypted text embedding in an image
86. Performance Evaluation of DISTANCE Routing Algorithm in MANET
87. ERP for Leather Company
88. Online Web shop
89. Online Fashion Studios
90. ERP for Small Business
91. Bulk Billing System
92. Wireless Traffic Viewer Using J2ME
93. J2ME Mail Client Server
94. Monitoring And Managing The Clusters Using JMX
95. Peer-To-Peer Messaging
96. Mobile Information Provider
97. Mobile Bank
98. Video Steganography Using Mobile Simulation
99. Network Traffic Anomaly Detector
100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol
101. Active Source Routing Protocol for Mobile AD-HOC Networks
102. Adaptive Security and Authentication for DNS System
103. Evaluating the Performance of Versatile RMI Approach In Java
104. Dynamic Control for Active Network System
105. Effective Packet Analyzing and Filtering System forATM Network
106. Multi Server Communication In Distributed Management System
107. Reduction of Network Density for Wireless Ad-Hoc Networks
108. Messaging Service over TCP/IP in Local Area Network
109. Secure Data Hiding and Extraction Using BPCS
110. Dynamic Signature Verification Using Pattern Recognition
111. Data Minimization And Storage Using XML Enable SQL Server
112. Retrieving Files Using Content Based Search
113. Distributed Node Migration by Effective Fault Tolerance
114. Embedding in Video Steganography
115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
116. Location Aided Routing for Mobile Ad-Hoc Networks
117. Image Rendering for Grid Technology
118. Optimal Multicast Routing in Mobile Ad-Hoc Networks
119. Scalable Wireless Ad-Hoc Network Simulation using XTC
120. Homogenous Network Control and Implementation
121. Java Network File Sharing System
122. Mobile Agents In Distributed Multimedia Database Systems
123. Java Visual Editor with Compiler
124. ATM Networks for Online Monitoring System
125. Performance Evaluation of RMI
126. Network Border Patrol Preventing Congestion Collapse
127. Network Component for XML Migration
128. Shortest Node Finder In Wireless Ad-Hoc Networks
129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
130. Distributed Cache Updating for the Dynamic SourceRouting Protocol
131. Multi Router Traffic Monitoring System
132. Public Key Validation For DNS Security Extensions
133. A Secure Routing Protocol for mobile Ad-hoc Network
134. Retrieving Files Using Content Based Searching and presenting it in Carousel view
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response andBlocking using signature method in Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic sourcerouting protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermarkan Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing usingAnt Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
178. Textile Web Services
179. Auction System
180. Online Quiz
181. Online Bank
182. Online Voting System
183. Securing Image URL
184. Web Services
185. Smart Knowledge Provider
186. Online Book Shop
187. Electronic Fund Transfer
188. Work Flow Management System
189. Online Customer Care
190. Scribe Automation
191. Textile Management System
192. Sales and Purchase Management System
193. Human Resources Management System
194. Inventory Manage System
195. Job Order System
196. Advertisement Posting Website ASP .Net
197. Mobile shop shopping cart System
198. Patient Management System
199. Property Management System
200. Web Based Content Management System
201. Neural Networks for Handwriting Detection System Using Brain Net
202. Library Management system
203. Windows Management Instrument (WMI) .Net 2005
204. Wallpaper Changer Utility
205. Win Application for Word Processing
206. Screen capture Utility
207. HTML Editor
208. Image Converter 2005
209. Internet History Viewer
210. VB .Net Smart Mail Transfer Protocol
211. Windows Multi File Search utility
212. Message Digest
213. FTP Explorer
214. Convolution Filter
215. Find and Replace utility
216. Apartment Management System
217. Computerized Information Software
218. Employee Management System
219. Hotel Management System
220. Human Resources Management System
221. Inventory System
222. Membership Management System
223. Patient Care System
224. Send SMS To Cell Phone Through SMTP Mail
225. Trainee Management System
226. J2ME Project Titles
227. Wireless Traffic Viewer Using J2ME
228. J2ME Mail Client Server
229. Monitoring And Managing The Clusters Using JMX
230. Peer-To-Peer Messaging
231. Mobile Information Provider
232. Mobile Bank
233. Video Steganography Using Mobile Simulation
234. Network Traffic Anomaly Detector
235. J2EE Project Titles
236. ERP for Leather Company
237. Online Web shop
238. Online Fashion Studios
239. ERP for Small Business
240. Bulk Billing System
241. Distributed cache updating for the Dynamic sourcerouting protocol
242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
243. Face Recognition Using Laplacian faces
244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
247. Noise Reduction by Fuzzy Image Filtering
248. Online Handwritten Script Recognition
249. ODAM: An Optimized Distributed Association Rule Mining Algorithm
250. Protocol Scrubbing: Network Security Through Transparent Flow Modification
251. Workflow Mining: Discovering Process Models from Event Logs
252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
253. An Agent Based Intrusion Detection, Response andBlocking using signature method in Active Networks
254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
255. ITP: An Image Transport Protocol for the Internet
256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
257. Incremental deployment service of Hop by hop multicast routing protocol
258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
259. Application of BPCS steganography to wavelet compressed video
260. Neural Networks for Unicode Optical Character Recognition
261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
262. Neural Network-Based Face Detection
263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System forATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
306. Query Routing Optimization In Sensor Communication Networks
307. Virtual Private Network
308. Voice Enabled Smart Browser
309. XML Enabled SQL SERVER
310. An efficient message digest algorithm (MD) for data security
311. Hopfield model of neural network for pattern recognition
312. Using Trigonometry and Pythagoras to Watermarkan Image
313. Hiding messages in the Noise of a Picture
314. ERP for Leather Company
315. Cryptographically Using Secure Server/Client Protocol
316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
317. Neural Networks for Handwriting Detection System Using Brain Net
318. Wireless Traffic Viewer Using J2ME
319. Video Steganography Using Mobile Simulation
320. Image Rendering for Grid Technology
321. Java Network File Sharing System
322. Java Visual Editor with Compiler
323. E-Mail Server Using Multithreaded Sockets
324. Network Component for XML Migration
325. Image Water Marking and Combustion
326. Image Processing for Convolution Filters
327. Artificial intelligence network load balancing usingAnt Colony Optimization
328. Image Processing for Edge Detection Filters
329. Mobile Information Provider
330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case
331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
332. QUIVER: Consistent Object Sharing For Edge Services
333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
334. Geometric Approach to Improving Active Packet Loss Measurement
335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
338. Watermarking Relational Databases Using Optimization Based Techniques
339. Active Queue Management for Fair Resource Allocation in Wireless Networks
340. Benefit Based Data Caching In Ad Hoc Networks
341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks
342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction
343. Two Techniques for Fast Computation of Constrained Shortest Paths
344. Controlling IP Spoofing Through Inter Domain Packet Filters
345. A New Model for Dissemination of XML Content
346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements
347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocationand Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resourcesin an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video JAva Base Project List
1. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
2. A Reputation Based Trust Model for Peer to Peer eCommerce Communities “ IEEE
3. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
4. Mobile Banking Design & Implementation - IEEE
5. Retrieving Files using Content Based Searching and displaying them in Carousel View “ IEEE
6. Distributed Data mining in Credit Card Fraud Detection Analysis “ IEEE
7. E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management “ IEEE
8. Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader
9. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
10. VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
11. Authenticating Network Attached Storage - IEEE
12. Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S -IEEE
13. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
14. Digital Image Processing with Multi Domain Approach “ IEEE
15. Static Image Hand Gesture Recognition using Neural Networks
16. CAC “ Connection Admission Control using ATM Networks Implementation “ IEEE
17. Distributed Component Router based Supply Chain Management System “ SCM “ IEEE
18. Intelli WAP System Implementation / WAP based information Retrieval System
19. Proxy Server - Design and Implementation
20. Public Key Validation for DNS Security Extensions “ Domain Naming Server
21. E-Recruitment System - Dynamic Online Professional Recruitment & Management System
22. Secure Password-Based Protocol for Downloading a Private Key - IEEE
23. Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
24. Network Security System in DNS using AD-HOC Networks “ IEEE
25. Secure Optimal Cyclic Cryptographic System “ IEEE
26. Multithreaded Peer to Peer Communication using Distributed Frameworks“ IEEE
27. Building Intelligent Shopping Assistant using Data mining technique for Web Services “ IEEE
28. Network Analyzer & Network Monitoring Tool using SNMP
29. Remote Computing using Thin Clients
30. VVoIP “ Voice with Video Over IP Networks
31. Dynamic Character & Pattern Recognition using Neural Networks
32. Online Handwritten Script Recognition - IEEE
33. Towards multi model interfaces for intrusion detection - IEEE
34. Proxy Server - A Smart Sharing System with Fire wall Protection, Customized Firewall for internet security & inter-network traffic gateway “ IEEE
35. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
36. Network Border Patrol for Congestion Collapse Preventing System “ IEEE
37. Defect Tracking Tool - Enterprise Project and Defect Tracking System “ IEEE
38. Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification
39. Multi Router Traffic Monitor Implementation
40. Homogeneous Networks & Control Implementation
41. A/I Net A Network that Integrates ATM and IP - IEEE
42. E“Secure Transaction “ Design & Implementation “ IEEE
43. Image Compression and Analysis with MSE & PSNR Technique - IEEE
44. Crypt kit “ A real time cryptographic system for security over the networks - IEEE
45. Efficient Contiguous Data & Video Streamer with Buffer Management
46. Distributed Component Router Based CRM “ Customer Relationship Management“ IEEE
47. Network Traffic, Packet Analyzer and Sniffer
48. Digital Steganography: Hiding Data within Data
49. Integrated Development Environment using JSWING“ IDE JSWING
50. ERP Application “ integrated Enterprise Solutionswith Strategic advantages
51. Grid information Retrieval System
52. Network Packer Sniffer Implementation
53. Online Issue Tracking - Project Management Solutions
54. E-HealthCare - Distributed HealthCare and A Strategic Management System
55. Data mining implementation for Credit Cards Application Processing System
56. Dynamic University Linking & Data integrity Maintenance
57. E-Sales Order Processing System
58. RTF to XML Converter
59. Material Forecasting and Management Solution
60. Effective & Efficient Freight Management System
61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
62. XML Migration - Implementation for XML format from Database System
63. Shares & Stock Management system “ Portfolio Manager Implementation
64. Online Task Management with fully featured intelli System
65. Vertical Market Information Providing System Implementation
66. Insertion of Links of navigation into the Web Pages
67. Inter Office Messaging System “ IOMS, Office Automation System
68. Web based Matrimonial Services, A Desi Matrimony web Portal
69. Online Auction & Bidding System With Multi Brand & Product Selection
70. Online Body Shopping System with Auto Mailing feature
71. Online Job Consultancy Services
72. Net Banking Services & Solutions
73. Online Web Shop Mall - Web Shop Site
74. Intelli Shopping Cart & Assistant System
75. Online VRS - Vehicle Reservation System
76. Distributed Web Service for On-Line Coursework Submission
77. Document Archival Management System “ Electronic Archival Design
78. Remote Electricity Billing System Automation & Implementation “ EJB
79. Dynamic College information System & Data integrity Maintenance
80. Computerized system for Extracting Abstract from the given source document, Abstract solutions
81. eCareer & Consultancy Service Online
82. eGovernance Design & Implementation System
83. EAI Approach “ Implementation of EAI in Hotel Management System
84. Online Event Management with featured intelli system
85. Online Hospital info System with interactive Services & Universal Medical Portal with Adviser
86. Human Resource Management Solutions (HRMS)
87. Online Web based Complete Recruitment System
88. Distributed Database System for online Shopping & Store
89. Web based Distributor Information Providing Services
90. Insurance System, Online Insurance Solutions Provider
91. Integrating Data and Voice Networks - VoIP
92. Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
93. Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
94. Mobile based Network Monitoring System
95. System to Mobile Communication
96. Video Transmission using SIP - IEEE
97. Web based Chatting - Multi User Voice Chat
98. Network Traffic Anomaly Detector “ IEEE
99. SIP - Session Initialization Protocol, Chatting
100. Monitoring & Managing the Clusters using JMX “IEEE
101. Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
102. Peer-to-Peer implementation Multithreaded Technology with tuple space
103. Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE
104. P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
105. Secured Network manager
106. Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time “ IEEE
107. Scalable Wireless Ad-Hoc Network Simulation using XTC “ IEEE
108. Voice Web Browser Implementation
109. Network Analyzer, Design & Implementation
110. Routing Simulator - An Efficient end to end Packet Delivery system
111. Remote Viewer “ A Remote Desktop viewer for an Intranet Environment
112. Remote City Mapping Implementation using J2ME
113. Mobile Clients Support GUI Systems design
114. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
115. Bluetooth equipped mobile phones to support synchronous interaction with public displays
116. Bluetooth based Mobile Phone Photo Browser
117. IMAP - Internet Mail Access Protocol using InternetEngineering Task Force
118. Online PDA “ Primary Domain Controller System
119. Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request
120. Portable and Generic tool for Web Applications
121. Network Document Management & Versioning System
122. Dynamic Server Replication System
123. Instant Smart Messenger System
124. Multi Threaded implementation with Pull / Push Technology
125. Tool for Performance Profiling of Web Sites
126. Network Time Tracker system
127. Workflow based Complaint Management System
128. Project Scrutinizer “ Efficient Project Tracking System
129. Project Tracking & It Portfolio Management System
130. JSP based Shopping Cart Implementation
131. ERP & CRM, An Effective implementation of ERP with CRM Solutions
132. Financial Accounts - Integrated Financial Accounting Solutions
133. Multi Language Mailing system “ Design & implementation.
My email is hollam201[at]gmail.com in case anybody has information for me concerning any of these project topics or other ones.
Thanks