Collage Management System
Online Aucation system
Online Shopping system
Electronic Transaction security system
Php based online schooling system
Enterprise Resource Planning system (VB)
Virtual Class Room
Online Shopping (asp based)
Message Management System
Automatic Remote Backup
Network Monitoring System
Online Library System
Opticall Character Recognition system
Task Management System
Ethernet - Billing System
Voice Controlled application for blindes
Office Automation
Web + Mail Crowler
Online Examination
Automated Robot for Military System (ARMS)
The Complete Personal Mobile System
Distributed Ant Robotics
Networks Based Performance Analysis Tool
Some misclanious
Webopedia (Web Sever)
Voice Chating & Voice Mail
Network Monitoring Based on Java
Security Robot
Honynet
A Network Based University Collage Co-Ordiantion Syatem
Internet On Demand - Web Browser And Copier
Anti - Viruses
AI Firewall
Steganography - an Art of Hiding Digital Information
Parellel Processing Thro' Job Distribution
Network Management Tool
Digital Image Processing
Utilities to Compressess, Decompressers and Split Merge Files
Load Balancing Using Process Migration in Linux
Web Based Proxy Sever
Ooline Polling
Microcomputer Based Robot
Intrusion Prevention System
Barcode Genration
Wireless Voice Over IP
Text to Speech Technology
Biometric - The Security System
Remote PC Access in Cyber Cafe
Parallel Processing Application
SCET Intra Net
Voice Organization
Mobotric
Network Monitoring
Image Processing Application
Web Based Administration of Lunix Sever
SCET's Invition For Online Tender
Graphical Representation Of Online Shares & Stocks
A Man-Machine Interface - A Robot
Automation With The Concept Of Jini
Net on TV Channel
Firewell
Distributed Parallel Virtual Machine
The Application of Stock Technology
Online Test
E-Mail Server Using SMTP
Smart Divece Controller
Medical Transcription Server
Intrusion Detection System & Bandwidth Limitation
Telecontrolled Utilities
Network Vigilator
Ocr in Hindi
Web Server
We - Crm (Custember Relationship)
Yarn Quality Management System
Upware (Packet Analyzer, IPFW, IPRTR )
Network MAnagement And Internet Tools
DSP Simulator
PC (Net) To Phone
Jini The Distributed System
SAS
Wireless Application Protocol
Webified Irc (Internet Relay Chat)
Online Aucation system
Online Shopping system
Electronic Transaction security system
Php based online schooling system
Enterprise Resource Planning system (VB)
Virtual Class Room
Online Shopping (asp based)
Message Management System
Automatic Remote Backup
Network Monitoring System
Online Library System
Opticall Character Recognition system
Task Management System
Ethernet - Billing System
Voice Controlled application for blindes
Office Automation
Web + Mail Crowler
Online Examination
Automated Robot for Military System (ARMS)
The Complete Personal Mobile System
Distributed Ant Robotics
Networks Based Performance Analysis Tool
Some misclanious
Webopedia (Web Sever)
Voice Chating & Voice Mail
Network Monitoring Based on Java
Security Robot
Honynet
A Network Based University Collage Co-Ordiantion Syatem
Internet On Demand - Web Browser And Copier
Anti - Viruses
AI Firewall
Steganography - an Art of Hiding Digital Information
Parellel Processing Thro' Job Distribution
Network Management Tool
Digital Image Processing
Utilities to Compressess, Decompressers and Split Merge Files
Load Balancing Using Process Migration in Linux
Web Based Proxy Sever
Ooline Polling
Microcomputer Based Robot
Intrusion Prevention System
Barcode Genration
Wireless Voice Over IP
Text to Speech Technology
Biometric - The Security System
Remote PC Access in Cyber Cafe
Parallel Processing Application
SCET Intra Net
Voice Organization
Mobotric
Network Monitoring
Image Processing Application
Web Based Administration of Lunix Sever
SCET's Invition For Online Tender
Graphical Representation Of Online Shares & Stocks
A Man-Machine Interface - A Robot
Automation With The Concept Of Jini
Net on TV Channel
Firewell
Distributed Parallel Virtual Machine
The Application of Stock Technology
Online Test
E-Mail Server Using SMTP
Smart Divece Controller
Medical Transcription Server
Intrusion Detection System & Bandwidth Limitation
Telecontrolled Utilities
Network Vigilator
Ocr in Hindi
Web Server
We - Crm (Custember Relationship)
Yarn Quality Management System
Upware (Packet Analyzer, IPFW, IPRTR )
Network MAnagement And Internet Tools
DSP Simulator
PC (Net) To Phone
Jini The Distributed System
SAS
Wireless Application Protocol
Webified Irc (Internet Relay Chat)
1. Distributed cache updating for
the Dynamic source routing protocol
2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
3. Face Recognition Using Laplacian faces
4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
7. Noise Reduction by Fuzzy Image Filtering
8. Online Handwritten Script Recognition
9. ODAM: An Optimized Distributed Association Rule Mining Algorithm
10. Protocol Scrubbing: Network Security Through Transparent Flow Modification
11. Workflow Mining: Discovering Process Models from Event Logs
12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
15. ITP: An Image Transport Protocol for the Internet
16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)
17. Incremental deployment service of Hop by hop multicast routing protocol
18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
19. Application of BPCS steganography to wavelet compressed video
20. Neural Networks for Unicode Optical Character Recognition
21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
22. Neural Network-Based Face Detection
23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
25. Mobile Agents In Distributed Multimedia Database Systems
26. Image Stream Transfer Using Real-Time Transmission Protocol
27. Neural Networks for Handwritten character and Digits
28. Evaluating the Performance of Versatile RMI Approach In Java
29. Effective Packet Analyzing and Filtering System for ATM Network
30. Selective Encryption of Still Image
31. Homogenous Network Control and Implementation
32. Retrieving Files Using Content Based Searching and presenting it in Carousel view
33. Dynamic Signature Verification Using Pattern Recognition
34. Embedding in Video Steganography
35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
36. Location Aided Routing for Mobile Ad-Hoc Networks
37. Image Rendering for Grid Technology
38. Java Network File Sharing System
39. Java Visual Editor with Compiler
40. E-Mail Server Using Multithreaded Sockets
41. Network Component for XML Migration
42. Image Water Marking and Combustion
43. Image Processing for Convolution Filters
44. Artificial intelligence network load balancing using Ant Colony Optimization
45. Image Processing for Edge Detection Filters
46. Flood Fill Algorithms in C# and GDI+
47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
48. Hiding messages in the Noise of a Picture
49. Windows Management Instrumentation WMI Implementation
50. Steganography for Hiding Data in Wave Audio Files
51. Automatic Dependent Surveillance-Broadcasting(Ads-B)
52. Digital Water Marking For Video Piracy Detection
53. Encryption and Decryption technique for secure communication in WLAN
54. File Encryption and Encrypted text embedding in an image
55. Integrating Speech Engine with Web Navigator
56. Intrusion Detection Prevention And Trace back Systems
57. Java Productivity Aids
58. J2ME Mail Client Server
59. Monitoring And Managing The Clusters Using JMX
60. Network Analyze
61. Neural Network for Recognition of Handwritten and Digits Backpropagation
62. Network Traffic Anomaly Detector
63. Optimal Cryptographic Technique
64. Peer to Peer Messaging System using JXTA
65. Performance Evaluation of DISTANCE Routing Algorithm in MANET
66. Public Key Validation for DNS security Extension
67. Query Routing Optimization In Sensor Communication Networks
68. Virtual Private Network
69. Voice Enabled Smart Browser
70. XML Enabled SQL SERVER
71. An efficient message digest algorithm (MD) for data security
72. Hopfield model of neural network for pattern recognition
73. Using Trigonometry and Pythagoras to Watermark an Image
74. Hiding messages in the Noise of a Picture
75. ERP for Leather Company
76. Cryptographically Using Secure Server/Client Protocol
77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
78. Neural Networks for Handwriting Detection System Using Brain Net
79. Wireless Traffic Viewer Using J2ME
80. Video Steganography Using Mobile Simulation
81. Cryptographically Using Secure Server/Client Protocol
82. Intrusion Detection Prevention And Trace back Systems
83. Neural Network for Recognition of Handwritten and Digits
84. The File Digest program and the C++ implementation of some Message-Digest algorithms
85. File Encryption and Encrypted text embedding in an image
86. Performance Evaluation of DISTANCE Routing Algorithm in MANET
87. ERP for Leather Company
88. Online Web shop
89. Online Fashion Studios
90. ERP for Small Business
91. Bulk Billing System
92. Wireless Traffic Viewer Using J2ME
93. J2ME Mail Client Server
94. Monitoring And Managing The Clusters Using JMX
95. Peer-To-Peer Messaging
96. Mobile Information Provider
97. Mobile Bank
98. Video Steganography Using Mobile Simulation
99. Network Traffic Anomaly Detector
100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol
101. Active Source Routing Protocol for Mobile AD-HOC Networks
102. Adaptive Security and Authentication for DNS System
103. Evaluating the Performance of Versatile RMI Approach In Java
104. Dynamic Control for Active Network System
105. Effective Packet Analyzing and Filtering System for ATM Network
106. Multi Server Communication In Distributed Management System
107. Reduction of Network Density for Wireless Ad-Hoc Networks
108. Messaging Service over TCP/IP in Local Area Network
109. Secure Data Hiding and Extraction Using BPCS
110. Dynamic Signature Verification Using Pattern Recognition
111. Data Minimization And Storage Using XML Enable SQL Server
112. Retrieving Files Using Content Based Search
113. Distributed Node Migration by Effective Fault Tolerance
114. Embedding in Video Steganography
115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
116. Location Aided Routing for Mobile Ad-Hoc Networks
117. Image Rendering for Grid Technology
118. Optimal Multicast Routing in Mobile Ad-Hoc Networks
119. Scalable Wireless Ad-Hoc Network Simulation using XTC
120. Homogenous Network Control and Implementation
121. Java Network File Sharing System
122. Mobile Agents In Distributed Multimedia Database Systems
123. Java Visual Editor with Compiler
124. ATM Networks for Online Monitoring System
125. Performance Evaluation of RMI
126. Network Border Patrol Preventing Congestion Collapse
127. Network Component for XML Migration
128. Shortest Node Finder In Wireless Ad-Hoc Networks
129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
130. Distributed Cache Updating for the Dynamic Source Routing Protocol
131. Multi Router Traffic Monitoring System
132. Public Key Validation For DNS Security Extensions
133. A Secure Routing Protocol for mobile Ad-hoc Network
134. Retrieving Files Using Content Based Searching and presenting it in Carousel view
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic source routing protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermark an Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing using Ant Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
178. Textile Web Services
179. Auction System
180. Online Quiz
181. Online Bank
182. Online Voting System
183. Securing Image URL
184. Web Services
185. Smart Knowledge Provider
186. Online Book Shop
187. Electronic Fund Transfer
188. Work Flow Management System
189. Online Customer Care
190. Scribe Automation
191. Textile Management System
192. Sales and Purchase Management System
193. Human Resources Management System
194. Inventory Manage System
195. Job Order System
196. Advertisement Posting Website ASP .Net
197. Mobile shop shopping cart System
198. Patient Management System
199. Property Management System
200. Web Based Content Management System
201. Neural Networks for Handwriting Detection System Using Brain Net
202. Library Management system
203. Windows Management Instrument (WMI) .Net 2005
204. Wallpaper Changer Utility
205. Win Application for Word Processing
206. Screen capture Utility
207. HTML Editor
208. Image Converter 2005
209. Internet History Viewer
210. VB .Net Smart Mail Transfer Protocol
211. Windows Multi File Search utility
212. Message Digest
213. FTP Explorer
214. Convolution Filter
215. Find and Replace utility
216. Apartment Management System
217. Computerized Information Software
218. Employee Management System
219. Hotel Management System
220. Human Resources Management System
221. Inventory System
222. Membership Management System
223. Patient Care System
224. Send SMS To Cell Phone Through SMTP Mail
225. Trainee Management System
226. J2ME Project Titles
227. Wireless Traffic Viewer Using J2ME
228. J2ME Mail Client Server
229. Monitoring And Managing The Clusters Using JMX
230. Peer-To-Peer Messaging
231. Mobile Information Provider
232. Mobile Bank
233. Video Steganography Using Mobile Simulation
234. Network Traffic Anomaly Detector
235. J2EE Project Titles
236. ERP for Leather Company
237. Online Web shop
238. Online Fashion Studios
239. ERP for Small Business
240. Bulk Billing System
241. Distributed cache updating for the Dynamic source routing protocol
242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
243. Face Recognition Using Laplacian faces
244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
247. Noise Reduction by Fuzzy Image Filtering
248. Online Handwritten Script Recognition
249. ODAM: An Optimized Distributed Association Rule Mining Algorithm
250. Protocol Scrubbing: Network Security Through Transparent Flow Modification
251. Workflow Mining: Discovering Process Models from Event Logs
252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
253. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
255. ITP: An Image Transport Protocol for the Internet
256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
257. Incremental deployment service of Hop by hop multicast routing protocol
258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
259. Application of BPCS steganography to wavelet compressed video
260. Neural Networks for Unicode Optical Character Recognition
261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
262. Neural Network-Based Face Detection
263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System for ATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
306. Query Routing Optimization In Sensor Communication Networks
307. Virtual Private Network
308. Voice Enabled Smart Browser
309. XML Enabled SQL SERVER
310. An efficient message digest algorithm (MD) for data security
311. Hopfield model of neural network for pattern recognition
312. Using Trigonometry and Pythagoras to Watermark an Image
313. Hiding messages in the Noise of a Picture
314. ERP for Leather Company
315. Cryptographically Using Secure Server/Client Protocol
316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
317. Neural Networks for Handwriting Detection System Using Brain Net
318. Wireless Traffic Viewer Using J2ME
319. Video Steganography Using Mobile Simulation
320. Image Rendering for Grid Technology
321. Java Network File Sharing System
322. Java Visual Editor with Compiler
323. E-Mail Server Using Multithreaded Sockets
324. Network Component for XML Migration
325. Image Water Marking and Combustion
326. Image Processing for Convolution Filters
327. Artificial intelligence network load balancing using Ant Colony Optimization
328. Image Processing for Edge Detection Filters
329. Mobile Information Provider
330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case
331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
332. QUIVER: Consistent Object Sharing For Edge Services
333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
334. Geometric Approach to Improving Active Packet Loss Measurement
335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
338. Watermarking Relational Databases Using Optimization Based Techniques
339. Active Queue Management for Fair Resource Allocation in Wireless Networks
340. Benefit Based Data Caching In Ad Hoc Networks
341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks
342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction
343. Two Techniques for Fast Computation of Constrained Shortest Paths
344. Controlling IP Spoofing Through Inter Domain Packet Filters
345. A New Model for Dissemination of XML Content
346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements
347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resources in an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
3. Face Recognition Using Laplacian faces
4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
7. Noise Reduction by Fuzzy Image Filtering
8. Online Handwritten Script Recognition
9. ODAM: An Optimized Distributed Association Rule Mining Algorithm
10. Protocol Scrubbing: Network Security Through Transparent Flow Modification
11. Workflow Mining: Discovering Process Models from Event Logs
12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
15. ITP: An Image Transport Protocol for the Internet
16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)
17. Incremental deployment service of Hop by hop multicast routing protocol
18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
19. Application of BPCS steganography to wavelet compressed video
20. Neural Networks for Unicode Optical Character Recognition
21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
22. Neural Network-Based Face Detection
23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
25. Mobile Agents In Distributed Multimedia Database Systems
26. Image Stream Transfer Using Real-Time Transmission Protocol
27. Neural Networks for Handwritten character and Digits
28. Evaluating the Performance of Versatile RMI Approach In Java
29. Effective Packet Analyzing and Filtering System for ATM Network
30. Selective Encryption of Still Image
31. Homogenous Network Control and Implementation
32. Retrieving Files Using Content Based Searching and presenting it in Carousel view
33. Dynamic Signature Verification Using Pattern Recognition
34. Embedding in Video Steganography
35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
36. Location Aided Routing for Mobile Ad-Hoc Networks
37. Image Rendering for Grid Technology
38. Java Network File Sharing System
39. Java Visual Editor with Compiler
40. E-Mail Server Using Multithreaded Sockets
41. Network Component for XML Migration
42. Image Water Marking and Combustion
43. Image Processing for Convolution Filters
44. Artificial intelligence network load balancing using Ant Colony Optimization
45. Image Processing for Edge Detection Filters
46. Flood Fill Algorithms in C# and GDI+
47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
48. Hiding messages in the Noise of a Picture
49. Windows Management Instrumentation WMI Implementation
50. Steganography for Hiding Data in Wave Audio Files
51. Automatic Dependent Surveillance-Broadcasting(Ads-B)
52. Digital Water Marking For Video Piracy Detection
53. Encryption and Decryption technique for secure communication in WLAN
54. File Encryption and Encrypted text embedding in an image
55. Integrating Speech Engine with Web Navigator
56. Intrusion Detection Prevention And Trace back Systems
57. Java Productivity Aids
58. J2ME Mail Client Server
59. Monitoring And Managing The Clusters Using JMX
60. Network Analyze
61. Neural Network for Recognition of Handwritten and Digits Backpropagation
62. Network Traffic Anomaly Detector
63. Optimal Cryptographic Technique
64. Peer to Peer Messaging System using JXTA
65. Performance Evaluation of DISTANCE Routing Algorithm in MANET
66. Public Key Validation for DNS security Extension
67. Query Routing Optimization In Sensor Communication Networks
68. Virtual Private Network
69. Voice Enabled Smart Browser
70. XML Enabled SQL SERVER
71. An efficient message digest algorithm (MD) for data security
72. Hopfield model of neural network for pattern recognition
73. Using Trigonometry and Pythagoras to Watermark an Image
74. Hiding messages in the Noise of a Picture
75. ERP for Leather Company
76. Cryptographically Using Secure Server/Client Protocol
77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
78. Neural Networks for Handwriting Detection System Using Brain Net
79. Wireless Traffic Viewer Using J2ME
80. Video Steganography Using Mobile Simulation
81. Cryptographically Using Secure Server/Client Protocol
82. Intrusion Detection Prevention And Trace back Systems
83. Neural Network for Recognition of Handwritten and Digits
84. The File Digest program and the C++ implementation of some Message-Digest algorithms
85. File Encryption and Encrypted text embedding in an image
86. Performance Evaluation of DISTANCE Routing Algorithm in MANET
87. ERP for Leather Company
88. Online Web shop
89. Online Fashion Studios
90. ERP for Small Business
91. Bulk Billing System
92. Wireless Traffic Viewer Using J2ME
93. J2ME Mail Client Server
94. Monitoring And Managing The Clusters Using JMX
95. Peer-To-Peer Messaging
96. Mobile Information Provider
97. Mobile Bank
98. Video Steganography Using Mobile Simulation
99. Network Traffic Anomaly Detector
100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol
101. Active Source Routing Protocol for Mobile AD-HOC Networks
102. Adaptive Security and Authentication for DNS System
103. Evaluating the Performance of Versatile RMI Approach In Java
104. Dynamic Control for Active Network System
105. Effective Packet Analyzing and Filtering System for ATM Network
106. Multi Server Communication In Distributed Management System
107. Reduction of Network Density for Wireless Ad-Hoc Networks
108. Messaging Service over TCP/IP in Local Area Network
109. Secure Data Hiding and Extraction Using BPCS
110. Dynamic Signature Verification Using Pattern Recognition
111. Data Minimization And Storage Using XML Enable SQL Server
112. Retrieving Files Using Content Based Search
113. Distributed Node Migration by Effective Fault Tolerance
114. Embedding in Video Steganography
115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
116. Location Aided Routing for Mobile Ad-Hoc Networks
117. Image Rendering for Grid Technology
118. Optimal Multicast Routing in Mobile Ad-Hoc Networks
119. Scalable Wireless Ad-Hoc Network Simulation using XTC
120. Homogenous Network Control and Implementation
121. Java Network File Sharing System
122. Mobile Agents In Distributed Multimedia Database Systems
123. Java Visual Editor with Compiler
124. ATM Networks for Online Monitoring System
125. Performance Evaluation of RMI
126. Network Border Patrol Preventing Congestion Collapse
127. Network Component for XML Migration
128. Shortest Node Finder In Wireless Ad-Hoc Networks
129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
130. Distributed Cache Updating for the Dynamic Source Routing Protocol
131. Multi Router Traffic Monitoring System
132. Public Key Validation For DNS Security Extensions
133. A Secure Routing Protocol for mobile Ad-hoc Network
134. Retrieving Files Using Content Based Searching and presenting it in Carousel view
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic source routing protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermark an Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing using Ant Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
178. Textile Web Services
179. Auction System
180. Online Quiz
181. Online Bank
182. Online Voting System
183. Securing Image URL
184. Web Services
185. Smart Knowledge Provider
186. Online Book Shop
187. Electronic Fund Transfer
188. Work Flow Management System
189. Online Customer Care
190. Scribe Automation
191. Textile Management System
192. Sales and Purchase Management System
193. Human Resources Management System
194. Inventory Manage System
195. Job Order System
196. Advertisement Posting Website ASP .Net
197. Mobile shop shopping cart System
198. Patient Management System
199. Property Management System
200. Web Based Content Management System
201. Neural Networks for Handwriting Detection System Using Brain Net
202. Library Management system
203. Windows Management Instrument (WMI) .Net 2005
204. Wallpaper Changer Utility
205. Win Application for Word Processing
206. Screen capture Utility
207. HTML Editor
208. Image Converter 2005
209. Internet History Viewer
210. VB .Net Smart Mail Transfer Protocol
211. Windows Multi File Search utility
212. Message Digest
213. FTP Explorer
214. Convolution Filter
215. Find and Replace utility
216. Apartment Management System
217. Computerized Information Software
218. Employee Management System
219. Hotel Management System
220. Human Resources Management System
221. Inventory System
222. Membership Management System
223. Patient Care System
224. Send SMS To Cell Phone Through SMTP Mail
225. Trainee Management System
226. J2ME Project Titles
227. Wireless Traffic Viewer Using J2ME
228. J2ME Mail Client Server
229. Monitoring And Managing The Clusters Using JMX
230. Peer-To-Peer Messaging
231. Mobile Information Provider
232. Mobile Bank
233. Video Steganography Using Mobile Simulation
234. Network Traffic Anomaly Detector
235. J2EE Project Titles
236. ERP for Leather Company
237. Online Web shop
238. Online Fashion Studios
239. ERP for Small Business
240. Bulk Billing System
241. Distributed cache updating for the Dynamic source routing protocol
242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
243. Face Recognition Using Laplacian faces
244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
247. Noise Reduction by Fuzzy Image Filtering
248. Online Handwritten Script Recognition
249. ODAM: An Optimized Distributed Association Rule Mining Algorithm
250. Protocol Scrubbing: Network Security Through Transparent Flow Modification
251. Workflow Mining: Discovering Process Models from Event Logs
252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
253. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
255. ITP: An Image Transport Protocol for the Internet
256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
257. Incremental deployment service of Hop by hop multicast routing protocol
258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
259. Application of BPCS steganography to wavelet compressed video
260. Neural Networks for Unicode Optical Character Recognition
261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
262. Neural Network-Based Face Detection
263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System for ATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
306. Query Routing Optimization In Sensor Communication Networks
307. Virtual Private Network
308. Voice Enabled Smart Browser
309. XML Enabled SQL SERVER
310. An efficient message digest algorithm (MD) for data security
311. Hopfield model of neural network for pattern recognition
312. Using Trigonometry and Pythagoras to Watermark an Image
313. Hiding messages in the Noise of a Picture
314. ERP for Leather Company
315. Cryptographically Using Secure Server/Client Protocol
316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
317. Neural Networks for Handwriting Detection System Using Brain Net
318. Wireless Traffic Viewer Using J2ME
319. Video Steganography Using Mobile Simulation
320. Image Rendering for Grid Technology
321. Java Network File Sharing System
322. Java Visual Editor with Compiler
323. E-Mail Server Using Multithreaded Sockets
324. Network Component for XML Migration
325. Image Water Marking and Combustion
326. Image Processing for Convolution Filters
327. Artificial intelligence network load balancing using Ant Colony Optimization
328. Image Processing for Edge Detection Filters
329. Mobile Information Provider
330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case
331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
332. QUIVER: Consistent Object Sharing For Edge Services
333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
334. Geometric Approach to Improving Active Packet Loss Measurement
335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
338. Watermarking Relational Databases Using Optimization Based Techniques
339. Active Queue Management for Fair Resource Allocation in Wireless Networks
340. Benefit Based Data Caching In Ad Hoc Networks
341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks
342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction
343. Two Techniques for Fast Computation of Constrained Shortest Paths
344. Controlling IP Spoofing Through Inter Domain Packet Filters
345. A New Model for Dissemination of XML Content
346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements
347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resources in an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
JAva Base
Project List
1. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
2. A Reputation Based Trust Model for Peer to Peer eCommerce Communities “ IEEE
3. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
4. Mobile Banking Design & Implementation - IEEE
5. Retrieving Files using Content Based Searching and displaying them in Carousel View “ IEEE
6. Distributed Data mining in Credit Card Fraud Detection Analysis “ IEEE
7. E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management “ IEEE
8. Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader
9. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
10. VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
11. Authenticating Network Attached Storage - IEEE
12. Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S - IEEE
13. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
14. Digital Image Processing with Multi Domain Approach “ IEEE
15. Static Image Hand Gesture Recognition using Neural Networks
16. CAC “ Connection Admission Control using ATM Networks Implementation “ IEEE
17. Distributed Component Router based Supply Chain Management System “ SCM “ IEEE
18. Intelli WAP System Implementation / WAP based information Retrieval System
19. Proxy Server - Design and Implementation
20. Public Key Validation for DNS Security Extensions “ Domain Naming Server
21. E-Recruitment System - Dynamic Online Professional Recruitment & Management System
22. Secure Password-Based Protocol for Downloading a Private Key - IEEE
23. Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
24. Network Security System in DNS using AD-HOC Networks “ IEEE
25. Secure Optimal Cyclic Cryptographic System “ IEEE
26. Multithreaded Peer to Peer Communication using Distributed Frameworks“ IEEE
27. Building Intelligent Shopping Assistant using Data mining technique for Web Services “ IEEE
28. Network Analyzer & Network Monitoring Tool using SNMP
29. Remote Computing using Thin Clients
30. VVoIP “ Voice with Video Over IP Networks
31. Dynamic Character & Pattern Recognition using Neural Networks
32. Online Handwritten Script Recognition - IEEE
33. Towards multi model interfaces for intrusion detection - IEEE
34. Proxy Server - A Smart Sharing System with Fire wall Protection, Customized Firewall for internet security & inter-network traffic gateway “ IEEE
35. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
36. Network Border Patrol for Congestion Collapse Preventing System “ IEEE
37. Defect Tracking Tool - Enterprise Project and Defect Tracking System “ IEEE
38. Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification
39. Multi Router Traffic Monitor Implementation
40. Homogeneous Networks & Control Implementation
41. A/I Net A Network that Integrates ATM and IP - IEEE
42. E“Secure Transaction “ Design & Implementation “ IEEE
43. Image Compression and Analysis with MSE & PSNR Technique - IEEE
44. Crypt kit “ A real time cryptographic system for security over the networks - IEEE
45. Efficient Contiguous Data & Video Streamer with Buffer Management
46. Distributed Component Router Based CRM “ Customer Relationship Management“ IEEE
47. Network Traffic, Packet Analyzer and Sniffer
48. Digital Steganography: Hiding Data within Data
49. Integrated Development Environment using JSWING “ IDE JSWING
50. ERP Application “ integrated Enterprise Solutions with Strategic advantages
51. Grid information Retrieval System
52. Network Packer Sniffer Implementation
53. Online Issue Tracking - Project Management Solutions
54. E-HealthCare - Distributed HealthCare and A Strategic Management System
55. Data mining implementation for Credit Cards Application Processing System
56. Dynamic University Linking & Data integrity Maintenance
57. E-Sales Order Processing System
58. RTF to XML Converter
59. Material Forecasting and Management Solution
60. Effective & Efficient Freight Management System
61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
62. XML Migration - Implementation for XML format from Database System
63. Shares & Stock Management system “ Portfolio Manager Implementation
64. Online Task Management with fully featured intelli System
65. Vertical Market Information Providing System Implementation
66. Insertion of Links of navigation into the Web Pages
67. Inter Office Messaging System “ IOMS, Office Automation System
68. Web based Matrimonial Services, A Desi Matrimony web Portal
69. Online Auction & Bidding System With Multi Brand & Product Selection
70. Online Body Shopping System with Auto Mailing feature
71. Online Job Consultancy Services
72. Net Banking Services & Solutions
73. Online Web Shop Mall - Web Shop Site
74. Intelli Shopping Cart & Assistant System
75. Online VRS - Vehicle Reservation System
76. Distributed Web Service for On-Line Coursework Submission
77. Document Archival Management System “ Electronic Archival Design
78. Remote Electricity Billing System Automation & Implementation “ EJB
79. Dynamic College information System & Data integrity Maintenance
80. Computerized system for Extracting Abstract from the given source document, Abstract solutions
81. eCareer & Consultancy Service Online
82. eGovernance Design & Implementation System
83. EAI Approach “ Implementation of EAI in Hotel Management System
84. Online Event Management with featured intelli system
85. Online Hospital info System with interactive Services & Universal Medical Portal with Adviser
86. Human Resource Management Solutions (HRMS)
87. Online Web based Complete Recruitment System
88. Distributed Database System for online Shopping & Store
89. Web based Distributor Information Providing Services
90. Insurance System, Online Insurance Solutions Provider
91. Integrating Data and Voice Networks - VoIP
92. Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
93. Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
94. Mobile based Network Monitoring System
95. System to Mobile Communication
96. Video Transmission using SIP - IEEE
97. Web based Chatting - Multi User Voice Chat
98. Network Traffic Anomaly Detector “ IEEE
99. SIP - Session Initialization Protocol, Chatting
100. Monitoring & Managing the Clusters using JMX “ IEEE
101. Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
102. Peer-to-Peer implementation Multithreaded Technology with tuple space
103. Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE
104. P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
105. Secured Network manager
106. Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time “ IEEE
107. Scalable Wireless Ad-Hoc Network Simulation using XTC “ IEEE
108. Voice Web Browser Implementation
109. Network Analyzer, Design & Implementation
110. Routing Simulator - An Efficient end to end Packet Delivery system
111. Remote Viewer “ A Remote Desktop viewer for an Intranet Environment
112. Remote City Mapping Implementation using J2ME
113. Mobile Clients Support GUI Systems design
114. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
115. Bluetooth equipped mobile phones to support synchronous interaction with public displays
116. Bluetooth based Mobile Phone Photo Browser
117. IMAP - Internet Mail Access Protocol using Internet Engineering Task Force
118. Online PDA “ Primary Domain Controller System
119. Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request
120. Portable and Generic tool for Web Applications
121. Network Document Management & Versioning System
122. Dynamic Server Replication System
123. Instant Smart Messenger System
124. Multi Threaded implementation with Pull / Push Technology
125. Tool for Performance Profiling of Web Sites
126. Network Time Tracker system
127. Workflow based Complaint Management System
128. Project Scrutinizer “ Efficient Project Tracking System
129. Project Tracking & It Portfolio Management System
130. JSP based Shopping Cart Implementation
131. ERP & CRM, An Effective implementation of ERP with CRM Solutions
132. Financial Accounts - Integrated Financial Accounting Solutions
133. Multi Language Mailing system “ Design & implementation
134. uPortal “ University Portal & Education Grid information Service Provider
135. AD HOC NETWORK BASED PROJECTS
136. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
137. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
138. Network Security System in DNS using AD-HOC Networks “ IEEE
139. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
140. J2ME PROJECTS
141. Mobile Banking Design & Implementation - IEEE
142. Intelli WAP System Implementation / WAP based information Retrieval System
143. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
144. Remote City Mapping Implementation using J2ME
145. Mobile Clients Support GUI Systems design
146. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
147. Bluetooth equipped mobile phones to support synchronous interaction with public displays
148. Bluetooth based Mobile Phone Photo Browser
149. Mobile Info Service Provider “ Online Data & information Access System
150. IMAGE PROCESSING PROJECTS
151. Digital Image Processing with Multi Domain Approach “ IEEE
152. Static Image Hand Gesture Recognition using Neural Networks
153. Digital Signature Verification using Artificial Neural Networks
154. Dynamic Character & Pattern Recognition using Neural Networks
155. Image Compression and Analysis with MSE & PSNR Technique “ IEEE
156. Online Handwritten Script Recognition “ IEEE
157. COMMUNICATION PROJECTS
158. ? System to Mobile Communication
159. ? Video Transmission using SIP - IEEE
160. ? Efficient Contiguous Data & Video Streamer with Buffer Management
161. ? Web based Chatting - Multi User Voice Chat
162. ? SIP - Session Initialization Protocol, Chatting
163. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
164. ? VVoIP “ Voice with Video Over IP Networks
165. SECURITY PROJECTS
166. ? Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S - IEEE
167. ? Crypt kit “ A real time cryptographic system for security over the networks - IEEE
168. ? Secure Optimal Cyclic Cryptographic System
169. ? JSAFE - Rijndael Algorithm based Encryption & Decryption
170. ? Secured Network manager
171. ? E“Secure Transaction “ Design & Implementation
172. ? Fire wall - Customized Firewall for internet security & inter-network traffic gateway
173. ? Secure Password-Based Protocol for Downloading a Private Key
174. NETWORKING PROJECTS
175. ? A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
176. ? Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
177. ? Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
178. ? Authenticating Network Attached Storage - IEEE
179. ? CAC “ Connection Admission Control using ATM Networks Implementation
180. ? Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
181. ? Efficient Contiguous Data & Video Streamer with Buffer Management
182. ? Dynamic Server Replication System
183. ? Mobile based Network Monitoring System
184. ? Monitoring & Managing the Clusters using JMX “ IEEE
185. ? Multi Router Traffic Monitor Implementation
186. ? Grid information Retrieval System
187. ? Homogeneous Networks & Control Implementation
188. ? Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
189. ? Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
190. ? Multithreaded Peer to Peer Communication using Distributed Frameworks
191. ? Network Analyzer & Network Monitoring Tool using SNMP
192. ? Network Border Patrol for Congestion Collapse Preventing System
193. ? Network Packer Sniffer Implementation
194. ? Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE
195. ? Network Security System in DNS using AD-HOC Networks “ IEEE
196. ? Network Traffic Anomaly Detector “ IEEE
197. ? Network Traffic, Packet Analyzer and Sniffer
198. ? Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
199. ? P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
200. ? Peer-to-Peer implementation Multithreaded Technology with tuple space
201. ? Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time “ IEEE
202. ? Public Key Validation for DNS Security Extensions “ Domain Naming Server
203. ? Remote Computing using Thin Clients
204. ? Retrieving Files using Content Based Searching and Displaying them in Carousel View
205. ? Routing Simulator - An Efficient end to end Packet Delivery system
206. ? Secured Network manager
207. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
208. ? XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
209. Modern English Spell Checking tool Design & Implementation
210. Web Based Bug Tracking System Implementation
211. E-Mail & SMS Assistant “ Design & Implementation
212. Mobile Agent Software for Payroll Processing System
213. J2EE based Quick Car Rental Services Implementation
214. Application Installer
215. Online ATM Banking & online transactions
216. On-Line Book store with online Shopping cart
217. Proxy Server - TransProxy
218. Career tracer - communicator between job seekers and job providers
219. J Chat “ A Chatting System over the Internet or local networks
220. Client FTP Frame
221. Online Airline Reservation Web portal for Traveling service provider
222. Computer Resource Management System (CRMS)
223. Content management systems (CMS) for University & Education portal
224. Credit card system - web-based system facilitates on line operations
225. Control System for the Maintenance of Computers
226. Web based Customer Support System
227. Distributed Channel Management System
228. Digital Signatures System Design & Implementation
229. Distance Learning System Implementation
230. Online E Banking provides online transactions
231. E-Boutique - web portal design and implementation
232. eSearch - Web based search engine
233. Employee Training Tracking System
234. E-Learning - web portal design and implementation
235. E-Music web-based design system provides online Music
236. Web Enabled Automated Manufacturing System - WEAMS
237. Fire wall - Customized Firewall for internet security & inter-network traffic gateway
238. File Transfer Protocol - FTP Implementation
239. Hospital Management system
240. HR Consultancy and Applicant Database Management with XML
241. Intranet Mailing System design and implementation
242. Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions
243. Web based Online Library System
244. Web based Online Book Store
245. Jobs.com “ A Service Provider for Employer & Employee
246. JChart for complex business & scientific charts
247. JSAFE - Rijndael Algorithm based Encryption & Decryption
248. Loyalty Business Tracker Application System
249. Mobile Clients Support GUI Systems design
250. Net Banking Services Design & Implementation
251. Net Conference Design & Implementation
252. Design & Implementation of Online Bidding & Auction
253. Online Resume Mart System Design
254. Online Tutorials - global forum for educators and students
255. JEDITOR - Customized Java Editor
256. eTutor - Online Tutorial, revolutionizing the tutoring industry
257. Pharmaceutical Distribution Automation Software system
258. Remote Desktop Capture system
259. eSearch - A Search Engine Design & Implementation
260. SMTP based JAVA MAIL CLIENT Graphical User Interface system
261. Java based Spam Filter implementation
262. Telecom Inventory maintenance and services Application with error tracking
263. Project based Time & efforts Tracking System Implementation
264. Training Organization Management System Implementation
265. Web Testing Tool Application - Designed to test & measure performance
266. Web based Job Site Management system “ A Exclusive Job Portal with Mega features
267. Employee Profile Management System “ An Effective Employee Management Resource
268. Development of Web enabled Online, Dynamic ATM Card Management System
269. Time Synchronization system using java
270. ATM Card & CMS application Back Office Management
271. Honey Pots “ A Security System to Identify Black Hat Community in the Networks
272. Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP)
273. Bandwidth Congestion Control using Authentication Service for Automatic and Dynamic Reconfiguration System
274. Network Load Balancing and Redistribution of the Traffic Over the Networks using Grid Computing System
275. Media Streaming in Mobile using J2ME Toolkit
276. Efficient Network Routing Protocol with Effective Data Transfer without Packet Loss Over the ADHOC Networks
277. Data Communication and File Transferring using Decreased Latency and Block Tracker
278. Authentication of Digital Images by Encryption and Decryption with Primary Key Implementation using LSB Algorithm and Steganography
279. Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol
280. Implementation of Security Kernel and Firewall using Java
281. Media streaming using J2ME
282. Unified Interface for Multiple Naming Service using JNDI
283. Multiplex SMS relay over GSM using AT commands
284. Zero Installation of Client DB Driver using RPC
285. Integrated Data Persistence & Synchronization in PDAâ„¢s
286. Distributed Cache Updating for the Dynamic Source Routing Protocol
287. Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic Peer Groups
288. An Agent-Based Testing for Web Application
289. TCP-LP: Low Priority Service via End“Point Congestion Control
290. On Self-Fish Routing in Internet Like Environments
291. Schema based Enterprise Charting & Reporting for Desktops
292. ER “ Schema Analyzer with Data Streaming
293. Data Hiding in Audio Files with PBE Encryption
294. Duplex Messaging for Enterprise Systems
295. Integrated Mail Transfer Agents using JAF
296. Designing Test Automation System using Native System Input Events
297. Components Framework for Developer Network using MVC Pattern
298. Asynchronous Server Interaction using AJAX and XML
299. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
300. An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management
301. An Anti-phishing Strategy Based on Visual Similarity Assessment
302. News Feed Syndication Generation over Heterogeneous Networks
303. Enterprise Mailing System validation with DNS query using MX Records
304. Component based Architecture for WAP Compliant Transactional Services
305. On Demand Audio / Video Streaming and rendering Over IP using UDP
306. Proactive Port Scanning for Secure Computing Environment
307. DDE Thin Client Midlet for Limited Devices using Java Communication
308. Denial of Service against the Domain Name System
309. Digital Rights Management (DRM) using SOAP
310. Multithreaded Networked Data Injector & Extraction Server & Client for Cryptographic Services
311. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
312. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
313. Anteater-A Service Oriented Architecture for High Performance Data Mining
314. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
315. Cross-Layer Optimization in TCP/IP networks
316. Data Security in Ad hoc Networks Using Multipath Routing
317. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server
318. Distributed Token Circulation in Mobile Ad Hoc Networks
319. Versioning Control System using JAVA
320. Virtual Private Network using JAVA
321. Voice based XML Phone Survey System
322. VSAT Simulation and Smart Cache Loader
323. WAP based information Retrieval System
324. WAP based Route Tracing and Mailing
325. WAP Enabled Greeting Card System - WAP Enabled Device User to send greeting card to other WAP Enabled Devices
326. Web Enabled Supply Chain Management
327. Wireless Application Programming with J2ME and Bluetooth
328. Workflow based Complaint Management System
329. XML Parser for E“Mail Resumes / Resume Tracking & allotment using XML
330. Instant Messaging and Presence Technology for College Campuses
331. Intrusion Detection in Wireless Ad-hoc Network
332. Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols
333. Fine Grained Layered Multicast using STAIR
334. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks
335. Network-Wide Prediction of BGP Routes
336. NIRA: A New Inter-Domain Routing Architecture
337. Online Detection and Prevention of Phishing Attacks
338. OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET
339. A Natural Language-Based Interface for Querying a Video Database
340. A Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc Networks
341. A Secure Routing Protocol for mobile Ad-hoc Network
342. A Trustworthy Mobile Agent Infrastructure for Network Management
343. A wireless distributed intrusion detection system and a new attack model
344. Allocating Applications in Distributed Computing using JINI
345. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
346. Routing and Security in Mobile Ad Hoc Networks
347. Scripting JAX-WS
348. Simple a Pre-Provisioning Scheme to Enable Fast Restoration
349. Site-based Mapping for parallel proxy servers with fewer TCP connections
350. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
351. Watermark Based Digital Rights Management
352. A Semantic Web-Based Approach to Knowledge Management for Grid Applications
353. A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
354. Context Oriented Search Engine with Web Crawler
355. Converting RTF into XML using the TEI Lite DTD
356. CRM based Sales of Fleet & Services Management
357. Data and Video Streaming System
358. Data Encryption and Compression System with Optimization
359. Dealership Management System - Dealers information & Dealings Process Manager
360. Defect Tracking Tool - Enterprise Project and Defect Tracking System
361. Design & Development of a Distributed, Scalable File Sharing & Access System with Security
362. Digital Image Processing “ Frequency Domain
363. Digital Water Marking for Video Piracy Detection
364. Distributed Database System for online Shopping & Store
365. Distributed File Sharing System for Peer to Peer Network
366. E-Commerce Shopping cart for B2B Implementation
367. EJB Implementation Of Distributed Online Stock Maintenance and Trading
368. Graphical Network Browser
369. Heterogeneous Networks Control and Implementation
370. Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and Administration in IP Network
371. Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments
372. Patient Keeper: Medical Application on mobile Phone
373. VPersonalized E-mail Management at Network Edges
374. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
375. XML Data Stores: Emerging Practices
376. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
377. Image File compression & Transmission across the Network by MDA (Message Digest Algorithm)
378. Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE)
379. Media Gateway Control Protocol Network
380. Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm
381. Route Reservation in Ad Hoc Wireless Networks
382. Pre Active Circulated Cache Updating using on Demand Routing Protocol
383. Dynamic Load Balancing in Distributed Systems in The Presence Of Delays “ A Regeneration Theory Approach
384. A Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed Environments
385. An Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS
386. A Fully Distributed Proactively Secure Threshold Multi signature Scheme
387. Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes
388. A Hierarchical Modeling and Analysis for Grid Service Reliability
389. Secure Data Hiding and Extractions using BPCS
390. SLA-Driven Clustering of QOS Aware Application Servers
391. User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony
392. Advanced Host Monitor Enterprise
393. Advanced instant Messenger & Message Broadcasting
394. Bug Tracking System - Comprehensive Bug Tracking & Change Management
395. Call Centre Management System
396. CALTOOL “ Computer Aided Learning Tool
397. Cargo Tracking System Design & implementation
398. Complete email system with an email server and an email client
399. Image Compression and Decompression using Huffmanâ„¢s
400. Image Manipulation for Face Recognition
401. Implementation of Broadcast Messaging System using Multi Threading
402. Asset Management Solution (AMS)
403. Implementation of Packet Filtering Firewall in Linux Systems
404. Implementation of Peer-to-Peer Communication System with a Centralized Name Server in Linux Network
405. Implementation of Secured & Encrypted Data Transmission over the Web
406. Implementation of Wireless Application Protocol Gateway in Mobile Network
407. Implementation of Wireless Communication Gateway for PC To Mobile Network Route using Internet Protocol
408. Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support
409. Intelli Mobile Banking System Design & Implementation
410. Investigation and Analysis of Packets Transformation in an Ethernet Network System
411. Java Grid Using Grid Computing System
412. Java Network Flow Analyzer
413. Java Network Monitor / Java Network Browser
414. Java RMI-based application which manages load balancing on heterogeneous clusters
415. Java SMTP, POP, Web Email Server
416. Java-to-XML Data Binding tool
417. Job Portal Implementation with intelli power features
418. JSP - Personal information Manager
419. Logistics - freight forwarding software solution logistics
420. Multimedia Messaging Service - MMS
421. Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems
422. Net Monitoring and Management using SNMP
423. Network Administrators to Monitor VPN and SSL Connections
424. Network Component Development for XML Document Migration
425. Neural Network based Character Pattern Identification System
426. On-Line Analytical Processing - Maintenance of Data collection & Reports
427. Online Auction with featured shopping cart
428. Online Enterprise Resources Planning “ Web Enabled ERP implementation with Distributed Database system
429. Online Health Care Management Solutions
430. Online Distributed Human resources Management System
431. Online Portfolio Manager “ Equity Trading & Mutual Funds management
432. Online web enabled Bug Tracking System
433. Online Web Shop Mall - Web Shop Site
434. Online Workflow Service Manager & Automation
435. SNMP Trap Gateway - Network Management
436. Software Routing “ Packet Filtering & Capturing
437. Thin Client Network Implementation
438. Ultimate Online Jobsite with intelli Search engine
439. Professional time and task management tool
440. Public-Key Cryptography Extensions into Kerberos
441. RAT (Remote Assistance Tool) is a Java Application
442. Resource Planning Tool Design & Implementation (RPT)
443. Sales force Automation Implemenation
444. Sales Order Processing and invoicing (SOPI)
445. Secure (RSA) Chat Server
446. Secure Electronic Transaction System
447. Secure Web Cache Proxy Server
448. Digital Image Processing “ Time Domain
449. Secure web conferencing on any platform using Java
450. Secured Network Manager & Tracker using JMX
451. SFTP Server - Synchronous File Transfer Communicator
452. Smart Network Access Using Mobile Bluetooth, J2ME
1. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
2. A Reputation Based Trust Model for Peer to Peer eCommerce Communities “ IEEE
3. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
4. Mobile Banking Design & Implementation - IEEE
5. Retrieving Files using Content Based Searching and displaying them in Carousel View “ IEEE
6. Distributed Data mining in Credit Card Fraud Detection Analysis “ IEEE
7. E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management “ IEEE
8. Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader
9. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
10. VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
11. Authenticating Network Attached Storage - IEEE
12. Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S - IEEE
13. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
14. Digital Image Processing with Multi Domain Approach “ IEEE
15. Static Image Hand Gesture Recognition using Neural Networks
16. CAC “ Connection Admission Control using ATM Networks Implementation “ IEEE
17. Distributed Component Router based Supply Chain Management System “ SCM “ IEEE
18. Intelli WAP System Implementation / WAP based information Retrieval System
19. Proxy Server - Design and Implementation
20. Public Key Validation for DNS Security Extensions “ Domain Naming Server
21. E-Recruitment System - Dynamic Online Professional Recruitment & Management System
22. Secure Password-Based Protocol for Downloading a Private Key - IEEE
23. Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
24. Network Security System in DNS using AD-HOC Networks “ IEEE
25. Secure Optimal Cyclic Cryptographic System “ IEEE
26. Multithreaded Peer to Peer Communication using Distributed Frameworks“ IEEE
27. Building Intelligent Shopping Assistant using Data mining technique for Web Services “ IEEE
28. Network Analyzer & Network Monitoring Tool using SNMP
29. Remote Computing using Thin Clients
30. VVoIP “ Voice with Video Over IP Networks
31. Dynamic Character & Pattern Recognition using Neural Networks
32. Online Handwritten Script Recognition - IEEE
33. Towards multi model interfaces for intrusion detection - IEEE
34. Proxy Server - A Smart Sharing System with Fire wall Protection, Customized Firewall for internet security & inter-network traffic gateway “ IEEE
35. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
36. Network Border Patrol for Congestion Collapse Preventing System “ IEEE
37. Defect Tracking Tool - Enterprise Project and Defect Tracking System “ IEEE
38. Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification
39. Multi Router Traffic Monitor Implementation
40. Homogeneous Networks & Control Implementation
41. A/I Net A Network that Integrates ATM and IP - IEEE
42. E“Secure Transaction “ Design & Implementation “ IEEE
43. Image Compression and Analysis with MSE & PSNR Technique - IEEE
44. Crypt kit “ A real time cryptographic system for security over the networks - IEEE
45. Efficient Contiguous Data & Video Streamer with Buffer Management
46. Distributed Component Router Based CRM “ Customer Relationship Management“ IEEE
47. Network Traffic, Packet Analyzer and Sniffer
48. Digital Steganography: Hiding Data within Data
49. Integrated Development Environment using JSWING “ IDE JSWING
50. ERP Application “ integrated Enterprise Solutions with Strategic advantages
51. Grid information Retrieval System
52. Network Packer Sniffer Implementation
53. Online Issue Tracking - Project Management Solutions
54. E-HealthCare - Distributed HealthCare and A Strategic Management System
55. Data mining implementation for Credit Cards Application Processing System
56. Dynamic University Linking & Data integrity Maintenance
57. E-Sales Order Processing System
58. RTF to XML Converter
59. Material Forecasting and Management Solution
60. Effective & Efficient Freight Management System
61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
62. XML Migration - Implementation for XML format from Database System
63. Shares & Stock Management system “ Portfolio Manager Implementation
64. Online Task Management with fully featured intelli System
65. Vertical Market Information Providing System Implementation
66. Insertion of Links of navigation into the Web Pages
67. Inter Office Messaging System “ IOMS, Office Automation System
68. Web based Matrimonial Services, A Desi Matrimony web Portal
69. Online Auction & Bidding System With Multi Brand & Product Selection
70. Online Body Shopping System with Auto Mailing feature
71. Online Job Consultancy Services
72. Net Banking Services & Solutions
73. Online Web Shop Mall - Web Shop Site
74. Intelli Shopping Cart & Assistant System
75. Online VRS - Vehicle Reservation System
76. Distributed Web Service for On-Line Coursework Submission
77. Document Archival Management System “ Electronic Archival Design
78. Remote Electricity Billing System Automation & Implementation “ EJB
79. Dynamic College information System & Data integrity Maintenance
80. Computerized system for Extracting Abstract from the given source document, Abstract solutions
81. eCareer & Consultancy Service Online
82. eGovernance Design & Implementation System
83. EAI Approach “ Implementation of EAI in Hotel Management System
84. Online Event Management with featured intelli system
85. Online Hospital info System with interactive Services & Universal Medical Portal with Adviser
86. Human Resource Management Solutions (HRMS)
87. Online Web based Complete Recruitment System
88. Distributed Database System for online Shopping & Store
89. Web based Distributor Information Providing Services
90. Insurance System, Online Insurance Solutions Provider
91. Integrating Data and Voice Networks - VoIP
92. Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
93. Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
94. Mobile based Network Monitoring System
95. System to Mobile Communication
96. Video Transmission using SIP - IEEE
97. Web based Chatting - Multi User Voice Chat
98. Network Traffic Anomaly Detector “ IEEE
99. SIP - Session Initialization Protocol, Chatting
100. Monitoring & Managing the Clusters using JMX “ IEEE
101. Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
102. Peer-to-Peer implementation Multithreaded Technology with tuple space
103. Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE
104. P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
105. Secured Network manager
106. Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time “ IEEE
107. Scalable Wireless Ad-Hoc Network Simulation using XTC “ IEEE
108. Voice Web Browser Implementation
109. Network Analyzer, Design & Implementation
110. Routing Simulator - An Efficient end to end Packet Delivery system
111. Remote Viewer “ A Remote Desktop viewer for an Intranet Environment
112. Remote City Mapping Implementation using J2ME
113. Mobile Clients Support GUI Systems design
114. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
115. Bluetooth equipped mobile phones to support synchronous interaction with public displays
116. Bluetooth based Mobile Phone Photo Browser
117. IMAP - Internet Mail Access Protocol using Internet Engineering Task Force
118. Online PDA “ Primary Domain Controller System
119. Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request
120. Portable and Generic tool for Web Applications
121. Network Document Management & Versioning System
122. Dynamic Server Replication System
123. Instant Smart Messenger System
124. Multi Threaded implementation with Pull / Push Technology
125. Tool for Performance Profiling of Web Sites
126. Network Time Tracker system
127. Workflow based Complaint Management System
128. Project Scrutinizer “ Efficient Project Tracking System
129. Project Tracking & It Portfolio Management System
130. JSP based Shopping Cart Implementation
131. ERP & CRM, An Effective implementation of ERP with CRM Solutions
132. Financial Accounts - Integrated Financial Accounting Solutions
133. Multi Language Mailing system “ Design & implementation
134. uPortal “ University Portal & Education Grid information Service Provider
135. AD HOC NETWORK BASED PROJECTS
136. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
137. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
138. Network Security System in DNS using AD-HOC Networks “ IEEE
139. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
140. J2ME PROJECTS
141. Mobile Banking Design & Implementation - IEEE
142. Intelli WAP System Implementation / WAP based information Retrieval System
143. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
144. Remote City Mapping Implementation using J2ME
145. Mobile Clients Support GUI Systems design
146. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
147. Bluetooth equipped mobile phones to support synchronous interaction with public displays
148. Bluetooth based Mobile Phone Photo Browser
149. Mobile Info Service Provider “ Online Data & information Access System
150. IMAGE PROCESSING PROJECTS
151. Digital Image Processing with Multi Domain Approach “ IEEE
152. Static Image Hand Gesture Recognition using Neural Networks
153. Digital Signature Verification using Artificial Neural Networks
154. Dynamic Character & Pattern Recognition using Neural Networks
155. Image Compression and Analysis with MSE & PSNR Technique “ IEEE
156. Online Handwritten Script Recognition “ IEEE
157. COMMUNICATION PROJECTS
158. ? System to Mobile Communication
159. ? Video Transmission using SIP - IEEE
160. ? Efficient Contiguous Data & Video Streamer with Buffer Management
161. ? Web based Chatting - Multi User Voice Chat
162. ? SIP - Session Initialization Protocol, Chatting
163. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
164. ? VVoIP “ Voice with Video Over IP Networks
165. SECURITY PROJECTS
166. ? Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S - IEEE
167. ? Crypt kit “ A real time cryptographic system for security over the networks - IEEE
168. ? Secure Optimal Cyclic Cryptographic System
169. ? JSAFE - Rijndael Algorithm based Encryption & Decryption
170. ? Secured Network manager
171. ? E“Secure Transaction “ Design & Implementation
172. ? Fire wall - Customized Firewall for internet security & inter-network traffic gateway
173. ? Secure Password-Based Protocol for Downloading a Private Key
174. NETWORKING PROJECTS
175. ? A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
176. ? Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE
177. ? Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
178. ? Authenticating Network Attached Storage - IEEE
179. ? CAC “ Connection Admission Control using ATM Networks Implementation
180. ? Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE
181. ? Efficient Contiguous Data & Video Streamer with Buffer Management
182. ? Dynamic Server Replication System
183. ? Mobile based Network Monitoring System
184. ? Monitoring & Managing the Clusters using JMX “ IEEE
185. ? Multi Router Traffic Monitor Implementation
186. ? Grid information Retrieval System
187. ? Homogeneous Networks & Control Implementation
188. ? Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
189. ? Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
190. ? Multithreaded Peer to Peer Communication using Distributed Frameworks
191. ? Network Analyzer & Network Monitoring Tool using SNMP
192. ? Network Border Patrol for Congestion Collapse Preventing System
193. ? Network Packer Sniffer Implementation
194. ? Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE
195. ? Network Security System in DNS using AD-HOC Networks “ IEEE
196. ? Network Traffic Anomaly Detector “ IEEE
197. ? Network Traffic, Packet Analyzer and Sniffer
198. ? Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
199. ? P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
200. ? Peer-to-Peer implementation Multithreaded Technology with tuple space
201. ? Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time “ IEEE
202. ? Public Key Validation for DNS Security Extensions “ Domain Naming Server
203. ? Remote Computing using Thin Clients
204. ? Retrieving Files using Content Based Searching and Displaying them in Carousel View
205. ? Routing Simulator - An Efficient end to end Packet Delivery system
206. ? Secured Network manager
207. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
208. ? XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
209. Modern English Spell Checking tool Design & Implementation
210. Web Based Bug Tracking System Implementation
211. E-Mail & SMS Assistant “ Design & Implementation
212. Mobile Agent Software for Payroll Processing System
213. J2EE based Quick Car Rental Services Implementation
214. Application Installer
215. Online ATM Banking & online transactions
216. On-Line Book store with online Shopping cart
217. Proxy Server - TransProxy
218. Career tracer - communicator between job seekers and job providers
219. J Chat “ A Chatting System over the Internet or local networks
220. Client FTP Frame
221. Online Airline Reservation Web portal for Traveling service provider
222. Computer Resource Management System (CRMS)
223. Content management systems (CMS) for University & Education portal
224. Credit card system - web-based system facilitates on line operations
225. Control System for the Maintenance of Computers
226. Web based Customer Support System
227. Distributed Channel Management System
228. Digital Signatures System Design & Implementation
229. Distance Learning System Implementation
230. Online E Banking provides online transactions
231. E-Boutique - web portal design and implementation
232. eSearch - Web based search engine
233. Employee Training Tracking System
234. E-Learning - web portal design and implementation
235. E-Music web-based design system provides online Music
236. Web Enabled Automated Manufacturing System - WEAMS
237. Fire wall - Customized Firewall for internet security & inter-network traffic gateway
238. File Transfer Protocol - FTP Implementation
239. Hospital Management system
240. HR Consultancy and Applicant Database Management with XML
241. Intranet Mailing System design and implementation
242. Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions
243. Web based Online Library System
244. Web based Online Book Store
245. Jobs.com “ A Service Provider for Employer & Employee
246. JChart for complex business & scientific charts
247. JSAFE - Rijndael Algorithm based Encryption & Decryption
248. Loyalty Business Tracker Application System
249. Mobile Clients Support GUI Systems design
250. Net Banking Services Design & Implementation
251. Net Conference Design & Implementation
252. Design & Implementation of Online Bidding & Auction
253. Online Resume Mart System Design
254. Online Tutorials - global forum for educators and students
255. JEDITOR - Customized Java Editor
256. eTutor - Online Tutorial, revolutionizing the tutoring industry
257. Pharmaceutical Distribution Automation Software system
258. Remote Desktop Capture system
259. eSearch - A Search Engine Design & Implementation
260. SMTP based JAVA MAIL CLIENT Graphical User Interface system
261. Java based Spam Filter implementation
262. Telecom Inventory maintenance and services Application with error tracking
263. Project based Time & efforts Tracking System Implementation
264. Training Organization Management System Implementation
265. Web Testing Tool Application - Designed to test & measure performance
266. Web based Job Site Management system “ A Exclusive Job Portal with Mega features
267. Employee Profile Management System “ An Effective Employee Management Resource
268. Development of Web enabled Online, Dynamic ATM Card Management System
269. Time Synchronization system using java
270. ATM Card & CMS application Back Office Management
271. Honey Pots “ A Security System to Identify Black Hat Community in the Networks
272. Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP)
273. Bandwidth Congestion Control using Authentication Service for Automatic and Dynamic Reconfiguration System
274. Network Load Balancing and Redistribution of the Traffic Over the Networks using Grid Computing System
275. Media Streaming in Mobile using J2ME Toolkit
276. Efficient Network Routing Protocol with Effective Data Transfer without Packet Loss Over the ADHOC Networks
277. Data Communication and File Transferring using Decreased Latency and Block Tracker
278. Authentication of Digital Images by Encryption and Decryption with Primary Key Implementation using LSB Algorithm and Steganography
279. Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol
280. Implementation of Security Kernel and Firewall using Java
281. Media streaming using J2ME
282. Unified Interface for Multiple Naming Service using JNDI
283. Multiplex SMS relay over GSM using AT commands
284. Zero Installation of Client DB Driver using RPC
285. Integrated Data Persistence & Synchronization in PDAâ„¢s
286. Distributed Cache Updating for the Dynamic Source Routing Protocol
287. Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic Peer Groups
288. An Agent-Based Testing for Web Application
289. TCP-LP: Low Priority Service via End“Point Congestion Control
290. On Self-Fish Routing in Internet Like Environments
291. Schema based Enterprise Charting & Reporting for Desktops
292. ER “ Schema Analyzer with Data Streaming
293. Data Hiding in Audio Files with PBE Encryption
294. Duplex Messaging for Enterprise Systems
295. Integrated Mail Transfer Agents using JAF
296. Designing Test Automation System using Native System Input Events
297. Components Framework for Developer Network using MVC Pattern
298. Asynchronous Server Interaction using AJAX and XML
299. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
300. An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management
301. An Anti-phishing Strategy Based on Visual Similarity Assessment
302. News Feed Syndication Generation over Heterogeneous Networks
303. Enterprise Mailing System validation with DNS query using MX Records
304. Component based Architecture for WAP Compliant Transactional Services
305. On Demand Audio / Video Streaming and rendering Over IP using UDP
306. Proactive Port Scanning for Secure Computing Environment
307. DDE Thin Client Midlet for Limited Devices using Java Communication
308. Denial of Service against the Domain Name System
309. Digital Rights Management (DRM) using SOAP
310. Multithreaded Networked Data Injector & Extraction Server & Client for Cryptographic Services
311. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
312. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
313. Anteater-A Service Oriented Architecture for High Performance Data Mining
314. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
315. Cross-Layer Optimization in TCP/IP networks
316. Data Security in Ad hoc Networks Using Multipath Routing
317. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server
318. Distributed Token Circulation in Mobile Ad Hoc Networks
319. Versioning Control System using JAVA
320. Virtual Private Network using JAVA
321. Voice based XML Phone Survey System
322. VSAT Simulation and Smart Cache Loader
323. WAP based information Retrieval System
324. WAP based Route Tracing and Mailing
325. WAP Enabled Greeting Card System - WAP Enabled Device User to send greeting card to other WAP Enabled Devices
326. Web Enabled Supply Chain Management
327. Wireless Application Programming with J2ME and Bluetooth
328. Workflow based Complaint Management System
329. XML Parser for E“Mail Resumes / Resume Tracking & allotment using XML
330. Instant Messaging and Presence Technology for College Campuses
331. Intrusion Detection in Wireless Ad-hoc Network
332. Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols
333. Fine Grained Layered Multicast using STAIR
334. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks
335. Network-Wide Prediction of BGP Routes
336. NIRA: A New Inter-Domain Routing Architecture
337. Online Detection and Prevention of Phishing Attacks
338. OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET
339. A Natural Language-Based Interface for Querying a Video Database
340. A Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc Networks
341. A Secure Routing Protocol for mobile Ad-hoc Network
342. A Trustworthy Mobile Agent Infrastructure for Network Management
343. A wireless distributed intrusion detection system and a new attack model
344. Allocating Applications in Distributed Computing using JINI
345. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
346. Routing and Security in Mobile Ad Hoc Networks
347. Scripting JAX-WS
348. Simple a Pre-Provisioning Scheme to Enable Fast Restoration
349. Site-based Mapping for parallel proxy servers with fewer TCP connections
350. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
351. Watermark Based Digital Rights Management
352. A Semantic Web-Based Approach to Knowledge Management for Grid Applications
353. A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
354. Context Oriented Search Engine with Web Crawler
355. Converting RTF into XML using the TEI Lite DTD
356. CRM based Sales of Fleet & Services Management
357. Data and Video Streaming System
358. Data Encryption and Compression System with Optimization
359. Dealership Management System - Dealers information & Dealings Process Manager
360. Defect Tracking Tool - Enterprise Project and Defect Tracking System
361. Design & Development of a Distributed, Scalable File Sharing & Access System with Security
362. Digital Image Processing “ Frequency Domain
363. Digital Water Marking for Video Piracy Detection
364. Distributed Database System for online Shopping & Store
365. Distributed File Sharing System for Peer to Peer Network
366. E-Commerce Shopping cart for B2B Implementation
367. EJB Implementation Of Distributed Online Stock Maintenance and Trading
368. Graphical Network Browser
369. Heterogeneous Networks Control and Implementation
370. Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and Administration in IP Network
371. Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments
372. Patient Keeper: Medical Application on mobile Phone
373. VPersonalized E-mail Management at Network Edges
374. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
375. XML Data Stores: Emerging Practices
376. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
377. Image File compression & Transmission across the Network by MDA (Message Digest Algorithm)
378. Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE)
379. Media Gateway Control Protocol Network
380. Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm
381. Route Reservation in Ad Hoc Wireless Networks
382. Pre Active Circulated Cache Updating using on Demand Routing Protocol
383. Dynamic Load Balancing in Distributed Systems in The Presence Of Delays “ A Regeneration Theory Approach
384. A Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed Environments
385. An Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS
386. A Fully Distributed Proactively Secure Threshold Multi signature Scheme
387. Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes
388. A Hierarchical Modeling and Analysis for Grid Service Reliability
389. Secure Data Hiding and Extractions using BPCS
390. SLA-Driven Clustering of QOS Aware Application Servers
391. User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony
392. Advanced Host Monitor Enterprise
393. Advanced instant Messenger & Message Broadcasting
394. Bug Tracking System - Comprehensive Bug Tracking & Change Management
395. Call Centre Management System
396. CALTOOL “ Computer Aided Learning Tool
397. Cargo Tracking System Design & implementation
398. Complete email system with an email server and an email client
399. Image Compression and Decompression using Huffmanâ„¢s
400. Image Manipulation for Face Recognition
401. Implementation of Broadcast Messaging System using Multi Threading
402. Asset Management Solution (AMS)
403. Implementation of Packet Filtering Firewall in Linux Systems
404. Implementation of Peer-to-Peer Communication System with a Centralized Name Server in Linux Network
405. Implementation of Secured & Encrypted Data Transmission over the Web
406. Implementation of Wireless Application Protocol Gateway in Mobile Network
407. Implementation of Wireless Communication Gateway for PC To Mobile Network Route using Internet Protocol
408. Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support
409. Intelli Mobile Banking System Design & Implementation
410. Investigation and Analysis of Packets Transformation in an Ethernet Network System
411. Java Grid Using Grid Computing System
412. Java Network Flow Analyzer
413. Java Network Monitor / Java Network Browser
414. Java RMI-based application which manages load balancing on heterogeneous clusters
415. Java SMTP, POP, Web Email Server
416. Java-to-XML Data Binding tool
417. Job Portal Implementation with intelli power features
418. JSP - Personal information Manager
419. Logistics - freight forwarding software solution logistics
420. Multimedia Messaging Service - MMS
421. Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems
422. Net Monitoring and Management using SNMP
423. Network Administrators to Monitor VPN and SSL Connections
424. Network Component Development for XML Document Migration
425. Neural Network based Character Pattern Identification System
426. On-Line Analytical Processing - Maintenance of Data collection & Reports
427. Online Auction with featured shopping cart
428. Online Enterprise Resources Planning “ Web Enabled ERP implementation with Distributed Database system
429. Online Health Care Management Solutions
430. Online Distributed Human resources Management System
431. Online Portfolio Manager “ Equity Trading & Mutual Funds management
432. Online web enabled Bug Tracking System
433. Online Web Shop Mall - Web Shop Site
434. Online Workflow Service Manager & Automation
435. SNMP Trap Gateway - Network Management
436. Software Routing “ Packet Filtering & Capturing
437. Thin Client Network Implementation
438. Ultimate Online Jobsite with intelli Search engine
439. Professional time and task management tool
440. Public-Key Cryptography Extensions into Kerberos
441. RAT (Remote Assistance Tool) is a Java Application
442. Resource Planning Tool Design & Implementation (RPT)
443. Sales force Automation Implemenation
444. Sales Order Processing and invoicing (SOPI)
445. Secure (RSA) Chat Server
446. Secure Electronic Transaction System
447. Secure Web Cache Proxy Server
448. Digital Image Processing “ Time Domain
449. Secure web conferencing on any platform using Java
450. Secured Network Manager & Tracker using JMX
451. SFTP Server - Synchronous File Transfer Communicator
452. Smart Network Access Using Mobile Bluetooth, J2ME
For more information click here!!!!!!!!!!!!!
This comment has been removed by the author.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteVery nice article.
ReplyDeleteI liked it. Very simply explained.
thank you
Campus Management System