41
3D Mobile Game Engine Development Software Project A Railway Anti-collision System with Phis Plate Removal Sensing and Auto Tra Automated Low-Level Analysis and Description of Diverse Intelligent Videos ( Automated Robot for Military System (ARMS) Band-Aids for Broken Microprocessors Battery Optimizer for Android Mobile Devices Bug Tracking System CALTOOL Computer Aided Learning Tool Coaching Management Software Combining Kinect and Stereo Depth Measurements Data-Efficient Robot Reinforcement Learning DDOS (Distributed Denial of Service) Using Throttle Algorithm Debugging Grids with Machine Learning Techniques Design and Development of Speed Cash System (SCS) Development of a Feature-Rich Practical Online Leave Management System (LMS) Diagnosing Computer Bugs Using Big Data Efficient Coding Technique for Aerospace Tele Command System Efficient Peer to Peer Similarity Query Processing for High dimensional Data Elevator Control System Energy & Power Efficient, Real Time System Scheduling File System Simulation Gaussian Processes for Bayesian State Estimation Gram-Based Fuzzy Keyword Search over Encrypted Data in Cloud Computing Honey Pots a Security System to Identify Black Hat Community in the Networks Imitation Learning in Humanoid Robots Information Flow in Bargaining Scenarios Inter-Operability of 802.11e and 802.11 Mobile Apps in the K-12 Classroom Multi-Million Dollar Maintenance Using WLS Algorithms North East West South Global Unified Reporting Utility (NEWSGURU) Online Voting Using Bluetooth Enabled Mobile Phone Pre Touch Sensing with Sea Shell Effect Privacy Preserving Data Sharing with Anonymous ID Assignment Security Issue of Cloud Based Storage Semi-Supervised Learning using Graph Kernels Simulation and Exploration of Hybrid Systems via Automata SMASH-Scalable Multimedia Content Analysis in a High-level Language Sockets Programming in Python –Building a Python Chat Server Software Engineering of Scientific Software SORT- a Self-Organizing Trust Model for Peer-to-Peer Systems SPIRIT –Spontaneous Information and Resource Sharing Tanrox Work Force The Design and Implementation of a Consolidated Middle Box Architecture Unique ID (UID) Management System Project Visual Tracking Using Spare Appearance Model Web-Based Online Library System A Reverse Engineering Approach for Converting Conventional Turbo C Co Microcontroller-Based Security System using Sonar

computer science Engineering Projects list

Embed Size (px)

DESCRIPTION

Computer science engineering projects list

Citation preview

3D Mobile Game Engine Development Software Project

A Railway Anti-collision System with Phis Plate Removal Sensing and Auto Track Changing

Automated Low-Level Analysis and Description of Diverse Intelligent Videos (ALADDIN)

Automated Robot for Military System (ARMS)

Band-Aids for Broken Microprocessors

Battery Optimizer for Android Mobile Devices

Bug Tracking System

CALTOOL Computer Aided Learning Tool

Coaching Management Software

Combining Kinect and Stereo Depth Measurements

Data-Efficient Robot Reinforcement Learning

DDOS (Distributed Denial of Service) Using Throttle Algorithm

Debugging Grids with Machine Learning Techniques

Design and Development of Speed Cash System (SCS)

Development of a Feature-Rich Practical Online Leave Management System (LMS)

Diagnosing Computer Bugs Using Big Data

Efficient Coding Technique for Aerospace Tele Command System

Efficient Peer to Peer Similarity Query Processing for High dimensional Data

Elevator Control System

Energy & Power Efficient, Real Time System Scheduling

File System Simulation

Gaussian Processes for Bayesian State Estimation

Gram-Based Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Honey Pots a Security System to Identify Black Hat Community in the Networks

Imitation Learning in Humanoid Robots

Information Flow in Bargaining Scenarios

Inter-Operability of 802.11e and 802.11

Mobile Apps in the K-12 Classroom

Multi-Million Dollar Maintenance Using WLS Algorithms

North East West South Global Unified Reporting Utility (NEWSGURU)

Online Voting Using Bluetooth Enabled Mobile Phone

Pre Touch Sensing with Sea Shell Effect

Privacy Preserving Data Sharing with Anonymous ID Assignment

Security Issue of Cloud Based Storage

Semi-Supervised Learning using Graph Kernels

Simulation and Exploration of Hybrid Systems via Automata

SMASH-Scalable Multimedia Content Analysis in a High-level Language

Sockets Programming in Python –Building a Python Chat Server

Software Engineering of Scientific Software

SORT- a Self-Organizing Trust Model for Peer-to-Peer Systems

SPIRIT –Spontaneous Information and Resource Sharing

Tanrox Work Force

The Design and Implementation of a Consolidated Middle Box Architecture

Unique ID (UID) Management System Project

Visual Tracking Using Spare Appearance Model

Web-Based Online Library System

A Reverse Engineering Approach for Converting Conventional Turbo C Code to 64bit C#

Microcontroller-Based Security System using Sonar

XTC Algorithm Based Scalable Wireless Ad hoc Networking IEEE

Wi-Fi Based Mobile Quiz

3D View MorphingAcademic peer to peer NetworkAcademic plannerAccident prevention system for hairpin bend zoneAccurate Anomaly Detection Through ParallelismAcknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs JavaActive Learning Methods for Interactive Image RetrievalActive Queue Management for Fair Resource Allocation in Wireless NetworksActive Source Routing Protocol for Mobile AD-HOC NetworksActurial projection systemAdaptive Data Fusion for Energy Efficient Routing in Wireless Sensor NetworksAdaptive distributed event model.Adaptive event based middleware architecture.Adaptive Programming Model for Fault-Tolerant Distributed Computing /JavaAdaptive Security and Authentication for DNS SystemAdding Functionalities to LibpcapAdvance IP Traceback SchemeAdvance vehicle and highway management systemAdvanced Computer Cluster ArchitectureAdvanced public bus transportation system for IndiaAdvertisement Posting Website ASP .NetAgent Based Intrusion Detection, Response and Blocking using signature method in Active NetworksAggregate queries on uncertain results of data integration systemsAgile/Generic/Agent-oriented programmingAI FirewallAll in One Steganographyalternative semantics for error and exceptional handlingAlumni SoftwareAnalysis of Event Models in Event based Middle wareAnalysis of Routing Models in Event Base Middle wares

Ann Based Control Patterns Estimator For UPFC Used In Power Flow ProblemAnomaly DetectionAnomaly Detection/One-Class Classification AlgorithmAnti - VirusesAntiSqlFilter-Blocking SQL Injection Hacker AttacksApartment Management SystemApplication Of Bayesian Networks To Data MiningApplication of Geometric invariants in finding structural properties in biological moleculesApplication of Mobile Agent Systems to First Responder Training With FlexibilityApplications and network vulnerabilitiesApproximation Algorithm for Facility location and related problemsArtificial intelligence network load balancing using Ant Colony Optimization C# NetATM Networks For Online Monitoring System JavaAuction simulator using agentsAuction System ASP Net

Android projects, collection of latest android project ideas

Audio processing of movies.Authenticating Network Attached Storage - IEEEAutomated Generation of Cycle Level Simulators for Embedded Processors.Automated Robot for Military System (ARMS)Automatic Dependent Surveillance-BroadcastingAutomatic Java Media ManagerAutomatic Medicine Announcement SystemAutomatic Remote BackupAutomating News Gathering and ClassificationAutomation With The Concept Of JiniAutonomic Computing and Self Healing SystemsBandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless NetworksBandwidth Estimation for IEEE 802.11 Based ADHOC NetworksBandwidth management ToolBarcode Capture and Recognition for EAN Barcodes Using Cell phone CameraBarcode GenrationBenefit Based Data Caching In Ad Hoc NetworksBiological data managementBiometric - The Security SystemBiotechnologies/Bioinformatics/Biometrics/Biomedical systemsBRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc NetworksBug tradingBuilding a Distributed Computing Environment in KreSITBuilding Cluster Environment For Interactive Users.Building Intelligent Shopping Assistant using Data mining technique for Web ServicesBuilding VoIP over DEP NetworkBulk Billing System JEEBusiness Card ManagerBusiness continuity and availabilityBusiness process integration and managementBypassing Vista USA and correctly launching interactive process from a windows service.CAC Connection Admission Control using ATM Networks ImplementationCall Center Management System ASP NetCampus Online Help DeskCargo Management SystemChaos based Encryption for a Structured Video CodecCharacterization of JVMCircular Target Detection and Pattern DetectionClinical telemedicineCloth Animation & Dynamics.COACS: Co - Operative and adaptive caching system for MANETsCode Database Servers-A Centralized Compiler ArchitectureCode Generation for Lazy Functional LanguagesCode optimization. Implementation of scalar optimizationsCode Review Tool Using Existing Third Party ImplementationsCognitive science and knowledge agent-based systems

Collaborative Platform for Open SourceCollaborative Span Filtering Using Centralized Incrementally Learning Spam RulesCollaborative Web BrowsingCollage Management SystemCollision-free tag reading mechanism for RFID Network with Mobile Readers.Color Image SegmentationColor imaging and multidimensional projectionsCompression in Flash-based DatabasesComputational biochemistryComputational Geometry in Drug DesignComputer graphics and animationComputer modeling/simulationComputer vision and resolutionComputerized Information Software VB NetCongestion Window ControlConsumer accessibility appliances and servicesConsumer trust in digital societyConsumer-oriented devices and servicesConsumer-oriented digital economicsConsumer-oriented e-commerceContact ReminderContent Cognizant data disseminationContention Window Differentiation Mechanism for providing QoS in 802.11Context Aware Service Oriented ArchitectureContext-aware and self-management systemsControl and monitoring systemsControl Setting of Unified Power Flow Controller Through Load Flow CalculationControlling IP Spoofing Through Inter Domain Packet FiltersControlling IP Spoofing through Inter domain Packet Filters (Java)Convolution FilterConvolution Filter VB NetConvolution FiltersConvolution Filters Using Image Processing C# NetCounting Bloom Filters for Pattern Matching and Anti-evasion at the Wire Speedcourse home page generatorCredit Card Fraud Detection using Hidden Markov Model (Net)

Crypt kit A real time cryptographic system for security over the networks - IEEECryptographic EngineCryptographically Using Secure Server/Client ProtocolCryptographically Using Secure Server/Client Protocol VC++Cryptography and algorithms encryptionCSI-KNN-based Intrusion Detection SystemCustomer Support ProtocolCustomizing Proxy Web serverCVS Root File Changing Utility

Credit Card Fraud Detection Using Hidden Markov Models

CVS Root File Changing Utility C# NetData IntegrationData Minimization And Storage Using XML Enable SQL ServerData mining implementation for Credit Cards Application Processing SystemData Recovery In Ext2 files system and Adding secure deletion to your favorite file SystemData Security in Ad hoc Networks Using Multi Path RoutingDatabaseDatabase In Smart CardsDatabase Schema Comparison Utility C#Database Schema Comparison Utility C# C# NetDatabases and mobility in databasesData-centered information systemsDBMS with SQL InterpreterDecision support systemsDedicated Short range road side communication for vehiclesDeduplication and Soft matchingDefect Tracking Tool - Enterprise Project and Defect Tracking SystemDept Library Management SystemDesign and Deployment of a Reliable File Transfer Protocol over Asymmetric Satellite NetworksDesign and Deployment of a Transfer Control Protocol over Asymmetric Satellite NetworksDesign and Evaluation of an IEEE 802.11 Based Dual MAC for MANETsDesign and Implementation of PSTN to VoIP Gateway in built Asterisk PBXDesign and implementation of PSTN/VoIP gateway with inbuilt PBX.Design and Implementation of RSVP-TE over MPLS EmulatorDesign and Implementation of Traffic Engineering Extensions for OSPFDesign and Implementation of WiFiRE protocolDesign considerations for computer-telephony application programming interfaces and related componentsDesign of an Infrastructure using WiFi for Road NaviationDesign of Intranet Mail SystemDesign of Multi-threaded Label Distribution Protocol for MPLS EmulatorDesigning Less - Structured P2p Systems for the Expected High ChurnDesk FM MonitorDetecting and Blocking SkypeDetection of recurring patterns in protein structure by superimposition and geometric hashingDeveloping an Organically Growing Peer to Peer NetworkDeveloping GUI for IP Tables ConfigurationDeveloping port scanning and detection systemDeveloping wireless componentsDevelopment of a Distributed Systems Simulator for Event Based MiddlewareDevelopment of an API for using SMS as transport layer.Development of an OS Framework for a MIPS SimulatorDevelopment of basic TGREP simulatorDevelopment of Customer relationship Management System to increase SalesDevelopment of LBX: Low-Bandwidth XDevelopment of Orchestration Server based on BPEL4WS standard (tentatively named as "ORCSERV").Development of QoS enhancement in VOIP applicationDevelopment of QoS enhancement in VOIP application

Development of simple IP subnet calculator toolDevelopment of Thin LINUX desktop with or without XDigital analysis and processingDigital Image ProcessingDigital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings /NetDigital Image Processing with Multi Domain ApproachDigital information processing (Voice/Data/Video)Digital librariesDigital Signature Verification using Artificial Neural Networks / Digital Signature VerificationDigital Steganography: Hiding Data within DataDigital telecommunications managementDigital video browser and multimedia content searchDigital Water Marking For Video Piracy DetectionDijkstra algorithm for shortest pathDimensioning Network Links: A New Look at Equivalent BandwidthDirect Information SystemDirect Manipulation Technique for Wireless NetworkingDirection queries in spatio-temporal databases.Directory Retrieval Using Voice Form Filling OnlineDisplacement filters, including swirl using GDI+Displacement filters, including swirl using GDI+ C# NetDistributed and Scalable Routing Table Manager for the Next Generation of IP RoutersDistributed Ant RoboticsDistributed Cache Updating for Dynamic Source Routing Protocol - IEEEDistributed cache updating for the Dynamic source routing protocolDistributed cache updating for the Dynamic source routing protocol /JavaDistributed Component Router Based CRM Customer Relationship ManagementDistributed Component Router based Supply Chain Management System SCMDistributed Data mining in Credit Card Fraud Detection AnalysisDistributed Database Architecture for Global Roaming in Next-Generation Mobile NetworksDistributed Database Architecture for Global Roaming in Next-Generation Mobile Networks /JavaDistributed Node Migration by Effective Fault ToleranceDistributed Parallel Virtual MachineDistributed System simulator for Publish-Subscribe ModelDistributed Workgroup File IndexerDNS based MultihomingDocument ManagerDSP Based Virtual Private NetworkDSP SimulatorDual-Link Failure Resiliency through Backup Link Mutual ExclusionDynamic Adaption of DCF and PCF mode of IEEE 802.11 WLANDynamic Character & Pattern Recognition using Neural NetworksDynamic Control for Active Network SystemDynamic Data Dissimination in Resource Constrained EnvironmentDynamic Location Strategy for Hot Mobile Subscribers in personal CommunicationsDynamic Signature Verification Using Discriminative Training

Dynamic Signature Verification Using Pattern RecognitionDynamic Slicing of ProgramsDynamic Topology Extraction for Component Based Enterprise Application EnvironmentsDynamic University Linking & Data integrity MaintenanceE -Wheel SoftwareE“Secure Transaction Design & ImplementationE-Banking transaction system and portal for bank officials and customere-Business, e-Science systemsE-CampusE-Commerce related projectEconomics of security and protectionEdge Detection FiltersEdge Detection Filters C# NetEffective Decision Tree AlgorithmEffective Monitoring of Web navigation using Code CheckEffective Packet Analyzing and Filtering System for ATM NetworkEffectively Tuning and Optimizing the DatabaseEfficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring ElementsEfficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of HopsEfficient and Secure Content Processing (Java)Efficient and Secure Content Processing and Distribution by Cooperative IntermediariesEfficient Association Rule Mining Algorithm In Distributed DatabasesEfficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc NetworksEfficient Causality Tracking in Optimistic Distributed SimulationEfficient Contiguous Data & Video Streamer with Buffer ManagementEfficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular NetworksEfficient inference algorithm for large state space graphical modelefficient message digest algorithm (MD) for data securityEfficient OSPF Based Load Sensitive Routing Algorithm.Efficient Resource Allocation For Wireless MulticastEfficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy CaseEfficient Way To Capturing and sending images and videos from mobile to PC and Vice-VersaE-form Application for Employee Management Using Hibernate Vs JDBCE-HealthCare - Distributed HealthCare and A Strategic Management SystemE-Job Card and Timesheet Using Hibernate Vs JDBCEKNOW: Information and knowledge managementE-learningElectronic Fund TransferElectronic Fund Transfer ASP NetElectronic imagery and visualization frameworksElectronic TransactionElliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETE-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & ManagementE-Mail Server Using Multithreaded SocketsE-Mail Server Using Multithreaded Sockets JavaE-Mail Server Using SMTP

Embedded and real-time systemsEmbedded Real Time SystemsEmbedded Systems for AutomobilesEmbedding in Video SteganographyEmbedding In Video Steganography JavaEmployee info and payroll systemEmployee Management SystemEmployee Management System VB NetEncryption and Decryption technique for secure communication in WLANEnergy and power systems controlEnergy Efficient Event Reliable Transport in Wireless Sensor NetworksEnhance the Email Performance Through SMTP- New ApproachEnhancing The AlgorithmsEnterprise Application IntegrationEnterprise Mobile Service Platform Using JMS & J2MEEnterprise Resource PlanningEntity Recognition on the WebE-Recruitment System - Dynamic Online Professional Recruitment & Management SystemERP Application integrated Enterprise Solutions with Strategic advantagesERP for Leather CompanyERP for Leather Company JEEERP for Small BusinessERP for Small Business JEEERP/CRMError handling for syntax analysisError Tracking SystemE-Sales Order Processing SystemE-shopingEstimating latencies and buffer requirements in multimedia networksEstimating Ridge Topologies with High Curvature for Fingerprint Authentication SystemsEstimation of Defects Based On Defect Decay Model: ED3METHEREAL SystemEthernet - Billing SystemEvaluating the Performance of Versatile RMI Approach In JavaExact functional context matching for web services.Exam ServerExperimenting with Code Optimizations on SUIF (Stanford University Intermediate Format)Expert systemsExploiting Local Regularities in Text Segmentation using Conditional Random FieldsExploring XUL as a GUI development kitExtending Shikav to support animation of networking protocolsE-ZestFace Recognition Using Artificial Neural NetworksFace Recognition Using Laplacian facesFace Recognition Using Laplacian faces /JavaFactory management system

Fair and dynamic Bandwidth Distribution ArchitectureFast Algorithms for the Modified Discrete Cosine TransformFault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc NetworksFault-Tolerant TCPFeed Forward Neural NetworksFeedback Based Self-Configuring SystemsFile Encryption and Encrypted text embedding in an imageFile Encryption and Encrypted text embedding in an image VC++File System Workload AnalysisFilter Object Framework for MICO - Dynamic ModelFilter Object Framework for MICO - Static ModelFinal Project by M.Techs ( currently reports are not available)Final Projects By MCA ( currently reports are not available)Find and Replace utilityFind and Replace utility VB NetFine-grained symmetric multiprocessor software architecture for TCP/IP stack on the UNM platformFingerprint Image EnhancementFingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint IndexingFirewellFlexible Network Monitoring Tool Based on a Data Stream Management SystemFlood Fill Algorithms in C# and GDI+Flood Fill Algorithms in C# and GDI+ C# NetFLOW WELL AUTOMATION SYSTEMForecastingForecasting using Genetic Algorithms.Forecasting using Neural NetworksFormal Specification and Verification of WiFiReFPGA implementation of 802.11 MAC.Framework for cascading Payments in P2PFramework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor NetworksFTP ExplorerFTP Explorer VB NetFuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information ProvisionGenerating Windows Presentation Foundation using templatesGeneration of Reliable PINs from FingerprintsGenetic Algorithm Based Train Simulation Using Concurrent EngineeringGenetic Algorithm Based Train Simulation Using Concurrent Engineering JavaGenetic Algorithms and the Traveling Salesman Problem using C# and ATL COMGenetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# NetGeographic and spatial data infrastructuresGeometric Approach to Improving Active Packet Loss MeasurementGlobal Insurance Management SystemGNUTELLA client for LINUXGOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone NetworksGovernment services in the context of digital societyGPRS Traffic Performance Measurements

Granite Business management systemGraphic/Image/Photo/Hand-writing analysis and processingGraphical library systemGraphical Representation Of Online Shares & StocksGraphical Search EngineGrid ComputingGrid Extension Framework for Large Scale Parallel Financial ModelingGrid information Retrieval SystemGSM Based LAN MonitoringGUI Front-end for PostgresHackers Approach to Improve the A.I. Behind CAPTCHAHandled and wearable computing and devicesHandover Keying and its UsesHardware - Software Codesign using hierarchical Finite State machinesHardware enhanced association rule mining with Hashing and PipeliningHBA Distributed Metadata Management for Large Cluster-Based Storage SystemsHba: Distributed Metadata Management for Large cluster-based storage system (Net)Hedonic and perceived digital qualityHiding binary data in HTML documentsHiding binary data in HTML documents C# NetHiding Messages in MIDI SongsHiding Messages in MIDI Songs C# NetHiding messages in the Noise of a PictureHiding messages in the Noise of a Picture C# NetHierarchical Data Back UpHigh-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural NetworksHomogeneous Networks & Control ImplementationHomogenous Network Control and ImplementationHomogenous Network Control and Implementation /JavaHomogenous Network Control and Implementation JavaHoney Pots- A Security System to Identify Black Hat Community in NetworksHonynetHopfield model of neural network for pattern recognitionHost Based IDSHostel Election SoftwareHostel elections voting softwareHotel Management SystemHotel Management System VB NetHR ConsultantHTML EditorHTML Editor VB NetHuman Age EstimationHuman factors in computer systemsHuman Head Internal Rendering with Mouth and Text To Speech SynthesizerHuman Resources Management SystemHuman Resources Management System VB Net

Human/Machine interface and man-in-the-loop controlHybrid Approach to Semi-Supervised LearningHybrid Constraint Satisfaction Problem SolverHybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) /JEEHybrid Mechanism for Enhancing the Performance of Streaming Service in D-T MAHybrid Model Based Reasoning in FinanceHybrid Query ExpansionHybrid wireless-optical broadband access network (woban): prototype Development and Research challengesIA64 ISA SimulationICT support for collaborationImage Classification Using Neural Networks and Fuzzy LogicImage Compression and Analysis with MSE & PSNR Technique - IEEEImage Converter 2005Image Converter VB NetImage ProcessingImage ProcessingImage Processing ApplicationImage Processing C# NetImage Processing for Bilinear Filters and ResizingImage Processing for Bilinear Filters and Resizing C# NetImage Processing for Convolution FiltersImage Processing for Edge Detection FiltersImage processing for HSL color spaceImage processing for HSL color space C# NetImage Processing for Per Pixel Filters using GDI+Image Processing for Per Pixel Filters using GDI+ C# NetImage Processing Techniques for the Detection and Removal of Cracks in Digitized PaintingsImage Rendering for Grid TechnologyImage Rendering For Grid Technology JavaImage RestorationImage SteganographyImage Stream Transfer Using Real-Time Transmission ProtocolImage Transformation using Grid JavaImage Water MarkingImage Water Marking and CombustionImaging interfaces and navigationImpact of Node Mobility on MANET Routing Protocols ModelsImplement Registration Server and Presence Server for SIP.Implement security framework for P to P file systemImplement SIP call control for voice Telephony.Implementation of an ASP based Supply Chain Management SystemImplementation of BPCS-SteganographyImplementation of cryptographic protocols in oblivious signature based envelope (Implementation of Download wizard for simultaneous downloads

Implementation of Scalar OptimizationsImplementation of Soil-biotechnology(SBT)Implementation of the gaming softwareImplementation of Virtual Private Database (VPDmechanism for POSTGRES.)Implementing a Linux ClusterImplementing an interface for transliterationImprecision/Uncertainty/Incompleteness in databasesImprove Forecasting Performance Using Decomposition and CombiningImproving performance of large scale data integration systemsImproving RFID System to read the tags efficientlyImproving TCP performance in adhoc networks.Improving the efficiency of Memory Management in Linux by Efficient PageIncorporating Quality Considerations into Project Time/Cost Tradeoff Analysis and Decision Making.Incremental deployment service of Hop by hop multicast routing protocolIncremental deployment service of Hop by hop multicast routing protocol /JavaIndian Internet TomographyIndustrial systemsInformation ethics and legal evaluationsInformation ExtractionInformation Extraction in Diverse SettingInformation Extraction using a DatabaseInformation Hiding Using Fractal EncodingInformation Management and Representation Using Topic MapsInformation management systemsInformation RetrievalInformation retrieval from textual corpus.Information Retrieval in Resource Constrained EnvironmentsInformation Retrieval SMS ServerInformation technologiesInformation Theoretic Text Similarity Measurement Using Approximate Word Sense DisambiguationInformational mining/retrieval/classificationInstant messenger systemInsurance Management SystemIntegrated Case Based Reasoning And Rule Based Reasoning for InsuranceIntegrated Development Environment using JSWING IDE JSWINGIntegrating Speech Engine with Web NavigatorIntegrating Speech Engine With Web Navigator JavaIntegration of Heterogeneous Databases Into XML Format with TranslatorIntelli WAP System Implementation / WAP based information Retrieval SystemIntelligent agents.Intelligent Call Routing & Management using IVR in Asterisk ServerIntelligent Car Transportation System (IntelliCarTS)Intelligent Dictionary Based encoding Algorithm for data compressing for High Speed Transformation Over InternetIntelligent GreenhouseIntelligent Multi-sensor System for Control of Boilers and FurnacesIntelligent user interfaces

Interaction in smart environmentsInteraction of IPSS: Distributed Resource Allocation and Revenue MaximizationInteractive Deduplication using Active LearningInteractive Multiplayer Mobile Games Using BluetoothInterface for Mobile Phone and PDA using J2MEInternet History ViewerInternet History Viewer VB NetInternet imaging localization and archivingInternet On Demand - Web Browser And CopierInter-operability of IEEE 802.11 with IEEE 802.11eInterpretor for lambda calculus with some extensionsIntranet Based Email SystemIntranet Caching ProtocolIntranet Mailing SystemIntruder Detection SystemIntrusion Detection in Homogeneous & Heterogeneous Wireless Sensor NetworksIntrusion Detection Prevention And Trace back SystemsIntrusion Detection Prevention And Trace back Systems VC++Intrusion Detection System & Bandwidth LimitationIntrusion Prevention SystemInventory Manage SystemInventory SystemInventory System VB NetInvestigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technologyIP SnifferIP Spoofing Detection Approach (ISDA) for Network Intrusion Detection SystemITP: An Image Transport Protocol for the InternetITP: An Image Transport Protocol for the Internet /JavaJ2EE Project TitlesJ2ME end-to-end security for M-commerce.J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2MEJ2ME Mail Client ServerJ2ME Project TitlesJava Dynamic Data ViewerJava Network File Sharing SystemJava Network File Sharing System JavaJava Productivity AidsJava Productivity Aids JavaJava Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader

Java SIP Signaling ComptrollerJava Visual Editor with CompilerJava Visual Editor with Compiler JavaJava-DebuggerJDBC Database Interfacing ToolJini The Distributed System

Java Projects on Cloud Computing (a project discussion)

JME Mail Client Server JMEJob Order SystemJob portalKnowledge acquisition, processing, and managementKnowledge data systemsKnowledge for global defenseKnowledge modeling and virtualizationLAN Based Bit TorrentLearning Paths for Information ExtractionLearning relevance order over graphically linked objectsleave plannerLending Tree ProjectLibrary management systemLibrary Management SystemLibrary Management System C# NetLibrary Management system VB NetLIC managementLinguistic knowledge representationLinux ClusteringLinux Kernel (Memory Management)Linux Kernel EnhancementLoad Balancer in client-server architecturesLoad Balancing Using Process Migration in LinuxLoad Sensitive Routing algorithm and its application in traffic engineeringLocalized Sensor Area Coverage With Low Communication OverheadLocation Aided Routing for Mobile Ad-Hoc NetworksLocation Aided Routing in Mobile ADHOC Networks for Secured RoutingLocation Based Spatial Query Processing In Wireless Broadcast EnvironmentsLocation-Aided Routing (LAR) in Mobile Ad Hoc Networks /JavaLog browserLow Bit Rate Speech CodingLow cost affordable raid storageMAC Layer Scheduling in Ad-hoc NetworksMail Server UtilityManagement and controlManaging Linux DistributionsMan-Machine Interface - A RobotMarathi Sentence Generation from UNL.Marketing administration systemMatchmaking algorithms for Semantic Web ServicesMatchmaking websiteMaterial Forecasting and Management SolutionMaximum Confidence Hidden Markov Modeling for Face RecognitionMeasurement and management systemsMeasurement Based Performance Characterization of Software ServersMedia Handling for Multimedia Conferencing in Multihop Cellular Networks

Medical agencyMedical image processingMedical management systemMedical Transcription ServerMembership Management SystemMembership Management System VB NetMemory Learning Framework for Effective Image RetrievalMessage DigestMessage Digest VB NetMessage Management SystemMessaging Service over TCP/IP in Local Area NetworkMicrocomputer Based RobotMiddleware for group communication in hybrid network.Mini Projects by B.Techs ( Currently reports are not available )Mini Projects By M.TechsMinimizing file download time in Stochastic Peer-to-Peer networks (Net)Minimizing File Downloading Time in Stochastic Peer-To-Peer NetworksMirroringMitigating the Reader Collision Problem in RFID Networks with Mobile ReadersMobile Agents In Distributed Multimedia Database SystemsMobile Agents In Distributed Multimedia Database Systems /JavaMobile BankMobile Bank WAPMobile Banking Design & Implementation - IEEEMobile Based Software InspectionMobile consumers and interactive spacesMobile devices and biotechnologiesMobile Information ProviderMobile Information Provider JMEMobile learning and communicationsMobile shop shopping cart SystemMobile TV and IPTVMobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless NetworksMobotricModel checking for protocol verification.Model Checking of Software Components: Combining Java Pathfinder and Behavior Protocol Model CheckerModeling & Automated Containment of WormsMonitoring And Managing The Clusters Using JMXMonitoring And Managing The Clusters Using JMX JMEMotion Detecting SystemMulti Router Traffic Monitor ImplementationMulti Router Traffic Monitoring SystemMulti Server Communication In Distributed Management SystemMulti User Chatting SystemMulticast Application and Approach to Security issues using key managementMulticast Live Video Broadcasting Using Real Time Transmission Protocol

Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay NetworksMulti-criteria decision theoryMultihoming Solution for effective load balancingMulti-input Fuzzy Logic Controller for Brushless dc Motor DrivesMultimodal and interactive interfacesMulti-Tasking SocketsMultithreaded Chat ServerMultithreaded Chat Server C# NetMulti-threaded Label Distribution Protocol for MPLS EmulatorMultithreaded Peer to Peer Communication using Distributed FrameworksMy SQL Administrative tool kitNanotechnologies/Systems-on-the-chip/Networks-on-the-chip/ Haptic phenomenaNatural language processing / robust processingnear-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithmnear-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm /JavaNet BankingNet on TV ChannelNetwork AnalysisNetwork AnalyzeNetwork AnalyzerNetwork Analyzer & Network Monitoring Tool using SNMPNetwork Analyzer JavaNetwork Anomaly detection and classification via opportunistic sampling.Network based Gaming Server.(NGS)Network Based University Collage Co-Ordiantion SyatemNetwork Border Patrol for Congestion Collapse Preventing SystemNetwork Border Patrol Preventing Congestion CollapseNetwork Border Patrol Preventing Congestion Collapse JavaNetwork border patrol: preventing congestion collapse and promoting fairness in the InternetNetwork border patrol: preventing congestion collapse and promoting fairness in the Internet /JavaNetwork Component for XML MigrationNetwork Component for XML Migration JavaNetwork MAnagement And Internet ToolsNetwork Management ToolNetwork MonitoringNetwork Monitoring Based on JavaNetwork Monitoring SystemNetwork Packer Sniffer ImplementationNetwork Protocol Verification Using Linear Temporal LogicNetwork Security System in DNS using AD-HOC NetworksNetwork Security System In DNS Using Ad-Hoc Networks JavaNetwork Simulation Creator and Animator/NAM Enhanced Simulation Animation (NS2)Network SnifferNetwork Traffic Anomaly DetectorNetwork Traffic Anomaly Detector JMENetwork Traffic, Packet Analyzer and Sniffer

Network VigilatorNetworks Based Performance Analysis ToolNeural Network for Recognition of Handwritten and DigitsNeural Network for Recognition of Handwritten and Digits BackpropagationNeural Network for Recognition of Handwritten and Digits VC++Neural Network-Based Face DetectionNeural Network-Based Face Detection /VC++Neural Networks for Handwriting Detection System Using Brain NetNeural Networks for Handwriting Detection System Using Brain Net VB NetNeural Networks for Handwritten character and DigitsNeural Networks for Handwritten character and Digits /VC++Neural Networks for Unicode Optical Character RecognitionNeural Networks for Unicode Optical Character Recognition C# NetNeuronal networks/Fuzzy logic/Temporal logic/ Genetic AlgorithmsNew Adversary and New Threats: Security in Unattended Sensor Networksnew methodology for representation of TCP performance in TCPSF.New Model for Dissemination of XML ContentNITC Student information systemNoise Reduction by Fuzzy Image FilteringNoise Reduction by Fuzzy Image Filtering /JavaNOT AVAILABLE DEP networking (title yet to be decided)NOT AVIALBLE Data MiningNOT AVIALBLE Data Mining (title yet to be decided)Novel Framework for Semantic Annotation and Personalized Retrieval of Sports VideoNovel Secure Communication Protocol for Ad Hoc networks [SCP]Novel Secure Communication Protocol for Ad Hoc networks [SCP] /JavaObject Based Video SegmentationObject-level Partitioning of ApplicationsOCGRR: A New Scheduling Algorithm for Differentiated Services NetworkOcr in HindiODAM: An Optimized Distributed Association Rule Mining AlgorithmODAM: An Optimized Distributed Association Rule Mining Algorithm /JavaOffice AutomationOMR Sheet ReaderOn Guaranteed Smooth Switching For Buffered Crossbar SwitchesOn supporting Design evolution and treaceablityOn the Performance of Ad Hoc Networks with Multiuser Detection, Rate Control and Hybrid ARQOn-demand business transformationOnline BankOnline Bank ASP NetOnline BankingOnline Book ShopOnline Book Shop ASP NetOnline book shop management systemOnline bug tracking and customer support systemOnline Bulletin Board

Online call logging and customer support systemOnline Class RegisterOnline consumer decision support & advertisingOnline CounselingOnline Counseling softwareOnline Customer CareOnline Customer Care ASP NetOnline EducationOnline Election Software for Hostel ElectionOnline Employee Time Management SystemOnline ExaminationOnline Fashion StudiosOnline Fashion Studios JEEOnline Handwritten Script RecognitionOnline Handwritten Script Recognition - IEEEOnline Handwritten Script Recognition /JavaOnline health care systemOnline Index Recommendations for High-Dimensional Databases Using Query WorkloadsOnline Issue Tracking - Project Management SolutionsOnline Library Management systemOnline Library SystemOnline matrimonial systemOnline Objective testOnline OucationOnline QuizOnline Quiz ASP NetOnline Share TradingOnline ShoppingOnline ShoppingOnline Shopping ASP NetOnline Student RegistrationOnline TestOnline Video/Audio ConferenceOnline Voting SystemOnline Voting System ASP NetOnline Web shopOnline Web shop JEEOoline PollingOpen and distance education systemsOperating system enhancements to prevent the misuse of system calls.Opticall Character RecognitionOptimal Cryptographic TechniqueOptimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute)Optimal Multicast Routing in Mobile Ad-Hoc NetworksOptimal Multicast Routing in Mobile Ad-Hoc Networks JavaOptimal Router Buffer Size

Optimization and information technologyOptimization on postgres optimizerOptimized and delay sensitive service provisioning over SLiT networksOptimizing pattern matching algorithm in intrusion detection.Optimizing the evaluation of complex similarity predicates on large datasetsOrganizational information systemsOrthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity ApproachOSBE to handle cyclic policy interdependency)Overload Control of Web Services with SEDAP-AODV: Extension of AODV for Partially Connected Ad Hoc NetworksParallel Processing ApplicationParallelizing XML Processing Pipelines via Map ReduceParellel Processing Thro' Job DistributionPatient Care SystemPatient Care System VB NetPatient Management SystemPattern recognition / Computer visionPatterns/Anti-patterns/Artifacts/FrameworksPayroll information systemPC (Net) To PhonePCI Interface to Wireless LANPeer to Peer Messaging System using JXTAPeer To Peer Secure Internet Telephony (SIP)Peer-To-Peer MessagingPeer-To-Peer Messaging JMEPerformance Analysis of IEEE 802.16 MACPerformance Analysis of Telephony Routing over IPPerformance Analysis of Telephony Routing ProtocolsPerformance Analysis of WiFi-Re(Wireless Fidelity - Rural Extension)Performance Enhancement of HTTP using improved TCP FunctionalitiesPerformance Evaluation and Modeling of Servlet ContainersPerformance Evaluation of an Efficient Multicast Routing ProtocolPerformance Evaluation of DISTANCE Routing Algorithm in MANETPerformance Evaluation of DISTANCE Routing Algorithm in MANET VC++Performance Evaluation of RMIPerformance Evaluation of RMI JavaPerformance Evaluation of Routing Algorithm using NS2Performance of a Speculative Transmission Scheme for Scheduling Latency ReductionPerformance Study of Infiniband Based ClusterPersonal Authentication Using 3-D Finger GeometryPersonal information managementPersonal, adaptive, and content-based image retrieval imagingPervasive and ubiquitous systemsPhysical Implementation and Evaluation of Ad Hoc Network Routing Protocols using Unmodi ed Simulation ModelsPolyphonic WizardsPower Aware duty scheduling in Wireless Sensor Networks

Power Flow Control with UPFCPragmatic general multicastPrecise Termination Condition of the Probabilistic Packet Marking AlgorithmPredictive Job Scheduling in a Connection Limited System using Parallel Genetic AlgorithmPredictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm /JavaPreventing Network Data Congestion Collapse Using Mobile AD-HOC NetworksProbabilistic Packet Marking For Large Scale IP Trace BackProbabilistic Techniques for cache replacementProcess Monitoring SystemProductivity Enhancement tool for Animation industryProgram verification/validation/correctnessProgramming languages and supporting toolsProject Management SystemProject Management SystemProject ServerProject Status Information SystemProperty Management SystemProtection of Database Security via Collaborative Inference DetectionProtein prediction.Protocol Scrubbing: Network Security Through Transparent Flow ModificationProxy Server - Design and ImplementationPublic Key Validation for DNS security ExtensionPublic Key Validation for DNS security Extension JavaPublic Key Validation For DNS Security ExtensionsPublic Key Validation for DNS Security Extensions Domain Naming ServerPublish-Subscribe systems for P2P NetworksPure Optical router for Optical routing without electronic interventionPush Vs Pull: Quantative Comparison for Data BroadcastQOS Architecture for Mobile NodesQoS based Routing Algorithms in InternetQoS in Wireless NetworksQuality of Resilience as a Network Reliability Characterization ToolQuality of Service Provisioning in IEEE 802.11 Wireless LANsQuantum Key Distribution for 3rd party authenticationQuery builderQuery Routing Optimization In Sensor Communication NetworksQuicklook approach to IDSQUIVER: Consistent Object Sharing For Edge ServicesRailway reservationRapid Internet attacks and networkRate & Delay Guarantees Provided By Close Packet Switches with Load BalancingRate Allocation & Network Lifetime Problem for Wireless Sensor NetworksRate Allocation and Network Life Time Problems (Net)Reading and Writing AVI files using steganographyReading and Writing AVI files using steganography C# NetReal native and persistent layer for Java & .Net

Reasoning models/Model checking/Modular reasoning/Receiver feedback based rate adaptation of multimedia sources.Reconfigurable Packet ClassifierReconfigurable Scheduling Co-ProcessorRecurring Functional Sites in Protein Structures detected with allowance for Substitution of Amino Acids.Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade SecurityReduction of Network Density for Wireless Ad-Hoc NetworksRemote Computing using Thin ClientsRemote medicine and InternetRemote PC Access in Cyber CafeRemote Service Monitor.Remote Switching Control System for Home AppliancesRe-ordering of packets using Retransmission TimerReplacement Policies.Reputation Based Trust Model for Peer to Peer eCommerce CommunitiesRetrieving Files Using Content Based SearchRetrieving Files using Content Based Searching and displaying them in Carousel ViewRetrieving Files Using Content Based Searching and presenting it in Carousel viewRetrieving Files Using Content Based Searching and presenting it in Carousel view JavaRFID based car parking systemRFID Data ManagementRFID reader enabled mobile with environment alert and mobile trackingRFID SecurityRich Internet Application Using Flux Frame for Managing Workflow in healthcare domainRisk Homeostasis and Network SecurityRobotics/Mobile devices/ Mobile networksRobust Distributed Speech Recognition using Speech EnhancementRobust HTML to DOM conversion and applicationsRobust Spanning Tree Topology for Data Collection and Dissemination in Distributed EnvironmentsRole Based Access ControlRough sets based Search Engine for grid service discovery (Net)Route Repair in Mobile Adhoc NetworksRouting and Security in Mobile Ad Hoc NetworksRTF to XML ConverterSafety in telemedicineSales and Purchase Management SystemSASSatellite Image Processing.Scalable and Efficient End-To-End Network Topology InferenceScalable Urban Network SimulatorScalable Wireless Ad-Hoc Network Simulation using XTCScalable Wireless AD-HOC Network Simulation Using XTC JavaSCET Intra NetSCET's Invition For Online TenderScreen capture UtilityScreen capture Utility VB Net

Scribe AutomationSecurable Network in three-party ProtocolSecure Conferencing SystemSecure Data Hiding and Extraction Using BPCSSecure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc NetworksSecure Mail ServerSecure Mobile Agent System Model Based on Extended Elementary Object SystemSecure Mobile Banking & Security IssuesSecure Net Auction SystemSecure Optimal Cyclic Cryptographic SystemSecure Password-Based Protocol for Downloading a Private Key - IEEESecure RoutersSecure Routing Protocol for mobile Ad-hoc NetworkSecure Routing Protocol for mobile Ad-hoc Network JavaSecure routing.Secure Update Semantics in XML databases (Area)Securing Image URLSecuring Image URL ASP NetSecuring User-Controlled Routing InfrastructuresSecurity In Large Networks Using Mediator ProtocolsSecurity in network, systems, and applicationsSecurity Issues in Mobile AgentsSecurity RobotSelective Encryption of Still ImageSelective Encryption of Still Image /VB,CSelf-addressable Memory-Based FSM: a Scalable Intrusion Detection EngineSelf-Interested Routing in Online EnvironmentsSelf-monitoring, self-diagnosing, self-management systemsSemantic Searching using NLP techniquesSemantic WEBSemi Automatic generation of properties for verificationSemi Supervised Information Extraction Using Hidden Markov ModeSemiotic engineering of online servicesSend SMS To Cell Phone Through SMTP MailSend SMS To Cell Phone Through SMTP Mail VB NetSequential switching for industrial applicationServices in Converged Network (Value-Added Services)Session Initiation Protocol (SIP) in JavaShare trading systemShort Term Load ForecastingShortest Node Finder In Wireless Ad-Hoc NetworksShortest Node Finder In Wireless Ad-Hoc Networks JavaSignal Processing Module for the Analysis of Heart Sounds and Heart MurmursSignature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal PatternsSimple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion DetectionSimple FTP Client

Simulating Routing Algorithms in JavaSimulation Analysis of Routing Misbehaviour in Mobile Ad hoc NetworksSimulation of the IA64 Instruction Set ArchitectureSimulation Study of BlackHole Attack In MANET: Detection and PreventionSimulation-based Comparisons of Tahoe, Reno, and SACK TCPSlicing of Synchronous ProgramsSmart and digital homesSmart CardSmart consumer appliancesSmart Divece ControllerSmart Knowledge ProviderSmart Knowledge Provider ASP NetSmart System for Remote Monitoring of Patients and SMS Messaging upon Critical ConditionSN Java Project Titles LanguageSoftware as a serviceSoftware development and deploymentsoftware life cycle maintainerSoftware robustness for digital societySoftware specification and design methodologiesSoundbox: A Graphical Interface to DigitalSource code management (like Rational Clearcase)Spatial and temporal database (queries for retrieving data)Spectral methods for Graph PartitioningSpeech enable appliancesSpeech recognition and processingSpeed Age Courier SystemStatic Image Hand Gesture Recognition using Neural NetworksStatistical Learners for Information Extraction:An Empiricial ApproachStatistical models for Information Extraction from webpagesStatistical Techniques for Detecting Traffic Anomalies through Packet Header DataStatistical Techniques for detecting Traffic anomalies through Packet Header Data (Net)Statistics Based Design of MAC Protocols with Distributed Collision Resolution for Ad Hoc NetworksSteganography - an Art of Hiding Digital InformationSteganography for FTP through a Proxy ServerSteganography for FTP through a Proxy Server C# NetSteganography for Hiding Data in Wave Audio FilesSteganography for Hiding Data in Wave Audio Files C# NetStreaming in NetworksStructure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression AppStructure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications /Javasubsequently implementing a GUI Providing a certain useful functionalitySynchronization Specifier and Presenter for Authoring SystemSystem advanced paradigmsTackling the exposed node problem in IEEE 802.11 MACTask Management SystemTax management system

TAX: Tree Algebra for XML ImplementationT-BloggerTCP/IP Pocket Controlling Monitor JavaTCPIP Chat client server Using C#TCPIP Chat client server Using C# C# NetTele cardiologyTele communication SystemTele pathology and digital imagingTele rehabilitationTelecontrolled UtilitiesTelematic Application - Global Position Aware VehicleTELEMED: Telemedicine and eHealthTelemedicine and tele healthTelemedicine portalsTelemedicine software and devicesTemporal Portioning of Communication Resources in an Integrated ArchitectureTesting ToolsText Editor for Linux PlatformText to Speech conversionText to Speech TechnologyText Watermarking Algorithm based on Word Classification and Inter-word Space Statistics & Multi word featuresTextile Management SystemTextile Web ServicesTextile Web Services ASP NetThe Application of Stock TechnologyThe Complete Personal Mobile SystemThe Effect of Pairs in Program Design Tasks (Net)The File Digest program and the C++ implementation of some Message-Digest algorithmsThe File Digest program and the C++ implementation of some Message-Digest algorithms VC++The Impact of Loss Recovery on Congestion Control for Reliable MulticastTime Table Information SystemTo Coordinate Collaborative Software Development Based on SDLC ModelsTool For Network Auditing(ping and Port Scanning, TCP/IP Finger printingTools for comparative analysis of extraction algorithmsTopology-Aware Failure Diagnosis For Distributed Enterprise Systems.Towards Evaluating Lexico-Semantic NetworksTowards multi model interfaces for intrusion detection - IEEETraffic Engineering Extensions to OSPFTrainee Management SystemTrainee Management System VB NetTransfer Program in Java Using Protocols like FTP,SMB,HTTP,SSHTreating Patients Diabetes Using Mobile and PCTriple crypt Using Vector Displacement AlgorithmTrust, privacy, and safenessTrustworthy Computing Under Resource Constraints With The Down PolicyTrustworthy Computing under Resource Constraints with the DOWN policy (Net)

Truth Discovery with Multiple Conflicting Information Providers on WebTutoring systemsTwo Techniques for Fast Computation of Constrained Shortest PathsTwo-Rule-Based Linguistic Fuzzy ControllersType systems and applications to safety.Type systems and it's application to safe and efficient code.Unified Log-Based Relevance Feedback Scheme for Image RetrievalUPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink ProgramsUpware (Packet Analyzer, IPFW, IPRTR )Usability, aesthetics, and accessibilityUse of wavelets in ForecastingUser Interfaces for Web ApplicationsUser-centric information systemsUsing a multitude of experts in time series forecastingUsing Genetic Algorithms for testcase generation for finite state machinesUsing Multiple Decomposition Methods and Combining a Multitude of ExpertsUsing Multitude of Time Series Forecasting Models to Improve ForecastUsing the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented SystemsUsing Trigonometry and Pythagoras to Watermark an ImageUsing Trigonometry and Pythagoras to Watermark an Image C# NetUtilities to Compressess, Decompressers and Split Merge FilesUtility-Based Incentive Scheme for P2P File Sharing in MANETsVB .Net Smart Mail Transfer ProtocolVB Net Smart Mail Transfer Protocol VB NetVehicle Driver Rating SystemVehicles with Intelligent Systems for Transport AutomationVehicular navigation and controlVerification of Communicating Reactive State MachinesVerifying Delivery, Authorization and Integrity of Electronic MessagesVideo Conferencing with Multicast SupportVideo over variable bandwidth linksVideo Steganography Using Mobile SimulationVideo Steganography Using Mobile Simulation JMEVideo Streaming in Wireless EnvironmentsVideo techniques for medical imagesVirtual Class RoomVirtual classroomVirtual Private NetworkVirtual reality/3D graphics/GamesVirtual Routing Network Emulation Frame WorkVirtual telemedicineVirtual UniversityVision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured LightVisual Layout Driven Information Extraction from WebsitesVisualization and Analysis Tool for NS-2 Wireless Simulations: iNSpectVoice Chating & Voice Mail

Voice Controlled applicationVoice Enabled Smart BrowserVoice message transfer using Personalised Repository based Speech-Coding techniquesVoice OrganizationVoice Over IPVOIP Flexible & Efficient Voice Communicator, Voice Over IPVoIP over wireless networkVVoIP Voice with Video Over IP NetworksWeb Application Server Development Using SMSWeb Attacks Alerter Using Feature Extraction and SNORTWeb based academic monitoring systemWeb Based Content Management SystemWeb Based help deskWeb Monitoring for Lightweight DevicesWeb Services ASP NetWeb-Based Library Management SystemWeb-based presentation of Soil-biotechnology (SBT)Windows Management Instrumentation WMI Implementation C# NetWindows Multi File Search utility VB NetWireless Application ProtocolWireless Data Traffic Decade of ChangeWireless Search EngineWireless Traffic Viewer Using JME JMEWork Flow Management System ASP Net

E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management

Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing