>> Embedded Systems

>> DSP

>> VLSI

>> Power Electronics

>> Power System

>> Control & Automation

>> Dotnet

>> Java

>> NS2

 


.NET Projects

IEEE 2013

Cloud Computing, WCF

MVC2, AJAX, XAML , Ultidev

Sl.No.

PROJECT THEME

APPLICATION

1

Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment

Resource Sharing

2

A Decentralized Self-Adaptation Mechanism for Service-Based Applications in the Cloud

Online Bidding system

3

A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

Preserving Process

4

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Health Care

5

A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud

Data Forwarding

6

Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

Cloud Server Configuration

7

Privacy Preserving Delegated Access Control in Public Clouds

Delegate Processing

8

Privacy-Preserving Public Auditing for Secure Cloud Storage

Secure Data Storage

9

QoS Ranking Prediction for Cloud Services

Ranking Prediction

10

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

Data Storage

11

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

Sharing Resource

12

Efficient Resource Provisioning and Rate Selection for Stream Mining in a Community Cloud

Cloud Cost Estimation

13

Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

Searching Query

IEEE 2012

Cloud Computing

AJAX, JQuery

14

An Adaptive Cloud Downloading Service

Cloud Service

15

Optimization Of Resource Provisioning Cost In Cloud Computing

Sharing Resources

16

Data Integrity Proofs In Cloud Storage

Cloud Security

17

Efficient Resource Allocation For Wireless Multicast

Resource Allocation

18

Cloud Computing: A New Business Paradigm For E-Learning

E-Learning Process

IEEE 2013

Android

Emulator, GSM

19

Web Based Security Analysis of OPASS Authentication Schemes using Mobile Application

Banking application

20

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

Health care

21

Automatic Fall Detection and Activity Classification by a Wearable Embedded Smart Camera

Health care

22

A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices

Mobile Security

IEEE 2012

Mobile

23

Secured Mobile Messaging

Mobile Security

IEEE 2013

3-Tier Process, LINQ

Network Security

24

Game Theory for Network Security

Node Formation

25

Load-Balanced Clustering Algorithm With Distributed Self-Organization for Wireless Sensor Networks

Server Migration

26

Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

Image Classification

IEEE 2012

Networking

Network Security

27

New Channel Selection Rule For JPEG Steganography

Network Security

28

Security Analysis And Implementation Of 3-Level Security System Using Image Based Authentication

Image Processing

29

Online Voting System Powered By Biometric Security Using Steganography

Biometric Security

30

Security Using Colors And Armstrong Numbers

Net banking

31

Enforcing Security Using RSA Algorithm In Net Banking

Banking Application

32

Information Transmission In Crime Branch Using Steganography and RSA Algorithm

Banking Application

IEEE 2013

DNNK

Global Class, Meta Tag,

33

A New Algorithm for Inferring User Search Goals with Feedback Sessions

Searching Query

34

Prequery Discovery of Domain-Specific Query Forms: A Survey

Searching Query

35

A Fuzzy Self-Constructing Algorithm for Feature Reduction

Text analysis

36

Mining User Queries with Markov Chains: Application to Online Image Retrieval

Mining Queries

37

Trusted DB: A Trusted Hardware based Database with Privacy and Data Confidentiality

Health Care

IEEE 2013

WSDL

Data Mining

38

Highly Secured Net Banking System Using Fingerprint Recognition Technique.

Finger Authentication

39

Using Data Mining Techniques In Heart Disease Diagnosis And Treatment

Disease Prediction

40

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

Net banking

IEEE 2012

Data Mining

CRM, Semantic Process

41

A New Framework For Credit Card Transactions Involving Mutual Authentication Between Cardholder And Merchant

Net banking

42

One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web Databases

Query Analysis

43

Customer Relationship Management Based On Data Mining

Data Management system

44

Measuring Code Quality to Improve Specification Mining

Semantic Search

45

A New Security Model Based On Fingerprint Recognition For Distributed Systems

Finger Authentication

IEEE 2013

SOAP

XMLRPC Web Services

46

An Enterprise Ontology-Based Approach to Service Specification

ERP

47

Toward Trustworthy Coordination of Web Services Business Activities

Booking Services analyzing

IEEE 2012

Web Services

48

Optimizing Medical Data Quality Based On Multi Agent Web Service Framework

Health care

49

A Personalized Ontology Model for Web Information Gathering

Query analysis

50

Military E-Mailing System With Cryptography Security Using Web Services

Chat Application

51

Alert Application Using Web Services

Web Application

52

Patient Monitoring System Using Web Services

Health Care

IEEE 2013

Rfid, Zigbee, Sensor

MMS, Microcontroller

53

Advanced Security Based Smart Car System Based On Bio-Metric Technique

Alert Application

54

RFID-based Tracking System Preventing Trees Extinction and Deforestation

Wireless Communication

55

Sensing Devices and Sensor Signal Processing for Remote Monitoring of Vital Signs in CHF Patients

Remote Monitoring

56

Moving Object Detection by Detecting Contiguous Outliers in the Low Rank Representation

Alert Application

IEEE 2012

Wireless Communication

57

Security Analysis Of Two Password Authentication Schemes

Online Banking

58

Smart Parking Applications Using RFID Technology

Wireless communication

59

Polling System With RFID Authentication

Wireless communication

IEEE 2013

MATLAB, Image Fusion,

Google Search Engine Creator

60

Local Directional Number Pattern for Face Analysis: Face and Expression Recognition

Facial expression

61

Fingerprint Combination for Privacy Protection

Finger Authentication

62

Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage

Image enhancement

63

Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation

Image enhancement

64

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

Image Processing

65

Query-Adaptive Image Search With Hash Codes

Searching Image

66

Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments

Facial Expression

IEEE 2012

Image Processing

67

Persuasive Cued Click-Points: Design, Implementation,And Evaluation Of A Knowledge-Based Authentication Mechanism

Network Security

68

A New Change Detection Algorithm For Visual Surveillance System

Alert Application

69

Separable Reversible Data Hiding In Encrypted Image

Secure Mailing

IEEE 2012

Image Processing

70

Integration Of Sound Signature In Graphical Password Authentication System

Net banking,Mailing

71

Anatomical Structure Segmentation In MRI Brain Images

Image Enhancement

72

Motion Human Detection Based On Background Subtraction

Alert Application

73

An Improved Method Of Content Based Image Watermarking

Image Enhancement

74

Finger Print Based Authentication And Controlling System Of Devices

Finger Authentication