For Latest Version Of This Blog
Click Below Link
www.finalprojects2030.net

Monday, November 1, 2010

Computer Science Project Topics (big list)

1. Distributed cache updating for the Dynamic source routing protocol
2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
3. Face Recognition Using Laplacian faces
4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
7. Noise Reduction by Fuzzy Image Filtering
8. Online Handwritten Script Recognition
9. ODAM: An Optimized Distributed Association Rule Mining Algorithm
10. Protocol Scrubbing: Network Security Through Transparent Flow Modification
11. Workflow Mining: Discovering Process Models from Event Logs
12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
15. ITP: An Image Transport Protocol for the Internet
16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS)
17. Incremental deployment service of Hop by hop multicast routing protocol
18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
19. Application of BPCS steganography to wavelet compressed video
20. Neural Networks for Unicode Optical Character Recognition
21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
22. Neural Network-Based Face Detection
23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
25. Mobile Agents In Distributed Multimedia Database Systems
26. Image Stream Transfer Using Real-Time Transmission Protocol
27. Neural Networks for Handwritten character and Digits
28. Evaluating the Performance of Versatile RMI Approach In Java
29. Effective Packet Analyzing and Filtering System for ATM Network
30. Selective Encryption of Still Image
31. Homogenous Network Control and Implementation
32. Retrieving Files Using Content Based Searching and presenting it in Carousel view
33. Dynamic Signature Verification Using Pattern Recognition
34. Embedding in Video Steganography
35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
36. Location Aided Routing for Mobile Ad-Hoc Networks
37. Image Rendering for Grid Technology
38. Java Network File Sharing System
39. Java Visual Editor with Compiler
40. E-Mail Server Using Multithreaded Sockets
41. Network Component for XML Migration
42. Image Water Marking and Combustion
43. Image Processing for Convolution Filters
44. Artificial intelligence network load balancing using Ant Colony Optimization
45. Image Processing for Edge Detection Filters
46. Flood Fill Algorithms in C# and GDI+
47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
48. Hiding messages in the Noise of a Picture
49. Windows Management Instrumentation WMI Implementation
50. Steganography for Hiding Data in Wave Audio Files
51. Automatic Dependent Surveillance-Broadcasting(Ads-B)
52. Digital Water Marking For Video Piracy Detection
53. Encryption and Decryption technique for secure communication in WLAN
54. File Encryption and Encrypted text embedding in an image
55. Integrating Speech Engine with Web Navigator
56. Intrusion Detection Prevention And Trace back Systems
57. Java Productivity Aids
58. J2ME Mail Client Server
59. Monitoring And Managing The Clusters Using JMX
60. Network Analyze
61. Neural Network for Recognition of Handwritten and Digits Backpropagation
62. Network Traffic Anomaly Detector
63. Optimal Cryptographic Technique
64. Peer to Peer Messaging System using JXTA
65. Performance Evaluation of DISTANCE Routing Algorithm in MANET
66. Public Key Validation for DNS security Extension
67. Query Routing Optimization In Sensor Communication Networks
68. Virtual Private Network
69. Voice Enabled Smart Browser
70. XML Enabled SQL SERVER
71. An efficient message digest algorithm (MD) for data security
72. Hopfield model of neural network for pattern recognition
73. Using Trigonometry and Pythagoras to Watermark an Image
74. Hiding messages in the Noise of a Picture
75. ERP for Leather Company
76. Cryptographically Using Secure Server/Client Protocol
77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
78. Neural Networks for Handwriting Detection System Using Brain Net
79. Wireless Traffic Viewer Using J2ME
80. Video Steganography Using Mobile Simulation
81. Cryptographically Using Secure Server/Client Protocol
82. Intrusion Detection Prevention And Trace back Systems
83. Neural Network for Recognition of Handwritten and Digits
84. The File Digest program and the C++ implementation of some Message-Digest algorithms
85. File Encryption and Encrypted text embedding in an image
86. Performance Evaluation of DISTANCE Routing Algorithm in MANET
87. ERP for Leather Company
88. Online Web shop
89. Online Fashion Studios
90. ERP for Small Business
91. Bulk Billing System
92. Wireless Traffic Viewer Using J2ME
93. J2ME Mail Client Server
94. Monitoring And Managing The Clusters Using JMX
95. Peer-To-Peer Messaging
96. Mobile Information Provider
97. Mobile Bank
98. Video Steganography Using Mobile Simulation
99. Network Traffic Anomaly Detector
100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol
101. Active Source Routing Protocol for Mobile AD-HOC Networks
102. Adaptive Security and Authentication for DNS System
103. Evaluating the Performance of Versatile RMI Approach In Java
104. Dynamic Control for Active Network System
105. Effective Packet Analyzing and Filtering System for ATM Network
106. Multi Server Communication In Distributed Management System
107. Reduction of Network Density for Wireless Ad-Hoc Networks
108. Messaging Service over TCP/IP in Local Area Network
109. Secure Data Hiding and Extraction Using BPCS
110. Dynamic Signature Verification Using Pattern Recognition
111. Data Minimization And Storage Using XML Enable SQL Server
112. Retrieving Files Using Content Based Search
113. Distributed Node Migration by Effective Fault Tolerance
114. Embedding in Video Steganography
115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
116. Location Aided Routing for Mobile Ad-Hoc Networks
117. Image Rendering for Grid Technology
118. Optimal Multicast Routing in Mobile Ad-Hoc Networks
119. Scalable Wireless Ad-Hoc Network Simulation using XTC
120. Homogenous Network Control and Implementation
121. Java Network File Sharing System
122. Mobile Agents In Distributed Multimedia Database Systems
123. Java Visual Editor with Compiler
124. ATM Networks for Online Monitoring System
125. Performance Evaluation of RMI
126. Network Border Patrol Preventing Congestion Collapse
127. Network Component for XML Migration
128. Shortest Node Finder In Wireless Ad-Hoc Networks
129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks
130. Distributed Cache Updating for the Dynamic Source Routing Protocol
131. Multi Router Traffic Monitoring System
132. Public Key Validation For DNS Security Extensions
133. A Secure Routing Protocol for mobile Ad-hoc Network
134. Retrieving Files Using Content Based Searching and presenting it in Carousel view
135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
136. E-Mail Server Using Multithreaded Sockets
137. Java Productivity Aids
138. Routing and Security in Mobile Ad Hoc Networks
139. Data Security in Ad hoc Networks Using Multi Path Routing
140. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks
142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
143. Wavelet Based Compression and Decompression Using Steganography
144. Image Stream Transfer Using Real-Time Transmission Protocol
145. Image Water Marking and Combustion
146. Distributed cache updating for the Dynamic source routing protocol
147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
148. Protocol Scrubbing: Network Security Through Transparent Flow Modification
149. Incremental deployment service of Hop by hop multicast routing protocol
150. CVS Root File Changing Utility
151. C# MP3 Compressor
152. Convolution Filters
153. Database Schema Comparison Utility C#
154. Displacement filters, including swirl using GDI+
155. Edge Detection Filters
156. Flood Fill Algorithms in C# and GDI+
157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
158. Hiding binary data in HTML documents
159. Hiding Messages in MIDI Songs
160. Hiding messages in the Noise of a Picture
161. Image Processing
162. Windows Management Instrumentation WMI Implementation
163. Image Processing for Bilinear Filters and Resizing
164. Image processing for HSL color space
165. Image Processing for Per Pixel Filters using GDI+
166. Multithreaded Chat Server
167. Reading and Writing AVI files using steganography
168. Steganography for Hiding Data in Wave Audio Files
169. TCPIP Chat client server Using C#
170. Neural Networks for Unicode Optical Character Recognition
171. Using Trigonometry and Pythagoras to Watermark an Image
172. Library Management System
173. Steganography for FTP through a Proxy Server
174. Artificial intelligence network load balancing using Ant Colony Optimization
175. ASP .Net Project Titles
176. Call Center Management System
177. Online Shopping
178. Textile Web Services
179. Auction System
180. Online Quiz
181. Online Bank
182. Online Voting System
183. Securing Image URL
184. Web Services
185. Smart Knowledge Provider
186. Online Book Shop
187. Electronic Fund Transfer
188. Work Flow Management System
189. Online Customer Care
190. Scribe Automation
191. Textile Management System
192. Sales and Purchase Management System
193. Human Resources Management System
194. Inventory Manage System
195. Job Order System
196. Advertisement Posting Website ASP .Net
197. Mobile shop shopping cart System
198. Patient Management System
199. Property Management System
200. Web Based Content Management System
201. Neural Networks for Handwriting Detection System Using Brain Net
202. Library Management system
203. Windows Management Instrument (WMI) .Net 2005
204. Wallpaper Changer Utility
205. Win Application for Word Processing
206. Screen capture Utility
207. HTML Editor
208. Image Converter 2005
209. Internet History Viewer
210. VB .Net Smart Mail Transfer Protocol
211. Windows Multi File Search utility
212. Message Digest
213. FTP Explorer
214. Convolution Filter
215. Find and Replace utility
216. Apartment Management System
217. Computerized Information Software
218. Employee Management System
219. Hotel Management System
220. Human Resources Management System
221. Inventory System
222. Membership Management System
223. Patient Care System
224. Send SMS To Cell Phone Through SMTP Mail
225. Trainee Management System
226. J2ME Project Titles
227. Wireless Traffic Viewer Using J2ME
228. J2ME Mail Client Server
229. Monitoring And Managing The Clusters Using JMX
230. Peer-To-Peer Messaging
231. Mobile Information Provider
232. Mobile Bank
233. Video Steganography Using Mobile Simulation
234. Network Traffic Anomaly Detector
235. J2EE Project Titles
236. ERP for Leather Company
237. Online Web shop
238. Online Fashion Studios
239. ERP for Small Business
240. Bulk Billing System
241. Distributed cache updating for the Dynamic source routing protocol
242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
243. Face Recognition Using Laplacian faces
244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
247. Noise Reduction by Fuzzy Image Filtering
248. Online Handwritten Script Recognition
249. ODAM: An Optimized Distributed Association Rule Mining Algorithm
250. Protocol Scrubbing: Network Security Through Transparent Flow Modification
251. Workflow Mining: Discovering Process Models from Event Logs
252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
253. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
255. ITP: An Image Transport Protocol for the Internet
256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
257. Incremental deployment service of Hop by hop multicast routing protocol
258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet
259. Application of BPCS steganography to wavelet compressed video
260. Neural Networks for Unicode Optical Character Recognition
261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
262. Neural Network-Based Face Detection
263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
265. Mobile Agents In Distributed Multimedia Database Systems
266. Image Stream Transfer Using Real-Time Transmission Protocol
267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks
268. Personal Authentication Using 3-D Finger Geometry
269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks
270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security
272. A Memory Learning Framework for Effective Image Retrieval
273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks
274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks
275. Neural Networks for Handwritten character and Digits
276. Evaluating the Performance of Versatile RMI Approach In Java
277. Effective Packet Analyzing and Filtering System for ATM Network
278. Selective Encryption of Still Image
279. Homogenous Network Control and Implementation
280. Retrieving Files Using Content Based Searching and presenting it in Carousel view
281. Dynamic Signature Verification Using Pattern Recognition
282. Embedding in Video Steganography
283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
284. Location Aided Routing for Mobile Ad-Hoc Networks
285. Digital Water Marking For Video Piracy Detection
286. Encryption and Decryption technique for secure communication in WLAN
287. File Encryption and Encrypted text embedding in an image
288. Integrating Speech Engine with Web Navigator
289. Intrusion Detection Prevention And Trace back Systems
290. Java Productivity Aids
291. J2ME Mail Client Server
292. Monitoring And Managing The Clusters Using JMX
293. Network Analyzer
294. Flood Fill Algorithms in C# and GDI+
295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
296. Hiding messages in the Noise of a Picture
297. Windows Management Instrumentation WMI Implementation
298. Steganography for Hiding Data in Wave Audio Files
299. Automatic Dependent Surveillance-Broadcasting (Ads-B)
300. Neural Network for Recognition of Handwritten and Digits Backpropagation
301. Network Traffic Anomaly Detector
302. Optimal Cryptographic Technique
303. Peer to Peer Messaging System using JXTA
304. Performance Evaluation of DISTANCE Routing Algorithm in MANET
305. Public Key Validation for DNS security Extension
306. Query Routing Optimization In Sensor Communication Networks
307. Virtual Private Network
308. Voice Enabled Smart Browser
309. XML Enabled SQL SERVER
310. An efficient message digest algorithm (MD) for data security
311. Hopfield model of neural network for pattern recognition
312. Using Trigonometry and Pythagoras to Watermark an Image
313. Hiding messages in the Noise of a Picture
314. ERP for Leather Company
315. Cryptographically Using Secure Server/Client Protocol
316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
317. Neural Networks for Handwriting Detection System Using Brain Net
318. Wireless Traffic Viewer Using J2ME
319. Video Steganography Using Mobile Simulation
320. Image Rendering for Grid Technology
321. Java Network File Sharing System
322. Java Visual Editor with Compiler
323. E-Mail Server Using Multithreaded Sockets
324. Network Component for XML Migration
325. Image Water Marking and Combustion
326. Image Processing for Convolution Filters
327. Artificial intelligence network load balancing using Ant Colony Optimization
328. Image Processing for Edge Detection Filters
329. Mobile Information Provider
330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case
331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks
332. QUIVER: Consistent Object Sharing For Edge Services
333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
334. Geometric Approach to Improving Active Packet Loss Measurement
335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks
337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
338. Watermarking Relational Databases Using Optimization Based Techniques
339. Active Queue Management for Fair Resource Allocation in Wireless Networks
340. Benefit Based Data Caching In Ad Hoc Networks
341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks
342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction
343. Two Techniques for Fast Computation of Constrained Shortest Paths
344. Controlling IP Spoofing Through Inter Domain Packet Filters
345. A New Model for Dissemination of XML Content
346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements
347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
350. Probabilistic Packet Marking For Large Scale IP Trace Back
351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization
352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns
353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems
354. Truth Discovery with Multiple Conflicting Information Providers on Web
355. Location Based Spatial Query Processing In Wireless Broadcast Environments
356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks
357. Modeling & Automated Containment of Worms
358. Security In Large Networks Using Mediator Protocols
359. Designing Less - Structured P2p Systems for the Expected High Churn
360. Estimation of Defects Based On Defect Decay Model: ED3M
361. On Guaranteed Smooth Switching For Buffered Crossbar Switches
362. Active Learning Methods for Interactive Image Retrieval
363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach
364. Efficient Resource Allocation For Wireless Multicast
365. Localized Sensor Area Coverage With Low Communication Overhead
366. Trustworthy Computing Under Resource Constraints With The Down Policy
367. Credit Card Fraud Detection Using Hidden Markov Models
368. An Efficient Association Rule Mining Algorithm In Distributed Databases
369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
370. COACS: Co - Operative and adaptive caching system for MANETs
371. Scalable and Efficient End-To-End Network Topology Inference
372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks
373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network
374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
377. Temporal Portioning of Communication Resources in an Integrated Architecture
378. Hardware enhanced association rule mining with Hashing and Pipelining
379. Protection of Database Security via Collaborative Inference Detection
380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
381. Securing User-Controlled Routing Infrastructures
382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video

No comments:

Post a Comment

Show Related Post's

Related Posts Plugin for WordPress, Blogger...