1. Honynet
2. Enterprise Resource Planning
3. Automated Robot for Military System (ARMS)
4. The Complete Personal Mobile System
5. Distributed Ant Robotics
6. Electronic Transaction
7. Networks Based Performance Analysis Tool
8. Webopedia (Web Sever)
9. Voice Chating & Voice Mail
10. Network Monitoring Based on Java
11. Security Robot
12. A Network Based University Collage Co-Ordiantion Syatem
13. Internet On Demand - Web Browser And Copier
14. Anti - Viruses
15. AI Firewall
16. Steganography - an Art of Hiding Digital Information
17. Parellel Processing Thro' Job Distribution
18. Network Management Tool
19. Digital Image Processing
20. Utilities to Compressess, Decompressers and Split Merge Files
21. Load Balancing Using Process Migration in Linux
22. Web Based Proxy Sever
23. Ooline Polling
24. Microcomputer Based Robot
25. Intrusion Prevention System
26. Barcode Genration
27. Wireless Voice Over IP
28. Text to Speech Technology
29. Biometric - The Security System
30. Virtual Class Room
31. Remote PC Access in Cyber Cafe
32. Parallel Processing Application
33. Online Shopping
34. SCET Intra Net
35. Voice Organization
36. Mobotric
37. Network Monitoring
38. Image Processing Application
39. Web Based Administration of Lunix Sever
40. SCET's Invition For Online Tender
41. Graphical Representation Of Online Shares & Stocks
42. A Man-Machine Interface - A Robot
43. Automation With The Concept Of Jini
44. Net on TV Channel
45. Firewell
46. Message Management System
47. Distributed Parallel Virtual Machine
48. The Application of Stock Technology
49. Online Test
50. E-Mail Server Using SMTP
51. Smart Divece Controller
52. Medical Transcription Server
53. Intrusion Detection System & Bandwidth Limitation
54. Telecontrolled Utilities
55. Automatic Remote Backup
56. Network Vigilator
57. Ocr in Hindi
58. Network Monitoring System
59. Web Server
60. Online Library System
61. We - Crm (Custember Relationship)
62. Yarn Quality Management System
63. Opticall Character Recognition
64. Task Management System
65. Upware (Packet Analyzer, IPFW, IPRTR )
66. Network MAnagement And Internet Tools
67. Ethernet - Billing System
68. DSP Simulator
69. PC (Net) To Phone
70. Voice Controlled application
71. Jini The Distributed System
72. SAS
73. Office Automation
74. Collage Management System
75. Online Oucation
76. Online Shopping
77. Wireless Application Protocol
78. Web + Mail Crowler
79. Online Examination
80. Webified Irc (Internet Relay Chat)
2. Enterprise Resource Planning
3. Automated Robot for Military System (ARMS)
4. The Complete Personal Mobile System
5. Distributed Ant Robotics
6. Electronic Transaction
7. Networks Based Performance Analysis Tool
8. Webopedia (Web Sever)
9. Voice Chating & Voice Mail
10. Network Monitoring Based on Java
11. Security Robot
12. A Network Based University Collage Co-Ordiantion Syatem
13. Internet On Demand - Web Browser And Copier
14. Anti - Viruses
15. AI Firewall
16. Steganography - an Art of Hiding Digital Information
17. Parellel Processing Thro' Job Distribution
18. Network Management Tool
19. Digital Image Processing
20. Utilities to Compressess, Decompressers and Split Merge Files
21. Load Balancing Using Process Migration in Linux
22. Web Based Proxy Sever
23. Ooline Polling
24. Microcomputer Based Robot
25. Intrusion Prevention System
26. Barcode Genration
27. Wireless Voice Over IP
28. Text to Speech Technology
29. Biometric - The Security System
30. Virtual Class Room
31. Remote PC Access in Cyber Cafe
32. Parallel Processing Application
33. Online Shopping
34. SCET Intra Net
35. Voice Organization
36. Mobotric
37. Network Monitoring
38. Image Processing Application
39. Web Based Administration of Lunix Sever
40. SCET's Invition For Online Tender
41. Graphical Representation Of Online Shares & Stocks
42. A Man-Machine Interface - A Robot
43. Automation With The Concept Of Jini
44. Net on TV Channel
45. Firewell
46. Message Management System
47. Distributed Parallel Virtual Machine
48. The Application of Stock Technology
49. Online Test
50. E-Mail Server Using SMTP
51. Smart Divece Controller
52. Medical Transcription Server
53. Intrusion Detection System & Bandwidth Limitation
54. Telecontrolled Utilities
55. Automatic Remote Backup
56. Network Vigilator
57. Ocr in Hindi
58. Network Monitoring System
59. Web Server
60. Online Library System
61. We - Crm (Custember Relationship)
62. Yarn Quality Management System
63. Opticall Character Recognition
64. Task Management System
65. Upware (Packet Analyzer, IPFW, IPRTR )
66. Network MAnagement And Internet Tools
67. Ethernet - Billing System
68. DSP Simulator
69. PC (Net) To Phone
70. Voice Controlled application
71. Jini The Distributed System
72. SAS
73. Office Automation
74. Collage Management System
75. Online Oucation
76. Online Shopping
77. Wireless Application Protocol
78. Web + Mail Crowler
79. Online Examination
80. Webified Irc (Internet Relay Chat)
computer science project topics (big list)
1. Distributed cache updating for the Dynamic source routing protocol 2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing 3. Face Recognition Using Laplacian faces 4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm 5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings 6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks 7. Noise Reduction by Fuzzy Image Filtering 8. Online Handwritten Script Recognition 9. ODAM: An Optimized Distributed Association Rule Mining Algorithm 10. Protocol Scrubbing: Network Security Through Transparent Flow Modification 11. Workflow Mining: Discovering Process Models from Event Logs 12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App 13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks 14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP] 15. ITP: An Image Transport Protocol for the Internet 16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) 17. Incremental deployment service of Hop by hop multicast routing protocol 18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet 19. Application of BPCS steganography to wavelet compressed video 20. Neural Networks for Unicode Optical Character Recognition 21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs 22. Neural Network-Based Face Detection 23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks 24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm 25. Mobile Agents In Distributed Multimedia Database Systems 26. Image Stream Transfer Using Real-Time Transmission Protocol 27. Neural Networks for Handwritten character and Digits 28. Evaluating the Performance of Versatile RMI Approach In Java 29. Effective Packet Analyzing and Filtering System for ATM Network 30. Selective Encryption of Still Image 31. Homogenous Network Control and Implementation 32. Retrieving Files Using Content Based Searching and presenting it in Carousel view 33. Dynamic Signature Verification Using Pattern Recognition 34. Embedding in Video Steganography 35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering 36. Location Aided Routing for Mobile Ad-Hoc Networks 37. Image Rendering for Grid Technology 38. Java Network File Sharing System 39. Java Visual Editor with Compiler 40. E-Mail Server Using Multithreaded Sockets 41. Network Component for XML Migration 42. Image Water Marking and Combustion 43. Image Processing for Convolution Filters 44. Artificial intelligence network load balancing using Ant Colony Optimization 45. Image Processing for Edge Detection Filters 46. Flood Fill Algorithms in C# and GDI+ 47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM 48. Hiding messages in the Noise of a Picture 49. Windows Management Instrumentation WMI Implementation 50. Steganography for Hiding Data in Wave Audio Files 51. Automatic Dependent Surveillance-Broadcasting(Ads-B) 52. Digital Water Marking For Video Piracy Detection 53. Encryption and Decryption technique for secure communication in WLAN 54. File Encryption and Encrypted text embedding in an image 55. Integrating Speech Engine with Web Navigator 56. Intrusion Detection Prevention And Trace back Systems 57. Java Productivity Aids 58. J2ME Mail Client Server 59. Monitoring And Managing The Clusters Using JMX 60. Network Analyze 61. Neural Network for Recognition of Handwritten and Digits Backpropagation 62. Network Traffic Anomaly Detector 63. Optimal Cryptographic Technique 64. Peer to Peer Messaging System using JXTA 65. Performance Evaluation of DISTANCE Routing Algorithm in MANET 66. Public Key Validation for DNS security Extension 67. Query Routing Optimization In Sensor Communication Networks 68. Virtual Private Network 69. Voice Enabled Smart Browser 70. XML Enabled SQL SERVER 71. An efficient message digest algorithm (MD) for data security 72. Hopfield model of neural network for pattern recognition 73. Using Trigonometry and Pythagoras to Watermark an Image 74. Hiding messages in the Noise of a Picture 75. ERP for Leather Company 76. Cryptographically Using Secure Server/Client Protocol 77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM 78. Neural Networks for Handwriting Detection System Using Brain Net 79. Wireless Traffic Viewer Using J2ME 80. Video Steganography Using Mobile Simulation 81. Cryptographically Using Secure Server/Client Protocol 82. Intrusion Detection Prevention And Trace back Systems 83. Neural Network for Recognition of Handwritten and Digits 84. The File Digest program and the C++ implementation of some Message-Digest algorithms 85. File Encryption and Encrypted text embedding in an image 86. Performance Evaluation of DISTANCE Routing Algorithm in MANET 87. ERP for Leather Company 88. Online Web shop 89. Online Fashion Studios 90. ERP for Small Business 91. Bulk Billing System 92. Wireless Traffic Viewer Using J2ME 93. J2ME Mail Client Server 94. Monitoring And Managing The Clusters Using JMX 95. Peer-To-Peer Messaging 96. Mobile Information Provider 97. Mobile Bank 98. Video Steganography Using Mobile Simulation 99. Network Traffic Anomaly Detector 100. Multicast Live Video Broadcasting Using Real Time Transmission Protocol 101. Active Source Routing Protocol for Mobile AD-HOC Networks 102. Adaptive Security and Authentication for DNS System 103. Evaluating the Performance of Versatile RMI Approach In Java 104. Dynamic Control for Active Network System 105. Effective Packet Analyzing and Filtering System for ATM Network 106. Multi Server Communication In Distributed Management System 107. Reduction of Network Density for Wireless Ad-Hoc Networks 108. Messaging Service over TCP/IP in Local Area Network 109. Secure Data Hiding and Extraction Using BPCS 110. Dynamic Signature Verification Using Pattern Recognition 111. Data Minimization And Storage Using XML Enable SQL Server 112. Retrieving Files Using Content Based Search 113. Distributed Node Migration by Effective Fault Tolerance 114. Embedding in Video Steganography 115. Genetic Algorithm Based Train Simulation Using Concurrent Engineering 116. Location Aided Routing for Mobile Ad-Hoc Networks 117. Image Rendering for Grid Technology 118. Optimal Multicast Routing in Mobile Ad-Hoc Networks 119. Scalable Wireless Ad-Hoc Network Simulation using XTC 120. Homogenous Network Control and Implementation 121. Java Network File Sharing System 122. Mobile Agents In Distributed Multimedia Database Systems 123. Java Visual Editor with Compiler 124. ATM Networks for Online Monitoring System 125. Performance Evaluation of RMI 126. Network Border Patrol Preventing Congestion Collapse 127. Network Component for XML Migration 128. Shortest Node Finder In Wireless Ad-Hoc Networks 129. Preventing Network Data Congestion Collapse Using Mobile AD-HOC Networks 130. Distributed Cache Updating for the Dynamic Source Routing Protocol 131. Multi Router Traffic Monitoring System 132. Public Key Validation For DNS Security Extensions 133. A Secure Routing Protocol for mobile Ad-hoc Network 134. Retrieving Files Using Content Based Searching and presenting it in Carousel view 135. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks 136. E-Mail Server Using Multithreaded Sockets 137. Java Productivity Aids 138. Routing and Security in Mobile Ad Hoc Networks 139. Data Security in Ad hoc Networks Using Multi Path Routing 140. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks 141. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks 142. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs 143. Wavelet Based Compression and Decompression Using Steganography 144. Image Stream Transfer Using Real-Time Transmission Protocol 145. Image Water Marking and Combustion 146. Distributed cache updating for the Dynamic source routing protocol 147. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks 148. Protocol Scrubbing: Network Security Through Transparent Flow Modification 149. Incremental deployment service of Hop by hop multicast routing protocol 150. CVS Root File Changing Utility 151. C# MP3 Compressor 152. Convolution Filters 153. Database Schema Comparison Utility C# 154. Displacement filters, including swirl using GDI+ 155. Edge Detection Filters 156. Flood Fill Algorithms in C# and GDI+ 157. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM 158. Hiding binary data in HTML documents 159. Hiding Messages in MIDI Songs 160. Hiding messages in the Noise of a Picture 161. Image Processing 162. Windows Management Instrumentation WMI Implementation 163. Image Processing for Bilinear Filters and Resizing 164. Image processing for HSL color space 165. Image Processing for Per Pixel Filters using GDI+ 166. Multithreaded Chat Server 167. Reading and Writing AVI files using steganography 168. Steganography for Hiding Data in Wave Audio Files 169. TCPIP Chat client server Using C# 170. Neural Networks for Unicode Optical Character Recognition 171. Using Trigonometry and Pythagoras to Watermark an Image 172. Library Management System 173. Steganography for FTP through a Proxy Server 174. Artificial intelligence network load balancing using Ant Colony Optimization 175. ASP .Net Project Titles 176. Call Center Management System 177. Online Shopping 178. Textile Web Services 179. Auction System 180. Online Quiz 181. Online Bank 182. Online Voting System 183. Securing Image URL 184. Web Services 185. Smart Knowledge Provider 186. Online Book Shop 187. Electronic Fund Transfer 188. Work Flow Management System 189. Online Customer Care 190. Scribe Automation 191. Textile Management System 192. Sales and Purchase Management System 193. Human Resources Management System 194. Inventory Manage System 195. Job Order System 196. Advertisement Posting Website ASP .Net 197. Mobile shop shopping cart System 198. Patient Management System 199. Property Management System 200. Web Based Content Management System 201. Neural Networks for Handwriting Detection System Using Brain Net 202. Library Management system 203. Windows Management Instrument (WMI) .Net 2005 204. Wallpaper Changer Utility 205. Win Application for Word Processing 206. Screen capture Utility 207. HTML Editor 208. Image Converter 2005 209. Internet History Viewer 210. VB .Net Smart Mail Transfer Protocol 211. Windows Multi File Search utility 212. Message Digest 213. FTP Explorer 214. Convolution Filter 215. Find and Replace utility 216. Apartment Management System 217. Computerized Information Software 218. Employee Management System 219. Hotel Management System 220. Human Resources Management System 221. Inventory System 222. Membership Management System 223. Patient Care System 224. Send SMS To Cell Phone Through SMTP Mail 225. Trainee Management System 226. J2ME Project Titles 227. Wireless Traffic Viewer Using J2ME 228. J2ME Mail Client Server 229. Monitoring And Managing The Clusters Using JMX 230. Peer-To-Peer Messaging 231. Mobile Information Provider 232. Mobile Bank 233. Video Steganography Using Mobile Simulation 234. Network Traffic Anomaly Detector 235. J2EE Project Titles 236. ERP for Leather Company 237. Online Web shop 238. Online Fashion Studios 239. ERP for Small Business 240. Bulk Billing System 241. Distributed cache updating for the Dynamic source routing protocol 242. An Adaptive Programming Model for Fault-Tolerant Distributed Computing 243. Face Recognition Using Laplacian faces 244. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm 245. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings 246. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks 247. Noise Reduction by Fuzzy Image Filtering 248. Online Handwritten Script Recognition 249. ODAM: An Optimized Distributed Association Rule Mining Algorithm 250. Protocol Scrubbing: Network Security Through Transparent Flow Modification 251. Workflow Mining: Discovering Process Models from Event Logs 252. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App 253. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks 254. A Novel Secure Communication Protocol for Ad Hoc networks [SCP] 255. ITP: An Image Transport Protocol for the Internet 256. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) 257. Incremental deployment service of Hop by hop multicast routing protocol 258. Network border patrol: preventing congestion collapse and promoting fairness in the Internet 259. Application of BPCS steganography to wavelet compressed video 260. Neural Networks for Unicode Optical Character Recognition 261. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs 262. Neural Network-Based Face Detection 263. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks 264. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm 265. Mobile Agents In Distributed Multimedia Database Systems 266. Image Stream Transfer Using Real-Time Transmission Protocol 267. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks 268. Personal Authentication Using 3-D Finger Geometry 269. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks 270. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks 271. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security 272. A Memory Learning Framework for Effective Image Retrieval 273. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks 274. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-Prone Networks 275. Neural Networks for Handwritten character and Digits 276. Evaluating the Performance of Versatile RMI Approach In Java 277. Effective Packet Analyzing and Filtering System for ATM Network 278. Selective Encryption of Still Image 279. Homogenous Network Control and Implementation 280. Retrieving Files Using Content Based Searching and presenting it in Carousel view 281. Dynamic Signature Verification Using Pattern Recognition 282. Embedding in Video Steganography 283. Genetic Algorithm Based Train Simulation Using Concurrent Engineering 284. Location Aided Routing for Mobile Ad-Hoc Networks 285. Digital Water Marking For Video Piracy Detection 286. Encryption and Decryption technique for secure communication in WLAN 287. File Encryption and Encrypted text embedding in an image 288. Integrating Speech Engine with Web Navigator 289. Intrusion Detection Prevention And Trace back Systems 290. Java Productivity Aids 291. J2ME Mail Client Server 292. Monitoring And Managing The Clusters Using JMX 293. Network Analyzer 294. Flood Fill Algorithms in C# and GDI+ 295. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM 296. Hiding messages in the Noise of a Picture 297. Windows Management Instrumentation WMI Implementation 298. Steganography for Hiding Data in Wave Audio Files 299. Automatic Dependent Surveillance-Broadcasting (Ads-B) 300. Neural Network for Recognition of Handwritten and Digits Backpropagation 301. Network Traffic Anomaly Detector 302. Optimal Cryptographic Technique 303. Peer to Peer Messaging System using JXTA 304. Performance Evaluation of DISTANCE Routing Algorithm in MANET 305. Public Key Validation for DNS security Extension 306. Query Routing Optimization In Sensor Communication Networks 307. Virtual Private Network 308. Voice Enabled Smart Browser 309. XML Enabled SQL SERVER 310. An efficient message digest algorithm (MD) for data security 311. Hopfield model of neural network for pattern recognition 312. Using Trigonometry and Pythagoras to Watermark an Image 313. Hiding messages in the Noise of a Picture 314. ERP for Leather Company 315. Cryptographically Using Secure Server/Client Protocol 316. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM 317. Neural Networks for Handwriting Detection System Using Brain Net 318. Wireless Traffic Viewer Using J2ME 319. Video Steganography Using Mobile Simulation 320. Image Rendering for Grid Technology 321. Java Network File Sharing System 322. Java Visual Editor with Compiler 323. E-Mail Server Using Multithreaded Sockets 324. Network Component for XML Migration 325. Image Water Marking and Combustion 326. Image Processing for Convolution Filters 327. Artificial intelligence network load balancing using Ant Colony Optimization 328. Image Processing for Edge Detection Filters 329. Mobile Information Provider 330. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case 331. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks 332. QUIVER: Consistent Object Sharing For Edge Services 333. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing 334. Geometric Approach to Improving Active Packet Loss Measurement 335. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm 336. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks 337. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers 338. Watermarking Relational Databases Using Optimization Based Techniques 339. Active Queue Management for Fair Resource Allocation in Wireless Networks 340. Benefit Based Data Caching In Ad Hoc Networks 341. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks 342. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction 343. Two Techniques for Fast Computation of Constrained Shortest Paths 344. Controlling IP Spoofing Through Inter Domain Packet Filters 345. A New Model for Dissemination of XML Content 346. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements 347. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision 348. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 349. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light 350. Probabilistic Packet Marking For Large Scale IP Trace Back 351. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization 352. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns 353. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems 354. Truth Discovery with Multiple Conflicting Information Providers on Web 355. Location Based Spatial Query Processing In Wireless Broadcast Environments 356. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks 357. Modeling & Automated Containment of Worms 358. Security In Large Networks Using Mediator Protocols 359. Designing Less - Structured P2p Systems for the Expected High Churn 360. Estimation of Defects Based On Defect Decay Model: ED3M 361. On Guaranteed Smooth Switching For Buffered Crossbar Switches 362. Active Learning Methods for Interactive Image Retrieval 363. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach 364. Efficient Resource Allocation For Wireless Multicast 365. Localized Sensor Area Coverage With Low Communication Overhead 366. Trustworthy Computing Under Resource Constraints With The Down Policy 367. Credit Card Fraud Detection Using Hidden Markov Models 368. An Efficient Association Rule Mining Algorithm In Distributed Databases 369. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 370. COACS: Co - Operative and adaptive caching system for MANETs 371. Scalable and Efficient End-To-End Network Topology Inference 372. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks 373. OCGRR: A New Scheduling Algorithm for Differentiated Services Network 374. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries 375. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data 376. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 377. Temporal Portioning of Communication Resources in an Integrated Architecture 378. Hardware enhanced association rule mining with Hashing and Pipelining 379. Protection of Database Security via Collaborative Inference Detection 380. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 381. Securing User-Controlled Routing Infrastructures 382. Online Index Recommendations for High-Dimensional Databases Using Query Workloads 383. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video JAva Base Project List 1. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE 2. A Reputation Based Trust Model for Peer to Peer eCommerce Communities “ IEEE 3. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE 4. Mobile Banking Design & Implementation - IEEE 5. Retrieving Files using Content Based Searching and displaying them in Carousel View “ IEEE 6. Distributed Data mining in Credit Card Fraud Detection Analysis “ IEEE 7. E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management “ IEEE 8. Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader 9. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME 10. VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP 11. Authenticating Network Attached Storage - IEEE 12. Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET™S - IEEE 13. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE 14. Digital Image Processing with Multi Domain Approach “ IEEE 15. Static Image Hand Gesture Recognition using Neural Networks 16. CAC “ Connection Admission Control using ATM Networks Implementation “ IEEE 17. Distributed Component Router based Supply Chain Management System “ SCM “ IEEE 18. Intelli WAP System Implementation / WAP based information Retrieval System 19. Proxy Server - Design and Implementation 20. Public Key Validation for DNS Security Extensions “ Domain Naming Server 21. E-Recruitment System - Dynamic Online Professional Recruitment & Management System 22. Secure Password-Based Protocol for Downloading a Private Key - IEEE 23. Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE 24. Network Security System in DNS using AD-HOC Networks “ IEEE 25. Secure Optimal Cyclic Cryptographic System “ IEEE 26. Multithreaded Peer to Peer Communication using Distributed Frameworks“ IEEE 27. Building Intelligent Shopping Assistant using Data mining technique for Web Services “ IEEE 28. Network Analyzer & Network Monitoring Tool using SNMP 29. Remote Computing using Thin Clients 30. VVoIP “ Voice with Video Over IP Networks 31. Dynamic Character & Pattern Recognition using Neural Networks 32. Online Handwritten Script Recognition - IEEE 33. Towards multi model interfaces for intrusion detection - IEEE 34. Proxy Server - A Smart Sharing System with Fire wall Protection, Customized Firewall for internet security & inter-network traffic gateway “ IEEE 35. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE 36. Network Border Patrol for Congestion Collapse Preventing System “ IEEE 37. Defect Tracking Tool - Enterprise Project and Defect Tracking System “ IEEE 38. Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification 39. Multi Router Traffic Monitor Implementation 40. Homogeneous Networks & Control Implementation 41. A/I Net A Network that Integrates ATM and IP - IEEE 42. E“Secure Transaction “ Design & Implementation “ IEEE 43. Image Compression and Analysis with MSE & PSNR Technique - IEEE 44. Crypt kit “ A real time cryptographic system for security over the networks - IEEE 45. Efficient Contiguous Data & Video Streamer with Buffer Management 46. Distributed Component Router Based CRM “ Customer Relationship Management“ IEEE 47. Network Traffic, Packet Analyzer and Sniffer 48. Digital Steganography: Hiding Data within Data 49. Integrated Development Environment using JSWING “ IDE JSWING 50. ERP Application “ integrated Enterprise Solutions with Strategic advantages 51. Grid information Retrieval System 52. Network Packer Sniffer Implementation 53. Online Issue Tracking - Project Management Solutions 54. E-HealthCare - Distributed HealthCare and A Strategic Management System 55. Data mining implementation for Credit Cards Application Processing System 56. Dynamic University Linking & Data integrity Maintenance 57. E-Sales Order Processing System 58. RTF to XML Converter 59. Material Forecasting and Management Solution 60. Effective & Efficient Freight Management System 61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data 62. XML Migration - Implementation for XML format from Database System 63. Shares & Stock Management system “ Portfolio Manager Implementation 64. Online Task Management with fully featured intelli System 65. Vertical Market Information Providing System Implementation 66. Insertion of Links of navigation into the Web Pages 67. Inter Office Messaging System “ IOMS, Office Automation System 68. Web based Matrimonial Services, A Desi Matrimony web Portal 69. Online Auction & Bidding System With Multi Brand & Product Selection 70. Online Body Shopping System with Auto Mailing feature 71. Online Job Consultancy Services 72. Net Banking Services & Solutions 73. Online Web Shop Mall - Web Shop Site 74. Intelli Shopping Cart & Assistant System 75. Online VRS - Vehicle Reservation System 76. Distributed Web Service for On-Line Coursework Submission 77. Document Archival Management System “ Electronic Archival Design 78. Remote Electricity Billing System Automation & Implementation “ EJB 79. Dynamic College information System & Data integrity Maintenance 80. Computerized system for Extracting Abstract from the given source document, Abstract solutions 81. eCareer & Consultancy Service Online 82. eGovernance Design & Implementation System 83. EAI Approach “ Implementation of EAI in Hotel Management System 84. Online Event Management with featured intelli system 85. Online Hospital info System with interactive Services & Universal Medical Portal with Adviser 86. Human Resource Management Solutions (HRMS) 87. Online Web based Complete Recruitment System 88. Distributed Database System for online Shopping & Store 89. Web based Distributor Information Providing Services 90. Insurance System, Online Insurance Solutions Provider 91. Integrating Data and Voice Networks - VoIP 92. Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion 93. Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE 94. Mobile based Network Monitoring System 95. System to Mobile Communication 96. Video Transmission using SIP - IEEE 97. Web based Chatting - Multi User Voice Chat 98. Network Traffic Anomaly Detector “ IEEE 99. SIP - Session Initialization Protocol, Chatting 100. Monitoring & Managing the Clusters using JMX “ IEEE 101. Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach 102. Peer-to-Peer implementation Multithreaded Technology with tuple space 103. Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE 104. P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE 105. Secured Network manager 106. Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time “ IEEE 107. Scalable Wireless Ad-Hoc Network Simulation using XTC “ IEEE 108. Voice Web Browser Implementation 109. Network Analyzer, Design & Implementation 110. Routing Simulator - An Efficient end to end Packet Delivery system 111. Remote Viewer “ A Remote Desktop viewer for an Intranet Environment 112. Remote City Mapping Implementation using J2ME 113. Mobile Clients Support GUI Systems design 114. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices 115. Bluetooth equipped mobile phones to support synchronous interaction with public displays 116. Bluetooth based Mobile Phone Photo Browser 117. IMAP - Internet Mail Access Protocol using Internet Engineering Task Force 118. Online PDA “ Primary Domain Controller System 119. Java Virtual Pad - RFB protocol based Desktop sharing exclusively or on request 120. Portable and Generic tool for Web Applications 121. Network Document Management & Versioning System 122. Dynamic Server Replication System 123. Instant Smart Messenger System 124. Multi Threaded implementation with Pull / Push Technology 125. Tool for Performance Profiling of Web Sites 126. Network Time Tracker system 127. Workflow based Complaint Management System 128. Project Scrutinizer “ Efficient Project Tracking System 129. Project Tracking & It Portfolio Management System 130. JSP based Shopping Cart Implementation 131. ERP & CRM, An Effective implementation of ERP with CRM Solutions 132. Financial Accounts - Integrated Financial Accounting Solutions 133. Multi Language Mailing system “ Design & implementation 134. uPortal “ University Portal & Education Grid information Service Provider | 135. AD HOC NETWORK BASED PROJECTS 136. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE 137. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE 138. Network Security System in DNS using AD-HOC Networks “ IEEE 139. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE 140. J2ME PROJECTS 141. Mobile Banking Design & Implementation - IEEE 142. Intelli WAP System Implementation / WAP based information Retrieval System 143. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME 144. Remote City Mapping Implementation using J2ME 145. Mobile Clients Support GUI Systems design 146. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices 147. Bluetooth equipped mobile phones to support synchronous interaction with public displays 148. Bluetooth based Mobile Phone Photo Browser 149. Mobile Info Service Provider “ Online Data & information Access System 150. IMAGE PROCESSING PROJECTS 151. Digital Image Processing with Multi Domain Approach “ IEEE 152. Static Image Hand Gesture Recognition using Neural Networks 153. Digital Signature Verification using Artificial Neural Networks 154. Dynamic Character & Pattern Recognition using Neural Networks 155. Image Compression and Analysis with MSE & PSNR Technique “ IEEE 156. Online Handwritten Script Recognition “ IEEE 157. COMMUNICATION PROJECTS 158. ? System to Mobile Communication 159. ? Video Transmission using SIP - IEEE 160. ? Efficient Contiguous Data & Video Streamer with Buffer Management 161. ? Web based Chatting - Multi User Voice Chat 162. ? SIP - Session Initialization Protocol, Chatting 163. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP 164. ? VVoIP “ Voice with Video Over IP Networks 165. SECURITY PROJECTS 166. ? Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANET™S - IEEE 167. ? Crypt kit “ A real time cryptographic system for security over the networks - IEEE 168. ? Secure Optimal Cyclic Cryptographic System 169. ? JSAFE - Rijndael Algorithm based Encryption & Decryption 170. ? Secured Network manager 171. ? E“Secure Transaction “ Design & Implementation 172. ? Fire wall - Customized Firewall for internet security & inter-network traffic gateway 173. ? Secure Password-Based Protocol for Downloading a Private Key 174. NETWORKING PROJECTS 175. ? A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE 176. ? Adaptive Coding and Packet Rate for TCP - Friendly VoIP Flows - IEEE 177. ? Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion 178. ? Authenticating Network Attached Storage - IEEE 179. ? CAC “ Connection Admission Control using ATM Networks Implementation 180. ? Distributed Cache Updating for Dynamic Source Routing Protocol - IEEE 181. ? Efficient Contiguous Data & Video Streamer with Buffer Management 182. ? Dynamic Server Replication System 183. ? Mobile based Network Monitoring System 184. ? Monitoring & Managing the Clusters using JMX “ IEEE 185. ? Multi Router Traffic Monitor Implementation 186. ? Grid information Retrieval System 187. ? Homogeneous Networks & Control Implementation 188. ? Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE 189. ? Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach 190. ? Multithreaded Peer to Peer Communication using Distributed Frameworks 191. ? Network Analyzer & Network Monitoring Tool using SNMP 192. ? Network Border Patrol for Congestion Collapse Preventing System 193. ? Network Packer Sniffer Implementation 194. ? Network Proctor & Action Coordinator - The Network Monitoring Daemon “ IEEE 195. ? Network Security System in DNS using AD-HOC Networks “ IEEE 196. ? Network Traffic Anomaly Detector “ IEEE 197. ? Network Traffic, Packet Analyzer and Sniffer 198. ? Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE 199. ? P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE 200. ? Peer-to-Peer implementation Multithreaded Technology with tuple space 201. ? Performance Evaluation of RMI - Latency, Round Trip Time & Packets Per Unit time “ IEEE 202. ? Public Key Validation for DNS Security Extensions “ Domain Naming Server 203. ? Remote Computing using Thin Clients 204. ? Retrieving Files using Content Based Searching and Displaying them in Carousel View 205. ? Routing Simulator - An Efficient end to end Packet Delivery system 206. ? Secured Network manager 207. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP 208. ? XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE 209. Modern English Spell Checking tool Design & Implementation 210. Web Based Bug Tracking System Implementation 211. E-Mail & SMS Assistant “ Design & Implementation 212. Mobile Agent Software for Payroll Processing System 213. J2EE based Quick Car Rental Services Implementation 214. Application Installer 215. Online ATM Banking & online transactions 216. On-Line Book store with online Shopping cart 217. Proxy Server - TransProxy 218. Career tracer - communicator between job seekers and job providers 219. J Chat “ A Chatting System over the Internet or local networks 220. Client FTP Frame 221. Online Airline Reservation Web portal for Traveling service provider 222. Computer Resource Management System (CRMS) 223. Content management systems (CMS) for University & Education portal 224. Credit card system - web-based system facilitates on line operations 225. Control System for the Maintenance of Computers 226. Web based Customer Support System 227. Distributed Channel Management System 228. Digital Signatures System Design & Implementation 229. Distance Learning System Implementation 230. Online E Banking provides online transactions 231. E-Boutique - web portal design and implementation 232. eSearch - Web based search engine 233. Employee Training Tracking System 234. E-Learning - web portal design and implementation 235. E-Music web-based design system provides online Music 236. Web Enabled Automated Manufacturing System - WEAMS 237. Fire wall - Customized Firewall for internet security & inter-network traffic gateway 238. File Transfer Protocol - FTP Implementation 239. Hospital Management system 240. HR Consultancy and Applicant Database Management with XML 241. Intranet Mailing System design and implementation 242. Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions 243. Web based Online Library System 244. Web based Online Book Store 245. Jobs.com “ A Service Provider for Employer & Employee 246. JChart for complex business & scientific charts 247. JSAFE - Rijndael Algorithm based Encryption & Decryption 248. Loyalty Business Tracker Application System 249. Mobile Clients Support GUI Systems design 250. Net Banking Services Design & Implementation 251. Net Conference Design & Implementation 252. Design & Implementation of Online Bidding & Auction 253. Online Resume Mart System Design 254. Online Tutorials - global forum for educators and students 255. JEDITOR - Customized Java Editor 256. eTutor - Online Tutorial, revolutionizing the tutoring industry 257. Pharmaceutical Distribution Automation Software system 258. Remote Desktop Capture system 259. eSearch - A Search Engine Design & Implementation 260. SMTP based JAVA MAIL CLIENT Graphical User Interface system 261. Java based Spam Filter implementation 262. Telecom Inventory maintenance and services Application with error tracking 263. Project based Time & efforts Tracking System Implementation 264. Training Organization Management System Implementation 265. Web Testing Tool Application - Designed to test & measure performance 266. Web based Job Site Management system “ A Exclusive Job Portal with Mega features 267. Employee Profile Management System “ An Effective Employee Management Resource 268. Development of Web enabled Online, Dynamic ATM Card Management System 269. Time Synchronization system using java 270. ATM Card & CMS application Back Office Management 271. Honey Pots “ A Security System to Identify Black Hat Community in the Networks 272. Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP) 273. Bandwidth Congestion Control using Authentication Service for Automatic and Dynamic Reconfiguration System 274. Network Load Balancing and Redistribution of the Traffic Over the Networks using Grid Computing System 275. Media Streaming in Mobile using J2ME Toolkit 276. Efficient Network Routing Protocol with Effective Data Transfer without Packet Loss Over the ADHOC Networks 277. Data Communication and File Transferring using Decreased Latency and Block Tracker 278. Authentication of Digital Images by Encryption and Decryption with Primary Key Implementation using LSB Algorithm and Steganography 279. Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol 280. Implementation of Security Kernel and Firewall using Java 281. Media streaming using J2ME 282. Unified Interface for Multiple Naming Service using JNDI 283. Multiplex SMS relay over GSM using AT commands 284. Zero Installation of Client DB Driver using RPC 285. Integrated Data Persistence & Synchronization in PDA™s 286. Distributed Cache Updating for the Dynamic Source Routing Protocol 287. Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic Peer Groups 288. An Agent-Based Testing for Web Application 289. TCP-LP: Low Priority Service via End“Point Congestion Control 290. On Self-Fish Routing in Internet Like Environments 291. Schema based Enterprise Charting & Reporting for Desktops 292. ER “ Schema Analyzer with Data Streaming 293. Data Hiding in Audio Files with PBE Encryption 294. Duplex Messaging for Enterprise Systems 295. Integrated Mail Transfer Agents using JAF 296. Designing Test Automation System using Native System Input Events 297. Components Framework for Developer Network using MVC Pattern 298. Asynchronous Server Interaction using AJAX and XML 299. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks 300. An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management 301. An Anti-phishing Strategy Based on Visual Similarity Assessment 302. News Feed Syndication Generation over Heterogeneous Networks 303. Enterprise Mailing System validation with DNS query using MX Records 304. Component based Architecture for WAP Compliant Transactional Services 305. On Demand Audio / Video Streaming and rendering Over IP using UDP 306. Proactive Port Scanning for Secure Computing Environment 307. DDE Thin Client Midlet for Limited Devices using Java Communication 308. Denial of Service against the Domain Name System 309. Digital Rights Management (DRM) using SOAP 310. Multithreaded Networked Data Injector & Extraction Server & Client for Cryptographic Services 311. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks 312. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers 313. Anteater-A Service Oriented Architecture for High Performance Data Mining 314. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates 315. Cross-Layer Optimization in TCP/IP networks 316. Data Security in Ad hoc Networks Using Multipath Routing 317. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server 318. Distributed Token Circulation in Mobile Ad Hoc Networks 319. Versioning Control System using JAVA 320. Virtual Private Network using JAVA 321. Voice based XML Phone Survey System 322. VSAT Simulation and Smart Cache Loader 323. WAP based information Retrieval System 324. WAP based Route Tracing and Mailing 325. WAP Enabled Greeting Card System - WAP Enabled Device User to send greeting card to other WAP Enabled Devices 326. Web Enabled Supply Chain Management 327. Wireless Application Programming with J2ME and Bluetooth 328. Workflow based Complaint Management System 329. XML Parser for E“Mail Resumes / Resume Tracking & allotment using XML 330. Instant Messaging and Presence Technology for College Campuses 331. Intrusion Detection in Wireless Ad-hoc Network 332. Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols 333. Fine Grained Layered Multicast using STAIR 334. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks 335. Network-Wide Prediction of BGP Routes 336. NIRA: A New Inter-Domain Routing Architecture 337. Online Detection and Prevention of Phishing Attacks 338. OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET 339. A Natural Language-Based Interface for Querying a Video Database 340. A Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc Networks 341. A Secure Routing Protocol for mobile Ad-hoc Network 342. A Trustworthy Mobile Agent Infrastructure for Network Management 343. A wireless distributed intrusion detection system and a new attack model 344. Allocating Applications in Distributed Computing using JINI 345. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs 346. Routing and Security in Mobile Ad Hoc Networks 347. Scripting JAX-WS 348. Simple a Pre-Provisioning Scheme to Enable Fast Restoration 349. Site-based Mapping for parallel proxy servers with fewer TCP connections 350. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense 351. Watermark Based Digital Rights Management 352. A Semantic Web-Based Approach to Knowledge Management for Grid Applications 353. A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection 354. Context Oriented Search Engine with Web Crawler 355. Converting RTF into XML using the TEI Lite DTD 356. CRM based Sales of Fleet & Services Management 357. Data and Video Streaming System 358. Data Encryption and Compression System with Optimization 359. Dealership Management System - Dealers information & Dealings Process Manager 360. Defect Tracking Tool - Enterprise Project and Defect Tracking System 361. Design & Development of a Distributed, Scalable File Sharing & Access System with Security 362. Digital Image Processing “ Frequency Domain 363. Digital Water Marking for Video Piracy Detection 364. Distributed Database System for online Shopping & Store 365. Distributed File Sharing System for Peer to Peer Network 366. E-Commerce Shopping cart for B2B Implementation 367. EJB Implementation Of Distributed Online Stock Maintenance and Trading 368. Graphical Network Browser 369. Heterogeneous Networks Control and Implementation 370. Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and Administration in IP Network 371. Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments 372. Patient Keeper: Medical Application on mobile Phone 373. VPersonalized E-mail Management at Network Edges 374. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval 375. XML Data Stores: Emerging Practices 376. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks 377. Image File compression & Transmission across the Network by MDA (Message Digest Algorithm) 378. Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE) 379. Media Gateway Control Protocol Network 380. Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm 381. Route Reservation in Ad Hoc Wireless Networks 382. Pre Active Circulated Cache Updating using on Demand Routing Protocol 383. Dynamic Load Balancing in Distributed Systems in The Presence Of Delays “ A Regeneration Theory Approach 384. A Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed Environments 385. An Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS 386. A Fully Distributed Proactively Secure Threshold Multi signature Scheme 387. Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes 388. A Hierarchical Modeling and Analysis for Grid Service Reliability 389. Secure Data Hiding and Extractions using BPCS 390. SLA-Driven Clustering of QOS Aware Application Servers 391. User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony 392. Advanced Host Monitor Enterprise 393. Advanced instant Messenger & Message Broadcasting 394. Bug Tracking System - Comprehensive Bug Tracking & Change Management 395. Call Centre Management System 396. CALTOOL “ Computer Aided Learning Tool 397. Cargo Tracking System Design & implementation 398. Complete email system with an email server and an email client 399. Image Compression and Decompression using Huffman™s 400. Image Manipulation for Face Recognition 401. Implementation of Broadcast Messaging System using Multi Threading 402. Asset Management Solution (AMS) 403. Implementation of Packet Filtering Firewall in Linux Systems 404. Implementation of Peer-to-Peer Communication System with a Centralized Name Server in Linux Network 405. Implementation of Secured & Encrypted Data Transmission over the Web 406. Implementation of Wireless Application Protocol Gateway in Mobile Network 407. Implementation of Wireless Communication Gateway for PC To Mobile Network Route using Internet Protocol 408. Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support 409. Intelli Mobile Banking System Design & Implementation 410. Investigation and Analysis of Packets Transformation in an Ethernet Network System 411. Java Grid Using Grid Computing System 412. Java Network Flow Analyzer 413. Java Network Monitor / Java Network Browser 414. Java RMI-based application which manages load balancing on heterogeneous clusters 415. Java SMTP, POP, Web Email Server 416. Java-to-XML Data Binding tool 417. Job Portal Implementation with intelli power features 418. JSP - Personal information Manager 419. Logistics - freight forwarding software solution logistics 420. Multimedia Messaging Service - MMS 421. Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems 422. Net Monitoring and Management using SNMP 423. Network Administrators to Monitor VPN and SSL Connections 424. Network Component Development for XML Document Migration 425. Neural Network based Character Pattern Identification System 426. On-Line Analytical Processing - Maintenance of Data collection & Reports 427. Online Auction with featured shopping cart 428. Online Enterprise Resources Planning “ Web Enabled ERP implementation with Distributed Database system 429. Online Health Care Management Solutions 430. Online Distributed Human resources Management System 431. Online Portfolio Manager “ Equity Trading & Mutual Funds management 432. Online web enabled Bug Tracking System 433. Online Web Shop Mall - Web Shop Site 434. Online Workflow Service Manager & Automation 435. SNMP Trap Gateway - Network Management 436. Software Routing “ Packet Filtering & Capturing 437. Thin Client Network Implementation 438. Ultimate Online Jobsite with intelli Search engine 439. Professional time and task management tool 440. Public-Key Cryptography Extensions into Kerberos 441. RAT (Remote Assistance Tool) is a Java Application 442. Resource Planning Tool Design & Implementation (RPT) 443. Sales force Automation Implemenation 444. Sales Order Processing and invoicing (SOPI) 445. Secure (RSA) Chat Server 446. Secure Electronic Transaction System 447. Secure Web Cache Proxy Server 448. Digital Image Processing “ Time Domain 449. Secure web conferencing on any platform using Java 450. Secured Network Manager & Tracker using JMX 451. SFTP Server - Synchronous File Transfer Communicator 452. Smart Network Access Using Mobile Bluetooth, J2ME |
No comments:
Post a Comment