IEEE Projects

13
1. Mitigation of Control Channel Jamming under Node Capture Attacks Java/2009 2. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Java/2009 3. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments Java/2009 4. Security Analysis of the SASI Protocol Java/2009 5. Capturing Router Congestion and Delay Java/2009 6. SIMPS Using Sociology for Personal Mobility Java/2009 7. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Java/2009 8. Scalable Routing in Cyclic Mobile Networks Java/2009 9. Flexible Rollback Recovery in Dynami Heterogeneous Grid Computing Java/2009 10. Monitoring the Application-Layer DDoS Attacks for Popular Websites Java/2009 11. Multiple Routing Configurations for Fast IP Network Recovery Java/2009 12. The Effectiveness of Checksums for Embedded Control Networks Java/2009 13. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Java/2009 14. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks Java/2009 15. A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions Java/2009 16. Multipath Dissemination in Regular Mesh Topologies Java/2009 17. Detecting Malicious Packet Losses Java/2009 18. Dynamic Routing with Security Considerations Java/2009 19. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Java/2009 20. Java/2009 21. Route Stability in MANETs under the Random Direction Mobility Model .Net/2009 22. On the Security of Route Discovery in MANETs .Net/2009 23. Dynamics of Multiple-Seller and Multiple Buyer Spectrum Trading in Cognitive Radio Networks A GamenTheoretic Modeling Approach .Net/2009 24. RandomCast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks .Net/2009 25. A Gen2 Based RFID Authentication Protocol for Security and Privacy .Net/2009 26. Greedy Routing with Anti Void Traversal for Wireless Sensor Networks .Net/2009 27. On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint .Net/2009 28. Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking .Net/2009 29. Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period .Net/2009 30. An Integrated Approach to Sensor Role Selection .Net/2009

Transcript of IEEE Projects

Page 1: IEEE Projects

1. Mitigation of Control Channel Jamming under Node Capture Attacks Java/2009

2. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Java/2009

3. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments Java/2009

4. Security Analysis of the SASI Protocol Java/2009

5. Capturing Router Congestion and Delay Java/2009

6. SIMPS Using Sociology for Personal Mobility Java/2009

7. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Java/2009

8. Scalable Routing in Cyclic Mobile Networks Java/2009

9. Flexible Rollback Recovery in Dynami Heterogeneous Grid Computing Java/2009

10. Monitoring the Application-Layer DDoS Attacks for Popular Websites Java/2009

11. Multiple Routing Configurations for Fast IP Network Recovery Java/2009

12. The Effectiveness of Checksums for Embedded Control Networks Java/2009

13. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Java/2009

14. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks Java/2009

15. A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions Java/2009

16. Multipath Dissemination in Regular Mesh Topologies Java/2009

17. Detecting Malicious Packet Losses Java/2009

18. Dynamic Routing with Security Considerations Java/2009

19. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Java/2009

20. Java/2009

21. Route Stability in MANETs under the Random Direction Mobility Model .Net/2009

22. On the Security of Route Discovery in MANETs .Net/2009

23. Dynamics of Multiple-Seller and Multiple Buyer Spectrum Trading in Cognitive Radio Networks A

GamenTheoretic Modeling Approach

.Net/2009

24. RandomCast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks .Net/2009

25. A Gen2 Based RFID Authentication Protocol for Security and Privacy .Net/2009

26. Greedy Routing with Anti Void Traversal for Wireless Sensor Networks .Net/2009

27. On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and

Coverage Constraint

.Net/2009

28. Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target

Tracking

.Net/2009

29. Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period .Net/2009

30. An Integrated Approach to Sensor Role Selection .Net/2009

31. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks .Net/2009

32. Biased Random Walks in Uniform Wireless Networks .Net/2009

33. Secure and Policy-Compliant Source Routing .Net/2009

34. Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications .Net/2009

35. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks .Net/2009

36. Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services .Net/2009

37. Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag .Net/2009

Page 2: IEEE Projects

Identification

38. Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-Board Processing Capabilities .Net/2009

39. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows .Net/2009

40. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks .Net/2009

41. Cell Breathing Techniques for Load Balancing in Wireless LANs .Net/2009

1. Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case 2008/ .Net

2. Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks 2008/Java

3. QUIVER: Consistent Object Sharing For Edge Services 2008/Java

4. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing 2008/Java

5. Geometric Approach to Improving Active Packet Loss Measurement 2008/Java

6. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm 2008/Java

7. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks 2008/Java

8. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers 2008/ .Net

9. Watermarking Relational Databases Using Optimization Based Techniques 2008/ .Net

10. Active Queue Management for Fair Resource Allocation in Wireless Networks 2008/Java

11. Benefit Based Data Caching In Ad Hoc Networks 2008/Java

12. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks 2008/Java

13. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction 2008/Java

14. Two Techniques for Fast Computation of Constrained Shortest Paths 2008/Java

15. Controlling IP Spoofing Through Inter Domain Packet Filters 2008/Java

16. A New Model for Dissemination of XML Content 2008/ .Net

17. Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements 2008/ .Net

18. Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision 2008/ .Net

19. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 2008/ .Net

20. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light 2008/ .Net

21. Probabilistic Packet Marking For Large Scale IP Trace Back 2008/ .Net

22. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization 2008/Java

23. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns 2008/J2EE

24. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems 2008/Java

25. Truth Discovery with Multiple Conflicting Information Providers on Web 2008/Java

26. Location Based Spatial Query Processing In Wireless Broadcast Environments 2008/Java

27. Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks 2008/Java

28. Modeling & Automated Containment of Worms 2008/Java

29. Security In Large Networks Using Mediator Protocols 2008/Java

30. Designing Less - Structured P2p Systems for the Expected High Churn 2008/Java

31. Estimation of Defects Based On Defect Decay Model: ED3M 2008/ .Net

32. On Guaranteed Smooth Switching For Buffered Crossbar Switches 2008/ .Net

33. Active Learning Methods for Interactive Image Retrieval 2008/ .Net

34. Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach

2008/ .Net

35. Efficient Resource Allocation For Wireless Multicast 2008/ .Net

Page 3: IEEE Projects

36. Localized Sensor Area Coverage With Low Communication Overhead 2008/ .Net

37. Trustworthy Computing Under Resource Constraints With The Down Policy 2008/ .Net

38. Credit Card Fraud Detection Using Hidden Markov Models 2008/ .Net

39. An Efficient Association Rule Mining Algorithm In Distributed Databases 2008/Java

40. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 2008/Java

41. COACS: Co - Operative and adaptive caching system for MANETs 2008/Java

42. Scalable and Efficient End-To-End Network Topology Inference 2008/Java

43. Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks

2007/ .Net

44. OCGRR: A New Scheduling Algorithm for Differentiated Services Network 2007/ .Net

45. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries 2008/Java

46. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data 2008/ .Net

47. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 2008/ .Net

48. Temporal Portioning of Communication Resources in an Integrated Architecture 2008/ .Net

49. Hardware enhanced association rule mining with Hashing and Pipelining 2008/ .Net

50. Protection of Database Security via Collaborative Inference Detection 2008/Java

51. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 2008/Java

52. Securing User-Controlled Routing Infrastructures 2008/Java

53. Online Index Recommendations for High-Dimensional Databases Using Query Workloads 2008/Java

54. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video 2008/ .Net

1. Distributed cache updating for the Dynamic source routing protocol Java/2006

2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing Java/2007

3. Face Recognition Using Laplacian faces Java/2005

4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Java/2005

5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings . Net/2006

6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Java/2004

7. Noise Reduction by Fuzzy Image Filtering Java/2006

8. Online Handwritten Script Recognition Java/2004

9. ODAM: An Optimized Distributed Association Rule Mining Algorithm Java/2004

10. Protocol Scrubbing: Network Security Through Transparent Flow Modification Java/2004

11. Workflow Mining: Discovering Process Models from Event Logs . Net/2004

12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App Java/2004

13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks Java/2006

14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP] Java/2006

15. ITP: An Image Transport Protocol for the Internet Java/2002

16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) J2EE/2007

17. Incremental deployment service of Hop by hop multicast routing protocol Java/2006

18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet Java/2004

19. Application of BPCS steganography to wavelet compressed video Java/2004

20. Neural Networks for Unicode Optical Character Recognition . Net/2004

21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs Java/2007

Page 4: IEEE Projects

22. Neural Network-Based Face Detection VC++/2005

23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks Java/2004

24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Java/2005

25. Mobile Agents In Distributed Multimedia Database Systems  Java/2004

26. Image Stream Transfer Using Real-Time Transmission Protocol  Java/2006

27. Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks Java/2005

28. Personal Authentication Using 3-D Finger Geometry Java/2006

29. Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks Java/2006

30. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks . Net/2005

31. Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security Java//2006

32. A Memory Learning Framework for Effective Image Retrieval Java/2005

34. High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks Java/2005

35. GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over Error-

Prone NetworksJava/2005

36. Neural Networks for Handwritten character and Digits VC++/2003

37. Evaluating the Performance of Versatile RMI Approach In Java Java

38. Effective Packet Analyzing and Filtering System for ATM Network Java

39. Selective Encryption of Still Image VB, C,Java

40. Homogenous Network Control and Implementation Java

41. Retrieving Files Using Content Based Searching and presenting it in Carousel view Java

42. Dynamic Signature Verification Using Pattern Recognition Java

43. Embedding in Video Steganography  Java

44. Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java

45. Location Aided Routing for Mobile Ad-Hoc Networks Java

46. Digital Water Marking For Video Piracy Detection C++

47. Encryption and Decryption technique for secure communication in WLAN VB, C

48. File Encryption and Encrypted text embedding in an image VC++

49. Integrating Speech Engine with Web Navigator Java

50. Intrusion Detection Prevention And Trace back Systems VB, VC++

51. Java Productivity Aids Java

52. J2ME Mail Client Server J2ME

53. Monitoring And Managing The Clusters Using JMX J2ME

54. Network Analyzer J2ME

55. Flood Fill Algorithms in C# and GDI+ C# .Net

56. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# .Net

57. Hiding messages in the Noise of a Picture C# .Net

58. Windows Management Instrumentation WMI Implementation C# .Net

59. Steganography for Hiding Data in Wave Audio Files C# .Net

60. Automatic Dependent Surveillance-Broadcasting (Ads-B) VC++

Page 5: IEEE Projects

61. Neural Network for Recognition of Handwritten and Digits Backpropagation VC++

62. Network Traffic Anomaly Detector J2ME

63. Optimal Cryptographic Technique C++

64. Peer to Peer Messaging System using JXTA J2ME

65. Performance Evaluation of DISTANCE Routing Algorithm in MANET VC++

66. Public Key Validation for DNS security Extension Java

67. Query Routing Optimization In Sensor Communication Networks C,C++

68. Virtual Private Network C# .Net

69. Voice Enabled Smart Browser Java

70. XML Enabled SQL SERVER Java

71. An efficient message digest algorithm (MD) for data security VC++

72. Hopfield model of neural network for pattern recognition C# .Net

73. Using Trigonometry and Pythagoras to Watermark an Image C# .Net

74. Hiding messages in the Noise of a Picture C# .Net

75. ERP for Leather Company J2EE

76. Cryptographically Using Secure Server/Client Protocol VC++

77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# .Net

78. Neural Networks for Handwriting Detection System Using Brain Net VB .Net

79. Wireless Traffic Viewer Using J2ME J2ME

80. Video Steganography Using Mobile Simulation J2ME

81. Image Rendering for Grid Technology Java

82. Java Network File Sharing System Java

83. Java Visual Editor with Compiler Java

84. E-Mail Server Using Multithreaded Sockets Java

85. Network Component for XML Migration Java

86. Image Water Marking and Combustion Java

87. Image Processing for Convolution Filters C# .Net

88. Artificial intelligence network load balancing using Ant Colony Optimization C# .Net

89. Image Processing for Edge Detection Filters C# .Net

90. Mobile Information Provider J2ME

1. CVS Root File Changing Utility C# .Net

2. C# MP3 Compressor C# .Net

3. Convolution Filters C# .Net

4. Database Schema Comparison Utility C# C# .Net

5. Displacement filters, including swirl  using GDI+ C# .Net

6. Edge Detection Filters C# .Net

7. Flood Fill Algorithms in C# and GDI+ C# .Net

8. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# .Net

9. Hiding binary data in HTML documents C# .Net

10. Hiding Messages in MIDI Songs C# .Net

Page 6: IEEE Projects

11. Hiding messages in the Noise of a Picture C# .Net

12. Image Processing C# .Net

13. Windows Management Instrumentation WMI Implementation C# .Net

14. Image Processing for  Bilinear Filters and Resizing C# .Net

15. Image processing for  HSL color space C# .Net

16. Image Processing for  Per Pixel Filters using GDI+ C# .Net

17. Multithreaded Chat Server C# .Net

18. Reading and Writing AVI files using steganography C# .Net

19. Steganography for Hiding Data in Wave Audio Files C# .Net

20. TCPIP Chat client server Using C# C# .Net

21. Neural Networks for  Unicode Optical Character Recognition C# .Net

22. Using Trigonometry and Pythagoras to Watermark an Image C# .Net

23. Library Management System C# .Net

24. Steganography for FTP through a Proxy Server C# .Net

25. Artificial intelligence network load balancing using Ant Colony Optimization C# .Net

26. Call Center Management System ASP .Net

27. Online Shopping ASP .Net

28. Textile Web Services ASP .Net

29. Auction System ASP .Net

30. Online Quiz ASP .Net

31. Online Bank ASP .Net

32. Online Voting System ASP .Net

33. Securing Image URL ASP .Net

34. Web Services ASP .Net

35. Smart Knowledge Provider ASP .Net

36. Online Book Shop ASP .Net

37. Electronic Fund Transfer ASP .Net

38. Work Flow Management System ASP .Net

39. Online Customer Care ASP .Net

40. Scribe Automation ASP .Net

41. Textile Management System ASP .Net

42. Sales and Purchase Management System ASP .Net

43. Human Resources Management System ASP .Net

44. Inventory Manage System ASP .Net

45. Job Order System ASP .Net

46. Advertisement Posting Website ASP .Net ASP .Net

47. Mobile shop shopping cart System ASP .Net

48. Patient Management System ASP .Net

Page 7: IEEE Projects

49. Property Management System ASP .Net

50. Web Based Content Management System ASP .Net

51. Neural Networks for Handwriting Detection System Using Brain Net  VB .Net

52. Library Management system  VB .Net

53. Windows Management Instrument (WMI) .Net 2005  VB .Net

54. Wallpaper Changer Utility  VB .Net

55. Win Application for Word Processing  VB .Net

56. Screen capture Utility  VB .Net

57. HTML Editor  VB .Net

58. Image Converter 2005  VB .Net

59. Internet History Viewer  VB .Net

60. VB .Net Smart Mail Transfer Protocol  VB .Net

61. Windows Multi File Search utility  VB .Net

62. Message Digest  VB .Net

63. FTP Explorer  VB .Net

64. Convolution Filter  VB .Net

65. Find and Replace utility  VB .Net

66. Apartment  Management System  VB .Net

67. Computerized Information Software  VB .Net

68. Employee Management System  VB .Net

69. Hotel Management System  VB .Net

70. Human Resources Management System  VB .Net

71. Inventory System  VB .Net

72. Membership Management System  VB .Net

73. Patient Care System  VB .Net

74. Send SMS To Cell Phone Through SMTP Mail  VB .Net

75. Trainee Management System  VB .Net

1. Wireless Traffic Viewer Using J2ME J2ME

2. J2ME Mail Client Server J2ME

3. Monitoring And Managing The Clusters Using JMX J2ME

4. Peer-To-Peer Messaging J2ME

5. Mobile Information Provider J2ME

6. Mobile Bank J2ME

Page 8: IEEE Projects

7. Video Steganography Using Mobile Simulation J2ME

8. Network Traffic Anomaly Detector J2ME

1. ERP for Leather Company J2EE

2. Online Web shop J2EE

3. Online Fashion Studios J2EE

4. ERP for Small Business J2EE

5. Bulk Billing System J2EE

1. Cryptographically Using Secure Server/Client Protocol VC++

2. Intrusion Detection Prevention And Trace back Systems VC++

3. Neural Network for Recognition of Handwritten and Digits VC++

4. The File Digest program and the C++ implementation of some Message-Digest algorithms VC++

5. File Encryption and Encrypted text embedding in an image VC++

6. Performance Evaluation of DISTANCE Routing Algorithm in MANET VC++

1. Distributed cache updating for the Dynamic source routing protocol Java/2006

2. An Adaptive Programming Model for Fault-Tolerant Distributed Computing Java/2007

3. Face Recognition Using Laplacian faces Java/2005

4. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Java/2005

5. Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings Java/2006

6. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Java/2004

7. Noise Reduction by Fuzzy Image Filtering Java/2006

8. Online Handwritten Script Recognition Java/2004

9. ODAM: An Optimized Distributed Association Rule Mining Algorithm Java/2004

10. Protocol Scrubbing: Network Security Through Transparent Flow Modification Java/2004

11. Workflow Mining: Discovering Process Models from Event Logs .Net/2004

12. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App Java/2004

13. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks Java/2006

14. A Novel Secure Communication Protocol for Ad Hoc networks [SCP] Java/2006

Page 9: IEEE Projects

15. ITP: An Image Transport Protocol for the Internet Java/2002

16. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) J2EE/2007

17. Incremental deployment service of Hop by hop multicast routing protocol Java/2006

18. Network border patrol: preventing congestion collapse and promoting fairness in the Internet Java/2004

19. Application of BPCS steganography to wavelet compressed video Java/2004

20. Neural Networks for  Unicode Optical Character Recognition .Net/2004

21. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs Java/2007

22. Neural Network-Based Face Detection VC++/2005

23. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks Java/2004

24. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Java/2005

25. Mobile Agents In Distributed Multimedia Database Systems    Java/2004

26. Image Stream Transfer Using Real-Time Transmission Protocol    Java/2006

27. Neural Networks for Handwritten character and Digits VC++/2003

28. Evaluating the Performance of Versatile RMI Approach In Java Java

29. Effective Packet Analyzing and Filtering System for ATM Network Java

30. Selective Encryption of Still Image VB, C,Java

31. Homogenous Network Control and Implementation Java

32. Retrieving Files Using Content Based Searching and presenting it in Carousel view Java

33. Dynamic Signature Verification Using Pattern Recognition Java

34. Embedding in Video Steganography  Java

35. Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java

36. Location Aided Routing for Mobile Ad-Hoc Networks Java

37. Image Rendering for Grid Technology Java

38. Java Network File Sharing System Java

39. Java Visual Editor with Compiler Java

40. E-Mail Server Using Multithreaded Sockets Java

41. Network Component for XML Migration Java

42. Image Water Marking and Combustion Java

43. Image Processing for Convolution Filters C# .Net

44. Artificial intelligence network load balancing using Ant Colony Optimization C# .Net

45. Image Processing for Edge Detection Filters C# .Net

46. Flood Fill Algorithms in C# and GDI+ C# .Net

47. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# .Net

48. Hiding messages in the Noise of a Picture C# .Net

49. Windows Management Instrumentation WMI Implementation C# .Net

50. Steganography for Hiding Data in Wave Audio Files C# .Net

51. Automatic Dependent Surveillance-Broadcasting(Ads-B) VC++

52. Digital Water Marking For Video Piracy Detection C++

Page 10: IEEE Projects

53. Encryption and Decryption technique for secure communication in WLAN       VB, C

54. File Encryption and Encrypted text embedding in an image VC++

55. Integrating Speech Engine with Web Navigator Java

56. Intrusion Detection Prevention And Trace back Systems VB, VC++

57. Java Productivity Aids Java

58. J2ME Mail Client Server J2ME

59. Monitoring And Managing The Clusters Using JMX J2ME

60. Network Analyze Java

61. Neural Network for Recognition of Handwritten and Digits Backpropagation VC++

62. Network Traffic Anomaly Detector J2ME

63. Optimal Cryptographic Technique C++

64. Peer to Peer Messaging System using JXTA J2ME

65. Performance Evaluation of DISTANCE Routing Algorithm in MANET VC++

66. Public Key Validation for DNS security Extension Java

67. Query Routing Optimization In Sensor Communication Networks C,C++

68. Virtual Private Network C# .Net

69. Voice Enabled Smart Browser Java

70. XML Enabled SQL SERVER Java

71. An efficient message digest algorithm (MD) for data security VC++

72. Hopfield model of neural network for pattern recognition C# .Net

73. Using Trigonometry and Pythagoras to Watermark an Image C# .Net

74. Hiding messages in the Noise of a Picture C# .Net

75. ERP for Leather Company J2EE

76. Cryptographically Using Secure Server/Client Protocol VC++

77. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# .Net

78. Neural Networks for Handwriting Detection System Using Brain Net VB .Net

79. Wireless Traffic Viewer Using J2ME J2ME

80. Video Steganography Using Mobile Simulation J2ME