ANDROID
S.N
o
Title
Code
An event-driven university campus navigation system on
android platform
AND01
Privacy-preserving relative location based services for
mobile users
AND02
My Privacy My Decision: Control of Photo Sharing on Online
Social Networks
AND03
A Bluetooth-based Android Communication for industrial
Robot
AND04
Prepaid energy meter using wireless communication
networks
AND05
Mobile Apps for Home Control and auditorium
AND06
RFID tag based purchase using Android
AND07
Android application used for Industrial monitoring and
wireless sensor networks
AND08
Office and school management system used for
android application
AND09
10
EduPad- A Tablet Based Educational System for Improving
Adult Literacy in Rural India
AND10
11
Office cab booking system
AND11
12
Personalized mobile search engine
AND12
13
Industrial management system using Android app
AND13
APPLICATION PROJECT
TITLES
DOTNET PROJECT TITLES
NETWORKING
S.N
o
1
Title
Cooperative Defense Against Pollution Attacks
Cod
e
SD0
1
A proof for Multicast collection of attack
SD0
2
Location Privacy Schemes for Wireless Sensor Networks
SD0
3
On-spot Location Verification in Wireless Networks
SD0
4
Hacker Detection in Wireless Sensor Networks
SD0
5
Communication-Intensive Workloads
SD0
6
Scheduling Multisource Divisible Load on Arbitrary
Network
SD0
7
Enhanced Layered P2P Bandwidth Variation
SD0
8
DATAMINING
S.N
o
Title
Cod
e
A new approach for privacy preserving in Hospital Management
System
SD0
9
Secure Storage Services in Cloud Computing
SD1
0
Hostel Management
SD1
1
Detecting Automation of Twitter Accounts
SD1
2
A Query Formulation Language for the Data Web
SD1
3
Online Rationshop Management System
SD1
4
Spatial data by Quality Preferences
SD1
5
Semantic Web for Web-Based e-Learning
SD1
6
Microblogging in a Classroom Students Relevant and
Irrelevant Questions
SD1
7
MOBILE COMPUTING
S.N
o
Title
Cod
e
A Noncommutative Routing Metric for Reliable Communication
SD1
8
Maximization of Random Power Allocation in Wireless Networks
SD1
9
Stateless Multicast Protocol for Ad Hoc Networks
SD2
0
Controlling high bandwidth aggregates in the network
SD2
1
Threats and Attacks Control In Wireless Sensor Network
SD2
2
NETWORK SECURITY
S.
No
Title
Cod
e
Controling Denial of Service Attacks using Clock Drifts
SD2
3
New Secure Authenticaton scheme using Image & video verification
SD2
4
Preventing Selective Jamming Attacks using Data hiding
SD2
5
Secure Data Aggregation in Wireless Sensor Networks
SD2
6
Blocking IP Address of Misbehaving user in Anonymous
Network
SD2
7
DOTNET APPLICATION PROJECTS
S.No
Title
Code
1
Online E-Payments for Government Taxes
SED01
2
PharmaIntelligence Articles Publishing System
SED02
3
Corporate Resource Management
SED03
4
Cloud Computing
SED04
5
Virtual class Room
SED05
6
Mediclaim Insurance Process
SED06
7
Company Procurement and Expenses Report
SED07
8
Cyber Eye
SED08
9
System Monitoring Process
SED09
10
Defect Tracking System
SED10
11
Online Training and Exam
SED11
12
Retail Data Business Management
SED12
13
Gas Agencies Booking
SED13
14
GSM EB Billing System
SED14
15
GSM Medical Report
SED15
16
GSM Temperature monitoring
SED16
17
GSM Weather monitoring
SED17
18
College Web Portal
SED18
19
Wild Adventure Using Biometrics
SED19
20
ATM FingerPrint Using Mobile Application
SED20
21
Online Tourism
SED21
22
Luggage RFID Booking
SED22
23
Rail way Route
SED23
24
Rsum Builder
SED24
25
RFID Smart card Verification
SED25
26
Online Shopping Cart
SED26
27
Smart Billing System
SED27
28
Cambiage Mailing System
SED28
29
Hostel Management System
SED29
30
RFID Passport Verification
SED30
31
Insurance Management System
SED31
32
Mobile Sync
SED32
33
Automated Mailing Tool
SED33
34
Clinic Management System
SED34
35
Analyzing and Opinion In For Mobile Products
SED35
36
Antiphishing Banking System
SED36
37
Construction Plus
SED37
38
Finger Print Voting System
SED38
39
Storage Space Structural Design For Digital Imagery System
SED39
40
Mobile Shop Management System
SED40
41
White Blood Cell Matching
SED41
42
Multilevel Big Business Depth
SED42
43
Web Threshold For E-Banking Transactions Scheme
SED43
44
Web Based Healthcare Gateway
SED44
45
Internet Data Protection Services
SED45
46
Dealership Management System
SED46
47
Water Marking In Relational Database
SED47
48
Cyber Voting
SED48
49
Web Based Pharmacy Supervision Software
SED49
50
Fracture Identifier Classification
SED50
51
Security Proficient Tool For Text File
SED51
52
Hospital Preservation Software
SED52
53
Sending Resume through SMS Gateway
SED53
54
RTO Management System
SED54
55
Face Detection System
SED55
56
Voice Recognition System
SED56
57
Civil supply using Biometric with SMS
SED57
58
SMS Management System
SED58
JAVA PROJECT TITLES
Networking
S.No
Title
Code
1
Recoverable secret Data Aggregation for information Integrity
SJ01
2
A Tiered Authentication of Multicast Protocol
SJ02
3
Improving Energy Saving and Reliability in Wireless Sensor
Networks Based Packet-Forwarding Solution
SJ03
4
The Three-Tier Security Scheme in Mobile Sinks
SJ04
5
Sleep Scheduling for Critical Event Monitoring
SJ05
6
Energy Consuming in Random Mutihop Wireless networks.
SJ06
7
Efficient Revocation in Data Outsourcing Systems using some
attributes
SJ07
8
Anonymizing Unstructured Peer-To-Peer Systems
SJ08
9
Consistency Maintenance in Peer-to-Peer File Sharing Networks
SJ09
10
Internet Congestion Control for Future High-Bandwidth-Delay
Environments
SJ10
11
Minimizing Data Loss using a Backup Path Algorithm
SJ11
12
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
SJ12
13
Priority of packet inference with back up path
SJ13
14
Load Balancing using ERT Algorithm
SJ14
15
An ISP-Friendly File Distribution Protocol
SJ15
16
Weak State Routing for Dynamic Networks
SJ16
17
Predictable High Performance Computing Using Feedback Control and
Admission Control
SJ17
18
Overcome the Path Failure and Increase the Throughput Knowledge
Based Search in P2P Networks
SJ18
19
Scheduling Deadline-Constrained Bulk Data Transfers to Minimize
Network Congestion
SJ19
20
Multipath Dissemination in Regular Mesh Topologies
SJ20
21
SOAR: Simple Opportunistic Adaptive Routing for Network
SJ21
22
Multicast using new Heuristic Technique
SJ22
23
Preventing the failure in Synchronous and Asynchronous System
SJ23
24
Filtering the Malicious Packets
SJ24
25
Automatic Java Code Generator
SJ25
26
Dynamic Cache Updating for Routing Table
SJ26
27
Balancing the Imbalance Load
SJ27
28
Synchronize Group Editor
SJ28
29
A New Improved Algorithm for Scheduling
SJ29
Data Mining
S.No
Title
Code
1
Knowledge logical Theories in XML Document arrangement
SJ30
2
A Probabilistic system for Keyword-Based Incremental Query
Structure
SJ31
3
Using Rule Ontology in Repeated Rule achievement from Similar Web
Sites
SJ32
4
Evaluating Path Queries over regularly Updated Route
SJ33
5
Managing the load balancing and fault tolerance
SJ34
6
Improving Data Quality with Dynamic Forms
SJ35
7
Identifying Disease-Treatment Relations in Short Texts
SJ36
8
Web Information Gathering based on user Expectation
SJ37
9
Minimizing Search Time using XML Keyword
SJ38
10
Classifying the Data using PLSA
SJ39
11
Create a Trusted Network using P2P Certificate
SJ40
12
Automatic Error Identification and Problem Solving tool for SQL
SJ41
13
Automatic index providing and fast data retrieving in P2P networks
SJ42
14
Equally Distribute the and Share the unpredictable Load
SJ43
15
Face Recognition
SJ44
16
Dynamic Decomposition of Hyper Videos
SJ45
17
Frequent Item Set Retrieving from Large amount of Data
SJ46
18
Answering Factoid Questions In Qa System
SJ47
19
Pattern Matching in Data Mining
SJ48
20
Discovery of Weighted Association Rules Mining
SJ49
21
Weighted Association Rule Mining Using Weighted Tree Approach
SJ50
22
Voice Chatting
SJ51
23
Privacy-preserving revocation checking
SJ52
24
Online Examination
SJ53
25
Generic Lossless Visible Watermarking A New Approach
SJ54
Mobile Computing
S.No
Title
Code
1
High-speed data collection in wireless sensor networks
SJ55
2
Reducing the Number of Transmissions in Network
SJ56
Handling Selfishness in Replica Allocation Network
SJ57
4
Hop-by-Hop Routing in with Bandwidth Guarantees
SJ58
5
Random Power Allocation
SJ59
6
Route Handoff Technique in multichannel
SJ60
7
Detection and Countermeasure in wireless Sensor networks
SJ61
Multicast Authentication Based on Short Signature Scheme
SJ62
9
Avoid Denial of services in wireless sensor networks using Randomize
Multipath Approach
SJ63
10
A Multichannel Scheduler for High-Speed Wireless Networks
SJ64
Virtual Energy-Based Encryption and Keying for Secure Data
SJ65
11
Transmission in Unreliable Networks
12
Efficient Broadcasting In Mobile Ad Hoc Networks
SJ66
Grid Computing
S.No
Title
Code
1
Improving the Performance Guarantee in Scientific Applications
SJ67
2
Key Management in Secure Group Communication
SJ68
3
Robust Load Delegation in Service Grid Environments
SJ69
4
Securing Data using GRID Architecture
SJ70
5
Xml Key Store for Heterogeneous Network
SJ71
Network Security
S.No
Title
Code
1
Routing Security in Ad Hoc Networks
SJ72
2
A Trust-Aware Routing Framework
SJ73
3
Detecting Spam Zombies by Monitoring Outgoing Messages
SJ74
4
A Security Architecture Achieving Anonymity and Traceability in
Wireless Networks
SJ75
Resource Allocation for Efficient Parallel Data Processing in the Grid.
SJ76
5
Secure Data Objects Replication in Data Grid
SJ77
Secure and Efficient Broadcast Authentication in Wireless Sensor
6
Networks
SJ78
7
Detecting Application Denial-of-Service Attacks: A Group-TestingSJ79
Based Approach
8
Authenticated Group Key Transfer Protocol Based on Secret Sharing
SJ80
9
Providing Witness Anonymity under Peer-to-Peer Networks
SJ81
10
Data Transfer in vulnerable free Route
SJ82
11
Multipath Routing Approach for Secure Data Delivery
SJ83
12
Detecting Malicious Packet Losses and avoiding the DOS Attacks
SJ84
13
Application Fault Tolerance with Secondary Middleware
SJ85
14
KTR: An Efficient Key Management Scheme For Secure Data Access DOS
Identifier
SJ86
J2EE PROJECTS
S.No
Title
Code
1
Scalable and secure sharing of PHR
SJ87
2
Personalized ontology search in web
SJ88
3
Cloud Storage System with Secure Data Forwarding
SJ89
4
Payment gateway
SJ90
5
Monitoring The Application-Layer DDOS Attacks For Popular Websites
SJ91
6
Swap: Mitigating XSS Attacks
SJ92
7
SQL Injection Attacks
SJ93
8
Runtime Defense against Code Injection Attacks
SJ94
9
SigFree: A Signature-Free Buffer Overflow Attack Blocker
SJ95
10
Security In Open Source Web Content Management Systems
SJ96
11
Ranking and Suggesting for Popular Items
SJ97
12
Virtual Credit Card
SJ98
13
Educational Forum
SJ99
14
Job Portal Management
SJ100
15
Effective XML Keyword Search
SJ101