COMPUTER SCIENCE RESEARCH JOURNALS

COMPUTER SCIENCE RESEARCH JOURNALS,Fine Clinical, Medical, Life Sciences, and Engineering & Technology journals and hosts 3000 scholarly research journals guides for use with listed topics for educational enhancement in thesis, Msc, Bsc and publications

 

  1. THE IMPACT OF INFORMATION TECHNOLOGY (IT) ON COLLECTION DEVELOPMENT AND MANAGEMENT IN THE DELTA STATE UNIVERSITY, ABRAKA
  2. APPLICATION OF ASSOCIATION RULE LEARNING IN CUSTOMER RELATIONSHIP MANAGEMENT
  3. APPLICATION OF DATA MINING TECHNIQUES IN THE PREDICTION OF CLIMATE EFFECT ON AGRICULTURE
  4. ASSESSMENT OF YOUTHS AND INTERNET CRIME IN NIGERIA (A CASE STUDY OF WARRI SOUTH LGA)
  5. PERCEPTION OF INTERNET USERS ON DATA DRIVEN ADVERTISING AMONGST UNIVERSITY STUDENTS
  6. EFFECT OF MANAGEMENT INFORMATION SYSTEM IN THE SERVICE DELIVERY (A CASE STUDY OF UNIVERSITY Of UYO)
  7. IMPACT OF KNOWLEDGE MANAGEMENT ON ORGANIZATIONAL PERFORMANCE (A CASE STUDY OF SELECTED IT FIRMS IN LAGOS)
  8. THE IMPACT OF INTERNET AND THE WAY IT INFLUENCE STUDENTS READING CULTURE (Case study of selected primary schools in Edo State)
  9. HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS
  10. EFFECTS OF GSM ON SERVICE DELIVERY OF SMES IN NIGERIA (Case study of Registered SMEs in Edo State)
  11. EVALUATION OF THE RELATIONSHIP BETWEEN E-BANKING AND CYBER CRIME IN NIGERIA (A CASE STUDY OF FIDELITY BANK PLC, 2011-2015)
  12. ANALYSIS OF DATA MINING TECHNIQUES OF TELECOMMUNICATION COMPANIES IN NIGERIA: A CASE STUDY OF MTN NIGERIA
  13. ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS
  14. A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES
  15. INTRODUCTION TO ARTIFICIAL INTELLIGENCE: APPLICATION AND BENEFITS TO HUMAN LIFE
  16. COMPUTER NETWORKING USING WIRELESS NETWORK
  17. THE APPLICATION OF INFORMATION TECHNOLOGY TO THE LEARNING AND TEACHING OF ECONOMICS IN NIGERIA : A CASE STUDY OF SEC. SCH IN JOS
  18. A STUDY INTO THE NEGATIVE INFLUENCE OF INFORMATION TECHNOLOGY ON CHILD EDUCATION
  19. AN APPRAISAL OF THE ROLE OF ICT AS A CHANGE AGENT FOR QUALITY EDUCATION IN TERTIARY INSTITUTION IN NIGERIA
  20. ASSESSMENT  OF  THE  UTILIZATION  OF  INTERNET  SERVICES  AMONG  STUDENTS  IN  FEDERAL INSTITUTIONS  IN  KADUNA  STATE
  21. CLOUD COMPUTING A BETTER MEANS OF IT OUTSOURCING
  22. THE USE OF INFORMATION AND COMMUNICATION TECHNOLOGY IN TEACHING OF VOCATIONAL SUBJECTS IN NIGERIA POLYTECHNICS
  23. SELF EFFICACY AND INFORMATION   SEEKING BEHAVIOUR OF STUDENTS OF SELECTED UNIVERSITIES IN NIGERIA
  24. A  SURVEY OF DATA BASE  MANAGEMENT IN  ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATIONS IN ABUJA
  25. SOCIAL MEDIA ENTERPRENURESHIP AS A TOOL FOR NATIONAL DEVELOPMENT (A CASE STUDY OF SELECTED BLOGGERS AND WEBMASTERS IN IKEJA, LAGOS)
  26. THE ROLE OF INFORMATION GATHERING IN THE RAPID SOCIAL-ECONOMIC TRANSFORMATION OF NIGERIA
  27. IMPROVING THE CAPACITY OF A RENEWABLE POWER SYSTEM, USING SOLAR POWER PANEL (A CASE STUDY OF COMPUTER SCIENCE AND SOFTTWARE LAB
  28. ENHANCING NIGERIAN ECONOMY THROUGH WIRELESS INTERNET NETWORK
  29. INFORMATION AND COMMUNICATION TECHNOLOGY AS A TOOL FOR CREATING JOB OPPORTUNITIES IN NIGERIA
  30. PREDICTING STUDENTS ACADEMIC PERFORMANCE USING ARTIFICIAL NEURAL NETWORK
  31. THE IMPACT OF INTERNET ON THE NIGERIAN SOCIETY
  32. THE IMPACT OF ICT ON THE NIGERIAN ECONOMIC GROWTH AND DEVELOPMENT
  33. INFORMATION TECHNOLOGY AND SERVICES DELIVERY (A CASE STUDY OF TERTIARY HOSPITAL IN RIVERS STATE)
  34. THE EFFECT OF COMPUTER USAGE ON ACADEMIC ACHIEVEMENT OF SECONDARY SCHOOL STUDENTS IN NIGERIA
  35. EFFECT OF CYBERCRIME IN NIGERIA
  36. EFFECT OF INFORMATION SYSTEMS ON THE PERFORMANCE OF E-COMMERCE
  37. THE ROLE AND THE PROBLEM OF ELECTRONIC DATA PROCESSING IN ACCOUNTING SYSTEM IN NIGERIA
  38. THE ROLE OF ICT IN A DEPRESSED ECONOMY
  39. THE IMPACT OF NEW TECHNOLOGY ON CUSTOMER SERVICE GIVEN BY SMALL AND MEDIUM ENTERPRISE IN AKWA IBOM STATE.
  40. STUDENTS ACCESS TO E-LEARNING RESOURCES AND THEIR ACADEMIC PERFORMANCE IN COLLEGE OF EDUCATION
  41. UNDERUTILIZED TECHNOLOGY IN FOODS, a case study of Food irradiation
  42. ASSESSING THE IMPACT OF ICT ON REVENUE COLLECTION ON THE SIERRA LEONE ECONOMY (A CASE STUDY OF THE NATIONAL REVENUE AUTHORITY)
  43. THE USE OF ICT IN PROMOTING LIBRARY RESOURCES
  44. IMPROVING SECURITY IN CASHELESS APPLICATION
  45. ETHICS: THE IMPACTS OF TECHNOLOGY ON THE YOUTH AND THEIR MORAL VALUES
  46. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL
  47. AN ADAPTIVE PROGRAMMING MODEL FOR FAULT-TOLERANT
  48. DISTRIBUTED COMPUTING FACE RECOGNITION USING LAPLACIAN FACES
  49.  PREDICTIVE JOB SCHEDULING IN A CONNECTION LIMITED SYSTEM USING PARALLEL GENETIC ALGORITHM
  50. IMAGE PROCESSING TECHNIQUES FOR THE DETECTION AND REMOVAL OF CRACKS IN DIGITIZED PAINTINGS
  51. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORKS
  52. NOISE REDUCTION BY FUZZY IMAGE FILTERING
  53.  ONLINE HANDWRITTEN SCRIPT RECOGNITION
  54.  ODAM: AN OPTIMIZED DISTRIBUTED ASSOCIATION RULE MINING ALGORITHM
  55. PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION
  56. WORKFLOW MINING: DISCOVERING PROCESS MODELS FROM EVENT LOGS
  57. STRUCTURE AND TEXTURE FILLING-IN OF MISSING IMAGE BLOCKS IN WIRELESS TRANSMISSION AND COMPRESSION APP
  58. AN AGENT BASED INTRUSION DETECTION, RESPONSE AND BLOCKING USING SIGNATURE METHOD IN ACTIVE NETWORKS
  59. A NOVEL SECURE COMMUNICATION PROTOCOL FOR AD HOC NETWORKS [SCP]
  60. ITP: AN IMAGE TRANSPORT PROTOCOL FOR THE INTERNET
  61. HYBRID INTRUSION DETECTION WITH WEIGHTED SIGNATURE GENERATION OVER ANOMALOUS INTERNET EPISODES(HIDS)
  62. INCREMENTAL DEPLOYMENT SERVICE OF HOP BY HOP MULTICAST ROUTING PROTOCOL
  63. NETWORK BORDER PATROL: PREVENTING CONGESTION COLLAPSE AND PROMOTING FAIRNESS IN THE INTERNET
  64. APPLICATION OF BPCS STEGANOGRAPHY TO WAVELET COMPRESSED VIDEO
  65. NEURAL NETWORKS FOR UNICODE OPTICAL CHARACTER RECOGNITION
  66.  AN ACKNOWLEDGMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR IN MANETS
  67. NEURAL NETWORK-BASED FACE DETECTION
  68. XTC: A PRACTICAL TOPOLOGY CONTROL ALGORITHM FOR AD-HOC NETWORKS
  69. A NEAR-OPTIMAL MULTICAST SCHEME FOR MOBILE AD HOC NETWORKS USING A HYBRID GENETIC ALGORITHM
  70. MOBILE AGENTS IN DISTRIBUTED MULTIMEDIA DATABASE SYSTEMS
  71.  IMAGE STREAM TRANSFER USING REAL-TIME TRANSMISSION PROTOCOL
  72. NEURAL NETWORKS FOR HANDWRITTEN CHARACTER AND DIGITS
  73. EVALUATING THE PERFORMANCE OF VERSATILE RMI APPROACH IN JAVA
  74. EFFECTIVE PACKET ANALYZING AND FILTERING SYSTEM FOR ATM NETWORK
  75.  SELECTIVE ENCRYPTION OF STILL IMAGE
  76.  HOMOGENOUS NETWORK CONTROL AND IMPLEMENTATION
  77. DYNAMIC SIGNATURE VERIFICATION USING PATTERN RECOGNITION
  78. EMBEDDING IN VIDEO STEGANOGRAPHY
  79. GENETIC ALGORITHM BASED TRAIN SIMULATION USING CONCURRENT ENGINEERING
  80.  LOCATION AIDED ROUTING FOR MOBILE AD-HOC NETWORKS
  81. IMAGE RENDERING FOR GRID TECHNOLOGY
  82.  JAVA NETWORK FILE SHARING SYSTEM
  83.  JAVA VISUAL EDITOR WITH COMPILER
  84.  E-MAIL SERVER USING MULTITHREADED SOCKETS
  85.  NETWORK COMPONENT FOR XML MIGRATION
  86. IMAGE WATER MARKING AND COMBUSTION
  87.  IMAGE PROCESSING FOR CONVOLUTION FILTERS
  88.  ARTIFICIAL INTELLIGENCE NETWORK LOAD BALANCING USING ANT COLONY OPTIMIZATION
  89.  IMAGE PROCESSING FOR EDGE DETECTION FILTERS
  90. FLOOD FILL ALGORITHMS IN C# AND GDI+
  91. GENETIC ALGORITHMS AND THE TRAVELING SALESMAN PROBLEM USING C# AND ATL COM
  92.  HIDING MESSAGES IN THE NOISE OF A PICTURE
  93.  WINDOWS MANAGEMENT INSTRUMENTATION WMI IMPLEMENTATION
  94. STEGANOGRAPHY FOR HIDING DATA IN WAVE AUDIO FILES
  95. AUTOMATIC DEPENDENT SURVEILLANCE-BROADCASTING(ADS-B)
  96.  DIGITAL WATER MARKING FOR VIDEO PIRACY DETECTION
  97.  ENCRYPTION AND DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WLAN
  98. FILE ENCRYPTION AND ENCRYPTED TEXT EMBEDDING IN AN IMAGE
  99.  INTEGRATING SPEECH ENGINE WITH WEB NAVIGATOR
  100. INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEMS
  101.  JAVA PRODUCTIVITY AIDS
  102. J2ME MAIL CLIENT SERVER
  103. MONITORING AND MANAGING THE CLUSTERS USING JMX
  104. NETWORK ANALYZE
  105. NEURAL NETWORK FOR RECOGNITION OF HANDWRITTEN AND DIGITS BACKPROPAGATION
  106. NETWORK TRAFFIC ANOMALY DETECTOR
  107. OPTIMAL CRYPTOGRAPHIC TECHNIQUE
  108. PEER TO PEER MESSAGING SYSTEM USING JXTA
  109. PERFORMANCE EVALUATION OF DISTANCE ROUTING ALGORITHM IN MANET
  110. PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSION
  111. QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
  112. VIRTUAL PRIVATE NETWORK
  113. VOICE ENABLED SMART BROWSER
  114. XML ENABLED SQL SERVER
  115. AN EFFICIENT MESSAGE DIGEST ALGORITHM (MD) FOR DATA SECURITY
  116. HOPFIELD MODEL OF NEURAL NETWORK FOR PATTERN RECOGNITION
  117. USING TRIGONOMETRY AND PYTHAGORAS TO WATERMARK AN IMAGE
  118. HIDING MESSAGES IN THE NOISE OF A PICTURE
  119. ERP FOR LEATHER COMPANY
  120. CRYPTOGRAPHICALLY USING SECURE SERVER/CLIENT PROTOCOL
  121. GENETIC ALGORITHMS AND THE TRAVELING SALESMAN PROBLEM USING C# AND ATL COM
  122. NEURAL NETWORKS FOR HANDWRITING DETECTION SYSTEM USING BRAIN NET
  123. WIRELESS TRAFFIC VIEWER USING J2ME
  124. VIDEO STEGANOGRAPHY USING MOBILE SIMULATION
  125. CRYPTOGRAPHICALLY USING SECURE SERVER/CLIENT PROTOCOL
  126. INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEMS
  127. NEURAL NETWORK FOR RECOGNITION OF HANDWRITTEN AND DIGITS
  128. THE FILE DIGEST PROGRAM AND THE C++ IMPLEMENTATION OF SOME MESSAGE-DIGEST ALGORITHMS
  129. FILE ENCRYPTION AND ENCRYPTED TEXT EMBEDDING IN AN IMAGE
  130. PERFORMANCE EVALUATION OF DISTANCE ROUTING ALGORITHM IN MANET
  131.  ERP FOR LEATHER COMPANY
  132. ONLINE WEB SHOP
  133. ONLINE FASHION STUDIOS
  134.  ERP FOR SMALL BUSINESS
  135.  BULK BILLING SYSTEM
  136. WIRELESS TRAFFIC VIEWER USING J2ME
  137. J2ME MAIL CLIENT SERVER
  138. MONITORING AND MANAGING THE CLUSTERS USING JMX
  139. PEER-TO-PEER MESSAGING
  140. MOBILE INFORMATION PROVIDER
  141. MOBILE BANK
  142. VIDEO STEGANOGRAPHY USING MOBILE SIMULATION
  143. NETWORK TRAFFIC ANOMALY DETECTOR
  144.  MULTICAST LIVE VIDEO BROADCASTING USING REAL TIME TRANSMISSION PROTOCOL
  145.  ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS
  146. ADAPTIVE SECURITY AND AUTHENTICATION FOR DNS SYSTEM
  147. EVALUATING THE PERFORMANCE OF VERSATILE RMI APPROACH IN JAVA
  148.  DYNAMIC CONTROL FOR ACTIVE NETWORK SYSTEM
  149. EFFECTIVE PACKET ANALYZING AND FILTERING SYSTEM FOR ATM NETWORK
  150. MULTI SERVER COMMUNICATION IN DISTRIBUTED MANAGEMENT SYSTEM
  151. REDUCTION OF NETWORK DENSITY FOR WIRELESS AD-HOC NETWORKS
  152. MESSAGING SERVICE OVER TCP/IP IN LOCAL AREA NETWORK
  153. SECURE DATA HIDING AND EXTRACTION USING BPCS
  154. DYNAMIC SIGNATURE VERIFICATION USING PATTERN RECOGNITION
  155. DATA MINIMIZATION AND STORAGE USING XML ENABLE SQL SERVER
  156. DISTRIBUTED NODE MIGRATION BY EFFECTIVE FAULT TOLERANCE
  157.  EMBEDDING IN VIDEO STEGANOGRAPHY
  158. GENETIC ALGORITHM BASED TRAIN SIMULATION USING CONCURRENT ENGINEERING
  159. LOCATION AIDED ROUTING FOR MOBILE AD-HOC NETWORKS
  160. IMAGE RENDERING FOR GRID TECHNOLOGY
  161.  OPTIMAL MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS
  162. SCALABLE WIRELESS AD-HOC NETWORK SIMULATION USING XTC
  163.  HOMOGENOUS NETWORK CONTROL AND IMPLEMENTATION
  164. JAVA NETWORK FILE SHARING SYSTEM
  165. MOBILE AGENTS IN DISTRIBUTED MULTIMEDIA DATABASE SYSTEMS
  166. JAVA VISUAL EDITOR WITH COMPILER
  167. ATM NETWORKS FOR ONLINE MONITORING SYSTEM
  168. PERFORMANCE EVALUATION OF RMI
  169.  NETWORK BORDER PATROL PREVENTING CONGESTION COLLAPSE
    127. NETWORK COMPONENT FOR XML MIGRATION
    128. SHORTEST NODE FINDER IN WIRELESS AD-HOC NETWORKS
    129. PREVENTING NETWORK DATA CONGESTION COLLAPSE USING MOBILE AD-HOC NETWORKS
    130. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL
    131. MULTI ROUTER TRAFFIC MONITORING SYSTEM
    132. PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSIONS
    133. A SECURE ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK
    135. DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORKS
    136. E-MAIL SERVER USING MULTITHREADED SOCKETS
    137. JAVA PRODUCTIVITY AIDS
    138. ROUTING AND SECURITY IN MOBILE AD HOC NETWORKS
    139. DATA SECURITY IN AD HOC NETWORKS USING MULTI PATH ROUTING
    140. AN AGENT BASED INTRUSION DETECTION, RESPONSE AND BLOCKING USING SIGNATURE METHOD IN ACTIVE NETWORKS
    141. FAULT-TOLERANT DISTRIBUTED CHANNEL ALLOCATION IN MOBILE AD-HOC NETWORKS
    142. AN ACKNOWLEDGMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR IN MANETS
    143. WAVELET BASED COMPRESSION AND DECOMPRESSION USING STEGANOGRAPHY
    144. IMAGE STREAM TRANSFER USING REAL-TIME TRANSMISSION PROTOCOL
    145. IMAGE WATER MARKING AND COMBUSTION
    146. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL
    147. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORKS
    148. PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION
    149. INCREMENTAL DEPLOYMENT SERVICE OF HOP BY HOP MULTICAST ROUTING PROTOCOL
    150. CVS ROOT FILE CHANGING UTILITY
    151. C# MP3 COMPRESSOR
    152. CONVOLUTION FILTERS
    153. DATABASE SCHEMA COMPARISON UTILITY C#
    154. DISPLACEMENT FILTERS, INCLUDING SWIRL USING GDI+
    155. EDGE DETECTION FILTERS
    156. FLOOD FILL ALGORITHMS IN C# AND GDI+
    157. GENETIC ALGORITHMS AND THE TRAVELING SALESMAN PROBLEM USING C# AND ATL COM
    158. HIDING BINARY DATA IN HTML DOCUMENTS
    159. HIDING MESSAGES IN MIDI SONGS
    160. HIDING MESSAGES IN THE NOISE OF A PICTURE
    161. IMAGE PROCESSING
    162. WINDOWS MANAGEMENT INSTRUMENTATION WMI IMPLEMENTATION
    163. IMAGE PROCESSING FOR BILINEAR FILTERS AND RESIZING
    164. IMAGE PROCESSING FOR HSL COLOR SPACE
    165. IMAGE PROCESSING FOR PER PIXEL FILTERS USING GDI+
    166. MULTITHREADED CHAT SERVER
  170. READING AND WRITING AVI FILES USING STEGANOGRAPHY
  171. STEGANOGRAPHY FOR HIDING DATA IN WAVE AUDIO FILES
  172.  TCPIP CHAT CLIENT SERVER USING C#
  173. NEURAL NETWORKS FOR UNICODE OPTICAL CHARACTER RECOGNITION
  174. USING TRIGONOMETRY AND PYTHAGORAS TO WATERMARK AN IMAGE
  175. LIBRARY MANAGEMENT SYSTEM
  176. STEGANOGRAPHY FOR FTP THROUGH A PROXY SERVER
  177. ARTIFICIAL INTELLIGENCE NETWORK LOAD BALANCING USING ANT COLONY OPTIMIZATION
  178.  ASP .NET PROJECT TITLES
  179. CALL CENTER MANAGEMENT SYSTEM
  180. ONLINE SHOPPING
  181. TEXTILE WEB SERVICES
  182. AUCTION SYSTEM
  183.  ONLINE QUIZ
  184.  ONLINE BANK
  185. ONLINE VOTING SYSTEM
  186. SECURING IMAGE URL
  187. WEB SERVICES
  188. SMART KNOWLEDGE PROVIDER
  189.  ONLINE BOOK SHOP
  190. ELECTRONIC FUND TRANSFER
  191. WORK FLOW MANAGEMENT SYSTEM
  192. ONLINE CUSTOMER CARE
  193. SCRIBE AUTOMATION
  194. TEXTILE MANAGEMENT SYSTEM
  195. SALES AND PURCHASE MANAGEMENT SYSTEM
  196. HUMAN RESOURCES MANAGEMENT SYSTEM
  197. INVENTORY MANAGE SYSTEM
  198. JOB ORDER SYSTEM
  199. MOBILE SHOP SHOPPING CART SYSTEM
  200. PATIENT MANAGEMENT SYSTEM
  201. PROPERTY MANAGEMENT SYSTEM
  202. WEB BASED CONTENT MANAGEMENT SYSTEM
  203. NEURAL NETWORKS FOR HANDWRITING DETECTION SYSTEM USING BRAIN NET
  204. LIBRARY MANAGEMENT SYSTEM
  205. WINDOWS MANAGEMENT INSTRUMENT (WMI) .NET 2005
  206. WALLPAPER CHANGER UTILITY
  207. WIN APPLICATION FOR WORD PROCESSING
  208.  SCREEN CAPTURE UTILITY
  209. HTML EDITOR
  210. IMAGE CONVERTER 2005
  211.  INTERNET HISTORY VIEWER
  212. VB .NET SMART MAIL TRANSFER PROTOCOL
    211. WINDOWS MULTI FILE SEARCH UTILITY
    212. MESSAGE DIGEST
    213. FTP EXPLORER
    214. CONVOLUTION FILTER
    215. FIND AND REPLACE UTILITY
    216. APARTMENT MANAGEMENT SYSTEM
    217. COMPUTERIZED INFORMATION SOFTWARE
    218. EMPLOYEE MANAGEMENT SYSTEM
    219. HOTEL MANAGEMENT SYSTEM
    220. HUMAN RESOURCES MANAGEMENT SYSTEM
    221. INVENTORY SYSTEM
    222. MEMBERSHIP MANAGEMENT SYSTEM
    223. PATIENT CARE SYSTEM
    224. SEND SMS TO CELL PHONE THROUGH SMTP MAIL
    225. TRAINEE MANAGEMENT SYSTEM
    226. J2ME PROJECT TITLES
    227. WIRELESS TRAFFIC VIEWER USING J2ME
    228. J2ME MAIL CLIENT SERVER
    229. MONITORING AND MANAGING THE CLUSTERS USING JMX
    230. PEER-TO-PEER MESSAGING
    231. MOBILE INFORMATION PROVIDER
    232. MOBILE BANK
    233. VIDEO STEGANOGRAPHY USING MOBILE SIMULATION
    234. NETWORK TRAFFIC ANOMALY DETECTOR
    235. J2EE PROJECT TITLES
    236. ERP FOR LEATHER COMPANY
    237. ONLINE WEB SHOP
    238. ONLINE FASHION STUDIOS
    239. ERP FOR SMALL BUSINESS
    240. BULK BILLING SYSTEM
    241. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL
    242. AN ADAPTIVE PROGRAMMING MODEL FOR FAULT-TOLERANT DISTRIBUTED COMPUTING
    243. FACE RECOGNITION USING LAPLACIAN FACES
    244. PREDICTIVE JOB SCHEDULING IN A CONNECTION LIMITED SYSTEM USING PARALLEL GENETIC ALGORITHM
    245. IMAGE PROCESSING TECHNIQUES FOR THE DETECTION AND REMOVAL OF CRACKS IN DIGITIZED PAINTINGS
    246. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORKS
    247. NOISE REDUCTION BY FUZZY IMAGE FILTERING
    248. ONLINE HANDWRITTEN SCRIPT RECOGNITION
  213.  ODAM: AN OPTIMIZED DISTRIBUTED ASSOCIATION RULE MINING ALGORITHM
  214. PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION
  215. WORKFLOW MINING: DISCOVERING PROCESS MODELS FROM EVENT LOGS
  216.  STRUCTURE AND TEXTURE FILLING-IN OF MISSING IMAGE BLOCKS IN WIRELESS TRANSMISSION AND COMPRESSION APP
  217. AN AGENT BASED INTRUSION DETECTION, RESPONSE AND BLOCKING USING SIGNATURE METHOD IN ACTIVE NETWORKS
  218.  A NOVEL SECURE COMMUNICATION PROTOCOL FOR AD HOC NETWORKS [SCP]
  219.  ITP: AN IMAGE TRANSPORT PROTOCOL FOR THE INTERNET
  220. HYBRID INTRUSION DETECTION WITH WEIGHTED SIGNATURE GENERATION OVER ANOMALOUS INTERNET EPISODES (HIDS)
  221. INCREMENTAL DEPLOYMENT SERVICE OF HOP BY HOP MULTICAST ROUTING PROTOCOL
  222. NETWORK BORDER PATROL: PREVENTING CONGESTION COLLAPSE AND PROMOTING FAIRNESS IN THE INTERNET
  223.  APPLICATION OF BPCS STEGANOGRAPHY TO WAVELET COMPRESSED VIDEO
  224. NEURAL NETWORKS FOR UNICODE OPTICAL CHARACTER RECOGNITION
  225. AN ACKNOWLEDGMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR IN MANETS
  226. NEURAL NETWORK-BASED FACE DETECTION
  227. XTC: A PRACTICAL TOPOLOGY CONTROL ALGORITHM FOR AD-HOC NETWORKS
  228. A NEAR-OPTIMAL MULTICAST SCHEME FOR MOBILE AD HOC NETWORKS USING A HYBRID GENETIC ALGORITHM
    265. MOBILE AGENTS IN DISTRIBUTED MULTIMEDIA DATABASE SYSTEMS
    266. IMAGE STREAM TRANSFER USING REAL-TIME TRANSMISSION PROTOCOL
    267. EFFICIENT FAULT-TOLERANT DISTRIBUTED CHANNEL ALLOCATION ALGORITHM FOR CELLULAR NETWORKS
    268. PERSONAL AUTHENTICATION USING 3-D FINGER GEOMETRY
    269. ADAPTIVE DATA FUSION FOR ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS
    270. EFFICIENT BROADCASTING WITH GUARANTEED COVERAGE IN MOBILE AD HOC NETWORKS
    271. REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY
  229.  A MEMORY LEARNING FRAMEWORK FOR EFFECTIVE IMAGE RETRIEVAL
  230.  HIGH-SPEED FACE RECOGNITION BASED ON DISCRETE COSINE TRANSFORM AND RBF NEURAL NETWORKS
  231. GOP-BASED CHANNEL RATE ALLOCATION USING GENETIC ALGORITHM FOR SCALABLE VIDEO STREAMING OVER ERROR-PRONE NETWORKS
  232. NEURAL NETWORKS FOR HANDWRITTEN CHARACTER AND DIGITS
  233. EVALUATING THE PERFORMANCE OF VERSATILE RMI APPROACH IN JAVA
  234. EFFECTIVE PACKET ANALYZING AND FILTERING SYSTEM FOR ATM NETWORK
  235. SELECTIVE ENCRYPTION OF STILL IMAGE
  236. HOMOGENOUS NETWORK CONTROL AND IMPLEMENTATION
  237. DYNAMIC SIGNATURE VERIFICATION USING PATTERN RECOGNITION
  238. EMBEDDING IN VIDEO STEGANOGRAPHY
  239. GENETIC ALGORITHM BASED TRAIN SIMULATION USING CONCURRENT ENGINEERING
  240. LOCATION AIDED ROUTING FOR MOBILE AD-HOC NETWORKS
  241.  DIGITAL WATER MARKING FOR VIDEO PIRACY DETECTION
  242. ENCRYPTION AND DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WLAN
  243. FILE ENCRYPTION AND ENCRYPTED TEXT EMBEDDING IN AN IMAGE
  244. INTEGRATING SPEECH ENGINE WITH WEB NAVIGATOR
  245. INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEMS
  246. JAVA PRODUCTIVITY AIDS
    291. J2ME MAIL CLIENT SERVER
    292. MONITORING AND MANAGING THE CLUSTERS USING JMX
    293. NETWORK ANALYZER
    294. FLOOD FILL ALGORITHMS IN C# AND GDI+
    295. GENETIC ALGORITHMS AND THE TRAVELING SALESMAN PROBLEM USING C# AND ATL COM
    296. HIDING MESSAGES IN THE NOISE OF A PICTURE
    297. WINDOWS MANAGEMENT INSTRUMENTATION WMI IMPLEMENTATION
    298. STEGANOGRAPHY FOR HIDING DATA IN WAVE AUDIO FILES
    299. AUTOMATIC DEPENDENT SURVEILLANCE-BROADCASTING (ADS-B)
    300. NEURAL NETWORK FOR RECOGNITION OF HANDWRITTEN AND DIGITS BACKPROPAGATION
    301. NETWORK TRAFFIC ANOMALY DETECTOR
  247. OPTIMAL CRYPTOGRAPHIC TECHNIQUE
  248. PEER TO PEER MESSAGING SYSTEM USING JXTA
    304. PERFORMANCE EVALUATION OF DISTANCE ROUTING ALGORITHM IN MANET
    305. PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSION
    306. QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
    307. VIRTUAL PRIVATE NETWORK
    308. VOICE ENABLED SMART BROWSER
    309. XML ENABLED SQL SERVER
    310. AN EFFICIENT MESSAGE DIGEST ALGORITHM (MD) FOR DATA SECURITY
    311. HOPFIELD MODEL OF NEURAL NETWORK FOR PATTERN RECOGNITION
    312. USING TRIGONOMETRY AND PYTHAGORAS TO WATERMARK AN IMAGE
    313. HIDING MESSAGES IN THE NOISE OF A PICTURE
    314. ERP FOR LEATHER COMPANY
    315. CRYPTOGRAPHICALLY USING SECURE SERVER/CLIENT PROTOCOL
    316. GENETIC ALGORITHMS AND THE TRAVELING SALESMAN PROBLEM USING C# AND ATL COM
    317. NEURAL NETWORKS FOR HANDWRITING DETECTION SYSTEM USING BRAIN NET
    318. WIRELESS TRAFFIC VIEWER USING J2ME
    319. VIDEO STEGANOGRAPHY USING MOBILE SIMULATION
    320. IMAGE RENDERING FOR GRID TECHNOLOGY
    321. JAVA NETWORK FILE SHARING SYSTEM
    322. JAVA VISUAL EDITOR WITH COMPILER
    323. E-MAIL SERVER USING MULTITHREADED SOCKETS
    324. NETWORK COMPONENT FOR XML MIGRATION
    325. IMAGE WATER MARKING AND COMBUSTION
    326. IMAGE PROCESSING FOR CONVOLUTION FILTERS
    327. ARTIFICIAL INTELLIGENCE NETWORK LOAD BALANCING USING ANT COLONY OPTIMIZATION
    328. IMAGE PROCESSING FOR EDGE DETECTION FILTERS
    329. MOBILE INFORMATION PROVIDER
    330. EFFICIENT ROUTING IN INTERMITTENTLY CONNECTED MOBILE NETWORKS: THE MULTIPLE COPY CASE
    331. MINIMIZING FILE DOWNLOADING TIME IN STOCHASTIC PEER-TO-PEER NETWORKS
    332. QUIVER: CONSISTENT OBJECT SHARING FOR EDGE SERVICES
    333. RATE & DELAY GUARANTEES PROVIDED BY CLOSE PACKET SWITCHES WITH LOAD BALANCING
    334. GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT
    335. A PRECISE TERMINATION CONDITION OF THE PROBABILISTIC PACKET MARKING ALGORITHM
    336. INTRUSION DETECTION IN HOMOGENEOUS & HETEROGENEOUS WIRELESS SENSOR NETWORKS
    337. A DISTRIBUTED AND SCALABLE ROUTING TABLE MANAGER FOR THE NEXT GENERATION OF IP ROUTERS
    338. WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION BASED TECHNIQUES
    339. ACTIVE QUEUE MANAGEMENT FOR FAIR RESOURCE ALLOCATION IN WIRELESS NETWORKS
    340. BENEFIT BASED DATA CACHING IN AD HOC NETWORKS
    341. BANDWIDTH EFFICIENT VIDEO MULTICASTING IN MULTIRADIO MUILTICELLULAR WIRELESS NETWORKS
    342. PERFORMANCE OF A SPECULATIVE TRANSMISSION SCHEME FOR SCHEDULING LATENCY REDUCTION
    343. TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATHS
    344. CONTROLLING IP SPOOFING THROUGH INTER DOMAIN PACKET FILTERS
    345. A NEW MODEL FOR DISSEMINATION OF XML CONTENT
    346. EFFICIENT 2-D GRAYSCALE MORPHOLOGICAL TRANSFORMATIONS WITH ARBITRALY FLAT STRUCTURING ELEMENTS
    347. FUZZY CONTROL MODEL OPTIMIZATION FOR BEHAVIOR-CONSTENT TRAFFIC ROUTING UNDER INFORMATION PROVISION
    348. RATE ALLOCATION & NETWORK LIFETIME PROBLEM FOR WIRELESS SENSOR NETWORKS
    349. VISION BASED PROCESSING FOR REAL-TIME 3-D DATA ACQUISITION BASED ON CODED STRUCTURED LIGHT
    350. PROBABILISTIC PACKET MARKING FOR LARGE SCALE IP TRACE BACK
    351. INTERACTION OF IPSS: DISTRIBUTED RESOURCE ALLOCATION AND REVENUE MAXIMIZATION
    352. A SIGNATURE BASED INDEXING METHOD FOR EFFICIENT CONTENT BASED RETRIEVAL OF RELATIVE TEMPORAL PATTERNS
    353. USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT ORIENTED SYSTEMS
    354. TRUTH DISCOVERY WITH MULTIPLE CONFLICTING INFORMATION PROVIDERS ON WEB
    355. LOCATION BASED SPATIAL QUERY PROCESSING IN WIRELESS BROADCAST ENVIRONMENTS
    356. BANDWIDTH ESTIMATION FOR IEEE 802.11 BASED ADHOC NETWORKS
    357. MODELING & AUTOMATED CONTAINMENT OF WORMS
    358. SECURITY IN LARGE NETWORKS USING MEDIATOR PROTOCOLS
    359. DESIGNING LESS – STRUCTURED P2P SYSTEMS FOR THE EXPECTED HIGH CHURN
    360. ESTIMATION OF DEFECTS BASED ON DEFECT DECAY MODEL: ED3M
    361. ON GUARANTEED SMOOTH SWITCHING FOR BUFFERED CROSSBAR SWITCHES
    362. ACTIVE LEARNING METHODS FOR INTERACTIVE IMAGE RETRIEVAL
    363. ORTHOGONAL DATA EMBEDDING FOR BINARY IMAGES IN MORPHOLOGICAL TRANSFORMS DOMAIN A HIGH CAPACITY APPROACH
    364. EFFICIENT RESOURCE ALLOCATION FOR WIRELESS MULTICAST
    365. LOCALIZED SENSOR AREA COVERAGE WITH LOW COMMUNICATION OVERHEAD
    366. TRUSTWORTHY COMPUTING UNDER RESOURCE CONSTRAINTS WITH THE DOWN POLICY
    367. CREDIT CARD FRAUD DETECTION USING HIDDEN MARKOV MODELS
    368. AN EFFICIENT ASSOCIATION RULE MINING ALGORITHM IN DISTRIBUTED DATABASES
    369. BRA BI-DIRECTIONAL ROUTING ABSTRACTION FOR ASYMMETRIC MOBILE AD HOC NETWORKS
    370. COACS: CO – OPERATIVE AND ADAPTIVE CACHING SYSTEM FOR MANETS
    371. SCALABLE AND EFFICIENT END-TO-END NETWORK TOPOLOGY INFERENCE
    372. MULTICAST ROUTING WITH DELAY AND DELAY VARIATION CONSTRAINTS FOR COLLABORATIVE APPLICATIONS ON OVERLAY NETWORKS
    373. OCGRR: A NEW SCHEDULING ALGORITHM FOR DIFFERENTIATED SERVICES NETWORK
    374. EFFICIENT AND SECURE CONTENT PROCESSING AND DISTRIBUTION BY COOPERATIVE INTERMEDIARIES
    375. STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA
    376. HBA DISTRIBUTED METADATA MANAGEMENT FOR LARGE CLUSTER-BASED STORAGE SYSTEMS
    377. TEMPORAL PORTIONING OF COMMUNICATION RESOURCES IN AN INTEGRATED ARCHITECTURE
    378. HARDWARE ENHANCED ASSOCIATION RULE MINING WITH HASHING AND PIPELINING
    379. PROTECTION OF DATABASE SECURITY VIA COLLABORATIVE INFERENCE DETECTION
    381. SECURING USER-CONTROLLED ROUTING INFRASTRUCTURES
    382. ONLINE INDEX RECOMMENDATIONS FOR HIGH-DIMENSIONAL DATABASES USING QUERY WORKLOADS
    383. A NOVEL FRAMEWORK FOR SEMANTIC ANNOTATION AND PERSONALIZED RETRIEVAL OF SPORTS VIDEO
     A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
    2. A Reputation Based Trust Model for Peer to Peer eCommerce Communities “ IEEE
    3. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
    4. Mobile Banking Design & Implementation – IEEE
    6. Distributed Data mining in Credit Card Fraud Detection Analysis “ IEEE
    7. E-Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management “ IEEE
    8. Java Productivity Aids to Track the Control Flow, Parsing, Control Flow & Log Reader
    9. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
    10. VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
    11. Authenticating Network Attached Storage – IEEE
    12. Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S – IEEE
    13. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
    14. Digital Image Processing with Multi Domain Approach “ IEEE
    15. Static Image Hand Gesture Recognition using Neural Networks
    16. CAC “ Connection Admission Control using ATM Networks Implementation “ IEEE
    17. Distributed Component Router based Supply Chain Management System “ SCM “ IEEE
    18. Intelli WAP System Implementation / WAP based information Retrieval System
    19. Proxy Server – Design and Implementation
    20. Public Key Validation for DNS Security Extensions “ Domain Naming Server
    21. E-Recruitment System – Dynamic Online Professional Recruitment & Management System
    22. Secure Password-Based Protocol for Downloading a Private Key – IEEE
    23. Distributed Cache Updating for Dynamic Source Routing Protocol – IEEE
    24. Network Security System in DNS using AD-HOC Networks “ IEEE
    25. Secure Optimal Cyclic Cryptographic System “ IEEE
    26. Multithreaded Peer to Peer Communication using Distributed Frameworks“ IEEE
  249. Building Intelligent Shopping Assistant using Data mining technique for Web Services “ IEEE
  250. Network Analyzer & Network Monitoring Tool using SNMP
  251. Remote Computing using Thin Clients
  252. VVoIP “ Voice with Video Over IP Networks
  253. Dynamic Character & Pattern Recognition using Neural Networks
  254. Online Handwritten Script Recognition – IEEE
  255.  Towards multi model interfaces for intrusion detection – IEEE
  256. Proxy Server – A Smart Sharing System with Fire wall Protection, Customized Firewall for internet security & inter-network traffic gateway “ IEEE
  257.  Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
  258. Network Border Patrol for Congestion Collapse Preventing System “ IEEE
  259. Defect Tracking Tool – Enterprise Project and Defect Tracking System “ IEEE
  260. Digital Signature Verification using Artificial Neural Networks / Digital Signature Verification
  261. Multi Router Traffic Monitor Implementation
  262. Homogeneous Networks & Control Implementation
  263. A/I Net A Network that Integrates ATM and IP – IEEE
  264. E“Secure Transaction “ Design & Implementation “ IEEE
  265. Image Compression and Analysis with MSE & PSNR Technique – IEEE
  266. Crypt kit “ A real time cryptographic system for security over the networks – IEEE
  267. Efficient Contiguous Data & Video Streamer with Buffer Management46. Distributed Component Router Based CRM “ Customer Relationship Management“ IEEE
  268. Network Traffic, Packet Analyzer and Sniffer
  269. Digital Steganography: Hiding Data within Data
  270. Integrated Development Environment using JSWING “ IDE JSWING
  271. ERP Application “ integrated Enterprise Solutions with Strategic advantages
  272. Grid information Retrieval System
  273. Network Packer Sniffer Implementation
    53. Online Issue Tracking – Project Management Solutions
    54. E-HealthCare – Distributed HealthCare and A Strategic Management System
    55. Data mining implementation for Credit Cards Application Processing System
    56. Dynamic University Linking & Data integrity Maintenance
    57. E-Sales Order Processing System
    58. RTF to XML Converter
    59. Material Forecasting and Management Solution60. Effective & Efficient Freight Management System
    61. XML (Extensible Markup Language) enabled SQL for Storing & Retrieving Data
    62. XML Migration – Implementation for XML format from Database System
    63. Shares & Stock Management system “ Portfolio Manager Implementation
    65. Vertical Market Information Providing System Implementation
    67. Inter Office Messaging System “ IOMS, Office Automation System
    68. Web based Matrimonial Services, A Desi Matrimony web Portal
    69. Online Auction & Bidding System With Multi Brand & Product Selection
    70. Online Body Shopping System with Auto Mailing feature
    71. Online Job Consultancy Services
    72. Net Banking Services & Solutions
    73. Online Web Shop Mall – Web Shop Site
    74. Intelli Shopping Cart & Assistant System
    75. Online VRS – Vehicle Reservation System
    76. Distributed Web Service for On-Line Coursework Submission
    77. Document Archival Management System “ Electronic Archival Design
    78. Remote Electricity Billing System Automation & Implementation “ EJB
    79. Dynamic College information System & Data integrity Maintenance
    80. Computerized system for Extracting Abstract from the given source document, Abstract solutions
    81. eCareer & Consultancy Service Online
    82. eGovernance Design & Implementation System
    83. EAI Approach “ Implementation of EAI in Hotel Management System
    85. Online Hospital info System with interactive Services & Universal Medical Portal with Adviser
    86. Human Resource Management Solutions (HRMS)
    87. Online Web based Complete Recruitment System
    88. Distributed Database System for online Shopping & Store
    89. Web based Distributor Information Providing Services
    90. Insurance System, Online Insurance Solutions Provider
    91. Integrating Data and Voice Networks – VoIP
    92. Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
    93. Adaptive Coding and Packet Rate for TCP – Friendly VoIP Flows – IEEE
    94. Mobile based Network Monitoring System
    95. System to Mobile Communication
    96. Video Transmission using SIP – IEEE
    97. Web based Chatting – Multi User Voice Chat
    98. Network Traffic Anomaly Detector “ IEEE
    99. SIP – Session Initialization Protocol, Chatting
    100. Monitoring & Managing the Clusters using JMX “ IEEE
    101. Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
    102. Peer-to-Peer implementation Multithreaded Technology with tuple space
    103. Network Proctor & Action Coordinator – The Network Monitoring Daemon “ IEEE
    104. P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
    105. Secured Network manager
    106. Performance Evaluation o RMI using Latency, Round Trip Time and Packets Per Unit time “ IEEE
    107. Scalable Wireless Ad-Hoc Network Simulation using XTC “ IEEE
    108. Voice Web Browser Implementation
    109. Network Analyzer, Design & Implementation110. Routing Simulator – An Efficient end to end Packet Delivery system
    111. Remote Viewer “ A Remote Desktop viewer for an Intranet Environment
    112. Remote City Mapping Implementation using J2ME
    113. Mobile Clients Support GUI Systems design
    114. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
    115. Bluetooth equipped mobile phones to support synchronous interaction with public displays
    116. Bluetooth based Mobile Phone Photo Browser
    117. IMAP – Internet Mail Access Protocol using Internet Engineering Task Force
    118. Online PDA “ Primary Domain Controller System
    119. Java Virtual Pad – RFB protocol based Desktop sharing exclusively or on request
    120. Portable and Generic tool for Web Applications
    121. Network Document Management & Versioning System
    122. Dynamic Server Replication System
    123. Instant Smart Messenger System
    124. Multi Threaded implementation with Pull / Push Technology
    125. Tool for Performance Profiling of Web Sites
    126. Network Time Tracker system
    127. Workflow based Complaint Management System
    128. Project Scrutinizer “ Efficient Project Tracking System
    129. Project Tracking & It Portfolio Management System
    130. JSP based Shopping Cart Implementation
    131. ERP & CRM, An Effective implementation of ERP with CRM Solutions
    132. Financial Accounts – Integrated Financial Accounting Solutions
    133. Multi Language Mailing system “ Design & implementation
    134. uPortal “ University Portal & Education Grid information Service Provider135. AD HOC NETWORK BASED PROJECTS
    136. Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
    137. XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE
    138. Network Security System in DNS using AD-HOC Networks “ IEEE
    139. Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
    140. J2ME PROJECTS
    141. Mobile Banking Design & Implementation – IEEE
    142. Intelli WAP System Implementation / WAP based information Retrieval System
    143. J2me Implementation of POP3 Client System / J2ME Mail Client Server Implementation / Mail Downloader Using J2ME
    144. Remote City Mapping Implementation using J2ME
    145. Mobile Clients Support GUI Systems design
    146. JAVA J2ME “ Bluetooth based Application for PDA / Mobile Devices
    147. Bluetooth equipped mobile phones to support synchronous interaction with public displays
    148. Bluetooth based Mobile Phone Photo Browser
    149. Mobile Info Service Provider “ Online Data & information Access System
    150. IMAGE PROCESSING PROJECTS
    151. Digital Image Processing with Multi Domain Approach “ IEEE
    152. Static Image Hand Gesture Recognition using Neural Networks
    153. Digital Signature Verification using Artificial Neural Networks
    154. Dynamic Character & Pattern Recognition using Neural Networks
    155. Image Compression and Analysis with MSE & PSNR Technique “ IEEE
    156. Online Handwritten Script Recognition “ IEEE
    157. COMMUNICATION PROJECTS
    158. ? System to Mobile Communication
    159. ? Video Transmission using SIP – IEEE
    160. ? Efficient Contiguous Data & Video Streamer with Buffer Management
    161. ? Web based Chatting – Multi User Voice Chat
    162. ? SIP – Session Initialization Protocol, Chatting
    163. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
    164. ? VVoIP “ Voice with Video Over IP Networks
    165. SECURITY PROJECTS
    166. ? Elliptic Curve Cryptography based Threshold Cryptography (ECCTC) Implementation for MANETâ„¢S – IEEE
    167. ? Crypt kit “ A real time cryptographic system for security over the networks – IEEE
    168. ? Secure Optimal Cyclic Cryptographic System
    169. ? JSAFE – Rijndael Algorithm based Encryption & Decryption
    170. ? Secured Network manager
    171. ? E“Secure Transaction “ Design & Implementation
    172. ? Fire wall – Customized Firewall for internet security & inter-network traffic gateway
    173. ? Secure Password-Based Protocol for Downloading a Private Key
    174. NETWORKING PROJECTS
    175. ? A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks “ IEEE
    176. ? Adaptive Coding and Packet Rate for TCP – Friendly VoIP Flows – IEEE
    177. ? Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion
    178. ? Authenticating Network Attached Storage – IEEE
    179. ? CAC “ Connection Admission Control using ATM Networks Implementation
    180. ? Distributed Cache Updating for Dynamic Source Routing Protocol – IEEE
    181. ? Efficient Contiguous Data & Video Streamer with Buffer Management182. ? Dynamic Server Replication System
    183. ? Mobile based Network Monitoring System
    184. ? Monitoring & Managing the Clusters using JMX “ IEEE
    185. ? Multi Router Traffic Monitor Implementation
    186. ? Grid information Retrieval System
    187. ? Homogeneous Networks & Control Implementation
    188. ? Location Aided Routing in Mobile ADHOC Networks for Secured Routing “ IEEE
    189. ? Mobile Agents in a Distributed Multimedia Database System “ IEEE Approach
    190. ? Multithreaded Peer to Peer Communication using Distributed Frameworks
    191. ? Network Analyzer & Network Monitoring Tool using SNMP
    192. ? Network Border Patrol for Congestion Collapse Preventing System
    193. ? Network Packer Sniffer Implementation
    194. ? Network Proctor & Action Coordinator – The Network Monitoring Daemon “ IEEE
    195. ? Network Security System in DNS using AD-HOC Networks “ IEEE
    196. ? Network Traffic Anomaly Detector “ IEEE
    197. ? Network Traffic, Packet Analyzer and Sniffer
    198. ? Optimal Multicast Routing in ADHOC Networks With ADHOC Multicast Routing Protocol (AMRoute) “ IEEE
    199. ? P2P (peer-to-peer networking) messaging system-using JXTA “ IEEE
    200. ? Peer-to-Peer implementation Multithreaded Technology with tuple space
    201. ? Performance Evaluation of RMI – Latency, Round Trip Time & Packets Per Unit time “ IEEE
    202. ? Public Key Validation for DNS Security Extensions “ Domain Naming Server
    203. ? Remote Computing using Thin Clients
    205. ? Routing Simulator – An Efficient end to end Packet Delivery system
    206. ? Secured Network manager
    207. ? VOIP “ Flexible & Efficient Voice Communicator, Voice Over IP
    208. ? XTC Algorithm based Scalable Wireless AD-HOC Networking “ IEEE209. Modern English Spell Checking tool Design & Implementation
    210. Web Based Bug Tracking System Implementation
    211. E-Mail & SMS Assistant “ Design & Implementation
    212. Mobile Agent Software for Payroll Processing System
  274.  J2EE based Quick Car Rental Services Implementation

  275. Application Installer

  276. Online ATM Banking & online transactions

  277.  On-Line Book store with online Shopping cart

  278. Proxy Server – TransProxy

  279. Career tracer – communicator between job seekers and job providers

  280.  J Chat “ A Chatting System over the Internet or local networks

  281. Client FTP Frame

  282. Online Airline Reservation Web portal for Traveling service provider

  283. Computer Resource Management System (CRMS)

  284.  Content management systems (CMS) for University & Education portal

  285. Credit card system – web-based system facilitates on line operations

  286. Control System for the Maintenance of Computers

  287.  Web based Customer Support System

  288. Distributed Channel Management System228. Digital Signatures System Design & Implementation

  289. Distance Learning System Implementation

    230. Online E Banking provides online transactions

    231. E-Boutique – web portal design and implementation

    232. eSearch – Web based search engine

    233. Employee Training Tracking System

    234. E-Learning – web portal design and implementation

    235. E-Music web-based design system provides online Music

    236. Web Enabled Automated Manufacturing System – WEAMS

    237. Fire wall – Customized Firewall for internet security & inter-network traffic gateway

    238. File Transfer Protocol – FTP Implementation239. Hospital Management system

    240. HR Consultancy and Applicant Database Management with XML

    241. Intranet Mailing System design and implementation

    242. Issue tracking System with Bug Tracking, Help Desk Ticketing & Solutions

    243. Web based Online Library System

    244. Web based Online Book Store

    245. Jobs.com “ A Service Provider for Employer & Employee

    246. JChart for complex business & scientific charts

    247. JSAFE – Rijndael Algorithm based Encryption & Decryption

    248. Loyalty Business Tracker Application System

    249. Mobile Clients Support GUI Systems design

    250. Net Banking Services Design & Implementation

    251. Net Conference Design & Implementation

    252. Design & Implementation of Online Bidding & Auction

  290. Online Resume Mart System Design

  291.  Online Tutorials – global forum for educators and students

  292. JEDITOR – Customized Java Editor

  293.  eTutor – Online Tutorial, revolutionizing the tutoring industry

  294. Pharmaceutical Distribution Automation Software system

  295. Remote Desktop Capture system

  296. eSearch – A Search Engine Design & Implementation

  297. SMTP based JAVA MAIL CLIENT Graphical User Interface system

  298.  Java based Spam Filter implementation

  299. Telecom Inventory maintenance and services Application with error tracking

  300. Project based Time & efforts Tracking System Implementation

  301.  Training Organization Management System Implementation

  302. Web Testing Tool Application – Designed to test & measure performance

  303. Web based Job Site Management system “ A Exclusive Job Portal with Mega features

  304. Employee Profile Management System “ An Effective Employee Management Resource

  305. Development of Web enabled Online, Dynamic ATM Card Management System

  306. Time Synchronization system using java

  307. ATM Card & CMS application Back Office Management

  308. Honey Pots “ A Security System to Identify Black Hat Community in the Networks

  309. Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP)

  310.  Bandwidth Congestion Control using Authentication Service for Automatic and Dynamic Reconfiguration System

  311. Network Load Balancing and Redistribution of the Traffic Over the Networks using Grid Computing System

  312.  Media Streaming in Mobile using J2ME Toolkit

  313.  Efficient Network Routing Protocol with Effective Data Transfer without Packet Loss Over the ADHOC Networks

  314. Data Communication and File Transferring using Decreased Latency and Block Tracker

  315. Authentication of Digital Images by Encryption and Decryption with Primary Key Implementation using LSB Algorithm and Steganography

  316. Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol

  317. Implementation of Security Kernel and Firewall using Java

  318.  Media streaming using J2ME

  319.  Unified Interface for Multiple Naming Service using JNDI

  320.  Multiplex SMS relay over GSM using AT commands

  321. Zero Installation of Client DB Driver using RPC

  322. Integrated Data Persistence & Synchronization in PDAâ„¢s

  323. Distributed Cache Updating for the Dynamic Source Routing Protocol

  324. Distributed Collaborative Key Agreement & Authentication Protocol for Dynamic Peer Groups

  325. An Agent-Based Testing for Web Application

  326.  TCP-LP: Low Priority Service via End“Point Congestion Control

  327. On Self-Fish Routing in Internet Like Environments

  328. Schema based Enterprise Charting & Reporting for Desktops

  329.  ER  Schema Analyzer with Data Streaming

  330.  Data Hiding in Audio Files with PBE Encryption

  331. Duplex Messaging for Enterprise Systems

  332.  Integrated Mail Transfer Agents using JAF

  333.  Designing Test Automation System using Native System Input Events

  334.  Components Framework for Developer Network using MVC Pattern298. Asynchronous Server Interaction using AJAX and XML

  335. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

  336.  An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management

  337.  An Anti-phishing Strategy Based on Visual Similarity Assessment

  338.  News Feed Syndication Generation over Heterogeneous Networks

  339.  Enterprise Mailing System validation with DNS query using MX Records

  340. Component based Architecture for WAP Compliant Transactional Services

  341. On Demand Audio / Video Streaming and rendering Over IP using UDP

  342.  Proactive Port Scanning for Secure Computing Environment

  343. DDE Thin Client Midlet for Limited Devices using Java Communication

  344. Denial of Service against the Domain Name System

  345. Digital Rights Management (DRM) using SOAP

  346.  Multithreaded Networked Data Injector & Extraction Server & Client for Cryptographic Services

  347. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks

  348. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers

  349.  Anteater-A Service Oriented Architecture for High Performance Data Mining

  350. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates

  351. Cross-Layer Optimization in TCP/IP networks

  352.  Data Security in Ad hoc Networks Using Multipath Routing

  353. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server

  354. Distributed Token Circulation in Mobile Ad Hoc Networks

  355. Versioning Control System using JAVA

  356. Virtual Private Network using JAVA

  357. Voice based XML Phone Survey System

  358. VSAT Simulation and Smart Cache Loader

  359.  WAP based information Retrieval System

  360. WAP based Route Tracing and Mailing

  361.  WAP Enabled Greeting Card System – WAP Enabled Device User to send greeting card to other WAP Enabled Devices

  362.  Web Enabled Supply Chain Management

  363.  Wireless Application Programming with J2ME and Bluetooth

  364. Workflow based Complaint Management System

  365. XML Parser for EMail Resumes / Resume Tracking & allotment using XML

  366.  Instant Messaging and Presence Technology for College Campuses

  367. Intrusion Detection in Wireless Ad-hoc Network

  368.  Exponential-RED: A Stabilizing AQM Scheme for Low- and High-Speed TCP Protocols

  369.  Fine Grained Layered Multicast using STAIR

  370.  Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks

  371. Network-Wide Prediction of BGP Routes

  372.  NIRA: A New Inter-Domain Routing Architecture

  373. Online Detection and Prevention of Phishing Attacks

  374. OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET

  375. A Natural Language-Based Interface for Querying a Video Databas

  376. A Route Reconstruction Method Based on Support Group Concept for Mobile Ad hoc Networks

  377.  A Secure Routing Protocol for mobile Ad-hoc Network

  378. A Trustworthy Mobile Agent Infrastructure for Network Management

  379.  A wireless distributed intrusion detection system and a new attack model

  380.  Allocating Applications in Distributed Computing using JINI

  381. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs346. Routing and Security in Mobile Ad Hoc Networks

  382.  Scripting JAX-WS

  383.  Simple a Pre-Provisioning Scheme to Enable Fast Restoration

  384.  Site-based Mapping for parallel proxy servers with fewer TCP connections

  385.  StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense

  386. Watermark Based Digital Rights Management

  387.  A Semantic Web-Based Approach to Knowledge Management for Grid Applications

  388.  A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection

  389.  Context Oriented Search Engine with Web Crawler

  390.  Converting RTF into XML using the TEI Lite DTD

  391.  CRM based Sales of Fleet & Services Management

  392.  Data and Video Streaming System

  393.  Data Encryption and Compression System with Optimization

  394.  Dealership Management System – Dealers information & Dealings Process Manager

  395.  Defect Tracking Tool – Enterprise Project and Defect Tracking System

  396.  Design & Development of a Distributed, Scalable File Sharing & Access System with Security

  397.  Digital Image Processing “ Frequency Domain

  398.  Digital Water Marking for Video Piracy Detection

  399. Distributed Database System for online Shopping & Store

  400. Distributed File Sharing System for Peer to Peer Network

  401.  E-Commerce Shopping cart for B2B Implementation

  402. EJB Implementation Of Distributed Online Stock Maintenance and Trading

  403.  Graphical Network Browser

  404. Heterogeneous Networks Control and Implementation

  405.  Implementation of Diagnosis, Packet Capturing and Transaction Monitoring and Administration in IP Network

  406.  Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments

  407. Patient Keeper: Medical Application on mobile Phone

  408. VPersonalized E-mail Management at Network Edges

  409. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval

  410. XML Data Stores: Emerging Practices

  411. XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks

  412.  Image File compression & Transmission across the Network by MDA (Message Digest Algorithm)

  413. Remote File Consistency Inspector using SHA Algorithm in Mobile Agents (IEEE)379. Media Gateway Control Protocol Network

  414.  Analyzing Network Traffic in order to Detect possible Intrusions by RED Algorithm

  415. Route Reservation in Ad Hoc Wireless Networks

  416. Pre Active Circulated Cache Updating using on Demand Routing Protocol

  417. Dynamic Load Balancing in Distributed Systems in The Presence Of Delays “ A Regeneration Theory Approach

  418.  A Robust Spanning Tree Topology Doe Data Collection and Dissemination in Distributed Environments

  419. An Acknowledgement Approach for the Detection of Routing Misbehavior in MANETS

  420. A Fully Distributed Proactively Secure Threshold Multi signature Scheme

  421. Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes

  422. A Hierarchical Modeling and Analysis for Grid Service Reliability

  423. Secure Data Hiding and Extractions using BPCS

  424. SLA-Driven Clustering of QOS Aware Application Servers

  425.  User Interface for Scalable Peer-to-Peer Look Up Service for Internet Telephony

  426. Advanced Host Monitor Enterprise

  427. Advanced instant Messenger & Message Broadcasting

  428. Bug Tracking System – Comprehensive Bug Tracking & Change Management

  429. Call Centre Management System

  430. CALTOOL “ Computer Aided Learning Tool

  431. Cargo Tracking System Design & implementation

  432. Complete email system with an email server and an email client

  433. Image Compression and Decompression using Huffmanâ„¢s

  434. Image Manipulation for Face Recognition

  435. Implementation of Broadcast Messaging System using Multi Threading

  436. Asset Management Solution (AMS)

  437. Implementation of Packet Filtering Firewall in Linux Systems

  438. Implementation of Peer-to-Peer Communication System with a Centralized Name Server in Linux Network

  439. Implementation of Secured & Encrypted Data Transmission over the Web

  440. Implementation of Wireless Application Protocol Gateway in Mobile Network

  441. Implementation of Wireless Communication Gateway for PC To Mobile Network Route using Internet Protocol

  442. Integrated & Distributed Enterprise Resource Planning with Customer Relationship Management Support

  443. Intelli Mobile Banking System Design & Implementation

  444. Investigation and Analysis of Packets Transformation in an Ethernet Network System

  445. Java Grid Using Grid Computing System

  446.  Java Network Flow Analyzer

  447.  Java Network Monitor / Java Network Browser

  448. Java RMI-based application which manages load balancing on heterogeneous clusters

  449.  Java SMTP, POP, Web Email Server

  450. Java-to-XML Data Binding tool

  451. Job Portal Implementation with intelli power features

  452. JSP – Personal information Manager

  453. Logistics – freight forwarding software solution logistics

  454. Multimedia Messaging Service – MMS

  455. Multiplex & Demultiplex Conversion in Audio / Video Transcoding Systems

  456. Net Monitoring and Management using SNMP

  457. Network Administrators to Monitor VPN and SSL Connections

  458.   Neural Network based Character Pattern Identification System

  459.  On-Line Analytical Processing – Maintenance of Data collection & Reports

  460.  Online Enterprise Resources Planning “ Web Enabled ERP implementation with Distributed Database system

  461. Online Health Care Management Solutions

  462.  Online Distributed Human resources Management System

  463. Online Portfolio Manager “ Equity Trading & Mutual Funds management

  464. Online web enabled Bug Tracking System

  465.  Online Web Shop Mall – Web Shop Site

  466. Online Workflow Service Manager & Automation

  467. SNMP Trap Gateway – Network Management

  468. Software Routing “ Packet Filtering & Capturing

  469.  Thin Client Network Implementation

  470. Ultimate Online Jobsite with intelli Search engine

  471. Professional time and task management tool

  472.  Public-Key Cryptography Extensions into Kerberos

  473.  RAT (Remote Assistance Tool) is a Java Application

  474.  Resource Planning Tool Design & Implementation (RPT)

  475.  Sales force Automation Implemenation

  476.  Sales Order Processing and invoicing (SOPI)

  477. Secure (RSA) Chat Server446. Secure Electronic Transaction System

  478. Secure Web Cache Proxy Server

  479.  Digital Image Processing “ Time Domain

  480.  Secure web conferencing on any platform using Java

  481. Secured Network Manager & Tracker using JMX

  482.  SFTP Server – Synchronous File Transfer Communicator

  483.  Smart Network Access Using Mobile Bluetooth, J2ME