Sie sind auf Seite 1von 13

c 


  

  

   
       

 1 Online training programme IT Project for students and
Department. It shouls also faculties of a department:
have AJAX powered search facilities for logging in,
capability. learning the tutorial
scheduled for the day,
submission of
assignments, evaluation
based on performance,
etc.
 2 Student Record &
Performance System
 3 College Automation System

! 4 Web database integration


system
" 5 Web Crawler
# 6 Web-based Photo Album
Viewer
$ 7 Client Server Based Live
Meeting
 8 video streaming using cell
phone with security
 9 IR/ Bluetooth Based video This Project is all about to
streaming on mobile phones provide easily affordable
security system for a
office or house or bank or
any important room
where you want to have
security by connecting IR
Transmitter and Receiver
at the entrance of the
room. If anytime, the Ir
Rays are cut, The PC is
intimated abut the same.
Immediately, an SMS is
sent to the owner of the
setup regarding the
intrusion such that the
owner can open the
application in his cell and
view the live video of the
happenings. Also, an
alarm is activated at the
PC?s end to alert the
people around regarding
intrusion. This project is
intended to : View live
video recording through a
mobile. This application
allows the mobile user to
track the activities
happening at a particular
location. Take the
snapshots of the video
recorded through webcam
in a mobile. Store these
snapshots as images in
the mobile. Images can be
stored in different formats
subjected to the a
particular selected format.
 10 Bluetooth Remote control for Opearting a laptop via
Laptop cell phone using blutooth.
The cell phone will act as
a remote control for
laptop.
 11 Facial Expression tracking Windows Desktop
Application portable to
Web Applications. The
aim of this project is
"Identification of a person
in a crime scene by
witness descriptions".This
project deals with video
fitting metods for forensic
applications.
 12 content management system
(C#/XML)
  13 content management system
(PHP/MySql)
! 14 Media player (C#.net/
DirectX)
" 15 Media Player
(C++/MFC/DirectX)
# 16 IVRS Simulator(C#/SAPI)
$ 17 IVRS Simulator(Java/SAPI)
 18 Budget tracker Windows application for
(C#.Net/SqlServer) the existing Excel
application "Budget
tracker". Import/export to
excel should be
supported.
 19 Blutooth File transfer MS Surface like
Application
 20 Running Any Program Via Control a PC connected
Network Remote Control(soft on network using a
robot) Remote like application
running on some other
computer in the network.
 21 Creation of a sniffer and a An application like
port scanner "Ethereal".
 22 Cross Platform Remote Cross Platform Remote
Surveillance System-Project Surveillance System is an
title and abstract application that monitors
remote desktops over the
network. It monitors and
scrutinizes the desktops
of all remote systems
whose IP address have
been stated for perusal. It
also keeps vigil on
processes currently
running on remote
system. The project
consists on two modules a
remote host (server) and
the user (client).
Employers can use this
program to read e-mail
and see any program that
is open on your screen.
Desktop replicating
software captures the
image on the computer
screen by intercepting
signals that are being
transmitted to the
computer¶s video card.
These images are then
streamed across the
network to the system
administrator. Some
prepackaged programs
include an alert system ²
when a user visits an
objectionable Web site or
transmits inappropriate
text, the system
administrator is alerted to
these actions.
 23 Automated Error Handling This application is mainly
System intended to log Run time
Error messages that
happens at runtime. This
is a fast and flexible
framework for logging
application debugging
messages. Inserting log
statements into your code
is a low-tech method for
debugging it. In the Java
language where a
preprocessor is not
available, log statements
increase the size of the
code and reduce its speed,
even when logging is
turned off. Given that a
reasonably sized
application may contain
thousands of log
statements, speed is of
particular
importance. This
application makes it
possible to enable logging
at runtime without
modifying the application
binary. The project is
designed in such a way
that these statements can
remain in shipped code
without incurring a heavy
performance cost.
Logging behavior can be
controlled by editing
a configuration file,
without touching the
application binary. Using
a logger hierarchy it is
possible to control which
log statements are output
at arbitrarily fine
granularity but also great
ease. This helps reduce
the volume of logged
output and minimize the
cost of logging.
! 24 Determining Web Usability This application will
monitor the internet usage
of a system. It will create
reports for the web usage.
It should also be possible
to record the amount of
data transferred i.e.
download nad upload.
$ 27 Website Recommender Effiecient web mining
System technique to determine
the probable websites
user may want to access.
 28 Fingerprint Image
Enhancement Using Fuzzy
Logic
 29 Web Session Clustering
 30 Robot fencing This project involved the
building of two robots
who fenced with each
other. One robot was
controlled by a flexible
exoskeleton that the
student built to convert
his arm movements into
movements in the robot.
The second robot was
controlled by artificial
intelligence: its skills in
fencing were created by
obtaining 'know how'
from experts on the
college Fencing team and
building a set of rules for
the robot to follow
allowing it to react to the
attacking robot in a
human like way.
 31 Video Steganography This project was about
steganography, (the word
means hidden writing).
The software package
developed allows the user
to hide information in
videos. we can find ways
of hiding the extra text
information in the video
so that the human
observer wont notice it is
there.
 32 C++ based xml parser DOM parser.
 33 Object-Oriented Relationship for each class, evaluate its
code analyzer for C++ static relationships with
others, e.g., public
inheritance, inheritance of
implementation,
composition, aggregation,
and using relationships.
Also evaluate its dynamic
relationships, e.g., for
each class, evaluate the
types of objects it creates,
communicates with, and
destroys. (create UML
diagrams all
relationships)
! 34 AJAX Based Web Browser Web browsing using
efficient url clustering
algorithms.
" 35 Efficient Clustering agglomorative clustering
Algorithm for documents algorithm. (hard
clustering)
# 36 Video Communication Over
Wireless Networks
$ 37 Cache memory Simulator Over the past few years,
the speed of
microprocessors has
increased faster than the
speed of semiconductor
memories. The effective
speed of memory can be
increased by using a
small amount of high-
speed cache memory to
hold frequently accessed
data and instructions. The
purpose of this project is
to create a cache memory
simulator in order to
analyze the effect of
changing a cache's
parameters (size,
organization, line size).
Ideally, the simulator
would be written as a
Java applet.
 38 Address and Data Simulator Computers generate
addresses and either read
data from memory or
write data to memory.
Instructions are read from
memory sequentially,
unless a branch or jump
instruction modifies the
flow of control.Cache
memory systems rely on
the "locality of reference"
of data; that is, data
elements are frequently
accessed from locations
that are close
together.The goal of this
project is to produce a
CPU simulator that
generates random
addresses and data to
simulate a real processor.
The simulator can be
programmed to behave in
various modes. You can
select how clustered the
data is, the frequency of
subroutine calls, the size
of subroutines, and so on.
 39 Computerized Student Testing Monitoring the
System performance of students
is very time-consuming
because it is so labour-
intensive. The goal of this
and the student will be
asked to convert it into a
decimal value.project is
to devise an automated
means of testing a
student¶s knowledge of
computer arithmetic,
computer logic and
computer architecture.
The system will generate
questions at random from
a database. Some
questions will be factual,
multi-choice questions.
Some will require an
exact answer. For
example, the computer
may generate a random 8-
bit binary integer The
testing system should be
diagnostic and locate the
student¶s problems. For
example, if a students
performs well in one area,
further questions at the
same level in the same
area will not be asked. If
a student performs baldly
in one area, the region of
"uncertainty" will be
probed.
 40 Traffic Control Simulations in demo simulating traffic
Boolean, Human and Fuzzy flow based on a simple
Logic traffic-flow model.the
number of the car on each
road should be assigned
arbitrarily when the
program starts (it could
be linked to any data
source via. network). user
could relocate a car from
one road to another by
dragging it with your
mouse. There has to be
few buttons for example
Buttons 'Stop Sign' and
'Traffic Light' should
allow user to switch
between traffic modes -
stop-sign control or
traffic-light control.
Button 'New Schedule for
Lights' should allow user
to change the period of all
traffic lights as a whole.
 41 Analyse and implement DSR
algorithm for ad-hoc
networks. Enhance the cache
performance for the DSR
algorithm.
 42 Extracting Actionable
Knowledge from Decision
Trees
  43 Maintaining Strong Cache
Consistency for the Domain
Name System
! 44 Efficient Skyline and Top-k
Retrieval in Subspaces
" 45 Rule Extraction from Support
Vector Machines: A
Sequential Covering
Approach
# 46 Fast Nearest Neighbor
Condensation for Large Data
Sets Classification
$ 47 Wildcard Search in Structured
Peer-to-Peer Networks
 48 Efficient Process of Top-k
Range-Sum Queries over
Multiple Streams with
Minimized Global Error
 49 Discovering Frequent
Agreement Sub trees from
Phylogenetic Data
 50 Watermarking Relational
Databases Using
Optimization-Based
Techniques
 51 Extracting Actionable
Knowledge from Decision
Trees
 52 A Requirements Driven
Framework for Benchmarking
Semantic Web Knowledge
Base Systems
 53 The Threshold Algorithm:
From Middleware Systems to
the Relational Engine
! 54 Rank Aggregation for
Automatic Schema Matching
" 55 Evaluation for Mining Share
Frequent item sets Containing
Infrequent Subsets
# 56 Efficient Computation of
Iceberg Cubes by Bounding
Aggregate Functions
$ 57 A Note on Linear Time
Algorithms for Maximum
Error Histograms
! 58 Toward Exploratory Test-
Instance-Centered Diagnosis
in High-Dimensional
Classification
! 59 An Entropy Weighting k-
Means Algorithm for
Subspace Clustering of High-
Dimensional Sparse Data
! 60 A Method for Estimating the
Precision of Place name
Matching
! 61 Efficiently Querying Large
XML Data Repositories: A
Survey
! 62 Neural-
Based Learning Classifier
Systems
!  63 Building a Multiple-Criteria
Negotiation Support System
!! 64 An Exploratory Study of
Database Integration
Processes
!" 65 COFI approach for Mining
Frequent Item sets
!# 66 Online Random Shuffling of
Large Database Tables
!$ 67 A Flexible Content
Adaptation System Using a
Rule-Based Approach
" 68 Efficient Revalidation of
XML Documents
" 69 Practical Algorithms and
Lower Bounds for Similarity
Search in Massive Graphs
" 70 Enhancing the Effectiveness
of Clustering with Spectra
Analysis
" 71 Efficient Monitoring
Algorithm for Fast News
Alerts
" 72 Top-k Monitoring
in Wireless Sensor Networks
"  73 Frequent Closed Sequence
Mining without Candidate
Maintenance
"! 74 Maintaining Strong Cache
Consistency for the Domain
Name System
"" 75 Efficient Skyline and Top-k
Retrieval in Subspaces
"# 76 Rule Extraction from Support
Vector Machines: A
Sequential Covering
Approach
"$ 77 Fast Nearest Neighbor
Condensation for Large Data
Sets Classification
# 78 Wildcard Search in Structured
Peer-to-Peer Networks
# 79 Efficient Process of Top-k
Range-Sum Queries over
Multiple Streams with
Minimized Global Error
# 80 Discovering Frequent
Agreement Sub trees from
Phylogenetic Data
# 81 Watermarking Relational
Databases Using
Optimization-Based
Techniques
# 82 Localization in wireless
sensor network
#  83 Routing Protocols in wireless
network
#! 84 INSTANT DATA
COLLECTION TOOL
#" 85 Request Tracking System
## 86 File Based Data
Communication System
#$ 87 Peer to Peer DATA
TRANSFER UTILITY
TOOLS
$ 88 Bluetooth Utility for AV
Room
$ 89 Finger Print Recognition on
Mobile Device
$ 90 Call Timing Based Coded
Communication System on
Mobile Device
$ 91 Design of routing algorithm
for client mash up
$ 92 Voice Mail Systems
$  93 Security Implementation in
Adhoc Networking( Bluetooth
Communication)
$! 94 Handwriting Recognition
System
$" 95 Change Request Tracking
System
$# 96 Assembly Language Teaching
Aid (simulator like tasm)
$$ 97 Web Based Document
Version Controller
98 LAN Based File Security
System
99 Graphical Simulator of
Electronic Devices
100Local Position System using
Adhoc Network
101Portable Point of Sale
102Mobile Accounting System
 103Wireless Payment Models
!104Efficient Text Mining
algorithm (design and
implementation)
"105Efficient Video Mining
algorithm (design and
implementation)
#106WAP enabled application for
internet browsing on mobile
device

Das könnte Ihnen auch gefallen