Sei sulla pagina 1di 3

ProjectSolutions 2013

Project List BE/BTech


DOTNET
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Dynamic web Portal Exploring The Design Space Of Social Network-Based Sybil Defenses Online Training Portal Virtual Mouse Ensuring Data Storage Security A Spectral and Spatial Measure of Local Perceived Sharpness in Natural Images A Keyless Approach to Image Encryption Video-based Face Recognition on Real-World Data Robust Watermarking of Compressed and Encrypted JPEG2000 Images Anomaly Detection in Network using Datamining Techniques .(c4.5) Mitigating Distributed Denial of Service (DOS) image compression and decompression using adaptive interpolation Automatic image equalization and contrast enhancement using Gaussian mixture N-Square Approach For Lossless Image Compression And Decompression Organizing User Search Histories resilient-identity-crime-detection Privacy-Preserving Public Auditing for Secure Cloud Storage. Developing Secure Social Healthcare System over the Cloud Predicting missing items in shopping cart using fast algorithm Dynamic Audit Services for Outsourced Storages in Clouds A Mutually Verifiable Billing System for the Cloud Computing Environment Bluetooth Chat Authentication Scheme for Session Password using Color Matrix Time Table Generator SMS Clustering Data Leakage Detection Learn to personlized image search from photo sharing websites Reliable Re-encryption In Unreliable Cloud Detection & Prevention of SQL Injection (Bank Application) "A Proxy-based Real-time Protection Mechanism for Social Networking Sites" Proxy Based Firewall Poolup Carpooling Secure Data Storage for Mobile Data Collection Systems CREDIT CARD FRAUD DETECTION USING HIDDEN MARKOV MODEL Edueasy J2ME: SMART ACCESSING MAIL SERVER THROUGH MOBILE Text editor mobile to pc communication project.solutions@rocketmail.com Mob. No.: +91 8793349922 Landline: +91 022 64646561

JAVA
22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39.

www.projectsolutions.co.in

ProjectSolutions 2013
40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. Security Enhancement using Steganography Efficient Compression of Encrypted Grayscale Images A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Detecting Spam Zombies by Monitoring Outgoing Messages Fair-Share for Fair Bandwidth location in Cloud Computing Image editor A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability Denial-of-Service Defense through Web Referral Automatic image equalization and contrast enhancement using Gaussian mixture N-Square Approach For Lossless Image Compression And Decompression Client-side Load Balancer using Cloud Distributed Accountability for Data Sharing in Cloud TIME BASED RE-ENCRYPTION IN UNRELIABLE CLOUDS Detecting and Resolving Firewall Policy Anomalies Double Guard: Detecting Intrusions in Multitier Web Applications Privacy-Preserving Updates to Anonymous and Confidential Databases. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Organizing User Search Histories resilient-identity-crime-detection Privacy-Preserving Public Auditing for Secure Cloud Storage. Developing Secure Social Healthcare System over the Cloud Predicting missing items in shopping cart using fast algorithm Dynamic Audit Services for Outsourced Storages in Clouds A Mutually Verifiable Billing System for the Cloud Computing Environment A Bayesian Approach to Digital Matting Automated Detection System for SQL Injection Attack Implementation of Web Usage Mining Using APRIORI and FP Growth Algorithms A Bayesian Approach to Filtering Junk E-Mail

Android
68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. E-Attendance OCR in Android Friend Finder (Location Based Services) Poolup Carpooling HUMAN RESOURCE RELIABLE AND ADMIRABLE SOFTWARE ASSESSING SERVICING OPPORTUNITIES OF BANK VIA MOBILE DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION location based alarm ANDROID PHONE BASED DRUNK AND DRIVE DETECTION EXTENDED MOBILE CAPTCHA IMPLEMENTATION Authentication Schemes for Session Passwords using Color and Images a android Speech to Text Convertor for SMS Google Place Finder project.solutions@rocketmail.com Mob. No.: +91 8793349922 Landline: +91 022 64646561

www.projectsolutions.co.in

ProjectSolutions 2013

NS2
82. 83. 84. 85. 86. 87. 88. 89. Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation Analyzing network traffic in order to detect possible intrusions Comparision of Network Attacks ALERT Energy Efficient Multipath Transmission Securing mobile_ad_hoc_network_with certificateless public_keys A Study of Congestion Aware Adaptive Routing Protocols in MANET

PHP
90. 91. 92. 93. 94. 95. 96. Elimination of potholes Health File Live Knowledge Management System CRM Cloud Document and Compiler ( php and Java) Cloud Service for encryption and decryption E-Attendance

www.projectsolutions.co.in

project.solutions@rocketmail.com

Mob. No.: +91 8793349922 Landline: +91 022 64646561

Potrebbero piacerti anche