Application Projects
Application Projects
S.N
o
Title
Code
AND01
AND02
AND03
AND04
AND05
AND06
AND07
AND08
AND09
10
AND10
11
AND11
12
AND12
13
AND13
APPLICATION PROJECT
TITLES
NETWORKING
S.N
o
1
Title
Cooperative Defense Against Pollution Attacks
Cod
e
SD0
1
SD0
2
SD0
3
SD0
4
SD0
5
Communication-Intensive Workloads
SD0
6
SD0
7
SD0
8
DATAMINING
S.N
o
Title
Cod
e
SD0
9
SD1
0
Hostel Management
SD1
1
SD1
2
SD1
3
SD1
4
SD1
5
SD1
6
SD1
7
MOBILE COMPUTING
S.N
o
Title
Cod
e
SD1
8
SD1
9
SD2
0
SD2
1
SD2
2
NETWORK SECURITY
S.
No
Title
Cod
e
SD2
3
SD2
4
SD2
5
SD2
6
SD2
7
S.No
Title
Code
1
Online E-Payments for Government Taxes
SED01
2
PharmaIntelligence Articles Publishing System
SED02
3
Corporate Resource Management
SED03
4
Cloud Computing
SED04
5
Virtual class Room
SED05
6
Mediclaim Insurance Process
SED06
7
Networking
S.No
Title
Code
1
Recoverable secret Data Aggregation for information Integrity
SJ01
2
A Tiered Authentication of Multicast Protocol
SJ02
3
SJ17
18
Overcome the Path Failure and Increase the Throughput Knowledge
Based Search in P2P Networks
SJ18
19
Scheduling Deadline-Constrained Bulk Data Transfers to Minimize
Network Congestion
SJ19
20
Multipath Dissemination in Regular Mesh Topologies
SJ20
21
SOAR: Simple Opportunistic Adaptive Routing for Network
SJ21
22
Multicast using new Heuristic Technique
SJ22
23
Preventing the failure in Synchronous and Asynchronous System
SJ23
24
Filtering the Malicious Packets
SJ24
25
Automatic Java Code Generator
SJ25
26
Dynamic Cache Updating for Routing Table
SJ26
27
Balancing the Imbalance Load
SJ27
28
Synchronize Group Editor
SJ28
29
A New Improved Algorithm for Scheduling
SJ29
Data Mining
S.No
Title
Code
1
Knowledge logical Theories in XML Document arrangement
SJ30
2
A Probabilistic system for Keyword-Based Incremental Query
Structure
SJ31
3
Using Rule Ontology in Repeated Rule achievement from Similar Web
Sites
SJ32
4
Evaluating Path Queries over regularly Updated Route
SJ33
5
Managing the load balancing and fault tolerance
SJ34
6
Improving Data Quality with Dynamic Forms
SJ35
7
Identifying Disease-Treatment Relations in Short Texts
SJ36
8
Web Information Gathering based on user Expectation
SJ37
9
Minimizing Search Time using XML Keyword
SJ38
10
11
Create a Trusted Network using P2P Certificate
SJ40
12
Automatic Error Identification and Problem Solving tool for SQL
SJ41
13
Automatic index providing and fast data retrieving in P2P networks
SJ42
14
Equally Distribute the and Share the unpredictable Load
SJ43
15
Face Recognition
SJ44
16
17
Frequent Item Set Retrieving from Large amount of Data
SJ46
18
Answering Factoid Questions In Qa System
SJ47
19
Pattern Matching in Data Mining
SJ48
20
Discovery of Weighted Association Rules Mining
SJ49
21
Weighted Association Rule Mining Using Weighted Tree Approach
SJ50
22
Voice Chatting
SJ51
23
Privacy-preserving revocation checking
SJ52
24
Online Examination
SJ53
25
Generic Lossless Visible Watermarking A New Approach
SJ54
Mobile Computing
S.No
Title
Code
1
High-speed data collection in wireless sensor networks
SJ55
2
Reducing the Number of Transmissions in Network
SJ56
4
Hop-by-Hop Routing in with Bandwidth Guarantees
SJ58
5
Random Power Allocation
SJ59
6
Route Handoff Technique in multichannel
SJ60
7
Detection and Countermeasure in wireless Sensor networks
SJ61
9
Avoid Denial of services in wireless sensor networks using Randomize
Multipath Approach
SJ63
10
A Multichannel Scheduler for High-Speed Wireless Networks
SJ64
11
Transmission in Unreliable Networks
12
Efficient Broadcasting In Mobile Ad Hoc Networks
SJ66
Grid Computing
S.No
Title
Code
1
Improving the Performance Guarantee in Scientific Applications
SJ67
2
Key Management in Secure Group Communication
SJ68
3
Robust Load Delegation in Service Grid Environments
SJ69
4
Securing Data using GRID Architecture
SJ70
5
Xml Key Store for Heterogeneous Network
SJ71
Network Security
S.No
Title
Code
1
Routing Security in Ad Hoc Networks
SJ72
2
A Trust-Aware Routing Framework
SJ73
3
Detecting Spam Zombies by Monitoring Outgoing Messages
SJ74
4
A Security Architecture Achieving Anonymity and Traceability in
Wireless Networks
SJ75
5
Secure Data Objects Replication in Data Grid
SJ77
6
Networks
SJ78
7
Detecting Application Denial-of-Service Attacks: A Group-TestingSJ79
Based Approach
8
Authenticated Group Key Transfer Protocol Based on Secret Sharing
SJ80
9
Providing Witness Anonymity under Peer-to-Peer Networks
SJ81
10
Data Transfer in vulnerable free Route
SJ82
11
Multipath Routing Approach for Secure Data Delivery
SJ83
12
Detecting Malicious Packet Losses and avoiding the DOS Attacks
SJ84
13
Application Fault Tolerance with Secondary Middleware
SJ85
14
KTR: An Efficient Key Management Scheme For Secure Data Access DOS
Identifier
SJ86
J2EE PROJECTS
S.No
Title
Code
1
Scalable and secure sharing of PHR
SJ87
2
Personalized ontology search in web
SJ88
3
Cloud Storage System with Secure Data Forwarding
SJ89
4
Payment gateway
SJ90
5
Monitoring The Application-Layer DDOS Attacks For Popular Websites
SJ91
6
Swap: Mitigating XSS Attacks
SJ92
7
SQL Injection Attacks
SJ93
8
Runtime Defense against Code Injection Attacks
SJ94
9
SigFree: A Signature-Free Buffer Overflow Attack Blocker
SJ95
10
Security In Open Source Web Content Management Systems
SJ96
11
Ranking and Suggesting for Popular Items
SJ97
12
Virtual Credit Card
SJ98
13
Educational Forum
SJ99
14
Job Portal Management
SJ100
15
Effective XML Keyword Search
SJ101