0% found this document useful (0 votes)
31 views2 pages

ETI Micro-Project Topics

The document lists various microprojects assigned to students in the Department of Computer Technology, focusing on IoT-based systems and digital forensics. Each project includes specific tasks such as explaining the need for the system, hardware and software requirements, circuit design, and data management. Additionally, there are projects related to studying cases of fraud and forgery using digital forensics, as well as identifying vulnerabilities in credit card fraud and Trojan attacks.

Uploaded by

tajanenikhil271
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

ETI Micro-Project Topics

The document lists various microprojects assigned to students in the Department of Computer Technology, focusing on IoT-based systems and digital forensics. Each project includes specific tasks such as explaining the need for the system, hardware and software requirements, circuit design, and data management. Additionally, there are projects related to studying cases of fraud and forgery using digital forensics, as well as identifying vulnerabilities in credit card fraud and Trojan attacks.

Uploaded by

tajanenikhil271
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Department of Computer Technology

Class- TYCM Subject- ETI (22618)


ETI MTCRO-PROJECTS LIST
Roll No Name of Student Name of Microproject

1 Ghorpade Rutuja pramod


2 Bendre Atharva Nandu
3 Shinde Tejas Jalindar
Io'T Based Humidity and Temperature Monitoring
4 Mahanor Yash Babasaheb
1. Explain the need of Io'T Based Humidity and Temperature Monitoring.
5 Deshmukh Aditya Santosh
2. What will be the hardware requirements for designing this system?
6 Vidhate Mayur Pramod
3. What will be the software requirements
7 Harshad pankaj wakchaure
4. Explain how circuit can be designed for this system along with its working
8 Shivani Ashok gujar
5. Explain how to design an loT application and how to store and retrieve a data on it.
9 Bhambare pranjali pandurang
10 Markad Sakshi Gajanan
11 [email protected]
12 Garadhe Rutuja Balkrishna
13 Gadhave Siddharth Rajendra
14 Phopase Darshan Sunil
15 Kale Komal Santosh Io'T based Weather Monitoring System
16 Rode Amruta Santosh
17 Tajane Nikhil Vitthal 1. Explain the need of Io'T Based Weather Monitoring System.
18 Sadafule Deepak Sarjerao 2. What will be the hardware requirements for designing this system.
19 Murdare Shreya Sham 3. What will be the software requirements
20 Patel Mijba Shakir 4. Explain how circuit can be designed for this system along with its working
21 Pokale Manasvi Prakash 5. Explain how to design an Io'T application and how to store and retrieve a data on it
22 Kachole Pratik Ganesh
23 Vaishnavi Sharad Shirsath
24 Pawar Om Rajendra
25 Jagatp Nandini Balasaheb
26 Suyog Mangesh Sonar
27 Gite Vrushabh Sanjay
28 Nibe Shiveshwari Rajendra
Study any case of fake profiling. Identify
29 Shirsath Ishwari Prashant
30 Kakade shruti ravindra
1. The way digital forensics was used in detecting the fraud.
31 Ranmale Madhura Devidas
2. Where was digital evidence located?
32 Tambe Gayatri Vishwanath
3. Effects.
33 Mandal Sujay Sukdev
34 Kadu Aditya Rajeev
35 Sayyad siddik firoj
36 Pranali Navnath Gatkal
37 Mutha Siddhi Nitin
38 Ghorpade Vrushali Balkrushna
39 Sumb Pooja Eknath
40 Ghodechor Saloni Kanifnath
Study any case of forgery /falsification crime case solved using digital forensics:
41 More Gautami Kiran
1. Identify the model used for Digital Investigation.
42 Sanika Shivraj Wagh
2. Was investigation done ethically or unethically?
43 Sonawane Tejaswi Vijay
3. Where was digital evidence found for crime establishment?
44 Kathale Apurva Ganesh
4. State the punishment meted.
45 Hase Omkar Ravindra
46 Thanage Prasad Gitaram
47 Kale Gauri Sachin
48 Telore Samruddhi Vijay
49 Mapari Aditi Dinesh
50 Sarode Prathamesh Ganesh
51 Vikhe bhakti Parshuram
Study Credit card fraud as an identity threat. Identify:
52 Akash Navnath mali
53 Pathare Vaibhav Machhindra
1. Use of digital media in carrying out fraud.
54 Mhaske Kalyani Santosh
2. Vulnerability Exploited.
55 Sadaphal Sai Ramdas
3. Effect of fraud.
56 Aditya Udaysinh nimbalkar
4. Protection/Precaution to be taken against such frauds.
57 Patil Harsh Dnyaneshwar
58 Chaudhari Neha Valmik
59 Kapse Vaibhav Sandip
60 Vivek Nanasaheb Mohite
61 Krushna Balasaheb Thombare
62 Landge swapnali subhash
63 Narote Onkar Abasaheb
64 Kekan Suseema Ravindra
65 Gite Anuja Motiram Study any Trojan attack. Identify the Trojan attack:
66 Jadhav Gayatri sandip
67 Sakshi Rajkumar Jadhavar
1. State the way Trojan got installed on particular Machine.
68 Nirmal Payal Subhash
2. State the effects of the Trojan.
69 Yuvraj Narendra More
70
3. Elaborate/Mention/State protection/Blocking mechanism for this specific Trojan,
Aher ritesh ravindra
71 Ghadge Rutuja Mahesh
example specification of any anti-threats platform which filters the Trojan
72 Patole rohan shashikant
73 Pandit Sahil Vijay
74 Kadri Shahid Arif
75 Salve Sapna Anil
76 Kakad Abhiraj Suresh
77 Mungase pranav popat
78 Ashish Laxman Talekar
79 Tambe Rushikesh Vishwanath Io'T Based Humidity and Temperature Monitoring
80 Chougule Abhishek Kishore 1. Explain the need of Io'T Based Humidity and Temperature Monitoring.
81 Siddharth Babasaheb Pawar 2. What will be the hardware requirements for designing this system?
82 Deore Akshara Gorakh 3. What will be the software requirements
83 Shivam Anil Anerao 4. Explain how circuit can be designed for this system along with its working
84 Bansode Riya Vilas 5. Explain how to design an loT application and how to store and retrieve a data on it.
85 Kanake Arati Devidas
86 Landge Ganesh Dattatray
87 Shasam Uday Vijay

You might also like