2013 ieee it projects

Final Year Projects for MBA

Posted on

Image

 

 

FINAL YEAR PROJECTS @ Low cost

SAKTHI SOFTWARE SOLUTIONS!!!

Contact: Tel: 044-43016888 /9710780469

    For – B.E/B.TECH/MCA/MSC/M.E

PROJECTS OFFERED

IEEE – JAVA/.NET   

APPLICATION –  JAVA/.NET

EMBEDDED SYSTEMS

MAT LAB

VLSI 

ANDROID

NS-2

ORACLE

Benefits of Doing Projects With SSS

All 2013 Projects & Base Papers

Projects on Latest Technologies

Real Time Projects

Real Time Training

Free Technical Classes

Review Support & Guidance

Free Placements

100% Runnable Projects

Own Concepts also be done

Affordable Price

 

M/s. Sakthi Software Solutions Pvt Ltd

RVR Towers, 1st Street, 3rd Main Road,

Annanagar, Behind Nalli Silks,Chennai 600 040.

Tel: 044-43016888 /9710780469

Email: fresherfocus@gmail.com,

http://www.finalyearprojectslist.com

www.sssedu.in

 

Sakthi Software Solutions in Chennai, we go beyond providing software solutions. We work with our clients technologies and business changes that shape their competitive advantages. We have achieved this by creating and perfecting the global department and delivery of high quality, high value services, reliable and cost effective IT products to clients around the world varied offering. We are well known Teaching and training industry based at Chennai, involved in real time software development and Final Year Projects in Chennai. In all of our interactions, we strive to keep you satisfied with Blue Chip Technologies.

 

Our Technical Staff are available to discuss your need and explain our projects. Our Application Engineers are ready to provide technical assistance for your Final Year Projects in Chennai. The Engineers at our Factory are committed to customer satisfaction. We accept students who are part of the degree (ME, M.TECH, MBA, MCA, M.SC, BE, B.TECH, B.SC, BCA, MS) in several technologies.

 

Our Final Year Projects Technology:

-IEEE .Net Final Year Projects,-IEEE Java Final Year Projects,-Application Final Year  Projects,-Embedded Final Year Projects,-VLSI Final Year Projects,-Android Final Year,Projects,-NS2 Final Year Projects,-Oracle Final Year Projects,-Mat Lab Final Year Projects,-MBA Final Year Projects,-Cloudism Final Year Projects,-Jist Final Year Projects
-Digital Signal Processing Final Year Projects,-Power Electronics Final Year Projects

 

 

S.No

IEEE – DOTNET TITLES

 

Data Mining

1

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

2

Dynamic Personalized Recommendation on Sparse Data

3

m-Privacy for Collaborative Data Publishing

4

Facilitating Document Annotation Using Content And Querying Value

5

Spatial Approximate String Search

6

Comparable Entity Mining from Comparative Questions

7

Ginix Generalized Inverted Index for Keyword Search

 

Knowledge And Data Engineering

8

Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse

9

T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence

10

Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

11

Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework

12

Protecting Sensitive Labels in Social Network Data Anonymization

13

Crowdsourcing Predictors of Behavioral Outcomes

14

A Probabilistic Approach to String Transformation

15

A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments

16

A System to Filter Unwanted Messages from OSN User Walls

17

Event Tracking for Real-Time Unaware Sensitivity Analysis (EventTracker)

18

Incentive Compatible Privacy-Preserving Data Analysis

 

Cloud Computing

19

An Adaptive Cloud Downloading Service

20

Privacy Preserving Data Sharing With Anonymous ID Assignment

21

Privacy Preserving Delegated Access Control in Public Clouds

22

Privacy-Preserving Public Auditing for Secure Cloud Storage

23

Winds of Change From Vendor Lock-In to the Meta Cloud

24

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

25

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

26

Mining Contracts for Business Events and Temporal Constraints in Service Engagements

 

Multimedia

27

Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

 

Parallel And Distributed Computing

28

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

29

On Data Staging Algorithms for Shared Data Accesses in Clouds

30

A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

31

Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment

32

Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

33

Towards Differential Query Services in Cost-Efficient Clouds

34

Network Traffic Classification Using Correlation Information

35

EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

 

Mobile Computing

36

Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation

37

Optimal Multicast capacity and delay tradeoff in manet

38

A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

39

Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks

40

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

41

Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

42

Vampire Attacks Draining Life from Wireless Ad Hoc Sensor Networks

43

On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks

 

Networking

44

Distance Bounding A Practical Security Solution for Real-Time Location Systems

45

Distributed Web Systems Performance Forecasting Using Turning Bands Method

46

EAACK—A Secure Intrusion-Detection System for MANETs

47

Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks

48

Efficient Algorithms for Neighbor Discovery in Wireless Networks

49

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

 

Secure Computing

50

Secure Encounter-based Mobile Social Networks Requirements, Designs, and Tradeoffs

 

Services Computing

51

Two Tales of Privacy in Online Social Networks

52

Privacy-Enhanced Web Service Composition

 

S.No

Multimedia & Image Processing

1

Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes

2

An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs

3

A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes

4

Casual Stereoscopic Photo Authoring

5

Estimating Information from Image Colors An Application to Digital Cameras and Natural Scenes

 

S.No

Wireless Network Projects

1

A Data Fusion Technique for Wireless Ranging Performance Improvement

2

Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling

3

 

Importance of Coherence Protocols with Network Applications on Multicore Processors

4

Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper

 

S.No

Software Engineering

1

EDZL Schedulability Analysis in Real-Time Multi-Core Scheduling

2

Monitor-Based Instant Software Refactoring

3

Quantifying the Effect of Code Smells on Maintenance Effort

4

Test Case-Aware Combinatorial Interaction Testing

5

Using Dependency Structures for Prioritization of Functional Test Suites

 

S.No

IEEE – JAVA TITLES

 

Cloud Computing

1

A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

2

An Adaptive Cloud Downloading Service

3

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

4

Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

5

On Data Staging Algorithms for Shared Data Accesses in Clouds

6

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

7

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

8

Privacy Preserving Delegated Access Control in Public Clouds

9

Privacy-Preserving Public Auditing for Secure Cloud Storage

 

Data Mining

10

Facilitating Document Annotation Using Content And Querying Value

11

m-Privacy for Collaborative Data Publishing

12

Spatial Approximate String Search

13

Event Tracking for Real-Time Unaware Sensitivity Analysis

14

Region-Based Foldingsin Process Discovery

15

A Proxy-Based Approach to Continuous Location-Based Spatial Queries inMobile Environments

 

Image Processing

16

Super-Resolution-based Inpainting

 

Industrial Informatics

17

Distributed Web Systems Performance Forecasting Using Turning Bands Method

 

Knowledge & Data Engineering

18

T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence

19

Crowdsourcing Predictors of Behavioral Outcomes

20

A Survey of XML Tree Patterns

21

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

22

A System to Filter Unwanted Messages from OSN User Walls

23

Incentive Compatible Privacy-Preserving Data Analysis

 

Mobile Computing

24

An Investigation on LTE Mobility Management

25

Capacity of Hybrid Wireless Mesh Network with Random Aps

26

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

27

Capacity of Hybrid Wireless Mesh Networks with Random Aps

28

EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

29

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

 

Multimedia

30

Beyond Text QA Multimedia Answer Generation by Harvesting Web Information

31

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

 

Network Security

32

Importance of Coherence Protocols with Network Applications on Multicore Processors

33

On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay

 

Networking

34

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

35

Price Differentiation for Communication Networks

36

Participatory Privacy  Enabling Privacy in Participatory Sensing

37

Fully Anonymous Profile Matching in Mobile Social Network

38

EAACK—A Secure Intrusion-Detection System for MANETs

39

Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks

 

Parallel & Distributed

40

MIN-MAX Counter-Based Algorithm for Regular Expression Matching

41

Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks

42

Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

43

Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems

44

Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks

45

Towards Differential Query Services in Cost-Efficient Clouds

46

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

 

Secure Computing

47

Privacy Preserving Data Sharing With Anonymous ID Assignment

48

Two tales of privacy in online social networks

49

Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs

50

Extracting Spread-Spectrum Hidden Data from Digital Media

S.No

APPLICATION TITLES-DOTNET

1

Social Network

2

Webportal bidding

3

Resume Grabber

4

Work flow management System

5

Business Interaction

6

Logistic Management System

7

Postal Management System

8

Human Resource Management System

9

Online Counselling

10

Online Tax Payment System.

11

Semantic Integration Of H/W and S/W

12

Optimal Route Querying

13

patient care System

14

Online Civil Registry

15

Library Management System.

16

Educational Tool for optimal controlling

17

office Automation

18

Hospital Management

19

Airline ticket booking system

20

Cinema hall ticket booking system

21

college management system

22

Real Estate Management System

23

Debugger

24

Search Engine

25

Online Sales Management System

26

Online Public and Private Chatting

27

Software Management System

28

Data Mining Analysis on EB bill system.

29

Home appliances online purchase.

30

Online Rental

31

Corporate Security System.

32

Online E-Post Office

33

Leave Management System

34

Online Advertising System

35

Ensuring Data Storage Security in Cloud Computing

36

Online Rental House Web Portal

37

Online Examination System

38

Mailing System

39

Customer care service

40

online staff and sudent interaction

41

online election system

42

online discussion forum

43

Job Portal

44

Budget Analysis System

45

Customer Relationship management

46

E-gift shoppy

47

Securing TCP/IP Communication using Cryptography

48

Distributed Computing for e-learning

49

Sales and Purchase Management System

50

Travrl Management System

51

An Unified Approach To Wangle Bugs And Trounce It For Attaining Software Quality

52

A Systematic And Effective Contrivance To Acuminate Skills Of Employees For The Amelioration Of Organization Growth

53

An Anomalous Overture To Maneuver Resources And Utilize It Efficiently

54

A Timesheet Based Employee Performance Monitoring System

55

A Structured Commercial Conveyance Of Merchandise Via Highways And Oceanic Itinerary

56

An Online Portal  Encompassing Entire Civil Functioning  At One Proximity

57

An Integral Commercial Coalition Of Cargo And Tourism Through Shipping

58

An Online Web Portal For Proficient People Searching For Applicable Jobs

59

An Online Web Portal  For  Tender Bidding And  Consent

60

An Unmitigated  Coalition Of Home And Life Insurance For Customers

61

An  Abridged Vehicle And Corporate Insurance System

62

An Online Service Oriented Web Portal For Organ Donation To Solve Human Misery

63

An Unmitigated  Coalition Of Online Exam And Carrier Guidance For Budding Talents

64

A State Of The Art Online Banking With Meticulous Emi Calculator

65

A Software Industry’s Project Based Hierarchical Work Flow Management

66

A Secured Monitory Transaction In Global Banking System

67

An Online Web Portal For Loan Mortgage And Origination System

68

A Comprehensive Index Of Web-Based State Tax

69

A Comprehensive Index Of Web-Based Indian Tax

70

An Online Web portal For Sharing And Gaining Knowledge Through Information Portal

71

An Online Framework For Monitoring And Managing  HRMS

72

Patient Care System

73

Realtors Portal

74

An Impeccable commercial web portal for Tourism management System

75

A Simple Approach For Image Processing And Resizing Using Bilinear Filters

76

Web based application for multiple client

77

BSNL Search service system for customers

78

complete automation software for inventory control system

79

Hiding the text in html document

80

Online bulletin board

81

CONSUMER COMPLAINT MANAGEMENT SYSTEM

82

Campus online help disk

83

Mails Management Using SMTP Mail Server System

84

Hiding Messangers in midi songs

85

Automated Blocking of malicious code with NDIS intermediate Driver

86

 A More Secure Steganography Method in Spatial Domain

87

Multilevel BUSINESS PROCESS IN CROSS ORGANAIZATION

88

Tracker System For Credit Card Fake

89

Watermarking In Relational Databases

90

Web Portal For E- Banking Transaction System

91

Equity Trading Portfolio Manager

92

Personalised Categorization

93

Citizen Online Service Management Information System(Cosmis)

94

Advanced Vehicle And Highway Systems

95

Dispensary Management System

96

Web Mart System For Jewellery Shop

97

Material Requisition, Collection And Stock Handling Management Portal

98

Web Based Healthcare System

99

Automated Discuss Forum

100

Effective Tool For Job Provider & Recruitment Process Teller System

101

Equity Trading Govt Ration Shop

102

Cost Accounting

103

A Relation-Based Page Rank Algorithm For Semantic Web Search Engines

104

A More Secure Steganography Method In Spatial Domain

105

Problems And Solutions Of Web Search Engines

106

A Web Search Engine-Based Approach To Measure Semantic Similarity Between Words

107

Nabs: Novel Approaches For Biometric Systems

108

Digital Image Hiding Using Curvelet Transform

109

Architecting A Secure Enterprise Data Sharing Environment To The Edge

110

Blind Image Watermarking Using A Sample Projection Approach

111

Off-Line Signature Verification Using Local Patterns

112

Human Motion Tracking By Temporal-Spatial Local Gaussian Process Experts

113

Data Integrity Proofs In Cloud Storage

114

Optimal Service Pricing For A Cloud Cache

115

A Personalized Ontology Model For Web Information Gathering

116

Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries

117

Audio Processing Of Movie

118

A Method For Creating, Rating And Publishing Web-Based Content

119

A Web Based Academic Monitoring System To Output The Timing Schedule

120

A User-Oriented Image Retrieval System Based On Interactive Genetic Algorithm

121

Product Marketing Analysis On Public Opinion

122

SQL Tuner

123

Universal Smart Card

124

Construction Company Work order System

125

Municipal Administration System

126

Web Usage Mining

127

Freelancer Job

128

High level network Security Using Packet Filtering

129

Tollgate Management System

130

Data Mining Analysis on EB bill system

131

Active Learning Methods For Image Retrival

132

Consumer Complaints Management System

133

Information Sharing In Urban Areas

134

Online Material Requisition, Collection And Stock Handling Management Portal

135

Uniqueness Of Medical Data Mining

136

Web Mart System For Jewellery Shop

137

Web Template for Customer Relationship Management (CRM)

138

Advance Public Bus Transpotation System For India

139

Election Software System

140

On Line Counseling

141

Tracker System for Credit Card Fake

142

Web based Application for Multiple Clients

143

Web Portal For Matrimonial System

 

S.No

APPLICATION TITLES – JAVA

1

Webportal bidding

2

Work flow management System

3

Logistic Management System

4

Human Resource Management System

5

Online Counselling

6

Online Tax Payment System.

7

patient care System

8

Library Management System.

9

office Automation

10

Hospital Management

11

Airline ticket booking system

12

Cinema hall ticket booking system

13

college management system

14

Real Estate Management System

15

Search Engine

16

Online Sales Management System

17

Home appliances online purchase.

18

Leave Management System

19

Online Advertising System

20

Online Examination System

21

Mailing System

22

online staff and sudent interaction

23

online discussion forum

24

Job Portal

25

Customer Relationship management

26

Distributed Computing for e-learning

27

Sales and Purchase Management System

28

A Systematic And  Prodigious Gateway for Data Base Deeds

29

Secured voice Transfer using stenography

30

Keep Password Away From Memory

31

IMPLEMENTATION OF SECURED ENCRYPTED DATA TRANSMISSION USING IMAGE FILES

32

Truth Discovery with Multiple Conflicting Information Providers on the Web

33

FIDRAN-Flexible Intrusion Detection and Response Framework over active networking

34

Detection Of Intrusion System Using Design Pattern

35

Multiple Routing Configurations for Fast IP Network Recovery

36

Online Organ Donation

37

COMPETITOR MINING WITH WEB

38

The Design of a Generic Intrusion-Tolerant Architecture for Web Servers

39

Spread Spectrum Watermarking Security

40

An Unmitigated  Coalition Of Online Exam And Carrier Guidance For Budding Talents

41

An Unified Approach To Follow Up Delinquent Orders And Trace Shipments

42

An Unified Overture For Logistics Management System

43

An Unified Approach To Wangle Bugs And Trounce It For Attaining Software Quality

44

A Timesheet Based Employee Performance Monitoring System

45

A Software Industry’s Project Based Hierarchical Work Flow Management

46

An Online Web Portal For Travelers On Travel Itinerary

47

A Comprehensive Index Of Web-Based State Tax

48

A Comprehensive Index Of Web-Based Indian Tax

49

An Unmitigated  Coalition Of Home And Life Insurance For Customers

50

A Secured Monitory Transaction In Global Banking Implemented Through Rsa Algorithm

51

A Genpact Service To Generate And Issue Certificates For Insurance

52

A Structured Commercial Conveyance Of Merchandise Via Highways And Oceanic Itinerary

53

Analysis On Credit Card Fraud Detection Methods

54

Multiple Exposure Fusion For High Dynamic Range Image Acquisition

55

Lossless Compression and information Hiding in Images Using Steganography

56

Using Proxy Server to reduce file download time in networks

57

Caching Scheme for distributed data processing in Peer to Peer Environments

58

Dynamic routing for reducing the compromised node attacks

59

Restoring internode connectivity using RIM algorithm

60

Mitigating DOS attacks for multicast authentication Using batch signature

61

Design routing protocols for mobile ad hoc networks

62

Image recognition for designing capcha

63

Organization claim process

64

Encryption and decryption using blow fish algorithm

65

A Competitive Study of Cryptography Techniques over Block Cipher

66

A foundation for stochastic bandwidth estimation of networks with random service

67

A New approach for FEC Decoding based on the Bp algorithm in LTE and Wimax systems

68

A unified approach to optimising performance in networks serving Heterogeneous flows

69

Analysis of quality of object oriented systems using object oriented metrics

70

A new data sharing environment for a secured enterprise

71

Sensetive Rule Hidding(data mining)

72

Automated  Teller Machine(ATM) System

73

A Bidirectional routing abstraction for Asymmetric

74

Clustering with multi-view point based similarity measure

75

Meshing Streaming updates with persistent data in an active data warehouse

76

Deniel of service attacks in wireless

77

Design of p-cycles for full node protection in WDM mesh networks

78

A new approach for authentication using water marking technique

79

Dynamic Channel allocation for wireless zone-based mulicast and broadcast service

80

Dynamics of malware spread in decentralized peer to peer networks

81

Effective navigation of quries results based on concepts hierarchies

82

Visual Cryptography Schemes for Secret Image

83

 FACE RECOGNITION USING EIGEN FACES(A Classical Authentication Mechanism

84

Geographical Routing With Location Service in Intermittently Connected MANETs

85

Interanal Corporate Management System

86

Interval ckMeans: An Algorithm for Clustering Symbolic Data

87

Mitigation of Control Channel Jamming under Node Capture Attacks

88

On Demand Check Pointing for Grid Application Reliability using Communicating Process Model

89

ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING

90

Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation

91

Ontology-Based Business Process Customization for Composite Web Services

92

Sketch4Match – Content-based Image Retrieval System Using Sketches

93

Simplified Algorithm on Network Shortest Path Problem

 

S.NO

ANDROID 2013-IEEE PROJECT TITLES

1

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

2

A Survey of XML Tree Patterns

3

Distributed Web Systems Performance Forecasting Using Turning Bands Method

4

Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse

5

Ranking on Data Manifold with Sink Points

6

Region-Based Foldings in Process Discovery

7

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

8

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

9

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

10

T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence

11

Analysis of Distance-Based Location Management in Wireless Communication Networks

12

Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

13

A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

14

A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

15

AML Efficient Approximate Membership Localization within a Web-Based Join Framework

16

SSD A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity

17

Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

18

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

19

Finding Rare Classes Active Learning with Generative and Discriminative Models

20

Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks