You are on page 1of 10

SOME M.TECH.

TOPIC DETAILS

MICROSOFT TECHNOLOGY

1. Effect Of Aging On Human Iris And Examine Their Authentication In Bio Metrics

2. A Comparative Study for Generic Model of Student-Based Adaptive Intelligent With

Bayesian Algo. And Fuzzy Logic In Predicting Student Knowledge Level

3. Quantification Of Portrayal Concepts Using TF-IDF For Organizing Web Search

Results Using Ranking And Clustering With Semantic Similarity

4. A Naive-Bayes Strategy For Sentiment Analysis For E –Courier : Fast And Accurate

Sentiment Classification

5. Finding Changes On Human Iris During A Period And Examine Their Authentication

Through Bio Metrics

6. A Novel Approach For Verifiable Secret Sharing In Proactive Network Using RSA

7. Document Clustering Technique In Cloud Server

8. Opinion Mining Using Naive Bayes Algo

9. Multiple Sequence Alignment (Using Genetic Algo)

10. To Analysis Of Human Baldness Through Improving Performance Of Multiple

Sequence Alignment Analysis

11. Detection & Prevention From Attacks(Sql Injection) For Web Applications

12. Prediction Of Upcoming Generation

13. Providing Security Using Encryption And Splitting Technique Over Cloud Storage

Security

14. Comparative Analysis of Cure Clustering and K-mean clustering .

15. Finding Intrusion Detection System in Cloud Computing Network

16. Data Leakage detection in Cloud Network


MATLAB

1. Improve Modified Low Energy Adaptive Clustering Of Wireless Sensor

Network Using Chmodeleach Protocol

2. A Unique Light Weight Time Stamp Based Security Protocol For Wireless Adhoc

Network

3. To Analysing Performance Measurement Of Wireless Sensor Network For

Solving Shortest Path Problem Using Dijkstra Algorithm

4. Advanced Digital Image Forgeries For Detection Of Copy-Move Forgery In

Digital Images Using Passive Image Authentication Techniques

5. A Survey On Face Detection Methods And Feature Extraction Of Face

Recognition Using Pca

6. Study And Analysis Of Methods Of Real-Time Visual Object Detection With

Kalman Filtering

7. Efficient Routing In Mantes Using Ordered Walks Olsr, Dsr And Aodv

8. Performance Measurement Of Wireless Sensor Network Using Dijkstra

Algorithm

9. Video Stabilization And Motion Detection Using Matlab

10. Finding Diverse Shortest Paths For The Routing Task In Wireless Sensor

Networks

11. Image Compression Using the Discrete

12. Digital Image Compression

13. Jpeg Image Compression Using Discrete Cosine

14. Lossy and Lossless Compression Techniques

15. Lossy Image Compression

16. Brightness-Preserved-Resolution-Enhancement-Using-Dwt-swt-Technique
17. Compressed Domain Contrast and Brightness Improvement Algorithm for Colour

Image through Contrast Measuring and Mapping of DWT Coefficients

18. Survey on Image Resolution Techniques for Satellite Images

19. Image Enhancement Using DWT DCT and SVD

20. Image enhancement using Wavelet

21. Satellite Image Resolution Enhancement Using DWT

22. A MATLAB based Face Recognition System using

23. A Matlab Project in Optical Character Recognition (OCR)

24. Automated Brain Tumor Detection and Identification

25. Comparative study of digital audio

26. Cost Effective Optical Mark Reader

27. IMAGE EDGE DETECTION BASED ON WAVELET TRANSFORM

28. LUNG CANCER DETECTION ON CT IMAGES BY USING IMAGE

29. RECOGNITION OF VEHICLE NUMBER PLATE USING MATLAB

30. Unsupervised Colour Segmentation of White Blood

31. A New LEACH-based Routing Protocol for Energy Optimization in Wireless

Sensor

32. An Improved Scheme of SEP in Heterogeneous Wireless Sensor Networks

33. Dijkstra-based Localized Multicast Routing

34. Modification of Floyd-Warshall’s Algorithm

35. Particle Swarm Optimization Approach for MST

36. Particle Swarm Optimization with Minimum

37. Performance Measurement of Wireless Sensor Network using Dijkstra Algorithm

38. Real time face recognition system.

39. Twitter users gender classification


40.

41. Real time human speaker recognition.

42. Real time human face Tracking System.

43. Real time hand finger counting and print.

44. Real time computer operate using hand finger.

45. smart bank locker using Real time face recognition and serial communication .

46. Real time object Tracking System with serial communication


JAVA

1. Subjective Question Answer Analysis Using Cosine similarity ,Jaccard similarity

2. Sliding window protocol

3. Review and Recommendation of Book Product Using Natural Language


Processing(NLP).

4. Comment Analysis & Review of E-Commerce Product Using Natural Language


Processing(NLP).

5. An Efficient Proxy Signature Scheme of delegating Rights Based On RSA Cryptosystem

6. Color Scheme Authentication Using color rating recognisation

7. Proxy Server With Signature (Rsa )

8. Review And Comment Analyser Using Nlp

9. An analytical approach of Data Mining Applications In Healthcare Sector

10. A Distributed learning approach with file sharing, Voice calling, Screen sharing (i.e.
Video Conferring)

11. Emotion based real time music player (.NET)

12. Amazon JSON Dataset Review Analysis using NLP

13. Real Time Amazon User Comment Review Analysis using Crawling and NLP

14. Data Clustering Using PSO

Apollo Hospital jsp


book_recommend_nlp jsp
Climate-Prediction-System jsp
ColorSchemAuthentication jsp
courier-management-system php
Crime-Analysis-Prediction-System java
Dataming-ID3-Algorithem java
E-Banking jsp
eCommerce jsp
E-commerce-Product-Prediction-by-Aspect-Based-Sentiment-Analysis NLP java
face_recog java
forum jsp
hotel_Piccadily (siddhart ) jsp
Hybrid-Genetic-Algorithm java
intranetmailing jsp
ItemRecommendationSystem_graph java
KDD-Music-Recommender java
MusicRecomendation (kamal) jsp
Naive Bayes Heart Attack java
NLP java
online exam system 2016 jsp
online SubjectiveAnswerVerify system 2016 jsp
RailTel jsp
Railway_Reservation_jsp jsp
RecommenderMahout jsp
RecommenderMhout_CoreJava java
Research project on Cloud Security java
ResultAnalyzer jsp
school(time table teacher sutend) jsp
SN jsp
StockMarket-neural running java
SubjectExam java
TimeManagement_2016 jsp
VirtualClassRoom jsp
Weather-Prediction-System java
AttendanceTimeTableMarks jsp
WSD (Semantic Similarity And Relatedness Measures in Biomedical) java
cloud_analyst java
CodeGenerator java
Chat_MailingSystem jsp
online SubjectiveAnswerVerify system 2016 jsp
movies_Reviews_nlp jsp
NLP M.tech\NLP_final java
E-commerce-Product-Prediction-by-Aspect-Based-Sentiment-Analysis java
chatting server client multiple room java
Suggested List of Project Titles:

1. Classification of Handwritten Digits using Machine Learning Techniques


2. Warehouse Management System Using Salesforce.com
3. Evaluating ML techniques for defect prediction
4. Real-time order processing and E-Commerce web application using J2EE
5. Baggage Tracking through RFID Tag
6. Social Network Analysis Utilizing Big Data Technology
7. Mobile phone application offloading by cloud computing utilization
8. Multi-Master Replication in Polyhedra: Full Replication and Eventual consistency
9. Data Leakage Detection Using Cloud Computing
10. Enriching Circuit Switched Mobile Phone Calls by Cooperative Web application.
11. RSS Reader for a Mobile Device in J2ME
12. Pharmacy Management System in PHP , MySQL
13. Multimedia Messaging Service Front End for Supplementary Messaging Services
14. Forensic Analysis of WhatsApp on Android Smartphones
15. Construction of Sensor Database for Internet of Things
16. Real Time Data Pipeline Integration Between Hadoop & External Systems
17. Data Leakage Detection Using Cloud Computing
18. Wiki/Blog Content Management System in PHP
19. Red Blood Cells Classification using Image Processing
20. Voice Based Automated Transport Enquiry System in C#.net and MySQL
21. 3G and Internet Protocols Integration
22. Indoor and Outdoor Real Time Information Collection in Disaster Scenario
23. Research Ontology Data Models for Data and Metadata Exchange Repository
24. JClone: Syntax tree based clone detection for Java
25. Automatic Estimation and Removal of Noise from a Single Image
26. Forensic Analysis of Social Networking Applications on Mobile Devices
27. Tap jacking Threats and Mitigation Techniques for Android Applications
28. Manage Cache Consistency in a Disconnected Distributed Environment
29. Intelligent Student Profiling with Fuzzy Models
30. Program Dependence Graph Generation for Source Code Plagiarism Detection
31. Real Time Network Intrusion Detection by ANN In Data Mining
32. A Session-Based System for Aligning Large Ontologies
33. Remote-Controlled Home Automation Systems with Network Technologies
34. Automated Robot for Military System (ARMS)
35. Online Voting Using Bluetooth Enabled Mobile Phone
36. Wi-Fi Based Mobile Quiz
37. Semi-Supervised Learning using Graph Kernels
38. Gram-Based Fuzzy Keyword Search over Encrypted Data in Cloud Computing
39. Battery Optimizer for Android Mobile Devices
40. Sockets Programming in Python –Building a Python Chat Server
41. Efficient Peer to Peer Similarity Query Processing for High dimensional Data
42. XTC Algorithm Based Scalable Wireless Ad hoc Networking
43. Honey Pots a Security System to Identify Black Hat Community in the Networks
44. Gaussian Processes for Bayesian State Estimation
45. Imitation Learning in Humanoid Robots
46. Privacy Preserving Data Sharing with Anonymous ID Assignment
47. Diagnosing Computer Bugs Using Big Data Approach.
48. Reverse Engineering for Converting Conventional Turbo C Code to 64bit C#
49. Debugging Grids with Machine Learning Techniques
50. Scalable Multimedia Content Analysis in a High-level Language
51. Design and Implementation of a Consolidated Middle Box Architecture
52. Automated Low-Level Analysis and Description of Diverse Intelligent Videos
53. DDOS (Distributed Denial of Service) Using Throttle Algorithm.
54. Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
55. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
56. Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
57. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
58. Decentralized Access Control with Anonymous Authentication of Data in Clouds
59. A Scalable Two-Phase Top-Down Specialization for Data anonymization Using
Map Reduce on Cloud
60. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
61. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective
Privacy Preserving of Intermediate Data Sets in Cloud
62. Cloud-Assisted Privacy Preserving Mobile Health Monitoring
63. QoS Ranking Prediction for Cloud Services
64. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
65. Outsourcing Privacy-Preserving Social Networks to a Cloud
66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption
67. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for
Relational Data
68. Prediction of Difficult Keyword Queries over Databases
69. A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
70. Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks
71. Task Trail: An Effective Segmentation of User Search Behavior
72. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data
73. Mining User Queries with Markov Chains: Application to Online Image Retrieval
74. Incentive Compatible Privacy-Preserving Data Analysis
75. Secure Mining of Association Rules in Horizontally Distributed Databases
76. Facilitating Effective User Navigation through Website Structure Improvement
77. Privacy-preserving Mining of Association Rules from Outsourced Transaction
Databases
78. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
79. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
80. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
81. A Two-stage Deanonymization Attack Against Anonymized Social Networks
82. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality.
83. Multiparty Access Control for Online Social Networks: Model and Mechanisms
84. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
85. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
-by-Packet Adaptive Routing in Communication Networks
86. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for
High-Speed Networks
87. A Decentralized Service Discovery Approach on Peer-to-Peer Networks
88. Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor
Networks
89. A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
90. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks
91. IP-Geo location Mapping for Moderately Connected Internet Regions
92. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
93. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social
Networks
94. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number
of Transmissions
95. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems.
96. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
97. Detecting Spam Zombies by Monitoring Outgoing Messages
98. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
99. Building up a Security and Privacy Aware Location-Based Rewarding System
100. Exploiting Service Similarity for Privacy in Location-Based Search Queries
101. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
102. A Privacy Leakage Upper-bound Constraint based Approach for Cost-
effective Privacy Preserving of Intermediate Datasets in Cloud.
103. A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
104. Dynamic Resource Allocation using Virtual Machines for Cloud Computing
Environment
105. Ranking and Clustering Software Cost Estimation Models through a Multiple
Comparisons Algorithm
106. Ant Colony Optimization for Software Project Scheduling and Staffing with
an Event-Based Scheduler
107. QoS Assurance for Dynamic Reconfiguration of Component-Based Software
Systems
108. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks
109. IP-Geo location Mapping for Moderately Connected Internet Regions.
110. Modified AODV against single and collaborative Black Hole attacks in
MANETs
111. Scalable and Secure Sharing of Personal Health Records in Cloud Computing
Using Attribute-Based Encryption
112. Cloud Computing-Based Forensic Analysis for Collaborative Network
Security Management System
113. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting
System Development
114. A Collaborative Protection Network for the Detection of Flooding DDoS
Attacks

You might also like