| +91 9790176891


« Previous

1. Andro WORDPRESS: WORDPRESS blogging using android
2. Android event scheduler reminder application
3. Authentication schemes for session passwords using color and images
4. Bluetooth based chatting system using android
5. Concise range queries system
6. Dynamic Google remote data collection
7. Extended mobile Captcha implementation
8. ibus: Chennai MTC bus info system
9. iflat: Flat ranking model using android
10. ihealth: Patient health record system
11. imed: Self diagnosis system for disease treatment
12. Restaurant Table Order Management System
13. iteeth: Dental hub on android
14. Mobile Geo data collection security for client site
15. Mobile phone based drunk driving detection system
16. Multi-user mobile Bluetooth two way text chat
17. Nearest ATM mobile navigation through global positioning system
18. Organization business communication & planning’s through mobile remote server
19. Portable learning language system
20. Quantitative and qualitative mobile data collection
21. Route Navigation through Global Positioning System
22. iShopping: Nearest Shopping Location Identifier
23. Software version self update for android mobile applications
24. Text to speech in android
25. The application protector for mobile manual security
26. Advanced GPS Location finder to identify Hospital Location
27. WIG: Weather Index Guide
28. Free Voice Calling In Wifi Campus Network Using Android
29. iRail: Railway Reservation Using Android App
30. FTP For Android
31. QuickPro: An advanced m-learning system
32. An efficient Image Search System in Android
33. Efficient and Secure Message passing system using new key distribution scheme
34. A Secured payment scheme method to avoid Frauds.
35. A Secured Cloud based data storing system
36. User preference based Mobile search engine
37. iRecommend: User Ranking based Recommendation System
38. Color based Pattern Lock System
39. A Secure Access Control system in Cloud
40. Emergency Alert System using Android Text Message Service
41. Online Student Attendance Management System using Android
42. DroidMat: Android Malware Detection
43. Mobile Computing Optimal Uplink Query Processing
44. Safety Alarm by Using GPS in Android
45. VNC Architecture Based Remote Desktop Access Through Android Mobile Phones
46. Friend Mapper and Open GPS Tracker System
47. Android Remote PC Control
48. Campus Navigation for Blind People on Android Devices (Pondicherry University Campus)
49. Location Based Early Disaster Warning and Evacuation System on Mobile Phones
50. Speech to Text
51. Android Call Skipper
52. Enhancing Driving through Driving Assistance System Android Application
53. Dynamic Personalized Movie Recommendation System
54. Location based Spatial Queries in Mobile Environments
55. Twitsper: Tweeting Privately
56. Meetup: Secure encounter based Social Networking
57. CloudFTP: A free Storage Cloud
58. Doctor-Patient Interaction System Based on Android
59. Android City Tour Guide System
60. A Mobile Phone Based Medicine In-take Reminder and Monitor
61. Android Leave Management System
62. Bank Account Tracker For Android

Web Application
1. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
2. A Secure Cloud Server System using Proxy Re-Encryption Mode
3. A Secure payment System for banking transactions
4. An efficient Mailing System for Detecting Spam Mails
5. Annotating Search Results from Web Databases
6. Anonymization for Secure Data in Web
7. Attribute-based Encryption System for Secured Data Storage
8. Automatic Testing System for Web Application
9. Boolean Retrieval for Medical datas
10. Cloud Data Protection for the Masses
11. CloudMov: Cloud based Video Streaming System
12. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
13. Continuous query processing system for location based services
14. Cooperative Secure Multi-Cloud Verification System
15. Detecting Complaints in Online Product Purchase
16. Detecting false users in Online Rating system & Securing Reputation
17. Distributed data integration on electricity board
18. Dynamic Assignments of Clients to Servers based on Load
19. Dynamic Resource allocation in Cloud
20. Earthquake Reporting System using Social Networking Site
21. Efficient and secure search on encrypted medical data
22. E-Fraud Prevention based on the Self-Authentication of e- Documents
23. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
24. Enhanced Security Scheme in Social Networking using XML
25. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
26. Facilitating Effective User Navigation through backtracking
27. Filtering Unwanted Messages in Online Social Networking User walls
28. Get your Campus
29. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
30. Identity-Based Secure Distributed Data Storage Schemes
31. Information leak detection and prevention system
32. Intrusion Detection and Prevention in Web Servers
33. IPTV Portal System
34. Load balancing model for Cloud Data Center
35. Location Based Search System
36. Multi-Cloud System to avoid server failures
37. Multiparty Access Control for Online Social Networks
38. Personalised Search Engine from user click-through logs
39. Personalized Image Search System
40. Personalized QoS-Aware Web Service Recommendation and Visualization
41. Portable Cloud System
42. Predicting BMI using Behavioral Outcomes
43. Preserving data and identity privacy from an untrusted cloud by Multi- Owner Data Sharing
44. Preventing Intrusion in Web and Database Servers
45. Preventing Private Information Inference Attacks on Social Networks
46. Privacy Preserving Data Sharing With Anonymous ID Assignment
47. Privacy Preserving Delegated Access Control in Cloud Computing
48. Privacy Protection Scheme in Location Information System
49. Privacy-Preserving Public Auditing For Secure Cloud Storage
50. Protecting Sensitive Labels in Social Network Data Anonymization
51. PUBMED: an efficient biomedical based hierarchical search engine
52. Ranking and feedback model in search engines
53. Ranking system for web library
54. Scalable and Secure Sharing of Personal Health Records
55. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
56. Secure Access Control System in Cloud using Attribute based encryption technique
57. Secure and practical outsourcing of linear programming in cloud computing
58. Secure cloud access system using JAR
59. Secure Key based Privacy Preserving Access Control System
60. Secure personal information system in Medical System
61. Security Enhanced Facebook like Social Networking Sites
62. Security key based Video Uploading and viewing System
63. Self diagnosing with identifying disease treatment with online doctor precautionary
64. Social Tube: P2P-assisted Video Sharing in Online Social Networks Social Tube:P2Passisted Video Sharing in Online
65. Spatial Approximate String Search
66. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
67. Twitsper Tweeting Privately
68. Two tales of privacy in online social networks
69. Vertical Search Engine
70. Video Sharing Website
1. A Decentralized Service Discovery Approach on Peer-to-Peer Networks
2. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
3. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
4. A System for Denial-of-Service Attack Detection
5. An enhanced model for achieving high throughput using variant buffer size methodology
6. Anomaly based intrusion detection system
7. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
8. Bandwidth estimation systems in networks
9. Blocking intruders for secured network maintenance
10. Cache based User Location Querying System
11. Caching techniques in MANET and various routing protocols in MANET
12. Capacity of Data Collection in Arbitrary Wireless sensor networks
13. CFR: an efficient congestion free router
14. Channel allocation system in mobile networks
15. Clone Node Detection in Wireless Sensor Networking
16. Coding for cryptographic security enhancement using stopping sets
17. Content based image retrieval system
18. Content Sharing in Peer-to-Peer Networks
19. Cut detection in Wireless Sensor Network
20. Data Transmission Using Multi-Tasking-Sockets
21. Delay-Based Network Utility Maximization
22. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
23. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
24. Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
25. Efficient and Dynamic Routing Topology Inference
26. Efficient load balancing system in SIP Servers
27. Efficient load distribution scheme to avoid congestion in servers
28. Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
29. Fault Node Recovery Algorithm for a Wireless Sensor Network
30. FEC based cryptography for secured data communication
31. Finding latency in data transmission
32. Geometric Routing Protocol in MANET
33. Homophonic cryptography technique for data security
34. Hop-by-Hop routing in Wireless Network
35. Impact of denial of service attacks on servers
36. Intrusion detection system in wireless sensor networks
37. Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
38. Mobility management schemes in wireless networks using agent forwarding methods
39. Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
40. Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
41. Optimized Software Release Planner
42. Packet monitoring based multicasting system
43. Preventing attackers in WSN from collecting datas
44. Protecting location information in Wireless Sensor Network
45. Puzzle based secure data transmission scheme to avoid intruders
46. Recovery from link failure in wireless networks
47. Reducing the costly forward using band-based directional broadcast
48. Reducing the number of transmission in Wireless Networks
49. Routing in Wireless Adhoc Network
50. Secure and efficient video distribution scheme using variant bandwidth system
51. Secure communication by hiding packets in intermediate router system
52. Secure Content Distribution using Network Coding Algorithm
53. Secure Overlay Cloud Storage with Access Control
54. Secured data communication system in wireless mesh networks
55. Selfish overlay network creation and maintenance
56. Single-source shortest path algorithm with nonnegative edge path
57. Supporting data transfer and movements of mobile terminal between different locations
58. Ticket based secured mobile banking scheme for detecting frauds
59. Ticket based security system for banking applications
60. Trace back scheme on finding attackers in Routing
61. Traffic flow analysis system based on a novel concept of flow set
62. Trust aware routing in MANET
63. Trust based Peer-to-Peer System for Secure Data Transmission
64. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service
65. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
66. Virus Spread in Network
67. Virus spread in P2P network
1. Automatic Vehicle Detection in Surveillance Video
2. Data embedding using Pixel-pair matching technique
3. Digital image processing filters for image filtering methods
4. Efficient steganography embedding methodology for secret data preservation
5. Handwritten Chinese Character Recognition
6. License Plate Recognition System
7. Reducing noises in images
8. Video steganography for secure data preservation
9. Visual cryptography system for secret image sharing
10. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal
11. Credit card fraud detection system using genetic algorithm
12. Crime Detection in Credit Card Fraud
13. Criminal Face Detection
14. Decision trees for uncertain data
15. Document clustering
16. Efficient search on XML data
17. Efficient searching technique in xml data
18. Feature Selection based Fast Clustering Algorithm with Minimum Spanning Tree in Medical Data
19. Finding File Duplication
20. High efficient location monitoring system
21. Mobile alert based intruder blocking system in cloud computing
22. Monitoring cloud resources for better resource utilization
23. Project Management System
24. Student Management System

Other Work

« Previous