BCA/B.Sc Project Titles



MCA/M.Sc Project Titles
1.      Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs.
2.      A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers.
3.      Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds.
4.      Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
5.      A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
6.      Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks.
7.      Security evaluation of pattern classifiers under attack.
8.      Multitouch Gesture-Based Authentication.
9.      AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments.
10.  Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems.
11.  Internet Traffic Privacy Enhancement with Masking: Optimization and Tradeoffs.
12.  Real-Time Scheduling with Security Enhancement for Packet Switched Networks.
13.  PMSE: A Personalized Mobile Search Engine.
14.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.
15.  A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data.
16.  Spatial Query Integrity with Voronoi Neighbors.
17.  Security evaluation of pattern classifiers under attack.
18.  A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.
19.  EAACK—A Secure Intrusion-Detection System for MANETs.
20.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks.
21.  Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
22.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
23.  AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
24.  Image Fusion with Guided Filtering.
25.  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
26.  Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
27.  OPASS: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attack.
28.  ST-CDP: Snapshots in TRAP for Continuous Data Protection.
29.  Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.
30.  Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis.
31.  A Novel Anti Phishing Framework based on Visual Cryptography.
32.  Resilient Identity Crime Detection.
33.  A Business Model for cloud computing Based on a Separate Encryption and Decryption Services.
34.  One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases.
35.  Harvesting Image Database From Web.
36.  Customer Relationship Management System based on Data mining Technique.
37.  Demand draft withdrawal automatic in ATM system.
38.  Unique code identification for voting system.
39.  Student performance monitoring system.
40.  Online courier tracking system.
41.  File compression and decompression using huffman algorithm.
42.  Graphical password authentication using cued click points for e-commerce application.
43.  ATM reporting system.
44.  Automated online examination system.
45.  Image retrieval based on multi-texton histogram.
46.  Image inpainting technique using local binary pattern based texture in painting.
47.  A color edge detection algorithm in rgb color space.
48.  Set with sms otp using two factor authentications for e-shopping application.
49.  Information hiding using lsb steganography.
50.  SMS based student attendance reporting system.
51.  SMS based student marks reporting system.
52.  RFID based attendance system.
53.  RFID based toll booth automation.
54.  RFID based voting system.
55.  Automobiles online selling.
56.  Tourism management system.
57.  Virtual mall shopping.
58.  Passport automation system.
59.  Library management system.
60.  Employment exchange management system.
61.  Web based college attendance analysis system.
62.  Electricity online billing system.
63.  LIC management system.
64.  Cricket Statistics
65.  Online matrimonial
66.  Marketing and sales system.
67.  Call center management system.
68.  Online mobile shopping.
69.  Online blood bank system.
70.  Supermarket management system.
71.  Data mining analysis on EB bill system.
72.  Online product opinion and ranking system.
73.  Flight booking portal.
74.  Online secure file transaction system.
75.  Online secure file transaction system.
76.  Online secure file transaction system.
77.  E-voting system.
78.  Website ranking system.
79.  Hospital management system.
80.  Global employee acclaimer.
81.  Intelligence missing items in shopping cart.
82.  Entrepreneur sales report management.
83.  Efficient and secure data processing on queries similarities.
84.  Cryptography on personal confidential information.
85.  Online Video Sharing Portal.
86.  Online Job Portal.
87.  Graphical Password Authentication for Online Banking Environment.
88.  Security in E-Banking using Visual Cryptography Technique.
89.  Biometric Secured Centralized Voting System.
90.  Random Password getting for E-Applications.
91.  Students Information System.
92.  Automated Fingerprint Identification System.
93.  Biometric Security Using Finger Print Recognition.
94.  Face recognition using eigenfaces.
95.  Face Recognition Using Line Edge Map.
96.  Image-based Face Detection and Recognition.
97.  Identity authentication system using face recognition techniques in human-computer interaction.
98.  Multi-face Detection System in Video Sequence.
99.  A novel way of tracking moving objects in video scenes.
100.          Video object tracking using region split and merge and a Kalman filter tracking algorithm.
101.          Real-time implementation of Library management system using RFID.
102.          Real-time implementation of Voter credential system using RFID.
103.          RFID based Vehicle Tax Pay and Access System.
104.          RFID based electronic passport system.
105.          Smart card attendance system.
106.          Automated colored object sorting system for pick and place application.
107.          Airline Reservation System.
108.          Hotel Reservation System.
109.          Railway Reservation System.
110.          Medical Agency Monitoring System.
111.          Computer Center Monitoring System.
112.          Crime File Information System.
113.          Patient Monitoring System.
114.          Pharmacy Management System.
115.          Gas Agency Management System.
116.          Cargo Information System.
117.          Online Shopping.
118.          Petrol Bulk Management System.
119.          Automated Palm Printing Identification System.
120.          Online Multilevel Business.
121.          Automated License plate Recognition
122.          Web Search Engine Optimization.
123.          Automatic Cell Phone Messaging System.
124.          Online Customer Care.
125.          Online Marketing and Sales System.
126.          Audio Stenography for Data Hiding in Wave Files.
127.          Performance Evaluation of Distance Routing Algorithm in MANET.
128.          Data Mining for Network Intrusion Detection.
129.          Human Resource Management System.
130.          Control of photo sharing over Online Social Networks.
131.          Jewellery Shop Management System.
132.          Student Record and Information System.
133.          E-mail System.
134.          Railway Reservation System.
135.          Driving License Management System
136.          Bus Reservation System.
137.          ATM System.
138.          Tax Management System.
139.          Prison Management System
140.          Online Examination System.
141.          Online Medicine Purchase.
142.          Privacy Concerns for Photo Sharing in Online Social Networks.
143.          Finance Management System.
144.          Implementation of Medical image fusion techniques for multi-focus images.
145.          Web Based Customer Favorite vehicle Search Engine.
146.          Employee Based Performance Monitoring and Action Systems.
147.          Secure and Cloud Based Patient Information Systems.
148.          Customer Sales Analysis System Based On Purchasing.
149.          Data confidential against untrusted servers using attribute- based encryption (ABE).
150.          College Result Analysis.
151.          Multi Location Networked Mobile Auto Intimates.
152.          Entrepreneur Sales Report Management.
153.          Reduce the Password Guessing Attacks using Click Point.
154.          Advanced One-Click User Web Search Engine.
155.          Online Tag Based Image Retrieval and Effective Management.
156.          Computational Perceptual Features for Texture Representation and Retrieval.
157.          Web Page re-Ranking System for Library.
158.          Online Advertising System.
159.          Pre-paid Recharging System on Banking.
160.          Secure SMS Transaction System on banking.
161.          E-Learning.
162.          Ensuring Data Storage Security in Cloud Computing.
163.          E-Online job Recruitment.
164.          E-recharge system.
165.          Enterprise Stock and Accounting System.
166.          Disease Information Hiding on Publishing Healthcare Data.
167.          Multilevel Images Authentication Systems.
168.          Client Favorite Photo Search Engine on Web.
169.          Online Banking With Fraud Detecting.
170.          Online University.
171.          Robust Data Authencitiy and Group Signature Mechanism for Enhanced Cloud Security Process.
172.          Extended Mobile Captcha Implementation.
173.          Face recognition using gradient technique.
174.          Automobile servicing center management.
175.          Hotel Management system.
176.          Web Based Ticket Booking System.
177.          College attendance analysis system.
178.          Blood bank system.
179.          Bus Management System.
180.          Courier Information System.
181.          Student Record and Information System.
182.          Employee Based Performance Monitoring.
183.          Fusion of MS and PAN Images Preserving Spectral Quality.
184.          Automatic Segmentation of Cloud Detection for All-Sky Images.
185.          Information Hiding using Text Embedding in QR Codes
186.          Facial Emotion Recognition Using Baysian Classification.
187.          Citizen card Management system.
188.          Fingerprint Image Enhancement.
189.          Network signature based on intrusion detection system.
190.          Secure Data Transfer Over Internet Using Image Steganography.
191.          A Web based academic monitoring system.
192.          Online Photo Gallery System.
193.          Web based Applications for Insurance Services.
194.          Biometric Authentication System Using Figer Tips.
195.          Mobile Recharging With Banking Transaction
196.          Result Alert System With E-mail and SMS.
197.          Telephone Billing System.
198.          Bug Tracking System.
199.          Face Recognition in e-attendance.
200.          E Commerce Product Rating Based On Customer Review Mining.
201.          Detecting E Banking Phishing Websites Using Visual Cryptography.
202.          Railway Tracking and Arrival Time Prediction.
203.          Online Loan Application & Verification System.
204.          Secure Electronic Fund Transfer Over Internet Using DES.
205.          Online Diagnostic Lab Reporting System.
206.          Timetable Management System.
207.          Internet Based Live Courier Tracking And Delivery System.
208.          Detect moving objects and tracking based on color and shape in real-time.
209.          Three Level Password Authentication System.
210.          Secure ATM Using Card Scanning Plus OTP.
211.          Storage/Energy efficient Cloud Computing.
212.          Detecting Edges Using Image Processing.
213.          Automatic Toll Collection Project.
214.          Handwriting recognition using neural networks.
215.          Information Hiding using Image Embedding in QR Codes.
216.          Secure And Confidential Sharing Of Personal Health Record In Outsourced Data.
217.          Face recognition using skin color and template matching a soft computing approach.
218.          Wireless Surveillance system using Robot.
219.          Spoofing Prevention Method.
220.          Content Base Image retrieval by shape matching.
221.          Enhanced secure password based Authentication System.
222.          Evidence Based Access Control For Web Services Implemented In A Mail Server.
223.          Demonstration Software for Edge Detection and Segmentation.
224.          Spy Robotics.
225.          Human Face Identification.