Diploma CSE and IT Project Dotnet Titles
1. SigFree: A Signature-Free Buffer Overflow Attack Blocker
2. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
3. Multicast multipath power efficient routing in manet
4. Maximizing reward in wireless network with energy
5. Automation of Attendance system using RFID and GSM
6. Motion detection with background subtraction
7. Executed CSMA algorithm for throughput and utility maximizing in wireless network
8. Online forum
9. Online random shuffling large database
10. Privacy preserving public auditability data storage in cloud
11. Efficient approximate query processing in peer to peer network
12. Quantum key and receiver program
13. E license investigation
14. Load Balancing
15. Ip tracking System
16. Real time group editor
17. Efficient Broadcasting with Guaranteed Coverage in MANETs
18. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
19. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
20. Event Driven Hook Demodulator
21. Facial Expression Recognition Using Facial Actions
22. Simple Vehicle Detection with Shadow Removal at Intersection
23. Blind Image Watermarking
24. Online Terminal Import & Export Procurement
25. Online based University Admission
26. Client Server chat Application
27. Online System For District Collector Office
28. Captcha Based Multiple Session Passwords Using Color And Images
29. Organ And Blood Donation through online
30. Online Polling
31. Efficient and securely detect fraud in Vehicle insurance
32. Multi Banking System Using NFC
33. Smart Card using RFID
34. A new Model RFID based attendance for College
35. Securely store the Patient record in hospital by using the Cryptography Algorithm
36. Application Layer Blocker For Preventing On Cyber Security
37. Auditing Data Integrity And Data Storage Using Cloud
38. Automatically Identifying Query Groups On Web Search Engine
39. Building Construction And Cost Estimation
40. A Reservation-Based Coordination Protocol For Web Services
41. Centralized Event Planer Across Social Media Sites
42. Market Based Analysis For Consumer Correct DecISIon
43. Cryptography On Personal Confidential Information
44. Customer Sales Analysis System Based On Purchasing
45. Data Aggregation Using Sql Clustering
46. Data Confidential Against Untrusted Servers Using Attribute-Based Encryption (Abe)
47. Data Mining Analysis On EB Bill
48. Data Processing For Disease-Treatment Relations
49. Distributed Database Optimization On Healthcare
50. Efficient And Secure Data Processing On Queries Similarity
51. Efficient Search On Outsourced Data Using Cloud
52. Ethical And Social Issues In File Sharing System
53. Firewall
54. Flight Booking Portal
55. Group Movement Pattern Discovery
56. High Secure Corporate Web Search Engine
57. Home Appliances Online Purchase
58. Human Expertise Search Engine
59. I-Med-Design And Evaluation Of The Imed Intelligent Medical Search Engine
60. Information Leak Detection And Prevention
61. Intelligence Missing Items In Shopping Cart
62. Joint Processing Of Spatial Keyword Queries
63. Market Intelligence Based Public Sentiment Analysis
64. Modern Distributed Business Applications For Supply-Chain Management
65. Multi Location Networked Mobile Auto Intimates
66. Multi-User Public Auditing System Of Data Storage Security
67. Net Bank In Recharge
68. News Ticker Project
69. Online Shopping
70. Online Digital Contract Signing In Mistrusted Parities
71. Online Dynamic Form Creation For Non-It Peoples
72. Online Social Networks Controls Using Cloud
73. Online Time Sensitive Queries
74. Optimum Online Knowledge Base
75. Predicting Users Behaviors Using Web Mining
76. Product Marketing Analysis On Public Opinion
77. Public Web Status Monitoring System
78. Recommendation System Based On Graph
79. Reduce The Password Guessing Attacks Using Click Point
80. Secure and Efficiently maintain the Patient Information in cloud
81. Secure Pre-Paid Recharging System Using Quasigroups Cryptographic Algorithm (QCA)
82. Secured Image Communicator
83. Semantic Web Search Engines
84. Sentence Based Search On Cloud
85. Server Fraud Detection On Cloud
86. Service Availability Guarantees On Virtual Economy
87. Session Authentication Passwords Using Color
88. SMS Transaction Security
89. Steganography For Data Reading And Writing AVI Files
90. Step By Step Monitoring For Product Purchasing System
91. Streaming Data Warehouse Updations
92. Substitution-Permutation Cryptanalysis System
93. Top-K Ranking System
94. Ultimate Location Information Systems
95. Universal Smart Card
96. Value Added Tax (Vat)
97. Vendor Information System For Shipping
98. Video Compression With Data Hiding & Data Extraction
99. Virtual Energy- Based Encryption And Keying
100. Web Based Book Publishing System
101. Web Based Customer Favorite Vehicle Search Engine
102. Web Service Oriented Query Authentication Technique
103. Privacy preserving public auditability data storage in cloud
104. Cyber Shopping Window
105. File Splitter software
106. College Alumni portal
107. E-Gift Shoppy
108. Advertising Agencies
109. Online-Results
110. Bulk SMS Application
111. A Secure Recognition Based Graphical Password by Watermarking
112. Three factor Authentication Method for Banking Application
113. Personal Computer Access control using voice recognition method
114. Refactoring – Aware Software Configuration Management
115. E-Banking Management System
116. World Wide Net Ranking System
117. Online Insurance Management System
118. Virtual Knowledge Sharing
119. Financial Forecast System
120. Multilevel Marketing System
121. Grid Services for Distributed System Integration
122. Authenticated Multi-step Nearest Neighbor Search
123. Predicting Missing Items in Shopping Carts
124. Student Database Management System Using Internet and Intranet
125. Crack Removal Based on Edge Detection Method
126. In-Depth Packet Inspection using a Hierarchical Pattern MatchingAlgorithm
127. Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems
128. Semantics-Based Design for Secure Web Services
129. Downloading Secured File using Multiple Servers
130. Statistical Techniques for Detecting Traffic Anomalies Through PacketHeader Data
131. Distributing and Monitoring the Process in a Network
132. Visualizing Student data in Web-Based Distance Education
133. Bridging Domains using World Wide
134. Website Ranking System
135. Criminal Investigation Management System
136. E-Banking
137. Reality Event Organization
138. E Cab Services
139. Edge Detection in Images with Wavelet Transform
140. Data Hiding additional files in a ZIP archive
141. Online Staff and Student Interaction
142. Case Management for Government Agencies
143. Classroom Management
144. Clinical Trial Initiation and Management
145. Competitive Analysis Web Site
146. Discussion Forum website
147. Disputed Invoice Management
148. Employee Training Scheduling and Materials
149. Equity Research Management
150. Integrated Marketing Campaign Tracking
151. Manufacturing Process Managements
152. Product and Marketing Requirements Planning
153. Request for Proposal Software
154. Sports League Management
155. Absence Request and Vacation Schedule Management
156. Budgeting and Tracking Multiple Projects
157. Bug Database Management
158. Call Center Management Software
159. Change Request Management
160. Compliance Process Support Site
161. Contacts Management Software
162. Document Library and Review
163. Event Planning and Management
164. Expense Reimbursement and Approval
165. Help Desk and Ticket Management
166. Inventory Tracking
167. I T Team Workspace
168. Job Requisition and Interview Management
169. Physical Asset Tracking and Management
170. Project Tracking Workspace
171. Shopping Cart
172. Room and Equipment Reservations
173. Sales Lead Pipeline
174. Expense Report Database
175. Sales Contact Management Database
176. Inventory Management Database
177. Service Call Management Database
178. Dental Clinic Management
179. Fund Raising Management
180. Clinic/ Health Management
181. Cable Management System
182. Survey Creation and Analytics
183. Museum Management System
184. Multi-Level Marketing System
185. Search Engine
186. Online News Paper Site
187. Image Gallery
188. Exam Scheduler
189. Wildlife Safari Trip Management
190. Load Balancing for Parallel Applications on Distributed Systems
191. Learning and Matching of Dynamic Shape Manifolds for human action recognition
192. Minimizing File Download in an Intranet
193. High Resolution Animated Scenes from Stills
194. Personalized Retrieval of Sports Video
195. In-Image Accessibility Indication
196. Customized Online Exam using Cryptography
197. Closing the Loop in Web Page Understanding
198. Securely pay toll gate money through online
199. Backpressure with adaptive redundancy mechanism for Networks in Overload
200. To improve the network Topology lifetime in wireless sensor network using Mobile node Rotation
201. Adaptive neighbor discovery algorithms for enhance the neighbor discovery in wireless network with MRP
202. Relay Selection in Wireless Networks for Optimal
203. Delay Anonymity Tradeoff
204. Online Movie Ticket Booking with Website Security
205. Multi User File Access Control System In Network
206. Traffic Analysis over Network Using MeasuRouting
207. Data Transmission among Hyper Cube Structured Network
208. File Format Convertor for File Distribution Service
209. File Transmission in Anonymous Network
210. Online Travel Search Using Incremental Query
211. Online HR Management Using Horizontal Aggregation
212. Real Estate Business In Online
213. Online Book Shop With Quick Search
214. Scientific Journals Search in Digital Library
215. Online Shopping with Ontology Rule Mining
216. Online Share Marketing View In Streaming Update
217. Firewall Rules Against the DDOS Attack
218. Online Exam Monitoring With Password Resistant Protocol
219. Online Banking Services With Image Based Authentication
220. Securing The Protocol Against To The DDOS
221. Data Leakage Detection In Customer Care Services
222. Secure And Safe Plug-ins in Website
223. Identifying Misbehavior User In Website
224. Enhancing Security Of Data In Cloud Storage
225. Auditing Verifier Liability In The Website
226. Online Security for Private Cloud Service
227. Indexing based Search On Cloud Service