Java Projects
There are given a lot of free java projects developed in core java, servlet, jsp, struts, spring and hibernate technology. We are providing all the projects for student purpose. All these projects have been developed under the guidance of our Java trainers. If you think, you can develop any of this project with more features and effective way, you can contact us.
NETWORKINGThis website promotes networking projects, network security projects, network design projects, network programming projects, ethical hacking projects and projects in computer network and security protocol analysis and testing along with reports. The site also contains different topics in networking and network security topics which can be used for papers, projects and presentations. The networking projects which are listed on the website are professional projects in networking.
- STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS
- FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS
- TOWARD OPTIMUM CROWDSENSING COVERAGE WITH GUARANTEED PERFORMANCE
- PRISM: PRIVACY-AWARE INTEREST SHARING AND MATCHING IN MOBILE SOCIAL NETWORKS
- JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL
- SOFTWARE DEFINED NETWORKING WITH PSEUDONYM SYSTEMS FOR SECURE VEHICULAR CLOUDS
- AN ENHANCED AVAILABLE BANDWIDTH ESTIMATION TECHNIQUE FOR AN END-TO-END NETWORK PATH
- PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS
- A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS
- IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS
- OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS
- SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS NETWORKS
- LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS
- SMARTCRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WE
- A NOVEL AND LIGHTWEIGHT SYSTEM TO SECURE WIRELESS MEDICAL SENSOR NETWORKS
- CIPHER X RAY
- A TWO STAGE DEANONYMIZATION ATTACK AGAINST ANONYMIZED SOCIAL NETWORKS
- AN IMPROVED CLUSTERING ALGORITHM BASED ONK-MEANS AND HARMONY SEARCH OPTIMIZATION
- A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS
- VAMPIRE ATTACKS
- MOBILE RELAY CONFIGURATION IN DATA - INTENSIVE WIRELESS SENSOR NETWORKS
- M-PRIVACY FOR COLLABRATIVE DATA PUBLISHING
- AMPLE:AN ADAPTIVE TRAFFIC ENGINEERING SYSTEM BASED ON VIRTUAL ROUTING TOPOLOGIES
- AUTOMATIC RECONFIGURATION FOR LARGE SCALE RELIABLE FOR STORAGE SYSTEM
- AVMON.
- P2PPROXY.
- BIDIRECTIONAL ROUTING ALGORITHUM
- CREDIT CARD FRAUD DETECTION USING HIDDEM M,ARKOV MODEL.
- EFFICIENT BROADCASTING WITH GURENTEED COVERAGE IN MOBILE ADHOC NETWORK.
- ONLINE HANDWRITTEN SCRIPT RECOGNITION.
- A FULLY DISTRIBUTED PROACTIVELY SECURE THRESHOLD MULTISIGNATURE SCHEME.
- NETWORK MONITORING MANAGEMENT
- A BIDIRECTIONAL ROUTING ABSTRACTION FOR ASYMMETRIC MOBILE AD HOC NETWORKS
- AN ACKNOWLEDGEMENT APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS
This category consists of cloud computing 2015-16 projects list and cloud computing project abstract. Here we provide latest collection of cloud computingproject topics with their abstracts. These projects are developed using latest cloud technology concepts.
- COST MINIMIZATION ALGORITHMS FOR DATA CENTER MANAGEMENT
- ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD
- EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCH-AND-BOUND HEURISTICS
- IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS
- PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS
- RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE
- LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS
- A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION
- A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS
- A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE
- A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS
- OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS
- IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE
- PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING
- TWO-FACTOR DATA ACCESS CONTROL WITH EFFICIENT REVOCATION FOR MULTI-AUTHORITY CLOUD STORAGE SYSTEMS
- VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS
- PRACTICAL PRIVACY-PRESERVING MAPREDUCE BASED K-MEANS CLUSTERING OVER LARGE-SCALE DATASET
- FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
- E-SCHOOL TECHNO BUS BASED ON CLOUD COMPUTING SERVICES
- ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS
- A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
- AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD
- DIFFERENTIALLY PRIVATE ONLINE LEARNING FOR CLOUD-BASED VIDEO RECOMMENDATION WITH MULTIMEDIA BIG DATA IN SOCIAL NETWORKS
- SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING
- DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE.
- DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
- DROPS: DIVISION AND REPLICATION OF DATA INCLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
- PHOENIX: A MAPREDUCE IMPLEMENTATION WITH NEWENHANCEMENTS
- A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD
- AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING
- AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD
- CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM
- CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING
- CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES
- CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL
- CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS
- DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD
- DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
- DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
- ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
- FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
- IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS
- PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD
- REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS
- SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED ENCRYPTION
- SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING
- TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE
- A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING
- A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
- CHARM A COST EFFICIENT MULTI CLOUD DATA HOSTING SCHEME WITH HIGH AVAILABILITY
- AUDITFREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE BASED ENCRYPTION
Here is a list of project ideas related to Data Mining. Students belonging to third year or final year can use these projects as mini-projects as well as mega-projects. This list has been complied after referring to the project ideas that have come across the forum since last few years. If you have questions regarding these projects feel free to ask them in the replies below.
- POINT-OF-INTEREST RECOMMENDATION FOR LOCATION PROMOTION IN LOCATION-BASED SOCIAL NETWORKS
- NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA
- SOCIALQ&A: AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM
- MODELING URBAN BEHAVIOR BY MINING GEOTAGGED SOCIAL DATA
- A WORKFLOW MANAGEMENT SYSTEM FOR SCALABLE DATA MINING ON CLOUDS
- FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING MAPREDUCE
- SENTIMENT ANALYSIS OF TOP COLLEGES IN INDIA USING TWITTER DATA
- INVERTED LINEAR QUADTREE: EFFICIENT TOP K SPATIAL KEYWORD SEARCH
- TRUTH DISCOVERY IN CROWDSOURCED DETECTION OF SPATIAL EVENTS
- SPORE: A SEQUENTIAL PERSONALIZED SPATIAL ITEM RECOMMENDER SYSTEM
- FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS
- A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS
- AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS
- BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION ALGORITHM
- CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION
- CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDINGS
- CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER
- CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA
- EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS
- DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS
- MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS
- NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS
- RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS
- LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY
- USING HASHTAG GRAPH-BASED TOPIC MODEL TO CONNECT SEMANTICALLY-RELATED WORDS WITHOUT CO-OCCURRENCE IN MICROBLOGS
- QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS
- PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY
- SURVEY ON VIGILANCE OF INSTANT MESSAGES INSOCIAL NETWORKS USING TEXT MINING TECHNIQUES AND ONTOLOGY
- A NOVEL PIPELINE APPROACH FOR EFFICIENT BIG DATA BROADCASTINGENTITY LINKING WITH A KNOWLEDGE BASE: ISSUES, TECHNIQUES, AND SOLUTIONS.
- ENTITY LINKING WITH A KNOWLEDGE BASE ISSUES TECHNIQUES AND SOLUTIONS
- SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY
- LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES
- A META-TOP-DOWN METHOD FOR LARGE-SCALE HIERARCHICAL CLASSIFICATION
- SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY
- ADVANCE MINING OF TEMPORAL HIGH UTILITY ITEMSET
- SLICING A NEW APPROACH TO PRIVACY PRESERVING DATA PUBLISHING
- FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS
- DISEASE PREDICTION
- FAST DATA RETRIEVAL FROM DATABASES BEYOND THE DATABASE DIMENSIONS
- C-TREND: TEMPORAL CLUSTER GRAPHS FOR IDENTIFYING AND VISUALIZING TRENDS IN MULTI ATTRIBUTE TRANSACTIONAL DATA
- A SIGNATURE-BASED INDEXING METHOD FOR EFFICIENT CONTENTBASED RETRIEVAL OF RELATIVE TEMPORAL PATTERNS
- HIDING SENSITIVE ASSOCIATION RULES WITH LIMITED SIDE EFFECTSEVENTUAL CLUSTERER .A MODULAR APPROACH TO DESIGNING HIERARCHICAL CONSENSUS.
Network Simulator Version 2, also known as NS-2. NS-2 is an event driven packet level network simulator developed as part of the VINT project (Virtual Internet Testbed).Below is the list of NS2 based projects with their abstract.
- A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS
- A STUDY ON FALSE CHANNEL CONDITION REPORTING ATTACKS IN WIRELESS NETWORKS
- AUTONOMOUS MOBILE MESH NETWORKS
- ALBA-R: LOAD-BALANCING GEOGRAPHIC ROUTING AROUND CONNECTIVITY HOLES IN WIRELESS SENSOR NETWORKS
- DEFENDING AGAINST COLLABORATIVE ATTACKS BY MALICIOUS NODES IN MANETS: A COOPERATIVE BAIT DETECTION APPROACH
Digital Image Processing is the use of computer algorithms to perform image processing on digital images. Image processing projects are relatively new domain for final year projects. The reason for this is the fact that tools and software for image processing have been available only over the past few years. These are software like Matlab, Simulink and LabVIEW.
- ONE-TIME PASSWORD FOR BIOMETRIC SYSTEMS: DISPOSABLE FEATURE TEMPLATES
- EFFECTIVE AND EFFICIENT GLOBAL CONTEXT VERIFICATION FOR IMAGE COPY DETECTION
- FACE RECOGNITION USING SPARSE FINGERPRINT CLASSIFICATION ALGORITHM
- A NEW RULE FOR COST REASSIGNMENT IN ADAPTIVE STEGANOGRAPHY
- PASSFRAME: GENERATING IMAGE-BASED PASSWORDS FROM EGOCENTRIC VIDEOS
- ENHANCED PASSWORD PROCESSING SCHEME BASED ON VISUAL CRYPTOGRAPHY AND OCR
- FINGERPRINT RECOGNITION OF YOUNG CHILDREN
- FULLY INCREMENTING VISUAL CRYPTOGRAPHY FROM A SUCCINCT NON-MONOTONIC STRUCTURE
- SOMEONE IN YOUR CONTACT LIST: CUED RECALL-BASED TEXTUAL PASSWORDS
- PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDS
- A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
- SINGLE SAMPLE FACE RECOGNITION BASED ON LPP FEATURE TRANSFER
- REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON PROGRESSIVE RECOVERY
- REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE WITH DISTRIBUTED SOURCE ENCODING
- A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION
- A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS
- LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH
- ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL
- TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
- AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES
- SUPER RESOLUTION – BASED INPAINTING
- 2D IMAGE MORPHING
- NOISE REDUCTION BY FUZZY IMAGE FILTERING
- FACE RECOGNITION USING EIGEN VALUES
- NOISE REDUCTION BY USING FUZZY IMAGE FILTERING
We all know that PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. We offers best PHP projects for students so that they will get good remarks.
- I STUDENT
- CAPTCHA
- E-COMMERCE APPLICATION PORTAL
- PRINTING PRESS WEDDING CARD
- E-SURVEY PORTAL
- E-COPS
- ONLINE E-COMMERCE STORE
- ONLINE BOOK-SHOP
- ONLINE C V BUILDER( RESUME MAKER)
- ONLINE LIBRARY MANAGEMENT SYSTEM
- STUDENT INFORMATION SYSTEM
- PHARMACY MANAGEMENT SYSTEM
- APARTMENT MANAGEMENT SYSTEM
- BUS RESERVATION SYSTEM
We all know that Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. The main concept involves −Mobile communication,Mobile hardware and Mobile software
- Intelligent Hands Free Speech based SMS System on Android
- Read to me: A cloud based reading aid for visually impaired
- DYNAMIC IMAGE GALLERY
- Safeguard: User Re authentication on Smartphones via Behavioral Biometrics
- Service Rating Prediction by Exploring Social Mobile Users’ Geographical Locations
- Fast Data Collection in Tree-Based Wireless Sensor Networks
- Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
- Staying Connected in a Mobile Healthcare System Experiences
- Location Based Intelligent Mobile Organizer
- Android Attack Application
- Android Event Scheduler /Reminder Application
- Android Student Result Analyzing System
- Insurance in android
- M-banking
- Mobile Invoice (Mobile Billing)
- Mobile Location Alarm
- Mobi Travel Guide – Smart way to travel
- Online shopping Android Application
- Remote PC Administration Using J2ME
- Restaurant Table Order Management System
- SIP – Session Initiation Protocol (M-Conference)
Find latest android project topics for your final year engineering projects. These are innovative android app project ideas to be developed as final year projects by engineering students. Your search for latest project topics in android ends here. Weprovide a variety of android app project ideas to be developed as your final year project.
ANDROID PROJECTS
- A CLASSROOM SCHEDULING SERVICE FOR SMART CLASSES
- COOPERATIVE QUERY ANSWER AUTHENTICATION SCHEME OVER ANONYMOUS SENSING DATA
- GEOMOB – A GEO LOCATION BASED BROWSER FOR SECURED MOBILE BANKING
- KNOWLEDGE-ENHANCED MOBILE VIDEO BROADCASTING (KMV-CAST) FRAMEWORK WITH CLOUD SUPPORT
- EFFICIENT AND PRIVACY-PRESERVING MIN AND K-TH MIN COMPUTATIONS IN MOBILE SENSING SYSTEMS
- A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING
- PRIVACY-PRESERVING LOCATION-PROXIMITY FOR MOBILE APPS
- MONET: A USER-ORIENTED BEHAVIOR-BASED MALWARE VARIANTS DETECTION SYSTEM FOR ANDROID
- EFFICIENT MULTI-FACTOR AUTHENTICATED KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS
- MY PRIVACY MY DECISION: CONTROL OF PHOTO SHARING ON ONLINE SOCIAL NETWORKS
- P-LINT: A PERMISSION SMELL DETECTOR FOR ANDROID APPLICATIONS
- SEARCHING TRAJECTORIES BY REGIONS OF INTEREST
- ZAPDROID: MANAGING INFREQUENTLY USED APPLICATIONS ON SMARTPHONES
- PRIVACY AND SECURE MEDICAL DATA TRANSMISSION AND ANALYSIS FOR WIRELESS SENSING HEALTHCARE SYSTEM
- DUMMY-BASED USER LOCATION ANONYMIZATION UNDER REAL WORLD CONSTRAINTS
- SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES
- MOBILE ATTENDANCE USING NEAR FIELD COMMUNICATION AND ONE-TIME PASSWORD
- CONTEXT-AWARE MOBILE CLOUD COMPUTING AND ITS CHALLENGES
- STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS
ANDROID APPLICATION PROJECTS
- ANDROID MEETS LED BULBS IN SMART-HOME AUTOMATION.
- GREEN HOUSE MONITORING AND CONTROL USING SMART PHONE.
- ANDROID BASED DEVICE CONTROL .
- ANDROID BASED HOME AUTOMATION.
- DEVELOPMENT AND CONTROLLING OF 5 IN 1 MULTIPURPOSE AGRICULTURAL ROBOT USING SMART PHONES
- ANDROID CONTROLLED PICK AND PLACE MOBILE ROBOT.
- LPG GAS MONITORING AND BOOKING USING SMART PHONE
- DEVELOPMENT OF PAITENT MONITORING SYSTEM USING SMART PHONE
- INDUSTRIAL MONITORING AND CONTROL SYSTEM USING ANDOID APPLICATION.
- SPEECH BASED CONTROL & ALERT SYSTEM FOR SENIOR CITIZENS USING ANDROID MOBILE
- AN ANDROID BASED APPLICATION FOR EMERGENCY HELPING
- SMART PHONE CONTROLLED ANDROID ROBOT WITH LIVE VIDEO TRANSMISSION
- ANDROID SPEECH RECOGNITION BASED VOICE COMMAND NOTICE BOARD
- DEVELOPMENT OF WSN BASED WATER LEVEL MONITORING AND CONTROL SYSTEM USING ANDROID
- DEVELOPMENT OF AUTOMATED IRRIGATION CONTROL SYSTEM USING SMART PHONE BASED ON SOIL MOISTURE
- ANDROID BASED ANTENNA POSITIONING SYSTEM