MCA STUDENTS PROJECT LIST Batch :

Similar documents
Computer/IT Project LIST. Contact:

PROJECT DETAILS - MCA BATCH. Reg.No Name Guide Name Title Company Name & Address

EMBEDDED MAJOR PROJECTS LIST

NATIONAL WORKSHOP ON ENERGY AUDITING & CONSERVATION TECHNIQUES April 2014 Date:

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura

VB.NET PROJECTS.NET Projects VB.NET, C#, ASP.NET, using Database SQL Server, Oracle, Access

Detailed Description about course module wise:

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Augmented Search for Software Testing

A Foolproof Biometric Attendance Management System

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

1. Mobile VoIP solutions and Services:

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

BHARATHIDASAN INSTITUTE OF TECHNOLOGY (BIT) CAMPUS TIRUCHIRAPPALLI ANNA UNIVERSITY DEPARTMENT OF CSE & IT

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

BlackBerry Enterprise Solution

Summer projects for Dept. of IT students in the summer 2015

The Masters of Science in Information Systems & Technology

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Assessing Learners Behavior by Monitoring Online Tests through Data Visualization

Masters in Human Computer Interaction

List of Projects in Application

Masters in Advanced Computer Science

Masters in Artificial Intelligence

Jort Kollerie SonicWALL

User Authentication Platform using Provisioning in Cloud Computing Environment

A Data Collection Revolution?

LOCATIONS AROUND ME (ANDROID)

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

Other Required Courses (14-18 hours)

Content Teaching Academy at James Madison University

Eleventh Hour Security+

The Masters of Science in Information Systems & Technology

Integrating a Hitachi IP5000 Wireless IP Phone

In the pursuit of becoming smart

Reducing Configuration Complexity with Next Gen IoT Networks

Professional Ethics for Computer Science

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Best Practices: Extending Enterprise Applications to Mobile Devices

Masters in Information Technology

ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

CRM MICROSOFT BUSINESS SOLUTIONS AXAPTA. A more efficient organisation overall

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents

FORBIDDEN - Ethical Hacking Workshop Duration

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

School of Computer Science

How To Understand And Understand The Science Of Engineering In India

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

Masters in Networks and Distributed Systems

Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India Prachi.deokar19@gmail.

Computer Information Systems

Loophole+ with Ethical Hacking and Penetration Testing

Android based Secured Vehicle Key Finder System

ISACA Kampala Chapter Feb Bernard Wanyama Syntech Associates Limited

COROUTER SOLUTIONS PVT. LTD.

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

BUSINESS PROCESS Automation For Customer Loyalty PMS CRM CCD CEBP

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

IERC IoT Research and Innovation September 2014, Brussels, Belgium

A Framework for Secure and Verifiable Logging in Public Communication Networks

Framework for Biometric Enabled Unified Core Banking

Market Entry Toolkit. Mobile Health Technology and Architecture: A Practical Framework for Technology Assessment for Mobile Health

Trust Based Infererence Violation Detection Scheme Using Acut Model

IEEE JAVA TITLES

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

Operations Research and Knowledge Modeling in Data Mining

We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques

Dynamic Query Updation for User Authentication in cloud Environment

Information Technology Career Field Pathways and Course Structure

Cleaning Encrypted Traffic

ETHICAL HACKING CYBER SECURITY

Comparative study of security parameters by Cloud Providers

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Towards an On board Personal Data Mining Framework For P4 Medicine

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Implementation of Smart Homes and Industrial Automation System with Secure Communication over GSM

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Adobe Marketing Cloud Bloodhound for Mac 3.0

Nokia Mobile Software Strategy

B.Sc. in Computer Information Systems Study Plan

ITS Workshop April 2015

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN

6.2 Reporting BIPublisher Improvements

Internet of Things (IoT): A vision, architectural elements, and future directions

B2B Exchanges. Overview. Context The nature of B2B sites Building B2B capability XML and SOAP Exchanges

Transcription:

MCA STUDENTS PROJECT LIST Batch : 2008-2011 S.NO REG.NO. STUDENT B567 90408535001 ABDUL JABBAR A G B568 90408535002 ARAVINDHAN J B569 90408535003 ARCHANA J V B570 90408535004 ARUN KUMAR P B571 90408535006 ARUNLAL T K B572 90408535007 ASHA MAI C B573 90408535008 ATHILAKSHMI S COMPANY EVES SRI RAMAKRISHNA MATH GRAINTEK TECH PVT SILICON HARVEST TITLE OF THE PROJECT BIOMETRIC AUTHENTICATION FOR PUBLIC DISTRIBUTION ONLINE BOOK SALES WITH MOBILE SMS ELECTRICAL CONTROL APPLICATION USING EMBEDDED & GSM ANTI-MONEY LAUNDERING FRIENDLY CODING STANRDADS AND REVIEWERS GLOBAL OBJECT LOCATOR AND CONTROLLER ENHANCED MAINTENANCE ARCHITECTURE IN E-COMMERCE SERVER GUIDE B574 90408535009 AYYANAN G INFOTEK SOCIAL NETWORKING WEB SERVICE B575 90408535010 BABU A B576 90408535011 BALAJI B L B577 90408535012 BALAKUMAR R B578 90408535013 BHARATH P COSMOSOFT TURNSOFT RAIM TECNLOGIES SCHEDULING CONCURRENT BAG-OF- TASKS APPLICATIONS OF HETEROGENEOUS PLATFORMS BLUETOOTH ENABLED MOBILE PHONE REMOTE CONTROL FOR PC MOBILE CULMINATING APPLICATIONS SUPER DIFFUSIVE BEHAVIOR OF MOBILE NODES AND ITS IMPACT ON ROUTING PROTOCOL PERFORMANCE Mr.A.Kannan Mr.A.Kannan B579 90408535014 DEEPIKA S 1 SOFT PILLS PRESCRIBER Mr.A.Kannan B580 90408535015 DHIVYA V MOBILE VNC Mr.A.Kannan B581 90408535016 DINESH BABU A V HASTECH B582 90408535017 DIVYARANI S S 1 SOFT CONSTRUCTION PLUS B583 90408535018 ESWARAN M S SELECTION OF WEB SERVICE WHICH IMPREMENTATION Qos CONSTRAINTS Mr.A.Kannan WAMP SERVER ADMINISTRATION B584 90408535019 GNANESWARAN T R STREAM COMMUNITY DIGITAL MODEL B585 90408535020 GOPAL K B586 90408535021 GOVINDHARAJAN N G B587 90408535022 INDIRA GANDHI A B588 90408535023 JEGATHEESWARAN B S S.NO REG.NO. STUDENT B589 90408535024 JEYA MURUGAN B B590 90408535025 KALIDASS C B591 90408535026 KANAGESWARI M S B592 90408535027 KARTHICK DINESH M K B593 90408535028 KARTHICK T V TERNSOFT S DOCSER PVT COMPANY SHARE INFOTECH SRS INFOS ONLINE POLLING USING FINGERPRINT DEVELOPING GIS SOFTWARE WITH COMPONENT TECHNIQUE BUG TRACKING MAGIC NET:HUMAN IMMUNE AND NETWORK SECURITY TITLE OF THE PROJECT ONLINE REAL ESTATE AND PROPERTY MANAGEMENT ASYNCHRONOUS MESSAGING BETWEEN WEB USING SSDL FRIENDLY CODING STANDARDS REVIEWER GUIDE EVES CONCEPTUAL REGIME MASTER MICRO TRACK INDUSTRIAL MOBILE WEB IN HEALTH CARE

B594 90408535029 KARTHICK P R PVT INDUSTRIAL SAFETY INSPECTION B595 90408535030 KARTHIK KUMAR N E B596 90408535031 KARTHIK KUMAR S M B597 90408535032 KARTHIK B R B598 90408535033 KARTHIK P J B599 90408535034 KARTHIK G R INSTA BANX S & NETWORK PVT ZEAL SOFT CANDELASOFT SMART SNIFFER MAIL IN PROJECT MANAGEMENT DISTRIBUTED DENIAL OF GRIMACY AYSER IDEA COINBOX ENCLOSING SOFTWARE A PREDICTABLE HIGH PERFORMANCE COMPUTING USING FEEDBACK ANDADMISSON CONTROL B600 90408535035 KARTHIKA R PORAS WEB SEARCH ENGINE B601 90408535036 KARTHIKEYAN R B602 90408535037 KAVITHA S R B603 90408535038 KAYALVIZHI M B604 90408535039 KISHORE BABU A V B605 90408535040 KRISHNAKUMAR T S B606 90408535041 KRISHNAPRIYA C R B607 90408535042 LALITHA LAKSHMI S B608 90408535043 MATHAVARAMAN T R B609 90408535044 MANI SANKAR C B610 90408535045 MANIKUMAR M B611 90408535046 MANOJ KUMAR R R B612 90408535047 MATHANAGOPAL N H B613 90408535048 MATHIVANAN N SCRUMSYS DIGISOURCE S MULTI PIXEL PVT. ENVISION MOBILITY S AAUM RESEARCH & AYTICS-IITM RESEARCH PARK PVT. MICRO TRACK INDUSTRIES HASTECH & NETWORK TECHNLOGIES CEGONSOFT PVT BANGALORE SRS SOFTWARE B614 90408535049 MEENA KUMARI R S AJ SQUARE INC LYRICS B615 90408535050 MICHLIN SEOUL A B616 90408535051 MUNEESWARAN N NATIO INFORMATION CENTRE, VIJAYALAKSHMI HITECH ONLINE MICRO INVENTION MANAGEMENT AN ISP FRIENDLY FILE DISTRIBUTION PROTOCOL AYSIS, DESIGN AND IMPLEMENTATION E-BUSINESS INFORMATION SHARING USING EXTRANET BANDWIDH ESTIMATION USING PRIORITY SCHEDULING ALGORITHM SALES AND INVOICE TRACKING E-REQUEST COURSES CO- ORDINATION ENABLING ROBUST DATA COLLECTION DOCUMENT MANAGER SECURITY AYSIS OF TWO PASSWORD AUTHENTICATION SCHEMA ACCURATE IMAGE SEARCH USING CONTEXTUAL DISSIMILARITY MEASURE INFORMATION BASED QUERIES IN MOBILE ENVIRONMENT CONTRIVANCE PLANNING MANAGEMENT COMPARTMENTED SECURITY FOR BROWSER THWART PHISHER RURAL SOFT ONLINE CREDIT CARD B617 90408535052 MURALI N C APPLIED MATERIALS EXCITE 3X TEST AUTOMATION B618 90408535054 MUTHU MANI V DATA ALCOTT POWER CONTROL B619 90408535055 MUTHU RASU N PVT ONLINE COUPON MANAGEMENT B620 90408535056 MUTHUKUMAR M SANSPAREIL NETWORK MONITORING

B621 90408535057 MUTHURAJA P B622 90408535058 NANDHINI T R B623 90408535059 NELSON MANDELA V B624 90408535060 NIVETHA V B625 90408535061 OMPRAKASH A K B626 90408535062 PANDI DEVI A AKAANTA SOFTWARE PVT DIABETIC FOOT CARE INDIA CMTD AKVANTA PVT JS SOFTWARE TECHNLOIES ORGANIZATIO PERFORMANCE MONITORING BOT CONTROL AND MONITORY USING CAPTCHA HEALTH CARE HOUSING & CAR LEASE MANAGEMENT TOOL EQUIPMENT PERFORMANCE TRACKER E-POST OFFICE B627 90408535063 POORNISHA G 1 SOFT EASY AUTO INSURER B628 90408535064 PRABAHARAN J B629 90408535065 PRIYA N R B630 90408535066 PYARELAL T R MICROSUN SOFT NOKIA SIEMENS NETWORK CANDELASOFT INTELLIGENCE KNOWLEDGE BASED RETORTER PROTING OUT SUBSCRIBER S FROM NETWORK ONLINE WEB BASED ADMINISTRATION WITH SMS B631 90408535067 RAGHURAMAN R SAYAS ROUTING SIMULATOR B632 90408535068 RAGUNATH T H UNIQUE SOFT CREDIT CARD FRAUD DETECTION B633 90408535069 RAMARAJ P B634 90408535070 ROOBINI S R B635 90408535071 SABHARISH P S B636 90408535072 SANTHOSH KUMAR S B637 90408535073 SARADHA K B B638 90408535074 SARATH BABU K B639 90408535075 SASIKUMAR R B640 90408535076 SATHEESH BABU T G B641 90408535077 SATHISH KUMAR R B642 90408535078 SATHISH KUMAR S SHARE INFOTECH RAAGA SOFTWARE CONSULTANCY INSTABANX TESPA INDIA PVT DIGI SOURCE PVT TIMES TARGET SOFTWARE XLNC INFO PVT INSTABAX SOFTWARE LICENSE MONITORING SERVICE FLOW AUTOMATION THE LOST ARTICLE RECONCIITION HUMAN RESOURCES AND PAYROLL MANAGEMENT S FOR ERP REAL TIME GROUP EDITOR CRYPTOKIT PROJECT AND COST MANAGEMENTAPPLICATION FOR MANUFACTURING ARICRAFT COMPOSITE COMPUNDING CORPORATE ID TRACKING WEB BASED CONTENT TRACKING WEB BASED REMOTE DATABASE ADMINISTRATION B643 90408535079 SATHYAVATHI K ROAMEX PROJECT B644 90408535080 SELVA KUMAR N MICRO SUNSOFT PERSO BUSINESS INTELLIGENCE ORGANIZER B645 90408535081 SENTHIL K N PORALSOFT REMOTE MONITORING B646 90408535082 SENTHIL NAYAKI N B647 90408535083 SENTHIL RAO A R B648 90408535084 SHARAFATH NISHA K B649 90408535085 SHENOZ DHEEN S B650 90408535086 SHOBANA KALAI PRIYA M DIGISOURCE TIMES DISK PROCESSING USING MOBILE SIGS MOBILE TO PC COMMUNICATION & VICE VERSA CREATION OF A OS WRAPPER FOR THE FLEX UI HIGH YIELD INVESTMENT PLAN (HYIP) CLOUD SUPPORT

B651 90408535087 SHYAMALA DEVI A S B652 90408535088 SIVA GANESHAN R B653 90408535089 SIVA SANKARI V M B654 90408535090 SIVATHARSINI M 4S SOFTWARE GREAT INNOVUS S ADROIT S MEENUM SOFTWARE S BIO-AUTHENTICATION BASED HUMAN HEALTH CARE LANGUAGE TRANSLATION FOR GOLLGLE ANDROID PLATFORM CRYPTOGRAPHY IN GSM MOBILE COMMUNICATION E-HEALTHCARE B655 90408535091 SNEKAN S T MICROSUN SOFT FILE TRACKING B656 90408535092 SRIKANTH M S B657 90408535093 SUDHARSAN S S B658 90408535094 SUNITHA J S B659 90408535095 SURESH BABU M P B660 90408535096 SURESH M B661 90408535097 SURESH M B662 90408535098 SURESH KUMAR T B663 90408535099 THANGA MANI J PVT MICROHOUSE INTEGRITY INDIA SOFTWARE MANI INDIA GRAINE TECHOLOGY PRAKASH ENGINERRING WORKS SANSPAREIL B664 90408535100 THANGAMEENAKSHI R TIMES B665 90408535101 THAVAMANI M B666 90408535102 UDHAYAKUMAR M B667 90408535103 VAISHNAVI L G B668 90408535104 VAISHNAVI P S B669 90408535105 VAISHNAVI T S B670 90408535106 VASANTH BABU E R B671 90408535107 VENGATESH T R B672 90408535108 VENKATALAKSHMI G B673 90408535109 VENKATESH KUMARAN A J B674 90408535110 VENKATESH P M B675 90408535111 VENKATESH R B676 90408535112 VENKATESH V R B677 90408535113 VIGNESHWARAN S SARAN ADVERTISHING AGENCY INVICTUS GRIAN PVT RAAGA SOFTWARE CONSULTANCY TECHNLOGIES PVT 1SOFT BSNL MADURAI TERNSOFT XLNC INFO TECH S PVT AND NETWORK PVT AKRANTA TECHNLOGIES PVT INFORMATION SECURITY FOR ONLINE GAMS MOBILE BANKING ERP BUILDING FOR FLOWER ENTERPRISE MAP APPLICATION IN ANORIOD DEVELOPMENT AUTOMATION OF GOVERNMENT ADMINISTRATION DESIGNING AND IMPLEMENTING AN ERP WEB-BASED COST ESTIMATION OF AIRCRAFT COMPOSITE COMPONENTS CONTENT MANAGEMENT AUTOMATED ISSUE AYZER BY AJAX REMOTE BASED SCHEMA TRANSFER WEB APPLICATION FOR AD GLOBOLIZATION PRIVACY PRESENTATION AN INFORMATION THEORITIC APPROACH OLAP EEG DETECTION USING ARTIFICIAL NEURAL NETWORK FINANCIAL LENDING EXPERT VISUAL TUTOR DEVELOPMENT KIT LUXURY RAFFLE BROADBAND NETWORK FAULT MONITORING DETECTION OF SPYWARE BY MINING EXECUTABLE FILES CIPHER MAIL SERVER FOR INTERNET WATERMARK BASED AUTHENTICATION DESIGN OF MOBILE ELECTRONIC COMMERCE EMPLOYEE OJT MONITORING

B678 90408535114 VIJAYAKUMAR R R B679 90408535115 VIJAYAKUMAR N B680 90408535116 VIKASH SAGAR A G APPLIED MATERIALS WIRELESS CONTEXT MANAGEMENT (WICOM) FOR MOBILE DEVICE KEY AGREEMENT FROM RANDOM BINARY SEQUENCES USING WEAK INTERACTIONS INSTALLSHIELD TROUBLESHOOTING AND DEVELOPEMENT B681 90408535117 VINAYAGA MUTHU D SENJOS TECHNLOGY CLIENT CONTROL B682 90408535118 VINOTHINI P B B683 90408535119 WAHITHA A B684 90408535120 YADEESH KUMAR K M 4S SOFTWARE POROS LIBRARY MANAGEMENT WITH FACE RECOGNITION INTEGRATED BIOMETERIC VOTING FRIENDLY CODING STANDARDS REVIEWER