BE COMP2005-2006 IRAM 3G & 4G (Mobile Generation) Routing Techniques in WAN A Secure & Inexpensive Remote Access Implementation Wi-Max Vs Xmax Unauthorised Access A Survey on Current Devpt. of data Storage Technology Medical Fraud Detection Using data Mining EDGE Technology SQL Server 2005 Hyper Threading Technology Server gated Cryptography Optimising Data Storage System Ping T.V : A case Study in Visual N/w monitoring Emerging Trends in WWW user population Spread & Victims of an Internet Worm Online N/W Analysis from Hettogenous Datasets New Core XMS Power Gene Experssion Analysis Site Implementation of Universal Wide-Band Security issue in Adhoc Routing Protocol Broad Band Internet Access-Consumer Peer to Peer Architecture : Gnutella Network CDMA Freq Conversion Repeater Usability of security SCADA System : Security Vulnerabilities Eye Gaze Technology Honey Pot Introduction Technology Active Campus- Using Mobile technology Speeding Up face Recogination USB Pen Drives simplifies Backups Stoping Spyware at the internet Gateway Internal Webserver Hosting for Small Enterprise Bandwidth Magt. For ISP & Universities An Adaptive Internet BW Magt. Arch. Software Quality JXTA: N/W Program Envt. Reverse Engineering Private Wireless Comm. N/W UDP Braodcasting Flooding Solaris 10(OS) JXTA Flash Media server-2 Zilog & Embedded Internet Vulnerability Assessment Improving N/W Security , Compliance & Provisioning Through N/W Automation Adaptive-Brain-Interface Windows Color System WLAL Security : Problems & Solution Embedded Control System Six Sigma Hard drive replaces by Flash memory Object Converter 10g XP Embedded over Linux User Mode Linux With VT Technology S/W Project Estimation Spammers Global Positioning System ORACLE 10(Basic Archi.) Boosting performance of Orcale database Rational Rose Information LifeCycle Management The LAN Switching Web Enabled Business Intelligencs S/W Incearsing Security of IP Networks Symbian OS Stream Control Transmission Mobile Agents for Intrusion Detection System Voice Over IP B2 Management S/W Refactoring in ZyttaByte File System(ZFS) CSS & Decss RFID File Tracking System Invisible Web Optimized Solution for high Performance Computing Grid Computing Wi-Max Technology Share pont Team Services Linux Security Module Managed File Transfer SAP Solution GSM on Railways Mobile Radio Frequency Identification Internet Access Technologies Secure Mobile Computing Cell Phone Application Devpt. Through BREW Migrationfrom Windows to Linux Web Page Text Classification Based on Document Struct. Supercomputer on Windows Instead of Linux Metaframe Presentation Server Real-Time 3D Video Conmpositing Spinnaker & MainSail Storage Area Network Defence Against Blended Threat A Global Digital Device for digital Wireless Phone Tech. Imation Bio Swipe Business Intelligent Software B.E (IT) Case Study 2005-06 Sr.no Topics 1 Software Testing Best Practices 2 Fingerprint Cards Using Biometrics 3 Gnutellan 4 Casecade Distributed Firewall 5 Blue-Eye 6 Windows Longhorn 7 E-Choupal 8 Artifical System 9 SRX Technology 10 Web Sementic 11 Network Security Scanner 12 Dynamic VPN 13 AJAX- for Web Applications 14 IT ACT 2000 15 Business Intelligent & Reporting Tool(Eclipse) 16 DB2 Intelligent Miner 17 SAP-Enabling Industry Growth 18 IBM Tivoli Software 19 Anoto Technology 20 IP Smart Spoofing 21 Overwiew of an Mobile Computing Devices 22 Recent Development in Robotics 23 Zigbee 24 RSS Implementation 25 Information Insecurity 26 Real Time Linux 27 iSCSI-The Future of N/W Storage 28 Borderless Network DEPARTMENT OF COMPUTER ENGINEERING CASE STUDY TOPICS 2006-2007 DIV B TOPICS

PALLADIUM : A FUTURISTIC APPROACH TOWARDS DATA SECURITY CLEMENTIRC QUERY TOOL FOR DATA MINING LAVA HIT SERVER GENETIC PATTERN RECOGNISION AUTOMATED SOFTWARE TESTING WIFI VS WIMAX GUIDED : A META & ITS IMPLEMENTATION ZIGBEE HOW WI-MAX TECH WORKS SEMANTIC SPYWARE ZONE ANTISPYWARE INCREMENTAL PARALLIZATION USING NAVIGATIONAL PROGRAMMING MESSAGING SECURITY IDENTITY MANAGEMENT AS A CYBERSECURITY CRYPTOGRAPHY DATA HIDING TECH REISERFS FILESYSTEM SOLARIS 10 ARCHITECTURE INTEL CORE 2 DUO PROCESSOR SECURITY OF INTERNET LOCATION MANAGEMENT 802.11N : NEST GENERATION WIRELESS LAN TECHNOLOGY WIRELESS INTEGRATION INTO AN ENTERPRISE NETWORK SECURITY IN SOFTWARE ARCHITECTURE ECONOMY IMPACT ON 3G WIRELESS TECHNOLOGY THREADING GAMES FOR HIGH PERFORMANCE ON INTEL PROCESSOR LDAP FOR WINDOWS SIMPLE NETWORK MANAGEMENT PROTOCOL A NEW ERA IN COMMUNICATION -FREE CALLING WORLDWIDE MATA COMPUTING MOBILE DOS ATTACK SEMANTIC WEB BROWSER BLUETOOTH-EXPLOITS VXML GLOBAL CLUSTERING DB2 Vs ORACLE ETHERNET HIGH SPEED WAN USABILITY OF SECURITY REVERSE PROXY SAMBA SERVER HYDRA FILESYSTEM AS-100 ARCHITECTURE AUTHENTICATION VIA WIRELESS NETWORK FIREWALL SERVICE MODULE PASSIVE OPTICAL NETWORKING LOCAL FILE SYSTEMS FOR TROJANS BGP FILTERING AIRGO NETWORKS MIGRATION OF OLD PSTN NETWORK TO A CONVERGED ENTEPRISE HORIZANTAL SCALING ON A VERTICAL SYSTEM USING ZONES IN THE WIRELESS NETWORK FOR MULTIMEDIA APPLICATION NET 2 DISPLAY VESA PROTOCOL JAVA SPACES APACHE WEB SERVER ON LINUX NETWORK SECURITY DESIGN ON A HYPOTHETICAL ISP NETWORK

DEPARTMENT OF COMPUTER ENGINEERING CASE STUDY TOPICS A

TOPICS WIRELESS ACCESS POINT MULTIPOINT AUDIO & VEDIO CONTROLFOR PACKET BASED DIGITAL WATERMARKING LINUX ON MOBILE : MOTOMING OPEN FLEXIBLE ROUTER RSA SECURE ID CONTROLLER AREA NETWORK DISTRIBUTED FIREWALL AODV ROUTING PROTOCOL IMAGE SEARCH ENGINE HIGH PERFORMANCE PARALLEL INTERFACE A SURVEY OF SOFTWARE COST ESTIMATION HD-DVD 7 (IE 7) THIN CLIENT TECHNOLOGY RAS: RESEARCH IN ONLINE AUCTION PARADIGM SHIFT IN OPERATION THEATRE WIRED ENVT. TO WIRELESS DIRECT PUSH TECHNOLOGY BUSINESS INTELLIGENCE INTRUSION PREVENTION SYSTEM ORGANIC LED SECURE SHELL PROTOCOL (SSH) DIFFERENT USERS IN WINDOWS 2003 & LINUX MIDDLE MAN : A VIDEO CACHING PROXY SERVER APPLICATIONS OF WEARABLE COMPUTER IN PAPERLESS PICKING ADSL: ASYMMETRIC DIGITAL SUBCRIBER LINE PALLADIUM SECURITY FOR THE WIRELESS NETWORK BLACK BERRY EVOLUTIONV OF OPEN SOURCE SOFTWARE UNIFIED MESSAGING SYSTEM ZENOSS LOTUS NOTES WIRELESS APPLICATION PROTOCOL PROTECTION AND SECURITY IN VISTA MMS ON SYMBIAN OPERATING SYSTEM ROUTING PROTOCOL INDEPENDENT SECURITY PGP AND PEM FOR EMAIL PRIVACY ARM PROCESSOR BORDER GATEWAY PROTOCOL 4 TINI OPERATING SYSTEM AND JAVA INTERNET MESSAGE ACCESS CONTROL DIGITAL SOUND ENCODER: DESIGNING EMBEDDED SYSTEM USING CYBORG -CYBERNATICS ORGANISM CELL-BROADBAND ENGINE ATM TRAFFIC MANAGEMENT RESOURCE MONITORING SYSTEM FOR NETWORK SSVPS BSD College Of Engineering, Dhule Department Of Computer Engineering B.E.(Computer ) Case Study list For the Academic Year 2007-2008 S.No Title 1 OFC of Mechniacal Deptt. 2 OFC of Mechniacal Deptt. 3 Cell Phone Jammer 4 Botnet 5 HD-DVD 6 7 Clustering in Data Mining 8 9 Oracle Fusion 10 Open Source Software and Development Tools 11 Maxtor 12 Voice over IP- Cost Bebefits & Security Concern 13 OFC 14 N/W Security Design of Hypothetical ISP 15 WWW User Population 16 Google File System 17 Comparison of Data Mining Tools 18 Wireless Broadband Routers 19 Data Networking of Main Dept. 20 Wireless USB 21 Kickstart in Linux 22 String : A TCP Based Network Measurement Tool 23 Tools for Antospam Confoiguration 24 Election Markup Language 25 OFC 26 Frame Skipping of Vedio Compression Techniques using MPEG2 27 LDAP in Linux 28 StegFS: Stegonograpgy File System for Linux 29 Linux File System 30 Intel matrix Storage Technique 31 Data Recovery Softwares 32 Microsoft File System - Transaction based Longhorn 33 OFC 34 OFC 35 OFC 36 N/W of Boys Hsotel 37 OFC 38 OFC 39 OFC of Polytechnic Bldg. 40 SBI Core Banking 41 OFC Elex Dept 42 Captus Network 43 Personal Mobile Hub 44 FUSE : Encryption for Online Storage 45 Web Browsers 46 Logging 47 PAM- Plugable Authentication Module 48 Firewire 49 Kernal Version and Compliation 50 Proxy Tools 51 MicroSD Memory Card 52 Firewall 53 User Profiling in Recommended Systems 54 Editing of Windows Register 55 NTFS Vs FAT File System 56 OFC 57 AJAX 58 ATA, SATA, SCSI Drives 59 Comparison of Network Cables 60 System Application Product 61 IP4 Vs IP6 62 Linux Samba Server 63 Comparisons of Editors 64 J2EE Vs .NET 65 Use of SAP Netweaver at SASOl 66 Software Comparison for Time Table Management 67 Features of Programming languages 68 Password Cracking in Windows 69 Multimedia Messaging Services 70 Bluetooth Enabled KB and Mouse 71 Live Linux CDROM 72 Symbian Mobile 360 Vs Windows mobile 6th Edition 73 IBM Server Power Consumptions 74 Load Balance in Router 75 Windows XP Log File 76 Functioning of Hyper Threading 77 Configuring Embedded Web Server 78 Concurrent Version Servers 79 Vertex II Processor 80 Hacking 81 Layer 3 Authentication & Security 82 OFC of Civil Deptt. 83 System Monitoring Tools 84 Consistency Mechanism in Distributed System 85 Compliers Comparison 86 Windows Mobile 87 DSL Modem 88 Different Types of UPS System 89 Bluetooth in Linux 90 Quad-Core Xenon Inetl Processor 7300 Series 91 Wideband Frequency Specturm in Wireless 92 LINQ : Language Integrated Network Query 93 Mainframe and Client /Server Strength 94 Airgo Network 95 OFC of Mechniacal Deptt. 96 Advanced SQL Injection in SQL Server Application 97 OFC 98 IDE Technology Recommendation 99 Mail Directory Formats 100 Rack Server 101 Server 2008 102 SAP Netweaver at Manitoba 103 Configuring Firewall 104 Complete Time Tracking Software 105 Secure Digital Card 106 E-Mail Security 107 Double Data Rate 3 108 IBM Mainframe OS 109 Graphics Processing Unit 110 PCI Express Bus 111 USB Flash Drive 112 USB Hub 113 Wireless Radio Modem 114 Tomcat Server 115 KIZAMU A System for Sculpting Digital Character 116 Copper can be Transformed in to Gold 117 CISCO 1700 Series Routers 118 WiFi: 2.4 GHz Vs 5 GHz 119 T.V Tuner 120 Internet Explorer 7 121 Visual Tech in Animation 122 Multicasting 123 Tune Up Utilities 124 Sensor Node : MOTE 125 OFC of Mechniacal Deptt. 126 CYBEROAM

B.E.( I.T. ) Case Study List For the Academic Year 2007-2008 S.No Title 1 Data Networking for Boys Hostel 2 3 Hardware Detection Software 4 Information Lifecycle Management in llg 5 Nanotechnology in Bioinformatics 6 MAC OS Leopard 7 Light Emitting Diode 8 Spanning Tree Protocol 9 SafeStore : A Durable & Practical Storage System 10 AMD Phenom 11 100GB Ethernet and Switch 12 DJVU File Format 13 Citrix Metaframe Server 14 Secure 15 IMAP S.S.V.P.S. B. S. DEORE COLLEGE OF ENGINEERING, DHULE DEPARTMENT OF COMPUTER ENGINEERING Case Study topics DIV A 2008-09 Topic Stemcell computing - A nano computerized approach of ZNS-05 Content Management System USB 3.0 Comparing blackberry to alternate wireless solution appliance Wire Shark MAC operating system Vs XP Faster Oracle performance with solid state disks Email Clients RIS installation on Linux Snom200 Kickstart Air equilizer ETL tool comparison Firewall Network Jammer Virus and Spyware How to speed up slow PC Identity cloaker Ultra portable DJ decks LTE Vs Wimax Pocket surfer 2 Gmail HD-DVD Vs Blue Ray Disc Intel centrino pro Vs Processor Youtube with all file format Peer to Peer file sharing Virtual Keyboard Internet Explorer 8 Linux Antivirus Opmanager VOIP phone Wi-Fi Manager WiBro ( Wireless Broadband) Red Hat Network Network IP Cameras Windows Copier Quad Core Xeon based serveer Vs AMD Opteron Windows Vs Apple Macintosh Blade Servers Netbeans Mobile Web Browser Image retrival systems Gnome Cloud computing Vs Grid computing DDR Web Filter Playstation2 Vs Playstation3 Video from webcams on mobile Rootkit Resistant Disk Kdump Nettops based on atom processor Netmeeting CORBA Portable Apps

S.S.V.P.S. B. S. DEORE COLLEGE OF ENGINEERING, DHULE DEPARTMENT OF COMPUTER ENGINEERING Case Study topics DIV B 2008-09 Topic Discovering web access patterns & trends by applying OLAP Core2-Duo Internet around the Globe Crime data mining : A general framework Wireless VOIP phones Efficient clustering of very large document collection SOA -Chances of failure & Success Comparision of Agent orinented Software techniques Voice Portal Teleportation Photoshop CS3 Vmware server Continuous data protection Touch screens and touch monitors Simple traffic analysis using etheral Preservation of worid processing document Search -Engine optimisation Comparision of intrusion detection tools Optimum choice of motherboard Tracking of stolen Laptop's Wireless Router Backup Solution / Software Bluetooth enabled keyboard RootKit Mobile Antivirus graphics cards Plug & surf devices Windows 7 beta Mobile Operating System Wimax Vs Wifi Nano processors Adobe Product Traffic Regulators : Hub switch and router ATM Vs Ethernet Share point technology QL-2 Technology Universal Mobile telecommunication system Comparision of various LAN cables Comparision if different Cable TV Services Comparision of CD-DVD burner software Mailing solutions: Qmail, Sendmail Analysis of iPhone users Data warehouse & data mining using SAS system Comparision of search engines How to apply data mining techniques in a healthcare datawarehouse Data mining for cancer management Windows server 2008 SOAP -SONAR Centralised tracking & risk analysis of 3rd party firewall connection how to make USB pendrive bootable Scalable Link Interface Technology Intel Vs AMD Star office Vs MS office

Eye Gaze communication system Pentium 7 SSVPS BSD College Of Engineering, Dhule Department Of Computer Engineering Year (2009-10) Topics Windows XP Tricks Google Image Swiri EXT2 vs EXT3 File System PostGre SQL RIS with G4L Installation Google, Bing and Yahoo (Search Engine) Typo3 Vs Drupal

How to Access Webpages Faster Web Graph VLAN OPERA 10 Vs Internet Explorer 8 Windows Data Recovery Compiler Comparision Surface Computing Sound Forge XP Manager Ashampoo Magical Snap Team Viewer Red Tacton SQL 4.0 Ways Deep Web -surfacing Hidden Value Altova Model VM Machine Kernel Compaision of OpenSolaris,Windows Vista & Linux File Copying Tools Study of Tomcat Server SNORT- Network Based Intrusion Defination Software FAT Data Recovery Eclipse Vs Joriater EditPadlite Editor Comparision Netbeans Eclipse, Intel Beep Freeze Software Star-Office-9 Vs MsOffice 2007 Fedora OS React Operating System Solid State Drive Vs HardDisk StarUML 5.0 Comparision Between HDTV and Digital TV Web Based Health Information System Winamp vs Itunes Hack Proofing Linux Retriving Multimedia Webobj based on Page rank Algo. Google's Deep-Web Crawl BOLT OS Umbrello -UML Modeller LAMP Server Green Computing Dillo Web Browser Flash Professional

Apple i-Pod Wine Itanium Processor DVB-HVS DVB-T Tripwire Technitium MAC Adress Changer Advance GPU Google GO Language Vs ++ WireShark Sensor Moter Fix on Human Body Phishing Prevenation System Backup4 Software Sensor Node Microsoft Virtual PC Suite Splunk version 4: Security Monitoring Solution Nir Cmd Glary Utilities Reporting Services Virtual Box Crames Difference between Dual Core and Core 2 Duo Windows Movie Maker Dual Mode Phone MANET Router Configuration Optical Camouflage Real Time Streaming Protocol(RTSP) NotePad++ Gigabyte GK-KM 7500 Security in Windows 7 Registry Mechanic Home Networking Mobile Phone Jammer Alcohol -Image Emulationa and Burning Core 2 Duo vs Core Quad Processor Total Video Converter Image Filtering Converter (PDF to Word etc) Windows Firewall Joomla Vs Drupal Google Search Engine Website Copier Apple Magic Mouse Tiny OS Packet Sniffer SATA vs PATA Holographic Memory Movie Auto Producer Load Runner Google Earth Etheral Protocol Network Dream Weaver Foxit Reader Bhuvan Vs Google Earth BOINC Drupal Tracking in Vechicular Network MsOffice 2008 Vs 2007 Comparison of Tablet PC Cain & Ahel Truecrypt Wireless USB Hammer File System Active Directory Web Recommender SD/MMC Devices Hibernate E-Business Page Ranking with Ant Colony Altova Database Spy Openoffice Wordpress Vs Drupal Nero9 UBUNTU Beryl Oracle 10 g Mobile Harddisk U3 Technology in USB Sticks Chrome OS: Netbook Create Bootable USB Drive Codec Different Types of RAM Gtalk Vs Yahoo Messanger Mojapac Software Comparision Between LCD,LED,CRT & TFT Monitors Comparision Between OS and Desktop OS Wireless Sensor Network Attack Mobile Presenter (Bluetooth) UBUNTU (OS) Mifare Card Onspeed Jmeter SSVPS B.S.Deore College Of Engineering, Dhule Department Of Computer Engineering e Study Topic Year 2010-11 Sr.No. Title 1 Neuro Solutions 2 3 Winpatrol 4 Deploying Windows 7 Through WDS 5 SquidGuard 6 Patch Maker 7 Microsoft Vs Ninetendo Wii 8 Bit Finder 9 Data Recovery 10 E-mail Hacking 11 Time Freez 12 Adobe Flex 13 Passmark Wireless Monitor 14 Cross Over Pro 15 16 Power Spy 17 Google Wave 18 Digital Watermarking 19 Google Sketchup 20 Microsoft Zune 21 CDMenupro v6 Editor 22 Gmail Drive 23 24 WEP Key Cracking using Aircracking 25 Flash boot 26 Power ISO 27 Minix3 OS 28 Repalce battery Problem 29 Advance Windows Optimizer 30 VirtualBox 31 Caputring Image on WDS 32 Nexus File Manager 33 34 Cloud using Microsoft Windows Azune Platform 35 Recuva Software 36 37 Structural Testing 38 Universal Coordinated time 39 ESET SysInspector 40 Web of Trust 41 Mobile Advertisement 42 Interactive Video Retrival 43 EASUS Partition 44 Shortcut Keys on Wiindows 45 PICTOMIO 46 StengoG 47 Agile Software Develpoment 48 49 Total spy 50 Mailing Solution: Qmail, sendmail, Squirrmail 51 Run Android Application on PC 52 Packet Tracer Software 53 Camstudio 54 Defraggler 55 Auror Media Workshop 56 Managing the performance of websites that Rely on CDN 57 Breaking Administrator password using Windows XP Bootable CD 58 File Recovery in Pen Drive 59 Spoon.net 60 Difference between Social Networking n 61 Secure Uninstaller 62 Advance system Care for Windows 63 Search Engine Optimization 64 Kodu Gaming Tool 65 Glide OS 66 Tweal Now Winsecret 67 3G Video Calling 68 Nmap 69 IPv4 Vs IPv6 70 PDF Grabber 71 72 Team Viewer 73 SunJava Wireless Toolkit for CDLC 74 75 Zombie Zopper 76 77 XAMPP Software 78 VMWare Workstation 79 WolfarmAlpha 80 Advance Renamer Descriptor 81 82 83 Speecy 84 Camstasia Studio 85 Wubi 86 AgroUML 0.32 87 Spicework Desktop 88 MS Office Project Professional 89 90 Google Map 91 Advance PWD Generator 92 Soluto Boot Analyzer 93 First Security Agent 94 SHIVA 3D Editor 95 Perforce 96 Router Simulation 97 98 99 Attack at Data link Layer 100 101 102 103 Adhoc Network with Routing 104 How Websites earn Money 105 Syscheck Up 3.1.0 106 Windows Hacking 107 108 Packet Tracer Software 109 Dexpot 110 Daemon Tools 111 Measuremnet and Analysis of LDAP Performance 112 Advance Desktop shield 113 Paint.Net 114 115 Kompozer Easy Web Authouring 116 Jdownloader 117 Win-to-Flash 118 360 Desktop 119 Transport layer Security 120 121 Spideroak 122 Hjsplit 123 JOOMLA 1.5 A Development Tool 124 Comparision between GSM Broadband and CDMA broadband 125 Driver Detective 126 Google Cloud Printing 127 IP Multimedia subsytem 128 4-G Wireless 129 Sharepoint 130 Zeta Uploader 131 D-Link Product Survey 132 Mcafee Site Advisior 133 Push Technology 134 limeware 135 Auto Run Media 136 Apple i-Pad Vs Samsung Galaxy Tab 137 138 Document Recover Center V 1.7 139 Building Supercomputer for Using Parallel Computing 140 Distributed File System share in Network Websites 141 SSVPS B.S.Deore College Of Engineering, Dhule Department Of Computer Engineering Case Study list 2011-12 Sr.no Title 1 Kinect Implementation of SAP Netweaver at SSVPS cassandra RSA 2 Apple Iphone 5 Metro Design Language Jelia Sonera 5 3 Android Vs Symbian OS for mobile Flash Vs HTMLS Misuse of SQL 4 Web 2.0 SOA and Cloud Windows Azuere Amazon EC2 5 BSNL 3G Modem Speedup My PC Rockmelt browser Argo UML 6 Comparision between orbit and IDM Lime survey Internet download accelerator 7 Real VNC ARMiner Data Mining tool AutoIT3 Xaio Stenograpgy 8 Malwarebytes Anti-Malware 1.60.1 Google Sketchup 8 WinPatrol 2012 Difference between jetaudio and iTune Players 9 Comparative study of wimax Technology Why Windows Vista is Failure IE Vs Opera Vs Chrome ROP for Web Application Development 10 System for Phising prevention Windows Kernel Architecture Quick time Technology

11 Apple iOS 5 GMDH shell Teamspeak Vs Teamviewer ooVoo 12 Graphical Share Market Data Representation Comparision between Avast, Quick heal & ESET Apple iPad2 Media juke box 14 player 13 Windows 7 tricks

14 Plan 9 OS 3 PC checkup Notepad ++ 15 PowerGUI Messanger 2011 Aakash Tablet Computer

Vertx PDF splitter and merger 16 Soft Error Analysis in storage system

I-Creator Clustering in Data mining Tools 17 Saas Compass

VisionTek Modem iCloud 18 Test Framework Complete time Tracking Comparision of web Browsers IrfanView 19 MOODLE ORANGE Data Mining Tool TANAGARA- Data Mining Tool Format Factory

20 Webplus X5 GIMP GNU Iamge Manipluation Program Wvdial-PPP dialer for Linux

21 BlueJ Version 3.0.4 KingSoft Office 2012 Dia Software Benchmarking S/W for android 22 Libra Office Expression Studio 4 Ping Dom Tool Evernote Vs Microsoft One Note 23 Line 2.0.6 Renorex Funk Load XNEC 24 Ninite software Y2k

25 Wamp Server JDK 1.7 Konboot Super cleaner 26 Universal SIM Places- an Android Mobile Application Android OS Mobile search Engine Mobile station Modem 27 Google+ EasyBCD Windows 8

28 Neuro solution to mudular neural network Wireshark Ethernet Wireshark TCP/IP Rich Internet Application 29 Flexible screen Technology TipCam Manthon Browser 3 30 Concurrency Control protocol in distributed database Fuzzy logic for light traffic controller Web application characterstics Web application securing Study 31 Bumptop Bit Torrent FOXIT Reader Free File Viewer 32 DocMGR CLAROLINE.NET Upgrading 6.x to 7.X version of Drupal 33 Selenium Play on linux Droiddraw Audiocity Cisco 1700 Series Router 34 Mango OS Intel i7 Processor Nitro pro 7.0 Data Recovery 35 Mobile Miner Google Web took kit Real Time Image shading 36 VideoChatting BOOt HIERANS Google App 37 WYSIWYG Editor Picasa 9.0

38 E-Learning University Management Software Optical Character Recognition

39 Installation of audio player on linux Suse 12.1

Rapid Miner CASE STUDY 2012-2013 Google Apps backup AJAX ON RAILS Intel Processors Digital forensics Networking in Mobile number portability Whatsapp problem and solution Andriod eclipse Security issues in mobile browesers GNS-3 ISOBUSTER IPV6 network implementation Hadoop distributed file system WinDirStat Data protection in cellphone device Biometrics in banking security APPLOGIC Winrunner EaseUS todo backup Visual paradigm -UML Tool Evernote OS X Moutain Lion Blackberry o.s. 10 Ubuntu mobile os Mobile network jammer Autoit Power saving techniques for wireless LAN Windows server 2012 Utrasurf 12.04 Avant browser Different types of antenna Web 3.0 Green cloud computing Dynamic water marking scheme ICQ Messenger Comodo dragaon browser Video editor An intelligent e-restrauant for customer DBMONSTER Secure mobile database application MS-OFFICE-2013 Internet cryptography Hike messenger Media playes INSSIDER Artisteer Andriod Vs Widows Mobile OS Faststone image viewer Under water cable Hybrid Laptops Sublime text 5G mobile technology Cain Sniffer tool Why 3G is Failure 3D-layar application Attribute changer Cloud services Viber ARCGIS Service IOS-6 4G-technology Intel paper thin tablet display Flexible display DNS changer Malware Blade server Video watermarking software SSD vs HDD Mapreduce programming model Flashget 3.7 Morto internet worm Wefi- Wireless tool LCD,LED backlight LED Altova Umodel Windows 8 file system NVIDIA-Project shield Panorama for capturing Image Freemake video converter Cloud storage Campfrog video chat-6.4.253 Microsoft mappoint DC++ Phishing Techniques Just dial android application search Seamonkey browser Mobile number portability Weblog analysis Quantum computer BOSOM netsion 8 V2x simulation runtime infrastructure Holographic versatile disc SOLEX web application tool Aesthetics in human computer interaction Cross site scrpting Data Mining Algorithm in Weka Google glasses Team Talk 4Sync Radius server Dropbox backup recovery Jcreater RAMDISK Private Cloud using Eucalyptus Cyber security Dreamviewer8 Nimbuzz Epic browser firefox os Advanced PC Tweaker Testing anywhere LoadUI Load testing tool for web Test Disk recovery tool 365 Vs Google apps Netmimer Advanced Query tool Sky Drive Win-to - flash Attack on tor browser Maxthon cloud browser XCODE Microsoft network analyzer Microsoft VISIO Syncback Various OS file systems Wireless charging CASE STUDY 2013-14 Deamon tool kit Video delivery challeges in 4G network Tou can version 3.1.0 Ubuntu 12.10 Vs linux mint Advanced system care N-map network security scanner Web Cartoon Maker Zone alarm firewall & antivirus 12.0 Forensic techniques tools for recover data from volatile mem. Elfin photo editor debian operating system Sony Vegas Goldbug istant messenger 0.9.00 Duplicate cleaner 3.2 Y2k38 bug Hotspot shield Namo web editor Webzip Cuberid Vanity Remover tool Telegram Auduino UNO module Opnet & real Axcrypt 1.7.3156.0 Eventlog explorer NCH software suite Luna wish slide show Revo uninstaller JV16 power tools2014 Mobile automation using seetest OMNET++ Mint operating system UPXIT Truecaller Andriod application Tinycad 3D creater pale moon Wise disk cleaner freeraser mobogenie software Team Viewer 9.0.25790 Plugin development for chrome broweser Nosql Vs Sql Android vs linux Speed commands Selenium automation and firefox customizations icare data recovery Pendrive as windows7 pc lock Vs window8 pin protection Ammyy admin Hadoop languages Vs Java languages C cleaner tool Touch pad pal 1.4 Driverpack solution Snajit WebDwarf Album me 3.5.4 Sisoftware sandra lite Baidu PC faster Netset man King translate JPEG compression Ultra video joiner Intel xdk Blender Quick image resizer Video to GIF converter life photo maker Alley code HTML editor 3D home maker Wise care Uc browser Speccy 1.25.674 Prezi presentation tool netcraft multi commander Shared memory MPI implementtion on Linux using MPICH Comparision between daily safe & peril alerts Magix music maker NS3 Geogebra Wireless network watcher Defragmentation Sailfish os IBM-Rad Xchat-Internet relay chat Uniquls face recognition payment sytem kernel virtual machine Jar to EXE converter JPEG file format comparision keylogger Stellerphonix recovery tool business card studio keepass tesseract engine Googel baloon Radeon RAMDISK Slimboat Java GUI Builder Windows repair (all in one) IOS Vs Andriod Photoshop CS6 Airbone internet Fastkeys Desktop search engine Openfreely Audacity Microsoft baseline security analyzer Remote emotional connection based on ambient technology AppDetox OLLAY Debugger QGIS Intel graphics performance analyzer Web log Preprocessing tool :weblog expert Win pdf editor CUDA YUMI bluestack Privacy guardian Rohoas logon key Quiz Maker Edit plus 3 PCX2 emulator Staf testing software warning bird CSE HTML validator tool AIM Open SSL Adding intelligence jetclean DNS config in IPV6 Paragoan backup and recovery2014 tuneup utilities 2014 Avast Free Antivirus 2014 Vs AVG Antivirus Auslogics duplicate BE COMP 2014-15 Use Open standards for interoperability issuse,sol.,challenges. Using network knowledge to improve workload performance in virtualized data centers Audio Fingerprint. Matching composite skteches to face photos & composite based approach High performance cloud computing. Cloud computing from a risk management perspective Sniffer technologies to detect lost mobile. MTBAC-Mut controlual trust based acess control Wireless switched digital video scheme for mobile TV services over WiMAX networks. Using linked data to annotate & search educational video resources for supporting distance learning Efficiently outsourceing multiparty computation under multiple keys. Automation system and home appliances control using PC & microcontroller. cCursor control system using facial expression. A refined wegited k-nearest neighbour's algo. For text categarization Design of wireless sensor network for mobile target detection. Automatic discovery of personal name aliases from the web. Intelligent traffic light controller using ES Query processing performance on encrypted databases by REA Passive contineous authentication system TCP congestion control scheme for wireless network based on TCP reserve field Closed loop measurement of N/W traffic Evolution towards 5G Multi-Tier celluar wireless network. Home automation using cloud network & mobile devices Personalized mobile search engine Affective body expression perception & recognition. A physical layer secured key distribution technique for IEEE 802.11g wireless network Robust face recognition for uncontrolled pose & illumination changes Forecast system for offshare water surface elevation with inundation map integrated for tsunami early warning Meta path based search & mining in hetetrogenous information network. An approach to driverless vechicles in highways ATM PIN transfer using visual cryptography. Discovering concrete attacks on website authorization by formal On fast & accurate detection of unauthorized wireless AP. Virtual classroom. An improved travel saftey for urban computers using an iTracks A context aware system architecture for leak point detection in the industry Browser fingerprinting To identify Web fraud A novel data embedding method using adaptive pair matching. Role of mobility for multi-message gossip. Evaluation of S/W engg. Changing scnario of modern H/W arciteture,semantic web & cloud computing

Ensuring distributed accountability for data sharing in the cloud. Cloud computing as Financial services. Raspberry Pi. Profile matching in mobile social network. Learning AND-OR templates for object recognition & detection

Multi document extra summerization based on word sequence. AntHocNet. Effective risk communication for andriod applications. Continues software engineering and beyound trends & challenges. NICE:Network Intrusion Detection and countermeasure selection in virtual n/w system. Learning multi boosted HMMs for Lip password based speaker verification. Privacy preserving enhance collabarative tagging Artificial neural network based intrusion detection. A systematic methodology for developing discrete event simulation models of s/w devlopment process Data transfer without using internet or bluetooth Zetabyte file system. Automatic control system for anti drunk-driving Project planning measures in CMMI Real-time scheduling for Xen-ARM virtual machines. 4D password strengthning seurity autentication. A system to filter unwanted message form OSN walls Configuring IPV4 over IPV6 network Data mining with big data NFC Today & Tomorrow Facial verification technology for use in ATM transaction Keyboard behaviour based authentication Smart card with iris recgnition for high security access enviornment Warning Bird Wearable Bio-sensor Automated Toll collection system using RFID Automated test packet generation Prevention of cross site scripting with E-guard algorithm IP Spoofing. Framework for ranking cloud computing services. Data hiding in medical images Monitoring PCs using Andriod Pill camera. Evaluation of mobile wireless communication network. vCUDA:GPU-acclerated high-performance computing in virtual machines. Privacy aware traffic monitoring Vehicle detection in very high resolution satellite images of city areas Acess Point buffer management for power saving IEEE802.11 WLANs. Elasticity in cloud computing. Andriod enabled mobile framework for ubiquitous access to cloud emergency services

Improving QOS in High-speed Mobilty using Bandwidth maps.

Auto detection of unsafe dynamic component loading using IP address DCSIM:A data center simulation tool for evaluating virtualized resource management A compressive sensing based secure watermark detection & privacy preserving storage framework. Second life Load balancing in WLAN by cell breathing technique Mobile phone signal jammer for GSM,CDMA with Pre- scheduled time duration using ARM7 Buffer management schemes for packet queues in MANET. Security challenges in vehicular cloud computing. Embedded technology for vehicle cabin saftey monitoring & alerting system. A survey of Ethernet LAN security. Zebu Gi-Fi technology. Antivirus software shield against antivirus terminators Virtual memory partitioning in mobile platform. Wrap-around testing methodology A fast Re-route method Cognitive radio network. RTOS based home automation system. Facebook thrift. Improving requirement engineering by Artefact orientation Devlopment & specification of a refernce architecture for agent based system. Autonomous mobile mesh network Orthogonal security with cipherbase Survey of packet dropping attack in MANET Participatory privacy: enabling privacy in participatory sensing. Three factor security protocol. Aritifical Intelligence in safe human robot interaction. Automatic discovery of association orders between name & alises from the web using achor text-based co-occurences. Thread migration predicition for distributed shared caches Elctronic medical report security using visual secret sharing scheme.

Vulnerability of n/w mechanism to sophisticated DDOS attack Security Andriod powered mobile device using SELinux Separable reversible data hiding using RC4 Algorithm. Bandwidth aware divisible task scheduling for cloud computing.

Packet hiding method for preventing selected jamming attacks

Differentiated virtual passwords,secret little functions & codebooks for protecting users from password theft Rain technology. Message queue telemetry transport-MQTT. preventing cell phone intrusion & theft using biometrics Shuttle: facilitating inter application interactions for OS-level virtulization. Barcode payment system in trusted mobile devices. Underwater wireless communication in freshwater at 2.4GHZ. Data mining tools and its comparision. Reinforcement learning based on computational cognitive nuroscience in neuromarphic VLSI chips On delay adjustment for dynamic load balancing in distributed virtual enviornment. Mind reading computer. A secure & efficient vehicle to vehicle communication using VANET A Taxonomy of Botnet behaviour,detection & defense Fast RPC system for virtual machine Wireless control & monitoring of robotic arm(SWORDS) Tagsense:laverging for automatic image. A fast clustering based feature subset selection algorithm for high dimensional data. Content based (CBIR) for identifying image base plant diseases Dynamic resource allocation using virtual machines for cloud computing enviornment mPATH:High bandwidth data transfers with massively multipath source routing. Cross-Domain privacy preserving cooperative firewall optimization. Profile based protection is personalized web search. Google driverless car Fingerprint recognition based electronic voting machine Survey of Balloon networking applications & technologies. Flocking based document clustering on the graphics processing unit Reliable data delivery in MANET using light weight verification algorithm with high node mobility. Secure encounter based mobile social network. Data integrity proof in cloud storage Automated food ordering system with real time customer feedback