You are on page 1of 12

MODAInnovations

Complete Academic Project Solutions


9538304161 www.modainnovations.com
modainnovations@gmail.com

APPLICATION PROJECT LIST


S NO

Project Title
A Fuzzy Self Constructing Feature Clustering A Mobility Management Solution Based on ID A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems A Personalized Ontology Model-Synopsis A Policy Enforcing Mechanism for Trusted Ad Hoc A Privacy-Preserving Location Monitoring A Security Architecture achieving anonymity and traceability in wireless mesh networks Achieving Secure, Scalable, and Fine-grained Data Adaptation of a virtual campus for mobile learning devices An Improved Sobel Edge Detection

Technology
Java Java

1 2

3 4 5 6

Java Java Java Java

7 8 9 10

Java Java Java Java

11 12 13 14

Chunk distribution in Mesh-Based Large Scale P2P Streaming-hoc Networks Clustering With Multi-Viewpoint based Similarity Measure Content based Image Retrieval System Using Sketches Continuous Neighbor Discovery in Asynchronous Cooperative Caching in Wireless P2P Networks Design Implementation And Evaluation Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks Distributed Group Key Management with Cluster based Communication for Dynamic Peer Groups Dynamic Audit Services for Integrity Verification Dynamic Authentication for Cross-Realm SOA-Based Business Processes Dynamics of Malware Spread in Decentralized Peer Enabling Public Auditability and Data Dynamics for Storage Security In Cloud Computing Energy-Efficient Protocol for Co Operative Networks Ensuring Data Storage Security in Cloud Computing Exploiting dynamic resource allocation

Java Java Java Java

15

Java

16

Java

17

Java

18

Java

19 20 21 22

Java Java Java Java

23 24 25 26

Java Java Java Java/J2ee

27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44

Fuzzy Keyword Search over Encrypted Data in Cloud Computing Host-to-Host Congestion Control for TCP-doc Improving the Performance of Wireless Integrated file replication and consistency maintenance in p2p systems IRIS Recognization System Layered Approach Using ConditionalRandom Fields for Intrusion Detection MABS Multicast Authentication Based On Batch Signature Mesh Based Multicast Routing in MANET Stable Link Based Approach Managing Data Access in Cloud Computing Mobility Management Approaches for Mobile-Zeroth review Modeling and Detection of Camouflaging Worm Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks Nymble Blocking Misbehaving Users in Anonymizing Networks Intrusion Alert Aggregation Optimal and Efficient Graph-based Resource Allocation Algorithms for Multiservice Frame based ofdma networks Optimal Bandwidth Assignment for Multiple Description Coded Video Optimized association rule mining using genetic algorithm Power and Sub Carrier Allocation for OFDMA Networks

Java Java/J2ee Java Java Java Java Java/J2ee Java Java Java Java Java Java Java Java Java Java Java

45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62

Privacy-Conscious Location-Based Queries in Mobile Environments Query Processing in Multi-User Scenario for WSN Ranking spatial data by quality preferences Rate Adaptation in Congested Wireless Networks Relational Attribute Integrated Matching Analysis - RAIMA Robust Video Data Hiding using Forbidden Zone Data Hiding and Selective Embedding Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Secure and Highly Efficient Three Level Key Management Scheme for Secure and Practical Outsourcing of Linear Programming in Cloud Computing Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes Secure Data Processing Framework for Mobile Cloud Computing Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes Secure High-Throughput Multicast Routing in WMN Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Supporting Efficient and Scalable Multicasting TDMA Scheduling with Optimized Energy The World in a Nutshell Towards Secure and Dependable Storage Services in Cloud Computing

Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java

63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80

Virus Spread in Networks A New Operational Transformation Framework for Real-Time Group Editors A wireless Activity Management System An efficient association rule mining algorithm in distributed data bases Audio Conference via VOIP Audio Editing Tool Automated Decision Making Work Flow System Barcode reader Benefit based data caching in adhoc networks Bluetooth Mobile Multimedia Accessories Bluetooth Mobile Based College Campus Capturing Router Congestion and Delay CATALOG Management System Credit Card Approval System CRM based Application cum office administration package Customer Support Service Operation Design and Implementation of Work Planner Detecting Malicious Packet Losses

Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java

81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98

Distributed cache updating for the Dynamic source routing protocol Distributed Channel Management e-banking Energy-Efficient SINR-Based Routing for Multihop Wireless Enterprise Resource Information System Face Recognition Using Laplacian faces File Transfer Protocol Manage Health Care System Help Desk HR Administration Image Edge Detection Image Processing Algorithm Insurance System Internet Multi Client Chatting Intranet Virtual Private Network Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks IP-Centrex Java Network File Sharing System

Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java

99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116

Java Orkut Medical Diagnizer design implementation Minimizing File Download Time in Stochastic Peer-to-Peer Networks Net Auction Network border patrol Network Communication System Network Monitoring & Remote Management Network Security using Mediator Protocal for Ad Hoc Networks NGO Satellite for Bluetooth College Campus Online Voting System Remote Administration using MIDP Remote Network Administration Routing Between Two Nodes Shopping Cart with Automatic Detection of Top Selling Products Signature based Indexing Method for Efficient Content based Retrieval of Relative Temporal Pattern Sound Synthesizer Stegnography Text Editor

Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java

117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134

Textiles Management Travel Desk System University Admission System Vehicle Insurance Management Tool Vehicle Tracking Management Tool Virtual Network Monitoring System VOIP Audio Conference Web-Based Open ATS platform for Application Processing Wireless Mobile Ad Hoc Multimedia Messenger 2D and 3D Morphing Active Learning Methods for Interactive Image Retrieval Analysis of Shortest Path Routing for Large Biased Random Walks in Uniform Wireless Networks Cell Breathing Techniques for Load Balancing in Wireless LANs Computer Resource Management System (CRMS) Conditional Shortest Path Routing in Content Management System Edge Detection in Images with Wavelet Transform

Java Java Java Java Java Java Java Java Java Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net

135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152

Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period Enforcing Minimum-Cost Multicast Routing Explicit Load Balancing Technique Image Edge Detection Image Recognition with Neural Networks Image Resolution Using Convolution filter Insurance Management System Message Digest New Life Hospital Administration System Online Discussion Forum Online Examination Resource Allocation in OFDMA Wireless Route Stability in MANETs under the Random Direction Mobility Model Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light A User Oriented Image Retrieval System Data Integrity Proofs in Cloud Storage Edge Adaptive Image Stegnography Based on LSB Matching Revisited Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net

153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170

Maximizing Rewards in Wireless Networks Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast Optimal Jamming Attacks and Network Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Route Stability in MANETs under the Random Direction Mobility Model SVD-Based Universal Spatial Domain Image Steganalysis An Integrated Approach to Sensor Role Selection Cell Breathing Techniques for Load Balancing in Wireless LANs Edge Detection in Images with Wavelet Transform Credit Card Approval System Edge Detection in Images with Wavelet Transform Image Edge Detection Insurance Management System Online Book Store System On Line Banking RTO Management System Online Share Design a Guard System for Sybil Attack

Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net Dot Net VB.NET VB.NET

171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188

Effective key generation for multimedia application Gated-way community & services Key pass password protection manager Monitoring the Application-Layer DDOS Attacks for Popular Websites Network Load Balancing Bug tracker Cool Cab services Customer support service operation Cyber bidding gateway Cyber Job Mela Drive2Destiny e-Billing e-Fashion Enterprise Security Services Greeting cards Hospital Management System HRMS Resource Planning Indian Tourism Portal

VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET

189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204

Insurance Envoy International Street Racing Community Mailing Portal Medi Claim Petrol Bunk Prison Details Radical Application Portal Reality Shows Organization Hotel Management system Sales & Customer Tracking System SMS based student intimation Snake Game Software Project Management SQL-Tuner Tax Assessment Services Visual Learner Memory Game

VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET VB.NET

You might also like