Vous êtes sur la page 1sur 7

Project Synopsis Format for 7th Semester IT Students

Synopsis, preferably, should be of about 3-4 pages.


The content should be as brief as is sufficient enough to explain the objective and
implementation of the project.
The write up/document must adhere to the guidelines and should include the
following:

1. Name / Title of the Project


2. Statement about the Problem
3. Why is the particular topic chosen?
4. Objective and scope of the project
5. Methodology
6. Hardware & Software to be used
7. What contribution would the project make? \
8. The Schedule of the project (Gantt chart/ PERT chart)
8. References/Bibliography.

Following contents have to be taken into consideration in synopsis:

Name/Title/Topic of the Project: This should be explicitly mentioned at the beginning


of the Synopsis. Since the topic itself gives an insight into the project to be taken up, the
student is suggested to be reasonable on the name/title of the project. The title being the
overall impression on the complete work, the topic should substantiate the work.

Objective and Scope: This should give a clear picture and final outcome of the project.
Objectives should be clearly specified. What the project ends up to and in what way it is
going to help the end user has to be mentioned.

Process Description: The process of the whole software system proposed, to be


developed, should be mentioned in brief. This has to be supported by DFD's/
Flowcharts/Use Case Diagrams to explain the flow of the data and control in the project.

Resources and Limitations: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware / software or real time data. The limitations of the proposed system in respect of
a larger and comprehensive system must be given in the synopsis itself.

Conclusion: The document must end with the concluding remarks-briefly describing
innovations in implementing the project and also any other important feature that makes
the system stands out from the rest.

References and bibliography: The complete list of books (chapter listing, topic listing),
website links (complete URLs) and research papers (title and authors, year of
publications) have to be mentioned.
Sample format of References:

REFERENCES
[1] S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology, 2nd ed., R. M.
Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998.
[2] J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind
Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989,
vol. 61.
[3] S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok, A novel ultrathin elevated
channel low-temperature poly-Si TFT, IEEE Electron Device Lett., vol. 20, pp. 569
571, Nov. 1999.
[4] M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, High resolution
fiber distributed measurements with coherent OFDR, in Proc. ECOC00, 2000, paper
11.3.4, p. 109.
[5] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, High-speed digital-to-RF
converter, U.S. Patent 5 668 842, Sept. 16, 1997.
[6] (2002) The IEEE website. [Online]. Available: http://www.ieee.org/
[7] M. Shell. (2002) IEEEtran homepage on CTAN. [Online]. Available:
http://www.ctan.org/tex-archive/macros/latex/contrib/supported/IEEEtran/

The topic can be chosen from any technology/field related to Information Technology
like Cloud Computing, Neural Networks and Fuzzy Logic, Image Processing, Artificial
Intelligence, Embedded Systems, Mobile Applications, Web Development, Applications
linked to social networks, Security(wired/wireless), algorithmic approaches. The topics
are not limited to the list mentioned and can also be in any other area of relevance.

The students are required to answer the following set of questions at the time of
presentation of the synopsis:
Question 1:- Explain in at least 100 words the reasons, why should the department
approve your project?
Question 2:- Explain the reasons why do you want to work in a group of 2 students and
not individually? Give proper justification of the division of workload in the
implementation of the project.
Question 3:- What are the strengths and limitations of your proposed work?
Question 4:- Explain in at least 100 words what will be the positive impact of the project
on society/academics/college/industry.
Suggested List of Project Titles:
1. Classification of Handwritten Digits using Machine Learning Techniques
2. Warehouse Management System Using Salesforce.com
3. Evaluating ML techniques for defect prediction
4. Real-time order processing and E-Commerce web application using J2EE
5. Baggage Tracking through RFID Tag
6. Social Network Analysis Utilizing Big Data Technology
7. Mobile phone application offloading by cloud computing utilization
8. Multi-Master Replication in Polyhedra: Full Replication and Eventual consistency
9. Data Leakage Detection Using Cloud Computing
10. Enriching Circuit Switched Mobile Phone Calls by Cooperative Web application.
11. RSS Reader for a Mobile Device in J2ME
12. Pharmacy Management System in PHP , MySQL
13. Multimedia Messaging Service Front End for Supplementary Messaging Services
14. Forensic Analysis of WhatsApp on Android Smartphones
15. Construction of Sensor Database for Internet of Things
16. Real Time Data Pipeline Integration Between Hadoop & External Systems
17. Data Leakage Detection Using Cloud Computing
18. Wiki/Blog Content Management System in PHP
19. Red Blood Cells Classification using Image Processing
20. Voice Based Automated Transport Enquiry System in C#.net and MySQL
21. 3G and Internet Protocols Integration
22. Indoor and Outdoor Real Time Information Collection in Disaster Scenario
23. Research Ontology Data Models for Data and Metadata Exchange Repository
24. JClone: Syntax tree based clone detection for Java
25. Automatic Estimation and Removal of Noise from a Single Image
26. Forensic Analysis of Social Networking Applications on Mobile Devices
27. Tap jacking Threats and Mitigation Techniques for Android Applications
28. Manage Cache Consistency in a Disconnected Distributed Environment
29. Intelligent Student Profiling with Fuzzy Models
30. Program Dependence Graph Generation for Source Code Plagiarism Detection
31. Real Time Network Intrusion Detection by ANN In Data Mining
32. A Session-Based System for Aligning Large Ontologies
33. Remote-Controlled Home Automation Systems with Network Technologies
34. Automated Robot for Military System (ARMS)
35. Online Voting Using Bluetooth Enabled Mobile Phone
36. Wi-Fi Based Mobile Quiz
37. Semi-Supervised Learning using Graph Kernels
38. Gram-Based Fuzzy Keyword Search over Encrypted Data in Cloud Computing
39. Battery Optimizer for Android Mobile Devices
40. Sockets Programming in Python Building a Python Chat Server
41. Efficient Peer to Peer Similarity Query Processing for High dimensional Data
42. XTC Algorithm Based Scalable Wireless Ad hoc Networking
43. Honey Pots a Security System to Identify Black Hat Community in the Networks
44. Gaussian Processes for Bayesian State Estimation
45. Imitation Learning in Humanoid Robots
46. Privacy Preserving Data Sharing with Anonymous ID Assignment
47. Diagnosing Computer Bugs Using Big Data Approach.
48. Reverse Engineering for Converting Conventional Turbo C Code to 64bit C#
49. Debugging Grids with Machine Learning Techniques
50. Scalable Multimedia Content Analysis in a High-level Language
51. Design and Implementation of a Consolidated Middle Box Architecture
52. Automated Low-Level Analysis and Description of Diverse Intelligent Videos
53. DDOS (Distributed Denial of Service) Using Throttle Algorithm.
54. Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
55. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
56. Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
57. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
58. Decentralized Access Control with Anonymous Authentication of Data in Clouds
59. A Scalable Two-Phase Top-Down Specialization for Data anonymization Using
Map Reduce on Cloud
60. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems
61. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective
Privacy Preserving of Intermediate Data Sets in Cloud
62. Cloud-Assisted Privacy Preserving Mobile Health Monitoring
63. QoS Ranking Prediction for Cloud Services
64. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
65. Outsourcing Privacy-Preserving Social Networks to a Cloud
66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing
using Attribute-based Encryption

67. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for


Relational Data
68. Prediction of Difficult Keyword Queries over Databases
69. A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
70. Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks
71. Task Trail: An Effective Segmentation of User Search Behavior
72. A Fast Clustering-Based Feature Subset Selection Algorithm for High
Dimensional Data
73. Mining User Queries with Markov Chains: Application to Online Image Retrieval
74. Incentive Compatible Privacy-Preserving Data Analysis
75. Secure Mining of Association Rules in Horizontally Distributed Databases
76. Facilitating Effective User Navigation through Website Structure Improvement
77. Privacy-preserving Mining of Association Rules from Outsourced Transaction
Databases
78. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
79. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
80. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
81. A Two-stage Deanonymization Attack Against Anonymized Social Networks
82. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging
Quality.
83. Multiparty Access Control for Online Social Networks: Model and Mechanisms
84. Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
85. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
-by-Packet Adaptive Routing in Communication Networks
86. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for
High-Speed Networks
87. A Decentralized Service Discovery Approach on Peer-to-Peer Networks
88. Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor
Networks
89. A Secure and Privacy-preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency
90. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks
91. IP-Geo location Mapping for Moderately Connected Internet Regions
92. Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
93. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile
Social Networks
94. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number
of Transmissions
95. Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI
Problems.
96. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
97. Detecting Spam Zombies by Monitoring Outgoing Messages
98. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based
Encryption
99. Building up a Security and Privacy Aware Location-Based Rewarding System
100. Exploiting Service Similarity for Privacy in Location-Based Search Queries
101. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
102. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective
Privacy Preserving of Intermediate Datasets in Cloud.
103. A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
104. Dynamic Resource Allocation using Virtual Machines for Cloud Computing
Environment
105. Ranking and Clustering Software Cost Estimation Models through a Multiple
Comparisons Algorithm
106. Ant Colony Optimization for Software Project Scheduling and Staffing with an
Event-Based Scheduler
107. QoS Assurance for Dynamic Reconfiguration of Component-Based Software
Systems
108. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks
109. IP-Geo location Mapping for Moderately Connected Internet Regions.
110. Modified AODV against single and collaborative Black Hole attacks in MANETs
111. Scalable and Secure Sharing of Personal Health Records in Cloud Computing
Using Attribute-Based Encryption
112. Cloud Computing-Based Forensic Analysis for Collaborative Network Security
Management System
113. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System
Development
114. A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

Vous aimerez peut-être aussi