Académique Documents
Professionnel Documents
Culture Documents
Objective and Scope: This should give a clear picture and final outcome of the project.
Objectives should be clearly specified. What the project ends up to and in what way it is
going to help the end user has to be mentioned.
Resources and Limitations: The requirement of the resources for designing and
developing the proposed system must be given. The resources might be in form of the
hardware / software or real time data. The limitations of the proposed system in respect of
a larger and comprehensive system must be given in the synopsis itself.
Conclusion: The document must end with the concluding remarks-briefly describing
innovations in implementing the project and also any other important feature that makes
the system stands out from the rest.
References and bibliography: The complete list of books (chapter listing, topic listing),
website links (complete URLs) and research papers (title and authors, year of
publications) have to be mentioned.
Sample format of References:
REFERENCES
[1] S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology, 2nd ed., R. M.
Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998.
[2] J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind
Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989,
vol. 61.
[3] S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok, A novel ultrathin elevated
channel low-temperature poly-Si TFT, IEEE Electron Device Lett., vol. 20, pp. 569
571, Nov. 1999.
[4] M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, High resolution
fiber distributed measurements with coherent OFDR, in Proc. ECOC00, 2000, paper
11.3.4, p. 109.
[5] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, High-speed digital-to-RF
converter, U.S. Patent 5 668 842, Sept. 16, 1997.
[6] (2002) The IEEE website. [Online]. Available: http://www.ieee.org/
[7] M. Shell. (2002) IEEEtran homepage on CTAN. [Online]. Available:
http://www.ctan.org/tex-archive/macros/latex/contrib/supported/IEEEtran/
The topic can be chosen from any technology/field related to Information Technology
like Cloud Computing, Neural Networks and Fuzzy Logic, Image Processing, Artificial
Intelligence, Embedded Systems, Mobile Applications, Web Development, Applications
linked to social networks, Security(wired/wireless), algorithmic approaches. The topics
are not limited to the list mentioned and can also be in any other area of relevance.
The students are required to answer the following set of questions at the time of
presentation of the synopsis:
Question 1:- Explain in at least 100 words the reasons, why should the department
approve your project?
Question 2:- Explain the reasons why do you want to work in a group of 2 students and
not individually? Give proper justification of the division of workload in the
implementation of the project.
Question 3:- What are the strengths and limitations of your proposed work?
Question 4:- Explain in at least 100 words what will be the positive impact of the project
on society/academics/college/industry.
Suggested List of Project Titles:
1. Classification of Handwritten Digits using Machine Learning Techniques
2. Warehouse Management System Using Salesforce.com
3. Evaluating ML techniques for defect prediction
4. Real-time order processing and E-Commerce web application using J2EE
5. Baggage Tracking through RFID Tag
6. Social Network Analysis Utilizing Big Data Technology
7. Mobile phone application offloading by cloud computing utilization
8. Multi-Master Replication in Polyhedra: Full Replication and Eventual consistency
9. Data Leakage Detection Using Cloud Computing
10. Enriching Circuit Switched Mobile Phone Calls by Cooperative Web application.
11. RSS Reader for a Mobile Device in J2ME
12. Pharmacy Management System in PHP , MySQL
13. Multimedia Messaging Service Front End for Supplementary Messaging Services
14. Forensic Analysis of WhatsApp on Android Smartphones
15. Construction of Sensor Database for Internet of Things
16. Real Time Data Pipeline Integration Between Hadoop & External Systems
17. Data Leakage Detection Using Cloud Computing
18. Wiki/Blog Content Management System in PHP
19. Red Blood Cells Classification using Image Processing
20. Voice Based Automated Transport Enquiry System in C#.net and MySQL
21. 3G and Internet Protocols Integration
22. Indoor and Outdoor Real Time Information Collection in Disaster Scenario
23. Research Ontology Data Models for Data and Metadata Exchange Repository
24. JClone: Syntax tree based clone detection for Java
25. Automatic Estimation and Removal of Noise from a Single Image
26. Forensic Analysis of Social Networking Applications on Mobile Devices
27. Tap jacking Threats and Mitigation Techniques for Android Applications
28. Manage Cache Consistency in a Disconnected Distributed Environment
29. Intelligent Student Profiling with Fuzzy Models
30. Program Dependence Graph Generation for Source Code Plagiarism Detection
31. Real Time Network Intrusion Detection by ANN In Data Mining
32. A Session-Based System for Aligning Large Ontologies
33. Remote-Controlled Home Automation Systems with Network Technologies
34. Automated Robot for Military System (ARMS)
35. Online Voting Using Bluetooth Enabled Mobile Phone
36. Wi-Fi Based Mobile Quiz
37. Semi-Supervised Learning using Graph Kernels
38. Gram-Based Fuzzy Keyword Search over Encrypted Data in Cloud Computing
39. Battery Optimizer for Android Mobile Devices
40. Sockets Programming in Python Building a Python Chat Server
41. Efficient Peer to Peer Similarity Query Processing for High dimensional Data
42. XTC Algorithm Based Scalable Wireless Ad hoc Networking
43. Honey Pots a Security System to Identify Black Hat Community in the Networks
44. Gaussian Processes for Bayesian State Estimation
45. Imitation Learning in Humanoid Robots
46. Privacy Preserving Data Sharing with Anonymous ID Assignment
47. Diagnosing Computer Bugs Using Big Data Approach.
48. Reverse Engineering for Converting Conventional Turbo C Code to 64bit C#
49. Debugging Grids with Machine Learning Techniques
50. Scalable Multimedia Content Analysis in a High-level Language
51. Design and Implementation of a Consolidated Middle Box Architecture
52. Automated Low-Level Analysis and Description of Diverse Intelligent Videos
53. DDOS (Distributed Denial of Service) Using Throttle Algorithm.
54. Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
55. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
56. Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
57. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
58. Decentralized Access Control with Anonymous Authentication of Data in Clouds
59. A Scalable Two-Phase Top-Down Specialization for Data anonymization Using
Map Reduce on Cloud
60. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems
61. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective
Privacy Preserving of Intermediate Data Sets in Cloud
62. Cloud-Assisted Privacy Preserving Mobile Health Monitoring
63. QoS Ranking Prediction for Cloud Services
64. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
65. Outsourcing Privacy-Preserving Social Networks to a Cloud
66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing
using Attribute-based Encryption