{"id":16835,"date":"2018-10-29T11:32:33","date_gmt":"2018-10-29T11:32:33","guid":{"rendered":"http:\/\/sode-edu.in\/?p=16835"},"modified":"2018-10-29T11:34:27","modified_gmt":"2018-10-29T11:34:27","slug":"cs-student-project","status":"publish","type":"post","link":"https:\/\/sode-edu.in\/smvitm\/uncategorized\/cs-student-project\/","title":{"rendered":"COMPUTER SCIENCE ENGINEERING STUDENT PROJECT LIST"},"content":{"rendered":"<table width=\"461\">\n<tbody>\n<tr>\n<td width=\"65\">Sl. No.<\/td>\n<td width=\"396\">Title<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td width=\"396\">SLA\u00a0 Driven Management of Web Applications<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td width=\"396\">Stegnography For Hiding Data In WavAudio File.<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td width=\"396\">Privacy Preserving Technique in Wireless Sensor Networks<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td width=\"396\">Automatic Vision Based\u00a0 Inspection System Using Raspberry\u00a0 PI<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td width=\"396\">Cloud Computing Security from Single to Multiclouds<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td width=\"396\">Negotiation Scheme for Trust Management<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td width=\"396\">Get Connected<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td width=\"396\">Authentication Smart Card Using Steganographic and Biometric Approach<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td width=\"396\">Biometric Vehicle Security Device<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td width=\"396\">Development of a Computational Linguistic Tool Rebting to Study of Regional Minor Languages<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">Batch:2011-15<\/td>\n<\/tr>\n<tr>\n<td>11<\/td>\n<td width=\"396\">Video Based Image Retrieval<\/td>\n<\/tr>\n<tr>\n<td>12<\/td>\n<td width=\"396\">Web Security Using Usual Cryptography Against Phishing<\/td>\n<\/tr>\n<tr>\n<td>13<\/td>\n<td width=\"396\">Authentication Techniques for Engg. Session Password With Colors and Text<\/td>\n<\/tr>\n<tr>\n<td>14<\/td>\n<td width=\"396\">3D Image Synthesis of Mouth Cricoid Uppergi Using Scan Images<\/td>\n<\/tr>\n<tr>\n<td>15<\/td>\n<td width=\"396\">GSM Based Automated Licence Verification Using Fingerprint<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td width=\"396\">Giform Gesture Input for Representation of Models<\/td>\n<\/tr>\n<tr>\n<td>17<\/td>\n<td width=\"396\">Smart Home Using Rasphery Pi<\/td>\n<\/tr>\n<tr>\n<td>18<\/td>\n<td width=\"396\">Authentication Using Visual Sacret Sharing<\/td>\n<\/tr>\n<tr>\n<td>19<\/td>\n<td width=\"396\">Biometric Authentication for Safety Lockers Using Cardiac Vectors<\/td>\n<\/tr>\n<tr>\n<td>20<\/td>\n<td width=\"396\">Analysis and Implementation of Region Based on Demand to Supply Chain Framework<\/td>\n<\/tr>\n<tr>\n<td>21<\/td>\n<td width=\"396\">Transforming Document to Publishing Media<\/td>\n<\/tr>\n<tr>\n<td>22<\/td>\n<td width=\"396\">Analyzing and Classification of Malware and Benign Executables<\/td>\n<\/tr>\n<tr>\n<td>23<\/td>\n<td width=\"396\">Performance\u00a0 Analysis of Various Protocols in Magnet<\/td>\n<\/tr>\n<tr>\n<td>24<\/td>\n<td width=\"396\">Automatic Attendance System<\/td>\n<\/tr>\n<tr>\n<td>25<\/td>\n<td width=\"396\">Content Authority Tool<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">Batch: 2012-16<\/td>\n<\/tr>\n<tr>\n<td>26<\/td>\n<td width=\"396\">Vehicle Tracking with Remote Document Verification<\/td>\n<\/tr>\n<tr>\n<td>27<\/td>\n<td width=\"396\">Biometric Enabled Ration Access System<\/td>\n<\/tr>\n<tr>\n<td>28<\/td>\n<td width=\"396\">Performance Enhancement using CPU<\/td>\n<\/tr>\n<tr>\n<td>29<\/td>\n<td width=\"396\">Portable Community oriented Health Monitoring<\/td>\n<\/tr>\n<tr>\n<td>30<\/td>\n<td width=\"396\">Personal Shopping Assistant<\/td>\n<\/tr>\n<tr>\n<td>31<\/td>\n<td width=\"396\">Drip Irrigation Control System Using Ordering &amp; GSM Modem<\/td>\n<\/tr>\n<tr>\n<td>32<\/td>\n<td width=\"396\">Genetic Algorithms Based Course Scheduling<\/td>\n<\/tr>\n<tr>\n<td>33<\/td>\n<td width=\"396\">Emergency Search and Rescue System<\/td>\n<\/tr>\n<tr>\n<td>34<\/td>\n<td width=\"396\">An Entity Recognition Frame Work For Data Mining Techniques<\/td>\n<\/tr>\n<tr>\n<td>35<\/td>\n<td width=\"396\">CHOIZ<\/td>\n<\/tr>\n<tr>\n<td>36<\/td>\n<td width=\"396\">Development of User Friendly Tool for the Analysis of Visualition of Multisource &amp; Multi Scale Data<\/td>\n<\/tr>\n<tr>\n<td>37<\/td>\n<td width=\"396\">Advanced Hostel Attendance Management Systems<\/td>\n<\/tr>\n<tr>\n<td>38<\/td>\n<td width=\"396\">Performance Analysis of Mobility Management Approaches for Mobile IP Networks<\/td>\n<\/tr>\n<tr>\n<td>39<\/td>\n<td width=\"396\">An Effective Network Monitoring Tool for Distributed<\/td>\n<\/tr>\n<tr>\n<td>40<\/td>\n<td width=\"396\">Virtual Classroom System<\/td>\n<\/tr>\n<tr>\n<td>41<\/td>\n<td width=\"396\">Online Voting App<\/td>\n<\/tr>\n<tr>\n<td>42<\/td>\n<td width=\"396\">Energy saving Home Automation<\/td>\n<\/tr>\n<tr>\n<td>43<\/td>\n<td width=\"396\">Mobile Health Care<\/td>\n<\/tr>\n<tr>\n<td>44<\/td>\n<td width=\"396\">Android Based E-Notice using Web Application<\/td>\n<\/tr>\n<tr>\n<td>45<\/td>\n<td width=\"396\">Access Control Model in Electronic Health Record Using Steganographic &amp; Visual Cryptographic\u00a0 Approach<\/td>\n<\/tr>\n<tr>\n<td>46<\/td>\n<td width=\"396\">Decision Support System for Weather Forecasting<\/td>\n<\/tr>\n<tr>\n<td>47<\/td>\n<td width=\"396\">Take Care-An IOT Based Smart Bike<\/td>\n<\/tr>\n<tr>\n<td>48<\/td>\n<td width=\"396\">Estimation of Betel Leaf Area Through Image Processing Technique<\/td>\n<\/tr>\n<tr>\n<td>49<\/td>\n<td width=\"396\">Drowsiness Detection Using Open CV<\/td>\n<\/tr>\n<tr>\n<td>50<\/td>\n<td width=\"396\">Smart Elevator System Based on Wireless Sensor Networks<\/td>\n<\/tr>\n<tr>\n<td>51<\/td>\n<td width=\"396\">Detection of Brain Tumor through MRI images using MATLAB<\/td>\n<\/tr>\n<tr>\n<td>52<\/td>\n<td width=\"396\">Android Based Home Door lock Application Via Wi-Fi for Disabled People<\/td>\n<\/tr>\n<tr>\n<td>53<\/td>\n<td width=\"396\">Study and Analysis of Security Algorithms in Smart Grid Applications<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">Batch: 2013-17<\/td>\n<\/tr>\n<tr>\n<td>54<\/td>\n<td width=\"396\">Analyzing the Brain MRI Images using Serial &amp; Parallel Processing<\/td>\n<\/tr>\n<tr>\n<td>55<\/td>\n<td width=\"396\">IOT Based Smart Wrist Band for Seniour Citizen<\/td>\n<\/tr>\n<tr>\n<td>56<\/td>\n<td width=\"396\">Securing the Data in Cloud using\u00a0 Alegebra Homomorphic Encryption Scheme Based on Updated Elgamal(AHEE)<\/td>\n<\/tr>\n<tr>\n<td>57<\/td>\n<td width=\"396\">Fingerprint Based Hall Ticket System for Students<\/td>\n<\/tr>\n<tr>\n<td>58<\/td>\n<td width=\"396\">Administration of Systems in a Network Using Cell Phone<\/td>\n<\/tr>\n<tr>\n<td>59<\/td>\n<td width=\"396\">Lung Cancer Detection Using Image Processing<\/td>\n<\/tr>\n<tr>\n<td>60<\/td>\n<td width=\"396\">An Effective Antiphishing Framework for Secure Transmission Using Visual Cryptography Techniques<\/td>\n<\/tr>\n<tr>\n<td>61<\/td>\n<td width=\"396\">Track Me<\/td>\n<\/tr>\n<tr>\n<td>62<\/td>\n<td width=\"396\">Decission Supporting System for Student Placement<\/td>\n<\/tr>\n<tr>\n<td>63<\/td>\n<td width=\"396\">Design &amp; Implementation of telemedicine Monitoring System<\/td>\n<\/tr>\n<tr>\n<td>64<\/td>\n<td width=\"396\">Suraksha , Women Safety Device &amp; App<\/td>\n<\/tr>\n<tr>\n<td>65<\/td>\n<td width=\"396\">Audio and Video Speech Processing<\/td>\n<\/tr>\n<tr>\n<td>66<\/td>\n<td width=\"396\">Campus Navigation System<\/td>\n<\/tr>\n<tr>\n<td>67<\/td>\n<td width=\"396\">Mobile Augmented Reality Learning System<\/td>\n<\/tr>\n<tr>\n<td>68<\/td>\n<td width=\"396\">Offline E-Cash Systems<\/td>\n<\/tr>\n<tr>\n<td>69<\/td>\n<td width=\"396\">IOT Based Vehicle Accident Analysis System<\/td>\n<\/tr>\n<tr>\n<td>70<\/td>\n<td width=\"396\">Smart Wheels<\/td>\n<\/tr>\n<tr>\n<td>71<\/td>\n<td width=\"396\">Enhancing RFID Security and Privacy during Money Transaction<\/td>\n<\/tr>\n<tr>\n<td>72<\/td>\n<td width=\"396\">Li-Fi Based Patient Monitoring System<\/td>\n<\/tr>\n<tr>\n<td>73<\/td>\n<td width=\"396\">Computerized Field Monitoring Using Remote Sensing (CFM)<\/td>\n<\/tr>\n<tr>\n<td>74<\/td>\n<td width=\"396\">Academic Planning and Scheduling System<\/td>\n<\/tr>\n<tr>\n<td>75<\/td>\n<td width=\"396\">Agri-Copter<\/td>\n<\/tr>\n<tr>\n<td>76<\/td>\n<td width=\"396\">Algorithms in Steganography Using Weighted &amp; Matching Techniques<\/td>\n<\/tr>\n<tr>\n<td>77<\/td>\n<td width=\"396\">Voice Based Email System for Blind<\/td>\n<\/tr>\n<tr>\n<td>78<\/td>\n<td width=\"396\">Student Momentum<\/td>\n<\/tr>\n<tr>\n<td>79<\/td>\n<td width=\"396\">Diabitic Foot Ulcer Detection Using Android Application<\/td>\n<\/tr>\n<tr>\n<td>80<\/td>\n<td width=\"396\">Cheque Deposition Using Image Processing.<\/td>\n<\/tr>\n<tr>\n<td>81<\/td>\n<td width=\"396\">Stranded In The Dark<\/td>\n<\/tr>\n<tr>\n<td>82<\/td>\n<td width=\"396\">Secured Image File Transfer By Automatic Self Poisoning.<\/td>\n<\/tr>\n<tr>\n<td>83<\/td>\n<td width=\"396\">Libkart<\/td>\n<\/tr>\n<tr>\n<td>84<\/td>\n<td width=\"396\">Text Summarization Using Graph Based Algorithm<\/td>\n<\/tr>\n<tr>\n<td>85<\/td>\n<td width=\"396\">Peer to Peer File Sharing System Through Webrtc.<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">Batch: 2014-18<\/td>\n<\/tr>\n<tr>\n<td>86<\/td>\n<td width=\"396\">VIZOR 360<\/td>\n<\/tr>\n<tr>\n<td>87<\/td>\n<td width=\"396\">SUAREZ -Smart Jacket for Soldiers<\/td>\n<\/tr>\n<tr>\n<td>88<\/td>\n<td width=\"396\">Vission Based Human Computer Interaction For Movement Impaired People<\/td>\n<\/tr>\n<tr>\n<td>89<\/td>\n<td width=\"396\">Medicare\u00a0 A\u00a0 Medical\u00a0 Assistant<\/td>\n<\/tr>\n<tr>\n<td>90<\/td>\n<td width=\"396\">Automated Fire Detection using Image Processing<\/td>\n<\/tr>\n<tr>\n<td>91<\/td>\n<td width=\"396\">Automated Stench Analyser For Smart Cities<\/td>\n<\/tr>\n<tr>\n<td>92<\/td>\n<td width=\"396\">ARISTA<\/td>\n<\/tr>\n<tr>\n<td>93<\/td>\n<td width=\"396\">An Efficient Algorithms for Fruit Ripeness Detection<\/td>\n<\/tr>\n<tr>\n<td>94<\/td>\n<td width=\"396\">Secure Data Retrieval for Decentralized Discruption Tolerant Militory Networks<\/td>\n<\/tr>\n<tr>\n<td>95<\/td>\n<td width=\"396\">Implementing a Secured\u00a0 Architecture in Smart Grid Technology<\/td>\n<\/tr>\n<tr>\n<td>96<\/td>\n<td width=\"396\">VIRTUAL Mouse<\/td>\n<\/tr>\n<tr>\n<td>97<\/td>\n<td width=\"396\">Keep Me Safe<\/td>\n<\/tr>\n<tr>\n<td>98<\/td>\n<td width=\"396\">Kisaan Unnathi An Agro Connect<\/td>\n<\/tr>\n<tr>\n<td>99<\/td>\n<td width=\"396\">Smart Camera<\/td>\n<\/tr>\n<tr>\n<td>100<\/td>\n<td width=\"396\">Perception of Diverse Account Specification in Social Networking<\/td>\n<\/tr>\n<tr>\n<td>101<\/td>\n<td width=\"396\">Network Traff Data Analysis Using Hadoop<\/td>\n<\/tr>\n<tr>\n<td>102<\/td>\n<td width=\"396\">Track Way<\/td>\n<\/tr>\n<tr>\n<td>103<\/td>\n<td width=\"396\">Biometric Authentication for Transaction Deprived of Card<\/td>\n<\/tr>\n<tr>\n<td>104<\/td>\n<td width=\"396\">Parallel Detection of Weeds &amp; Diseases in Paddy<\/td>\n<\/tr>\n<tr>\n<td>105<\/td>\n<td width=\"396\">Project Portal<\/td>\n<\/tr>\n<tr>\n<td>106<\/td>\n<td width=\"396\">Mobility Aid For Blind &amp; Old People<\/td>\n<\/tr>\n<tr>\n<td>107<\/td>\n<td width=\"396\">Passenger Announcement System in Railway Station<\/td>\n<\/tr>\n<tr>\n<td>108<\/td>\n<td width=\"396\">Real Time Indoor Navigation For Fire Fighters Using Android\u00a0 Application<\/td>\n<\/tr>\n<tr>\n<td>109<\/td>\n<td width=\"396\">Implimentation of DCT Steganography Using the Combination of Compression &amp; Encryption Technique<\/td>\n<\/tr>\n<tr>\n<td>110<\/td>\n<td width=\"396\">E-Commerce Data Analysis Using Hadoop<\/td>\n<\/tr>\n<tr>\n<td>111<\/td>\n<td width=\"396\">IOT Based Dynamic M2M Healthcare &amp; Disaster Management<\/td>\n<\/tr>\n<tr>\n<td>112<\/td>\n<td width=\"396\">OTP Based Security For ATMs<\/td>\n<\/tr>\n<tr>\n<td>113<\/td>\n<td width=\"396\">Park Me-Online Parking Assistant<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Sl. No. Title 1 SLA\u00a0 Driven Management of Web Applications 2 Stegnography For Hiding Data In WavAudio File. 3 Privacy Preserving Technique in Wireless Sensor Networks 4 Automatic Vision Based\u00a0 Inspection System Using Raspberry\u00a0 PI 5 Cloud Computing Security from Single to Multiclouds 6 Negotiation Scheme for Trust Management 7 Get Connected 8 Authentication Smart<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16835","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/posts\/16835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/comments?post=16835"}],"version-history":[{"count":3,"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/posts\/16835\/revisions"}],"predecessor-version":[{"id":16840,"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/posts\/16835\/revisions\/16840"}],"wp:attachment":[{"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/media?parent=16835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/categories?post=16835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sode-edu.in\/smvitm\/wp-json\/wp\/v2\/tags?post=16835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}