33
IMPULSE TECHNOLOGIES Contact: 98401 03301, 98410 91117. Mail: [email protected] www.impulse.net.in Your Ideas can be implemented. Any project better pricing with Up gradation being done. 1 E E E M M M B B B E E E D D D D D D E E E D D D V V V E E E H H H I I I C C C U U U L L L A A A R R R P P P R R R O O O J J J E E E C C C T T T S S S Sno Code PROJECT NAME DESCRIPTION YEAR 1 EVP01 The Conceptual Design of New Bus Stop Board By the new bus stop board, passengers could obtain not only the information of the bus line and information of lines in one station, but also important bus-stations, passenger transport hubs, geographical position information and so on. 2009 2 EVP02 T Th he e T Ti i r re e B Bu ur rs s t t o of f A Au ut t o o m mo o t t i i v ve e E Ea ar r l l y y- - W Wa a r rn ni i n ng g System Design (or) Tire Pressure Monitoring System Based on Wireless Sensor Networks Technology In this paper, the anti-flat tire design process is divided into two parts: the tire module and the host module. The micro-controller MC68HC908RF2 is the core of the tire module. The integrated sensor MPXY8020A executes tire pressure and temperature measuring. The transmitter integrated inside the micro-controller executes wireless transmittal task. MC33594 executes wireless receive task in the host module which adopts LED and sound-light warning. 2009 3 EVP03 T Th he e I I n nt t e e g g r ra at t e e d d C Co o n nt t r ro o l l o of f A An nt t i i - - l l o o c c k k B Br r e e a a k ki i n ng g System and Active Suspension in Vehicle This paper investigates the integrated control of anti- lock breaking system(ABS) and active suspension in vehicle 2009 4 EVP04 S SP PA AR RK K : : s s m ma a r rt t p pa a r r k ki i n ng g s sy y s s t t e e m m u us si i n ng g wireless sensor networks This paper proposes a parking management system based on wireless sensor network technology which provides advanced features like remote parking monitoring, automated guidance & parking reservation mechanism via mobile 2009 5 EVP05 Adaptive Traffic Monitoring and Controlling System ATMC is a cheap, automatic and practical traffic monitoring and controlling system which requires no human supervision at all. 2009 5. 1 EVP00 6 A low cost real-time communication system of locomotive based on GPS In this paper we propose a mobile communication solution of real-time operating data for moving locomotive without the railway GSM(GSM-R) 2009 6 EVP06 Tactile and Multisensory Spatial Warning Signals for Drivers Driver vigilance Monitoring & driver alert using Vibratory sensors 2008 7 EVP07 High Positioned Brake Reminder System Based on CAN Bus we adopt the dot matrix display technology and the vehicle high positioned brake reminder technology based on CAN bus, In order to reduce the vehicle rear collisions and the damage degrees on passengers. 2009 8 EVP08 Fuzzy logic based integrated control of Anti- lock Brake System and Collision Avoidance A CAN based braking system 2009

main embedded + software

Embed Size (px)

Citation preview

Page 1: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 1

EEEEEEEEEEEEMMMMMMMMMMMMBBBBBBBBBBBBEEEEEEEEEEEEDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEEEDDDDDDDDDDDD VVVVVVVVVVVVEEEEEEEEEEEEHHHHHHHHHHHHIIIIIIIIIIIICCCCCCCCCCCCUUUUUUUUUUUULLLLLLLLLLLLAAAAAAAAAAAARRRRRRRRRRRR PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS Sno

Code PROJECT NAME DESCRIPTION YEAR

1 EVP01 TThhee CCoonncceeppttuuaall DDeessiiggnn ooff NNeeww BBuuss SSttoopp

BBooaarr dd

By the new bus stop board, passengers could obtain

not only the information of the bus line and

information of lines in one station, but also important

bus-stations, passenger transport hubs, geographical

position information and so on.

2009

2 EVP02 TThhee TT ii rr ee BBuurr sstt ooff AAuuttoommoott iivvee EEaarr llyy--WWaarr nniinngg

SSyysstteemm DDeessiiggnn ((oorr ))

TTii rr ee PPrr eessssuurree MM oonnii ttoorr iinngg SSyysstteemm BBaasseedd oonn

WWiirr eelleessss SSeennssoorr NNeettwwoorr kkss TTeecchhnnoollooggyy

In this paper, the anti-flat tire design process is divided

into two parts: the tire module and the host module.

The micro-controller MC68HC908RF2 is the core of

the tire module. The integrated sensor MPXY8020A

executes tire pressure and temperature measuring. The

transmitter integrated inside the micro-controller

executes wireless transmittal task. MC33594 executes

wireless receive task in the host module which adopts

LED and sound-light warning.

2009

3 EVP03 TThhee II nntteeggrr aatteedd CCoonnttrr ooll ooff AAnntt ii --lloocckk BBrr eeaakkiinngg

SSyysstteemm aanndd AAcctt iivvee SSuussppeennssiioonn iinn VVeehhiiccllee

This paper investigates the integrated control of anti-

lock breaking system(ABS) and active suspension in

vehicle

2009

4 EVP04 SSPPAARRKK :: ssmmaarr tt ppaarr kkiinngg ssyysstteemm uussiinngg

wwiirr eelleessss sseennssoorr nneettwwoorr kkss

This paper proposes a parking management system

based on wireless sensor network technology which

provides advanced features like remote parking

monitoring, automated guidance & parking reservation

mechanism via mobile

2009

5 EVP05 AAddaapptt ii vvee TTrr aaffff iicc MM oonnii ttoorr iinngg aanndd CCoonnttrr ooll ll iinngg

SSyysstteemm

ATMC is a cheap, automatic and practical traffic

monitoring and controlling system which requires no

human supervision at all.

2009

5.

1

EVP00

6

AA llooww ccoosstt rr eeaall--tt iimmee ccoommmmuunniiccaatt iioonn ssyysstteemm

ooff llooccoommoott iivvee bbaasseedd oonn GGPPSS

In this paper we propose a mobile communication

solution of real-time operating data for moving

locomotive without the railway GSM(GSM-R)

2009

6 EVP06 TTaacctt ii llee aanndd MM uull tt iisseennssoorr yy SSppaatt iiaall

WWaarr nniinngg SSiiggnnaallss ffoorr DDrr iivveerr ss

Driver vigilance Monitoring & driver alert using

Vibratory sensors

2008

7 EVP07 High Positioned Brake Reminder System

Based on CAN Bus

we adopt the dot matrix display technology and the

vehicle high positioned brake reminder technology

based on CAN bus, In order to reduce the vehicle rear

collisions and the damage degrees on passengers.

2009

8 EVP08 FFuuzzzzyy llooggiicc bbaasseedd iinntteeggrr aatteedd ccoonnttrr ooll ooff AAnntt ii --

lloocckk BBrr aakkee SSyysstteemm aanndd CCooll ll iissiioonn AAvvooiiddaannccee

A CAN based braking system 2009

Page 2: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 2

SSyysstteemm uussiinngg CCAANN ffoorr eelleecctt rr iicc vveehhiicclleess

9 EVP09 CCooooppeerr aatt iivvee ccoommmmuunniiccaatt iioonnss bbeettwweeeenn

vveehhiicclleess aanndd iinntteell ll iiggeenntt rr ooaadd ssiiggnnss

A Communicative technology between vehicles and

road signs.

2009

10 EVP10 AAnntt ii ccooll ll iissiioonn DDiiggii ttaall AAcccciiddeenntt PPrr eevveenntteerr ffoorr

TTrr aaiinn

This project deals with reduction of accidents in

railways.

11 EVP11 RReeaall --TTiimmee MM oonnii ttoorr iinngg aanndd PPrr ee--aallaarr mm

SSyysstteemm ffoorr DDaannggeerr oouuss MM oouunnttaaiinnss iinn tthhee

RRaaii llwwaayy LL iinnee

There appear frequently natural phenomena such as

collapse, landslide along the railway line, which badly

threaten the transport safety of the railway. This

system adopts the method of auto-monitoring; the

content is the earth's surface deformation.

2009

12 EVP12 WWSSNN bbaasseedd mmooddeell ffoorr sseeccuurr ee rr aaii llwwaayy

ooppeerr aatt iioonnss

This study introduces the basic modules which

constitute the railway crossing surveillance and

warning system.

2009

13 EVP13 II nntteeggrr aatt iinngg AAuuttoommaatt iicc VVeerr ii ff iiccaatt iioonn ooff

SSaaffeettyy RReeqquuii rr eemmeennttss iinn RRaaii llwwaayy

II nntteerr lloocckkiinngg SSyysstteemm

This is automatic train following mechanism for

electric trains.

2001

14 EVP14 TTrr aaiinn ssttaatt iioonn aannnnoouunncceemmeenntt bbaasseedd oonn

WWiirr eelleessss SSeennssoorr nneettwwoorr kk

A project designed for announcing the station

beforehand a train stops.

15 EVP15 BBuuss aannnnuunncciiaatt iioonn ssyysstteemm ffoorr BBll iinndd This is a wireless bus announcement system for

visually handicapped.

16 EVP16 II nntteell ll iiggeenntt hhiigghhwwaayy AAcccciiddeenntt pprr eevveenntteerr

On a survey it was found that on an average out of 100

accidents in bye pass roads 85% accidents leads to

death. This is an attempt to make a device to minimize

the accidents.

2008

17 EVP17 WWiirr eelleessss SSeennssoorr NNeettwwoorr kk bbaasseedd vveehhiiccuullaarr

TThheeff tt iiddeenntt ii ff iiccaatt iioonn

Identifies vehicle theft and informs to the owner. 2009

18 EVP18 VVeehhiiccllee PPooll lluutt iioonn cchheecckk && TTrr aacckkiinngg ssyysstteemm.. This project is aimed to track the vehicles which are

generating more smoke which causes air pollution

2009

19 EVP19 DDeevveellooppmmeenntt ooff VViissiioonn bbaasseedd CCoonnttrr ooll

SSmmaarr tt WWiinnddsshhiieelldd WWiippeerr SSyysstteemm ffoorr

II nntteell ll iiggeenntt VVeehhiiccllee

This paper presents the development of vision-based

smart windshield wiper system that can automatically

adjust its speed and intermittent interval according to

the amount of water drops on the windshield.

2009

20 EVP20 PPGGSS :: ppaarr kkiinngg GGuuiiddaannccee SSyysstteemm bbaasseedd oonn

wwiirr eelleessss SSeennssoorr nneettwwoorr kkss

A fully embedded Parking guidance system 2008

21 EVP21 WWiirr eelleessss SSeennssoorr NNeettwwoorr kk bbaasseedd DDrr iivveerr

GGuuiiddaannccee SSyysstteemm ((DDGGSS))

We present DGS, a Driving Guidance System based on

wireless sensor networks (WSN) which guides a driver

to drive a car in safety.

2008

22 EVP22 TTaacctt ii llee aanndd MM uull tt iisseennssoorr yy SSppaatt iiaall WWaarr nniinngg

SSiiggnnaallss ffoorr DDrr iivveerr ss

This review highlights the most important potential

costs and benefits associated with the use of tactile and

multisensory information displays in a vehicle.

2009

Page 3: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 3

23 EVP23 FFaabbrr iiccaatt iioonn ooff AAuuttoo--BBrr aakkiinngg SSyysstteemm ffoorr

PPrree--ccrr aasshh SSaaffeettyy UUssiinngg SSeennssoorr

This module can detect the distance between front

vehicle and your vehicle to keep a constant distance

using a sensor and operate the brake system forcibly if

the driver does not decrease the speed. The system

displays the distance between the vehicles and the

speed of vehicle.

2009

24 EVP24 SSyysstteemm oonn CChhiipp DDeessiiggnn ooff EEmmbbeeddddeedd

CCoonnttrr ooll lleerr ffoorr CCaarr BBllaacckk BBooxx

A Embedded vehicle black box for secret maintenance

of data even in case of emergency

2007

25 EVP25 DDeevveellooppmmeenntt ooff DDiiggii ttaall VVeehhiiccllee DDiissttaannccee

MM oonnii ttoorr iinngg SSyysstteemm

The main orientation of this paper is specifically

focused on the accident. The development of the tool

could help driver get a sense of how far the car is from

an object either it is in front or behind the car.

26 EVP26 RReesseeaarr cchh aanndd DDeevveellooppmmeenntt ooff II nntteell ll iiggeenntt

DDiissppllaayy UUnnii tt ffoorr MM eettrr oo TTrraaiinn

Intelligent Display Unit integrates metro data

recording and train system management, and running

software that can generate the graphics based on

analyze of incoming onboard equipment data

27 EVP27 AA FFaasstt MM eetthhoodd FFoorr DDiissccoovveerr iinngg VVeehhiiccllee

LL iicceennssee PPllaattee FFrr oomm II mmaaggee WWiitthh CCoommppll iiccaatteedd

BBaacckkggrr oouunndd

The paper proposed a fast method on discovering

vehicle license plate position in image with very

complicated background and bad shooting condition

28 EVP28 AA VVeehhiiccllee DDiissppaattcchh SSyysstteemm MM ooddeell bbaasseedd oonn

WWeeaatthheerr aanndd RRooaadd CCoonnddii tt iioonn

in this paper we presented a system prototype which

can gather weather and road condition and use these

information to help dispatch vehicles to improve safety

of transportation.

29 EVP29 AAuuttoommaatt iicc NNuummbbeerr PPllaattee RReeccooggnnii tt iioonn ssyysstteemm

ffoorr VVeehhiiccllee II ddeenntt ii ff iiccaatt iioonn uussiinngg OOpptt iiccaall

CChhaarr aacctteerr RReeccooggnnii tt iioonn

The objective is to design an efficient automatic

authorized vehicle identification system by using the

vehicle number plate. The system is implemented on

the entrance for security control of a highly restricted

area like military zones or area around top government

offices e.g. Parliament, Supreme Court etc.

30 EVP30 DDeessiiggnn ooff EElleecctt rr oonniicc TTooll ll CCooll lleecctt iioonn SSyysstteemm

iinn EExxpprr eesssswwaayy BBaasseedd oonn RRFFII DD

A kind of radio frequency chip, nRF9E5, was adopted

to design electronic toll collection system of

expressway. Structural & process designs were made,

in addition, a new RFID authentication protocol model

was used to guarantee system security.

Page 4: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 4

EEEEEEEEEEEEMMMMMMMMMMMMBBBBBBBBBBBBEEEEEEEEEEEEDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEEEDDDDDDDDDDDD IIIIIIIIIIIINNNNNNNNNNNNNNNNNNNNNNNNOOOOOOOOOOOOVVVVVVVVVVVVAAAAAAAAAAAATTTTTTTTTTTTIIIIIIIIIIIIVVVVVVVVVVVVEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS 1. EIP01 HHaanndd ttaallkk AAssssiisstt iivvee tteecchhnnoollooggyy ffoorr tthhee DDeeaaff This article presents Hand Talk, a "smart glove" that

can recognize basic hand gestures and convert them

into speech using low-cost, commercial off-the-shelf

(COTS) components.

2008

2. EIP02 AAnn II nnnnoovvaatt iivvee BBrr aaii ll llee SSyysstteemm KK eeyybbooaarr dd ffoorr tthhee VViissuuaall ll yy II mmppaaii rr eedd

A keyboard is specially designed and constructed to

provide easy typing technology for the visually

impaired

2009

3. EIP03 VViibbrr aatt iioonn aass aa wwaayy ff iinnddiinngg aaiidd ((oorr )) AA ttaaccttii llee

SSyysstteemm ffoorr IInnffoorrmmiinngg tthhee BBll iinndd oonn DDii rreeccttiioonn ooff

aa WWaallkk

We present our work on a “vibrating belt”, a belt of

motors that can be used as an orientation aid.

2009

4. EIP04 BBlluueettooootthh EEnnaabblleedd MM oobbii llee PPhhoonnee RReemmoottee CCoonnttrr ooll ffoorr PPCC

This work confers an application which makes

possible to use a Bluetooth enabled mobile phone to

remote control home appliances such electric fan,

LEDs and stepper motor, connected to the personal

computer.

2009

5. EIP 05 TThhee DDeevveellooppmmeenntt ooff RRooaadd LL iigghhtt iinngg II nntteell ll iiggeenntt CCoonnttrr ooll SSyysstteemm BBaasseedd oonn WWiirr eelleessss NNeettwwoorr kk CCoonnttrr ooll

In this paper, to reach the purpose of energy saving,

it introduces an information method to deal with the

problem of road lighting.

2009

6. EIP 06 TThhrr eeee wwaayy cchhaall lleennggee rr eessppoonnssee aauutthheenntt iiccaatt iioonn iinn ssmmaarr tt ccaarr dd uussiinngg EEll ll iipptt iicc ccuurr vvee ccrr yyppttoossyysstteemm

The goal of this paper is to create authentication data

between card and device using encryption algorithms

key pair and pseudo- random number generation

2009

7. EIP07 AA VVeerr ii ff iiaabbllee EElleecctt rr oonniicc VVoott iinngg SScchheemmee OOvveerr tthhee II nntteerr nneett

We propose an electronic voting protocol that satisfy

all security requirements and allow the voter to verify

whether the cast ballot has been counted correctly or

not, and further, it will not encourage ballot buying.

2009

8. EIP08 SSeeccuurr ii ttyy MM aannaaggeemmeenntt SSyysstteemm ffoorr OOii ll ff iieelldd BBaasseedd oonn EEmmbbeeddddeedd WWiirr eelleessss CCoommmmuunniiccaatt iioonn

The first level is consist of some remote controllers

and a launcher ,which include wireless burglar alarm,

fault alarm, power-off alarm, self-checking alarm and

wireless night patrol point.

2009

9. EIP09 TTssuunnaammii WWaarr nniinngg SSyysstteemm uussiinngg AArr eeaa MM aaii ll DDiissaasstteerr II nnffoorr mmaatt iioonn SSeerr vviiccee oonn PPhhoonneess

Tsunami warning system with Mobile phones 2009

10. EIP10 SSeeccuurr ee TThhrr eeee--DDiimmeennssiioonnaall PPaasssswwoorr dd ffoorr MM oorr ee AAuutthheenntt iiccaatt iioonn ((II && mm))

A password system for Atm cards using Image

processing

2008

11. EIP11 AA RReemmoottee--CCoonnttrr ooll EEnnggiinneeeerr iinngg LL aabboorr aattoorr yy A remote Location authorization using Steganography 2008

12. EIP13 AAnn AAuuttoommaatt iicc VVooiiccee QQuueerr yy SSyysstteemm ffoorr BBaannkk BBaasseedd oonn TTeelleepphhoonnee NNeettwwoorr kk

A voice based Bank querying application 2008

13. EIP14 UUlltt rr aa LL ooww ppoowweerr WWiirr eelleessss WWeeaatthheerr SSttaatt iioonn A low power Environmental monitoring system 2007

Page 5: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 5

14. EIP16 TTeemmppeerr aattuurr ee CCoonnttrr ooll uussiinngg SSMM SS A mobile phone based Temperature controller 2006

15. EIP17 PPHH NNeeuuttrr aall iizzaatt iioonn tthhrr oouugghh II nntteerr nneett Flow control via internet 2006

16. EIP18 RReemmoottee TTaarr ggeett MM oonnii ttoorr iinngg iinn EEmmbbeeddddeedd SSyysstteemmss LL aabb CCoouurr sseess uussiinngg aa SSeennssoorr NNeettwwoorr kk

A remote Embedded Lab via a internet 2008

17. EIP19 AA WWiirr eelleessss VVeennddiinngg MM aacchhiinnee SSyysstteemm BBaasseedd oonn GGSSMM

A Novel petrol vending system via Pc with Card

recharging

2008

18. EIP20 DDeessiiggnn ooff aa rr eeaall --tt iimmee vviissii ttoorr ccoonnvveerr ssaatt iioonn && ddoooorr ccoonntt rr ooll aarr cchhii tteeccttuurr ee uussiinngg aa hhoommee ggaatteewwaayy

A Innovative House Guarding System 2008

19. EIP21 EE--SSeeccuurr ii ttyy SSyysstteemm wwii tthh VViiddeeoo CCaappttuurr ee oopptt iioonn

Miscellaneous Email threat finder NON

IEEE

20. EIP22 EEmmbbeeddddeedd BBiioo SSeennssoorr eedd EElleecctt rr iiccaall AAppppll iiccaatt iioonn AAcctt ii vvaattoorr CCuumm EEnneerr ggyy SSaavveerr

Super resolution energy saver for Houses NON

IEEE

EEEEEEEEEEEEMMMMMMMMMMMMBBBBBBBBBBBBEEEEEEEEEEEEDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEEEDDDDDDDDDDDD RRRRRRRRRRRROOOOOOOOOOOOBBBBBBBBBBBBOOOOOOOOOOOOTTTTTTTTTTTTIIIIIIIIIIIICCCCCCCCCCCC PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS 01 ERO01 CCooooppeerr aatt iivvee ddeecciissiioonn--mmaakkiinngg aanndd mmuull tt ii --

ttaarr ggeett aatt ttaacckk uussiinngg mmuull tt iippllee sseenntt rr yy gguunnss

This paper focuses on the development of a

methodology by which multiple sentry guns can

effectively engage and destroy multiple targets in a

coordinated attack.

2009

02 ERO02 DDeessiiggnn ooff tthhee oopptt iimmaall ppaatthh aallggoorr ii tthhmm ffoorr

LL iinnee tt rr aacckk RRoobboottss

The algorithm design has some certain significance for

the line track optimization of robots and the autopilot

of vehicles

2009

03 ERO03 RRoobboott--AArr mm PPiicckk aanndd PPllaaccee BBeehhaavviioorr

PPrr ooggrr aammmmiinngg SSyysstteemm UUssiinngg VViissuuaall

PPeerr cceepptt iioonn

this paper presents a programming robot-arm system

for carrying out flexible pick and place behavior using

visual perception

04 ERO04 NNaavviiggaatt iioonn ooff mmoobbii llee rr oobboott uussiinngg GGPPSS &&

oobbssttaaccllee aavvooiiddaannccee ssyysstteemm wwii tthh ccoommmmaannddeedd

lloooopp

In this project, a mobile robot is equipped with GPS

navigation system and obstacle avoidance system with

low cost mobile structure, GPS module and IR sensors

for obstacle detection.

05 ERO05 AAnn II nntteell ll iiggeenntt WWhheeeellcchhaaiirr ttoo eennaabbllee mmoobbii ll ii ttyy

ooff sseevveerr eellyy ddiissaabblleedd

These robot co-ordinates head movements into motion. 2009

06 ERO06 II nnddoooorr aauuttoonnoommoouuss nnaavviiggaatt iioonn ooff bbll iinndd

ppeerr ssoonnss uussiinngg RRFFII DD sseennssiinngg rr oobboottss

The aim of this project is to help blind people to

identify different places available in his locality.

2009

07 ERO07 VVooiiccee ccoonntt rr ooll lleedd wwhheeeell cchhaaii rr The theme is implemented for the parallelized persons

by voice activated wheelchair through speech

processing

2009

Page 6: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 6

08 ERO08 II wwaallkkeerr wwii tthh II nndduusstt rr iiaall ccoonntt rr ooll aarr mm A Rfid based robot with wireless and Material

Handling Techniques

09 ERO09 RReesseeaarr cchh ooff MM eecchhaanniiccaall AArr mm CCoonnttrr ooll BBaasseedd

oonn DDaattaa GGlloovvee

The operator controls the robot directly by computer,

wearing data glove and computer Generates virtual

scene to assist operation.

2008

10

.

ERO10 AAuuttoommaatteedd VVeehhiicclleess FFoorr PPhhyyssiiccaall llyy aanndd

VViissuuaall llyy CChhaall lleennggeedd

In this context we have developed a mechanism of

fuzzy logic which reduces the accidents and also helps

for physically/visually challenged persons.

2008

11 ERO11 CCooaall MM iinnee DDeetteecctt && rr eessccuuee RRoobboott DDeessiiggnn &&

rr eesseeaarr cchh

It can go into explosion environment and detect gas

content, temperature, etc. The data can send to control

man in safe field.

2008

12 ERO12 RRoobboott ii cc AArr mm wwii tthh FFoouurr DDeeggrr eeeess ooff FFrr eeeeddoomm The paper presents the details of construction of a

Robotic arm with four degrees of freedom.

2008

13 ERO13 VViissuuaall sseerr vvoo ccoonnttrr ooll ooff aa TThhrr eeee ddeeggrr eeee ooff

ff rr eeeeddoomm rr oobboott iicc AARRMM ssyysstteemm

It is presently a direction to be integrated with the

unmanned Ground vehicle (UGV) to serve as

surveillance unit in the combat hot zone, such as peace

keeping mission.

2008

14 ERO14 DDeessiiggnn aanndd iimmpplleemmeennttaatt iioonn ooff ssttaaiirr --

CCll iimmbbiinngg RRoobboott

a robot is designed to move up and down stairs to

provide service for the elders.

2008

15 ERO15 AA NNeeww mmeetthhoodd ooff iinnffrr aarr eedd sseennssoorr

mmeeaassuurr eemmeenntt ffoorr mmiiccrr oo mmoouussee ccoonntt rr ooll ttoo

ddeell iivveerr ddrr uuggss

In this project a tiny robot model is designed in order

to find the path in a puzzle and to reach the center of

the puzzle avoiding the obstacles. The IR Proximity

sensor is used to detect the obstacle.

2008

16 ERO16 DDeevveellooppmmeenntt ooff aa mmoodduullee bbaasseedd ppllaattffoorr mm ffoorr

mmoobbii llee rr oobboottss

We designed a master slave based robotic instrument

which can work as directed by the I2C Master.

2008

17 ERO17 DDeevveelloopp aa MM uull tt iippllee II nntteerr ffaaccee BBaasseedd FFiirr ee

FFiigghhtt iinngg RRoobboott

An autonomous fire detect and rescue robot 2007

18 ERO18 HHiigghhllyy VViiggii llaanntt FFllyyiinngg RRoobboott This is an aerial helicopter with Image Capturer

19 ERO19 DDeessiiggnn && II mmpplleemmeennttaatt iioonn ooff aann AAddvvaanncceedd

VViissuuaall GGuuiiddeedd RRoobboott

Robot movements using Facial features

20 ERO20 FFuuzzzzyy CCoonnttrr ooll ffoorr AAuuttoommaatt iicc SStteeeerr iinngg aanndd

LL iinnee TTrr aacckkiinngg ooff RRoobboott

In order to realize automatic navigation for agricultural

robot, a fuzzy control method for automatic steering

and a method for line tracking are conveyed.

21 ERO21 RRoobbooSShhoooott :: AAnn AAuuttoommaatt iicc SSyysstteemm ffoorr

AAccccuurr aattee SShhoooott iinngg

This is a shooting robot designed with versatile

features

22 ERO22 DDeessiiggnn ooff aa ccooll llaabboorr aatt iivvee wwhheeeellcchhaaii rr wwii tthh

ppaatthh gguuiiddaannccee aassssiissttaannccee

This paper describes the development and assessment

of a Collaborative Wheelchair Assistant

Page 7: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 7

23 ERO23 II nndduusstt rr iiaall ssppyy rr oobboott This is a spy robot with cctv features

21. ERO24 VVooiiccee CCoonnttrr ooll lleedd TTeemmppeerr aattuurr ee sseennssiinngg rr oobboott This is a voice controlled robot for industries with

temperature sensor

22. ERO25 SSmmaarr tt aatt tteennuuaatt iinngg vveehhiiccllee ffoorr II nndduusstt rr iiaall

MM aatteerr iiaall hhaannddll iinngg

This is a Smart robot with Material Handling and

object detection

23. ERO26 II nntteell ll iiggeenntt GGaass ddeetteecctt iioonn rr oobboott Gas detecting robot for Harsh environments

24. ERO28 PPCC iinntteerr ffaaccee ssttaatt iioonneerr yy rr oobboott ccrraannee A crane robot which is being guided via PC

25. ERO29 BBoommbb ddeetteecctt iinngg aanndd cclleeaarr iinngg rr oobboott wwii tthh

WWii rr eelleessss ccaammeerr aa

Detects Bomb Lifts the Bomb and places it in an

unknown environment with the aid of wireless

environment

26. ERO30 PPaassssiivvee iinnff rr aarr eedd bbaasseedd hhuummaann aall iivvee ddeetteecctteedd

RRoobboott..

A human detecting robot for disaster regions

EEEEEEEEMMMMMMMMBBBBBBBBEEEEEEEEDDDDDDDDDDDDDDDDEEEEEEEEDDDDDDDD IIIIIIIINNNNNNNNDDDDDDDDUUUUUUUUSSSSSSSSTTTTTTTTRRRRRRRRIIIIIIIIAAAAAAAALLLLLLLL AAAAAAAAUUUUUUUUTTTTTTTTOOOOOOOOMMMMMMMMAAAAAAAATTTTTTTTIIIIIIIIOOOOOOOONNNNNNNN PPPPPPPPRRRRRRRROOOOOOOOJJJJJJJJEEEEEEEECCCCCCCCTTTTTTTTSSSSSSSS

1 EIA01 RReemmoottee CCoonnttrr ooll ooff DDiiggii ttaall FFaaccttoorr yy tthhrr oouugghh WWeebb

This project reports the development of hardware and

software for remote control of a digital factory

controlled through internet.

2009

2 EIA02 DDiisstt rr iibbuutteedd GGuuaarr ddiinngg aanndd AAllaarr mmiinngg SSyysstteemm BBaasseedd oonn TTeelleepphhoonnee AAuuttoommaatt iiccaall llyy DDiiaall iinngg aanndd RReemmoottee CCoommmmuunniiccaatt iioonn TTeecchhnnoollooggyy

Single chip microprocessor AT89C51 processes data

signal collection and realize telephone automatically

dialing-alarming when there is unusual condition, as

well as it controls wireless transceiver chip nRF905 to

complete data transmission between monitor controller

and work central station controller. Upper PC of

manager is connected with work central station

controller though USB interface, which realizes

distributed safety monitor and guarding-alarming

system of intelligent building design.

2009

3 EIA03 RReesseeaarr cchh ooff tt rr aaff ff iicc SSiiggnnaall LL iigghhtt II nntteell ll iiggeenntt CCoonnttrr ooll SSyysstteemm bbaasseedd oonn mmiiccrr ooccoonntt rr ooll lleerr

A development of distributed area traffic signal lights

control based on single-chip microcontroller through

CAN BUS is described.

2009

4 EIA04 DDeevveellooppmmeenntt ooff aa RReeaall--tt iimmee MM iinnee AAuuxxii ll iiaarr yy MM oonnii ttoorr iinngg SSyysstteemm UUssiinngg RRFF WWii rr eelleessss SSeennssoorr NNeettwwoorr kkss

This paper proposes a mine auxiliary sensor

system(MASS) will effectively monitor all situations

in mine especially for the safety of mineworkers

2009

5 EIA05 RReesseeaarr cchh oonn tteemmppeerr aattuurr ee aanndd hhuummiiddii ttyy mmoonnii ttoorr iinngg uunnddeerr mmiinnee bbaasseedd oonn OOpptt iiccaall FFiibbeerr CCoommmmuunniiccaatt iioonn SSyysstteemm

For the problem of temperature drift, inexact and great

transmission loss of the monitoring of environment

temperature and humidity under the mine, this paper

2009

Page 8: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 8

proposes the temperature and humidity monitoring and

optical fiber communication transmission

6 EIA06 RReesseeaarr cchh aanndd DDeevveellooppmmeenntt ooff aa II nntteell ll iiggeenntt TTeemmppeerraattuurr ee--MM eeaassuurr iinngg SSyysstteemm BBaasseedd oonn 11--wwiirr ee BBuuss

temperature monitoring method of 1-wire bus was

proposed

2009

7 EIA07 DDiisstt rr iibbuutteedd sseennssoorr ffoorr sstteeeerr iinngg wwhheeeell GGrr iipp FFoorr ccee MM eeaassuurr eemmeenntt iinn ddrr iivveerr FFaatt iigguuee DDeetteecctt iioonn

This Smart project uses a microcontroller and a grip

sensor connected to it using CAN Protocol for a safe

drive in case of any tiredness for the driver.

2009

8 EIA08 TThhee iinntteeggrr aatteedd uunnii tt ffoorr MM EEMM SS BBaasseedd pprr eessssuurr ee mmeeaassuurr eemmeenntt

This project involves a MEMS sensor to calculate the

pressure and is connected to the microcontroller

through ADC using I2C protocol. The pressure values

cam be monitored in a PC via UART.

2009

9 EIA09 RReesseeaarr cchh oonn EEmmbbeeddddeedd ddaattaa ddiissppllaayy uunnii tt BBaasseedd oonn CCAANN BBuuss

This project uses an ARM Processor and a LCD to

display the data which is been sent through the can

protocol which would be vary efficient system.

2009

10 EIA10 RReesseeaarr cchh aanndd ddeevveellooppmmeenntt ooff tthhee rr eemmoottee II //OO DDaattaa AAccqquuiissii tt iioonn ssyysstteemm bbaasseedd oonn EEmmbbeeddddeedd AARRMM ppllaattffoorr mm

In this project the various industrial measurement units

can be integrated on to an Ethernet bridge using an

ARM processor to send info to a server database using

an RTOS.

2009

11 EIA11 MM iiccrr ooccoonntt rr ooll lleerr bbaasseedd ssttaannddaalloonnee PPVV SSyysstteemm ffoorr WWiirr eelleessss SSeennssoorr NNooddee

This project uses a microcontroller which monitors the

power of an active device and enables switch to charge

the device only if necessary to improve the life of that

device.

2008

12 EIA12 CCAANN BBuuss-- BBaasseedd DDiisstt rr iibbuutteedd ffuueell ssyysstteemm wwii tthh ssmmaarr tt ccoommppoonneennttss

In this project a new distributed control system for

very high efficient fuel management application is

introduced with the help of a CAN enabled

microcontroller.

2008

13 EIA13 AA LL ooww--ccoosstt iinntteell ll iiggeenntt GGaass SSeennssiinngg DDeevviiccee ffoorr mmii ll ii ttaarr yy aappppll iiccaatt iioonnss

This project uses sensors connected to a

microcontroller implemented using the C

programming language on that to detect the gas and to

intimate the military troops regarding the level of the

particular detected Gas.

2008

14 EIA14 SSttuuddyy oonn AARRMM pprr oocceessssoorr BBaasseedd EEmmbbeeddddeedd iinntteell ll iiggeenntt YYiieellddss ssyysstteemm ccoonntt rr ooll lleerr

This system proposes as effective scheduling

algorithm for the efficiency improvement of a yielding

system using ARM processor with moisture, pressure

sensing units.

2008

15 EIA15 AA ssiimmppllee ccaappaaccii tt iivvee sseeccuurr ii ttyy ccaarr dd ssyysstteemm This project uses a simple and reliable capacitive

security card system which is been designed and

consist of capacitive card reader system, an integrator,

2008

Page 9: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 9

rectifying circuit, an 8051 microcontroller and

indicators for very safe security system.

16 EIA16 RReesseeaarr cchh aanndd ddeessiiggnn ooff iinndduussttrr iiaall EEtthheerr nneett II nntteell ll iiggeenntt GGaatteewwaayy bbaasseedd oonn AARRMM

This project is going to deploy a system capable of

bridging various industrial protocols like CAN, RS232

on to an Ethernet gateway to measure the parameters

and communicating with system.

2008

17 EIA17 MM eeaassuurr iinngg aanndd TTrr aannssmmiitt tt iinngg vvii ttaall bbooddyy ssiiggnnss uussiinngg MM EEMM SS SSeennssoorr

The Systems proposes an innovative patient body

movement monitoring and intimation system by the

aid of an active MEMS sensor. It deals with

acceleration of the patient.

2008

18 EIA18 AASSSSII SSTT--AAuuttoommaatteedd ssyysstteemm ffoorr ssuurr ggiiccaall iinnssttrr uummeenntt aanndd ssppoonnggee tt rr aacckkiinngg..

The system deploys and operation monitoring system

for the usage of surgical tools, sponges and tracking

critical missing tools before the event of operation

completion for a secure surgery procedure.

2008

19 EIA19 EEmmbbeeddddeedd ssyysstteemm uusseedd ffoorr oonnee bbiioommeeddiiccaall aappppll iiccaatt iioonn

This project is used as a life saver, which uses

parametric sensors integrated to a MCU a wireless data

transfer which will transfer the sensor data

continuously and to alarm in case of any abnormality.

2008

20 EIA20 UUssiinngg tthhee CCAANN pprr oottooccooll aanndd RReeccoonnff iigguurr aabbllee ccoommppuutt iinngg tteecchhnnoollooggyy ffoorr wweebb--bbaasseedd ssmmaarr tt hhoouussee aauuttoommaatt iioonn

In this project a network based system is developed to

control various home appliances with the help of CAN

which gets the command through the internet to the

personal System at home.

2001

IEEE BIOMEDICALIEEE BIOMEDICALIEEE BIOMEDICALIEEE BIOMEDICAL PROJECTS PROJECTS PROJECTS PROJECTS 1. EBP01 RReeaall --tt iimmee MM oonnii ttoorr iinngg ooff VVii ttaall SSiiggnnss The main purpose of this study is to help the frequent

visitation struggles of people who live with certain

health conditions and, most importantly, to be able to

give them a sense of security, independence, and ,to

some degree,

2009

2. EBP02 DDeessiiggnn ooff CCll iinniicc PPaatt iieenntt BBooddyy TTeemmppeerr aattuurr ee WWii rr eelleessss RReemmoottee CCoonncceenntt rr aatt iioonn MM oonnii ttoorr SSyysstteemm BBaasseedd oonn VVII

This paper introduces that temperature sensor

DS18B20 is connected to realize distributed body

temperature wireless remote concentration monitor

system design.

2009

3. EBP03 PPoorr ttaabbllee AAmmbbuullaattoorr yy EElleecctt rr ooccaarr ddiiooggrraamm

MM oonnii ttoorr iinngg SSyysstteemm BBaasseedd oonn BBlluueettooootthh

The paper proposes an overall design idea of portable

ambulatory ECG monitoring system based on

Bluetooth and implementation program of system

hardware and software.

2009

Page 10: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 10

4. EBP04 AA nneeww sseeccuurr ii ttyy sscchheemmee ffoorr ee--hheeaall tthh ssyysstteemm In this paper, we present a novel role-interaction-

organization security model and apply it to the e-health

system which is modeled as a multi-agent system.

2009

5. EBP05 AA PPhhyyssiiccaall AAcctt iivvii ttyy MM oonnii ttoorr iinngg SSyysstteemm ffoorr

TThhee EEllddeerr llyy PPeeooppllee WWii tthh BBuuii ll tt --iinn VVii ttaall SSiiggnn

&& FFaall ll DDeetteecctt iioonn

This paper presents the implementation of a system to

sense, send, display and store physiology activity.

2009

6. EBP06 GGPPSS bbaasseedd PPaatt iieenntt MM oonnii ttoorr iinngg ssyysstteemm A gps & gsm based patient monitoring system with

Intimation to the Doctor in case of any problems

2008

7. EBP07 DDeevveellooppmmeenntt ooff iinntteell ll iiggeenntt hhoommee hheeaall tthhccaarr ee bbooxx ccoonnnneecctt iinngg mmeeddiiccaall eeqquuiippmmeennttss && sseerr vviiccee ppllaattffoorr mm

A novel guide for rural people disease diagonizing and

pill dispensing

2007

8. EBP08 TTeelleeccaarr ee SSyysstteemm UUssiinngg RRFF CCoommmmuunniiccaatt iioonn

TTeecchhnnoollooggyy iinn EEllddeerr llyy CCeenntteerr

2009

9. EBP09 DDeevveellooppmmeenntt ooff CCooll llaappssee--SSeennssiinngg PPhhoonnee

ffoorr EEmmeerr ggeennccyy PPoossii tt iioonniinngg SSyysstteemm

To accommodate emergencies involving the solitary

aged, we have developed a collapse-sensing phone

with a GPS receiving chipset and a CDMA sending

chipset that reports the location of the individual to a

local control Center. A GIS has been developed to

display the position of the caller on the map of a

control system that enables administrative officers to

rescue the aged people.

2009

IEEE IEEE IEEE IEEE RFID PROJECTSRFID PROJECTSRFID PROJECTSRFID PROJECTS 1. ERP01 RRFFII DD FFoooottwweeaarr aanndd FFlloooorr SSyysstteemm In this paper, we proposed the indoor localization

Footwear system based on RFID and smart floor.

2009

2. ERP02 DDeessiiggnn aanndd II mmpplleemmeennttaatt iioonn ooff CCaammppuuss GGaattee

CCoonnttrr ooll SSyysstteemm BBaasseedd oonn RRFFII DD

based on Radio Frequency Identification (RFID), to

conduct campus gate control by the identification

process constructed by the Server-end database and

campus Local Area Network (LAN). One way hash &

AES is adopted in this system.

2009

3. ERP03 AA NNoovveell RReemmoottee UUsseerr AAuutthheenntt iiccaatt iioonn

SScchheemmee UUssiinngg SSmmaarr tt CCaarrdd BBaasseedd oonn EECCDDLL PP

In this paper, a novel efficient remote user

authentication scheme using smart cards based on

Elliptic Curve Discrete Logarithm Problem (ECDLP)

has been proposed.

2009

4. ERP04 RRFFII DD EElleeccttrr oonniicc TTooll ll CCooll lleecctt iioonn AN automatic toll Collection system based on

RFID

2009

5. ERP05 UUssiinngg RRFFII DD tteecchhnnoollooggyy oonn ccll iinniicc’’ ss pphhaarr mmaaccyy

ooppeerr aatt iioonn mmaannaaggeemmeenntt aanndd ddeevveellooppmmeenntt ooff

This research emphasizes on how to improve the

present clinic pharmacy dispensing system by

introducing RFID technique to assist small clinic

2009

Page 11: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 11

iinntteell ll iiggeenntt mmeeddiicciinnee ddiissppeennssiinngg ccaabbiinneett which hires single pharmacist that can perform

repetitive inspections.

6. ERP06 TThheeff tt pprr eevveenntt iioonn uussiinngg wwii rr eelleessss sseeccuurr ii ttyy

ssyysstteemm

This paper presents a developed RFID based theft

prevention system such that luxurious belongings, such

as laptops which are monitored from being stolen.

2008

7. ERP07 RReesseeaarr cchh oonn CCooaall MM iinnee PPeerr ssoonnnneell

OOrr iieennttaatt iioonn RReessccuuiinngg SSyysstteemm BBaasseedd oonn RRFFII DD

To realize the breakthrough on underground coal mine

rescue technology, studied one based on RFID

personnel orientation rescuing system.

2008

8. ERP08 AA LL ooccaatt iioonn--AAwwaarr ee SSyysstteemm UUssiinngg RRFFII DD aanndd

MM oobbii llee DDeevviicceess ffoorr AArr tt MM uusseeuummss

This proposal results especially useful to provide

location-aware information avoiding the need for

users to manually select the desired information they

want to see.

20

0

8

9. ERP09 iiWWaallkkeerr :: TToowwaarr dd aa RRooll llaattoorr --MM oouunntteedd WWaayy

ff iinnddiinngg SSyysstteemm ffoorr tthhee EEllddeerr llyy

This is a robotic Vehicle which guides the people

based on RFID implanted tags on its path

10. ERP10 MM oobbii llee RRFFII DD TTrr aacckkiinngg SSyysstteemm A kid identification system in general public

11. ERP11 RRFFII DD--BBaasseedd II nntteell ll iiggeenntt BBooookkss SShheellvviinngg

SSyysstteemm ((oorr )) AAnn OOpptt iimmiizzeedd RRFFII DD--BBaasseedd

AAccaaddeemmiicc LL iibbrr aarr yy

We present a solution for integrating RFID technology

in academic libraries by offering cost effectiveness and

good quality of service.

12. ERP12 TThhee EE-- PPaassssppoorr tt :: TThhee FFuuttuurr ee OOff

GGoovveerr nnmmeenntt--II ssssuueedd RRFFII DD bbaasseedd

II ddeenntt ii ff iiccaatt iioonn

A Electronic passport for Validating the Passport

wherever the police wants

13. ERP13 AAuuttoommaatt iioonn ooff TTiimmee aanndd AAtt tteennddaannccee uussiinngg

RRFFII DD SSyysstteemmss

AN automatic Rfid based time and attendance marking

system

14. ERP14 RRFFII DD--bbaasseedd aanntt ii --tthheefftt aauuttoo sseeccuurr ii ttyy ssyysstteemm

wwii tthh aann iimmmmoobbii ll iizzeerr

This paper presents a novel radio frequency

identification (RFID) based vehicle immobilizer

system, which features low hacking probability while

preserving the safety of the passengers of the hijacked

vehicle.

15. ERP15 SSeeccuurr ii ttyy AArr cchhii tteeccttuurr ee ffoorr RRFFII DD AAppppll iiccaatt iioonn

iinn HHoommee EEnnvvii rr oonnmmeenntt

In this project we develop a smart home environment

using RFID Reader is placed in the room and the

item for which the location is to be determine is

attached with RFID Tags.

2009

16. ERP16 HHoossppii ttaall AAuuttoommaatt iioonn SSyysstteemm RRFFII DD BBaasseedd::

TTeecchhnnoollooggyy EEmmbbeeddddeedd iinn ssmmaarr tt

DDeevviicceess((CCaarr ddss,, TTaaggss aanndd BBrr aacceelleettss))

This project has the objective to present a system for

automation of a hospital Clinical Analysis laboratory.

This uses RFID tags stuck to containers containing

patient’s collected samples for the correct

identification of the patient who gave away the

samples.

2008

Page 12: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 12

17. ERP17 II nntt rr uussiioonn DDeetteecctt iioonn iinn RRFFII DD ssyysstteemmss Here the originality of an RFID tag is identified using

the data from RFID reader where the information is

sent to a PC and analyzed for its privacy statement.

2008

18. ERP18 AA bbll iinndd nnaavviiggaatt iioonn ssyysstteemm uussiinngg RRFFII DD ffoorr

iinnddoooorr EEnnvvii rr oonnmmeennttss

In this project path navigation for blind is implemented

using RFID card and reader to sense the correct path

using a reader which is with the blind person. RFID

cards are located in the correct path in a row.

2008

19. ERP19 BBuuss DDeetteecctt iioonn ddeevviiccee ffoorr tthhee BBll iinndd uussiinngg

ppaassssiivvee RRFFII DD AAppppll iiccaatt iioonn

Here a bus recognition system is developed for the

blind where RFID comes into act to detect the bus

information using the RFID Tag in the bus and an

RFID Reader with the blind person.

2009

20. ERP20 PPooll iiccyy aanndd rr oollee bbaasseedd mmoobbii llee RRFFII DD uusseerr

pprr iivvaaccyy DDaattaa MM aannaaggeemmeenntt SSyysstteemm

This project deals with design of a secured RFID

system for the protection of user access and

information onto a database by employing user privacy

policies and encryption.

2008

21. ERP21 AAuuttoommaatt iicc ccoonntt rr ooll ooff ssttuuddeennttss aatt tteennddaannccee iinn

ccllaassssrr oooommss uussiinngg RRFFII DD

In this project we propose architecture and a prototype

of a system that uses distributed RFID over Ethernet

and automates an entire student’s attendance

registration system by using FID in an educational

institution environment.

2008

22. ERP22 DDeessiiggnn && iimmpplleemmeennttaatt iioonn ooff aa RRFFII DD bbaasseedd

ppoowweerr mmeetteerr && oouuttaaggee RReeccoorr ddiinngg

This paper tries to design and implement a RFID based

power meter and outage recording system.

2008

23. ERP23 SSii ttuuaatt iioonn AAwwaarr ee RRFFII DD ssyysstteemm:: EEvvaalluuaatt iinngg

AAbbnnoorr mmaall bbeehhaavviioorr ddeetteecctt iinngg aapppprr ooaacchh

This system proposes a novel idea of a situation aware

RFID system for the detection of abnormal,

irregulative usage of RFID tag in a robust shopping

system.

2006

24. ERP24 TThhee II nntt rr oodduucctt iioonn aanndd DDeessiiggnn ooff aa NNeeww FFoorr mm ooff SSuuppeerr mmaarr kkeett :: SSmmaarr tt MM aarr kkeett

In this paper, we introduce a new form of supermarket: Smart Market, in which customers can acquire detailed product information with Smart Market’s facilities and expedite the checkout process without human intervention

ZZZZZZZZZZZZIIIIIIIIIIIIGGGGGGGGGGGGBBBBBBBBBBBBEEEEEEEEEEEEEEEEEEEEEEEE IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS 01. EZB01 AA wwii rr eelleessss ddeessiiggnn ooff llooww--ccoosstt ii rr rr iiggaatt iioonn

ssyysstteemm uussiinngg ZZiiggBBeeee tteecchhnnoollooggyy

A wireless solution for intelligent field irrigation

system based on ZigBee technology was proposed in

this paper.

2009

02. EZB02 EExxpplloorr aatt iioonn aanndd RReesseeaarr cchh bbaasseedd oonn VVII NN

CCooddee VVeehhiiccllee II ddeenntt ii ff ii ccaatt iioonn SSyysstteemm

This paper is designed and implemented based on

the ZigBee technology of the vehicle automatic

identification System.

2009

Page 13: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 13

03. EZB03 ZZiiggbbeeee bbaasseedd II nntteell ll iiggeenntt HHeellmmeett ffoorr CCooaall

MM iinneerr ss

A Cost effective zigbee based wireless mine

supervising system is presented in this article. 2009

04. EZB04 RReemmoottee--CCoonnttrr ooll llaabbllee aanndd EEnneerr ggyy--SSaavviinngg

RRoooomm AArr cchhii tteeccttuurr ee bbaasseedd oonn ZZiiggBBeeee

CCoommmmuunniiccaatt iioonn

This paper describes room architecture to reduce

power consumption and to make the room easily

controllable with an IR remote control of an home

appliance.

2009

05. EZB05 DDeessiiggnn ooff AAiirr PPooll lluutt iioonn MM oonnii ttoorr iinngg SSyysstteemm

UUssiinngg ZZiiggBBeeee NNeettwwoorr kkss ffoorr UUbbiiqquuii ttoouuss--CCii ttyy

This paper focuses on implementation of air pollution

monitoring system. 2009

06. EZB06 RReemmoottee PPoowweerr OONN//OOFFFF ccoonntt rr ooll && ccuurr rr eenntt

mmeeaassuurr eemmeenntt ffoorr HHoommee EElleeccttrr iicc OOuutt lleettss

bbaasseedd oonn aa LL ooww PPoowweerr EEmmbbeeddddeedd BBooaarr dd &&

ZZiiggbbeeee ccoommmmuunniiccaatt iioonn

A system for power reduction using Zigbee Networks 2008

07. EZB07 WWii rr eelleessss AAcccceessss MM oonnii ttoorr iinngg aanndd CCoonnttrr ooll

SSyysstteemm bbaasseedd oonn DDiiggii ttaall DDoooorr LL oocckk

A Door Lock system with high authorisation 2008

08. EZB08 AA ZZiiggBBeeee--BBaasseedd PPoowweerr MM oonnii ttoorr iinngg SSyysstteemm

wwii tthh DDiirr eecctt LL ooaadd CCoonnttrr ooll CCaappaabbii ll ii tt iieess

A power monitoring system with power representation

for each and every device 2008

09. EZB09 RReemmoottee--ccoonntt rr ooll llaabbllee aanndd eenneerr ggyy--ssaavviinngg rr oooomm

aarr cchhii tteeccttuurr ee bbaasseedd oonn ZZiiggBBeeee ccoommmmuunniiccaatt iioonn

This paper describes room architecture to reduce

power consumption and to make the room easily

controllable with an IR remote control of an home

appliance.

2008

10. EZB10 DDeessiiggnn aanndd RReeaall ii zzaatt iioonn ooff EEmmbbeeddddeedd WWeebb

GGaatteewwaayy SSeerr vveerr

This paper introduces in detail the transplantation and

system software design of embedded Web server, 2007

11. EZB11 WWeeaarr aabbllee WWiirr eelleessss BBooddyy AArr eeaa NNeettwwoorr kkss A Wearable body area network (WBAN) is the

emerging technology that is developed for wearable

monitoring application.

2007

12 EZB12 PPoowweerr MM aannaaggeemmeenntt uussiinngg ZZiiggBBeeee WWiirr eelleessss

SSeennssoorr NNeettwwoorr kk

To manage the available power more often the power

is cut for particular area.. Instead , we can use

available power in such a way that only low power

devices like Tubes ,Fans, Desktops which are primary

needs should be allowed and high power devices like

heater ,pump-set , A.C. etc should not be allowed for

that particular period

13 EZB13 TThhee AAppppll iiccaatt iioonn ooff AARRMM AAnndd ZZiiggBBeeee

TTeecchhnnoollooggyy WWiirr eelleessss NNeettwwoorr kkss II nn

MM oonnii ttoorr iinngg MM iinnee SSaaffeettyy SSyysstteemm

With the continuous development of technology, it

gives a new type System of Coal Mine Safety Based

on ZigBee technology.

Page 14: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 14

GGGGGGGGSSSSSSSSMMMMMMMM &&&&&&&& GGGGGGGGPPPPPPPPSSSSSSSS IIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPRRRRRRRROOOOOOOOJJJJJJJJEEEEEEEECCCCCCCCTTTTTTTTSSSSSSSS

01 EEGGPP0011 AAuuttoommoobbii llee AAnntt ii --tthheefftt SSyysstteemm DDeessiiggnn BBaasseedd

oonn GGSSMM

An automobile remote alarm system based on GSM

communication network is introduced

2009

02 EEGGPP0022 DDeessiiggnn && DDeevveellooppmmeenntt ooff aa GGSSMM BBaasseedd

VVeehhiiccllee TThheeff tt CCoonnttrr ooll SSyysstteemm

This paper deals with the design & development of a

theft control system for an automobile, which is being

used to prevent/control the theft of a vehicle.

2009

03 EEGGPP0033 AAnn AAuuttoommoott iivvee SSeeccuurr ii ttyy SSyysstteemm ffoorr AAnntt ii --

tthheefftt

In this paper, we present an automotive security

system to disable an automobile and its key auto

systems through remote control when it is stolen.

2009

04 EEGGPP0044 AA GGII SS ssyysstteemm ffoorr ttoouurr iissmm mmaannaaggeemmeenntt

Our objective is to build a Geographic Information

System (GIS) Model for tourism industries (services)

from one side and for officials and conservationist of

the historic sites on the other side.

2009

05 EEGGPP0055 HHEERROO:: OOnnll iinnee RReeaall --TTiimmee VVeehhiiccllee TTrr aacckkiinngg In this paper, we present an innovative scheme,

Hierarchical Exponential Region Organization

(HERO) for Intelligent transportation

2009

06 EEGGPP0066 TThhee MM oobbii llee EECCGG TTeellee mmoonnii ttoorr iinngg SSyysstteemm

BBaasseedd oonn GGPPRRSS aanndd GGPPSS

The portable ECG monitoring terminal in the system

consists of GPRS and GPS module in order to send the

ECG signal data through GPRS network with the

position information of the user, and a accelerometer is

embedded in the terminal to sense the sudden posture

change of the user, this will enable the monitoring

center in the system give a immediately response to

the user who suffer a suddenly cardiac failure

2009

07 EEGGPP0077 GGPPSS BBaasseedd MM oobbii llee TTeellee MM oonnii ttoorr iinngg &&

MM aannaaggeemmeenntt SSyysstteemm ffoorr II nntteerr ccii tt iieess PPuubbll iicc

TTrr aannssppoorr ttaatt iioonnss

A novel Bus management system based on GPS 2008

EEGGPP0088 DDeevveellooppmmeenntt ooff CCooll llaappssee--SSeennssiinngg PPhhoonnee

ffoorr EEmmeerr ggeennccyy PPoossii tt iioonniinngg SSyysstteemm

we have developed a collapse-sensing phone with a

GPS receiving chipset and a CDMA sending chipset

that reports the location of the individual to a local

control center.

Page 15: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 15

IIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEE EEEEEEEELLLLLLLLEEEEEEEECCCCCCCCTTTTTTTTRRRRRRRRIIIIIIIICCCCCCCCAAAAAAAALLLLLLLL PPPPPPPPRRRRRRRROOOOOOOOJJJJJJJJEEEEEEEECCCCCCCCTTTTTTTTSSSSSSSS 01. EPLC01 HHoommee aappppll iiaannccee eenneerr ggyy mmoonnii ttoorr iinngg aanndd

ccoonntt rr ooll ll iinngg bbaasseedd oonn PPoowweerr LL iinnee

CCoommmmuunniiccaatt iioonn

In this paper an embedded remote monitoring and

controlling power socket (RMCPS) has been

developed with high suitability for automatic and

power management of home electric appliances

2009

02. EPLC02 WWii rr eelleessss LL aann bbaasseedd DDiisstt rr iibbuutteedd DDiiggii ttaall

LL iigghhtt iinngg ssyysstteemmss ffoorr DDiiggii ttaall hhoommee

Effectiveness & reality of a system composed of

hardware & software is implemented with wireless

Lan & demonstrated in this paper

2009

03. EPLC03 WWii rr eelleessss AAdd HHoocc NNeettwwoorr kkss RReemmoottee MM eetteerr

RReeaaddiinngg SSyysstteemm BBaasseedd oonn GGPPRRSS

A gprs based Meter for Intelligent monitoring of

Electricity units consumed

04. EPLC04 RReesseeaarr cchh aanndd DDeessiiggnn ooff II nntteell ll iiggeenntt WWiirr eelleessss

HHaarr mmoonniicc DDeetteecctt iioonn ooff EElleecctt rr iicc PPoowweerr

SSyysstteemm

we design a kind of wireless power electric parameter

detection system based on single chip microprocessor

(SCM) technology, wireless communication

technology

2009

05. EPLC05 SSyynncchhrr oonniizzaatt iioonn AAllggoorr ii tthhmmss ffoorr SSMM SS BBaasseedd

WWii rr eelleessss DDiisstt rr iibbuutteedd SSyysstteemm ffoorr EElleecctt rr iicc

GGrr iidd MM oonnii ttoorr

In this paper, we have come up with some algorithms

that are easy to fulfill without sacrificing much to the

system's performance.

2009

06. EPLC06 II nntteeggrr aatteedd ssoollaarr tt rr aacckkeerr ppoossii tt iioonniinngg uunnii tt iinn

ddiissttrr iibbuutteedd ggrr iidd--ffeeeeddiinngg iinnvveerr tteerr ss ffoorr CCPPVV

ppoowweerr ppllaannttss

Solar tracker for efficient usage of electrical energy 2009

07. EPLC07 DDeevveellooppmmeenntt ooff AA HHiieerr aarr cchhiiccaall SSaavviinngg PPoowweerr

SSyysstteemm ffoorr CCaammppuuss

This dispatch system is the integration of Internet,

network, coded radio frequency, database, interfacing

technology, and campus administration using

computerization servers.

2009

08. EPLC08 II nntteell ll iiggeenntt WWiirr eelleessss SSyysstteemm ttoo MM oonnii ttoorr iinngg

MM eecchhaanniiccaall FFaauull tt iinn PPoowweerr TTrr aannssmmiissssiioonn

LL iinneess

This paper presents the development of an intelligent

wireless system to monitoring mechanical fault in

electric power transmission lines

2008

09. EPLC09 RReesseeaarr cchh oonn MM eeaassuurr iinngg EEqquuiippmmeenntt ooff ssiinnggllee--

pphhaassee EElleeccttrr iiccii ttyy –– SStteeaall iinngg wwii tthh LL oonngg

ddiissttaannccee MM oonnii ttoorr iinngg

This project deals with the implementation of a

automated electricity stealing detection system

involving a novel approach based on 8051 MCU.

2009

10. EPLC10 DDeevveellooppmmeenntt ooff EEnneerr ggyy MM aannaaggeemmeenntt aanndd

wwaarr nniinngg ssyysstteemm ffoorr RReessiiddeenntt :: AAnn EEnneerr ggyy

SSaavviinngg SSoolluutt iioonn..

This system brings forth an innovative power saving

solution for a residential system using electrical

parameter manipulation units.

2009

11. EPLC11 SSuuff ff ii cciieenntt ssuunnll iigghhtt ssuuppppllyy ffoorr hhoommee ccaarr ee

uussiinngg llooccaall cclloosseedd –– lloooopp sshhuutt tteerr ccoonntt rr ooll

ssyysstteemm..

This project projects an ambient control system for

limiting the amount of sunlight entering an industrial

area by using a sensitive LDR, ADC on an 8051 MCU.

2008

Page 16: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 16

12. EPLC12 DDeessiiggnn aanndd II mmpplleemmeennttaatt iioonn ooff UUnniivveerr ssaall

iinndduussttrr yy DDaattaa ccooll lleecctt iinngg aanndd CCoonnttrr ooll ll iinngg

SSyysstteemm..

This project deploys the development of a robust data

collecting system for the acquisition of industrial

parameters using a embedded 8051 MCU and storage

onto an I2C EEPROM.

2008

13. EPLC13 PPCC –– bbaasseedd PPII DD SSppeeeedd ccoonntt rr ooll iinn DDCC MM oottoorr In This project the speed of the system is controlled

using a PC where the average speed is fed and the DC

Motor is made to prevail in the same speed following

proportional integral Differential algorithm.

2008

14. EPLC14 RReemmoottee ppoowweerr mmaannaaggeemmeenntt aanndd mmeetteerr --

rr eeaaddiinngg ssyysstteemm bbaasseedd oonn AARRMM

mmiiccrr oopprr oocceessssoorr

In this project, the energy is measured and the value is

transferred to ARM Processor using RS-485 and the

value is displayed in LCD and communicates with the

management using GSM.

2008

15. EPLC15 II mmpplleemmeennttaatt iioonn ooff CCoonnttrr ooll MM eecchhaanniissmm ffoorr

SSttaannddbbyy PPoowweerr RReedduucctt iioonn iinn HHoommee

AAppppll iiaanncceess

A energy saving architecture for controlling the

devices in homes

22000088

16. EPLC16 AAuuttoommaatt iicc rr oooomm ll iigghhtt iinntteennssii ttyy ddeetteecctt iioonn &&

ccoonntt rr ooll uussiinngg mmiiccrr oopprr oocceessssoorr && ll iigghhtt sseennssoorr ss

Maintaining optimum temperature & lighting in a

room using Light & temperature sensors

22000088

17. EPLC17 AA GGSSMM ,, II nntteerr nneett && SSppeeeecchh CCoonnttrr ooll lleedd

WWiirr eelleessss II nntteerr aacctt iivvee HHoommee AAuuttoommaatt iioonn

SSyysstteemm

A home automation system using sms, Voice &

Internet web page.

22000077

18. EPLC18 AAuuttoommaatt iicc PPoowweerr MM eetteerr RReeaaddiinngg SSyysstteemm

uussiinngg GGSSMM NNeettwwoorr kk

This is an SMS based Power meter reading system 2007

19. EPLC19 SSooff ttwwaarree AAggeennttss BBaasseedd HHoommee AAuuttoommaatt iioonn

AAnn II nntteell ll iiggeenntt EElleeccttrr iiccaall BBii ll ll iinngg &&

MM aaiinntteennaannccee

Ann novel Electrical billing system with sms email

and auto meter reading option

2007

20. EPLC20 RReemmootteellyy CCoonnttrr ooll llaabbllee OOuutt lleett SSyysstteemm ffoorr

HHoommee PPoowweerr MM aannaaggeemmeenntt

A power management system for electrical devices in

home and Industrial equipments.

2006

21. EPLC21 OOnn LL iinnee TTeemmppeerr aattuurr ee MM oonnii ttoorr iinngg ooff PPoowweerr

DDiisstt rr iibbuutt iioonn EEqquuiippmmeenntt

A Temperature Monitoring system for Power

Distribution Equipments

2006

22. EPLC22 GGSSMM BBaasseedd DDiisstt rr iibbuutt iioonn TTrr aannssffoorr mmeerr

MM oonnii ttoorr iinngg ssyysstteemm

A sms based Distribution transformer parameter

Monitoring system

2006

Page 17: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 17

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN MMMMMMMMMMMMOOOOOOOOOOOOBBBBBBBBBBBBIIIIIIIIIIIILLLLLLLLLLLLEEEEEEEEEEEE CCCCCCCCCCCCOOOOOOOOOOOOMMMMMMMMMMMMPPPPPPPPPPPPUUUUUUUUUUUUTTTTTTTTTTTTIIIIIIIIIIIINNNNNNNNNNNNGGGGGGGGGGGG

JJJJJJJJJJJJAAAAAAAAAAAAVVVVVVVVVVVVAAAAAAAAAAAA &&&&&&&&&&&& DDDDDDDDDDDDOOOOOOOOOOOOTTTTTTTTTTTTNNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTT 1 ITMC01 AA RReeaall--TT iimmee II nntteell ll iiggeenntt WWiirr eelleessss

MM oobbii llee SSttaatt iioonn LL ooccaatt iioonn

EEsstt iimmaattoorr

In this paper, Adaptive Neuro-Fuzzy Inference system (ANFIS) is

used as a robust location estimator to locate the mobile station (MS)

using the MS geo-fencing area data from a serving base station.

Algorithm : Adaptive Neuro-Fuzzy Inference system

NOV

2009

2 ITMC02 MM DDPPFF :: MM iinniimmuumm DDiissttaannccee

PPaacckkeett ffoorr wwaarr ddiinngg ffoorr sseeaarr cchh

aappppll iiccaatt iioonnss iinn mmoobbii llee AAddhhoocc

NNeettwwoorr kkss

This paper introduces a message forwarding algorithm for search

applications within mobile ad hoc networks that is based on the

concept of selecting the nearest node from a set of designated nodes.

Algorithm :: MM iinniimmuumm DDiissttaannccee PPaacckkeett FFoorr wwaarr ddiinngg

OCT

2009

3 ITMC03 EExxppllooii tt iinngg CCoonnttaacctt SSppaatt iiaall

DDeeppeennddeennccyy ffoorr ooppppoorr ttuunniisstt iicc

MM eessssaaggee FFoorr wwaarr ddiinngg

We apply the proposed path-delay estimation to end-to-end routing.

The proposed scheme can reduce the message delay significantly,

when the network is sufficiently sparse and the spatial dependency is

quantitatively constant over time. Algorithm :: path-delay

estimation methods

OCT

2009

4 ITMC04 CCoonntt iinnuuoouuss MM oonnii ttoorr iinngg ooff ssppaatt iiaall

qquueerr iieess iinn wwiirr eelleessss BBrr ooaaddccaasstt

EEnnvvii rr oonnmmeennttss

In this paper, we propose an air indexing framework that

1) outperforms the existing (i.e., snapshot) techniques in terms of

energy consumption while achieving low access latency and

2) Constitutes the first method supporting efficient processing of

continuous spatial queries over moving objects.

Algorithm :: spatial query

OCT

2009

5 ITMC05 TThhee BBeeaaccoonn MM oovveemmeenntt DDeetteecctt iioonn

PPrr oobblleemm iinn WWiirr eelleessss SSeennssoorr

NNeettwwoorr kkss ffoorr LL ooccaall iizzaatt iioonn

AAppppll iiccaatt iioonnss..

Assuming that there are unnoticed changes of locations of some

beacons in the system, this problem concerns how to automatically

monitor such situations and identify such unreliable beacons based on

the mutual observations among beacons only.

Algorithm: BBeeaaccoonn MM oovveemmeenntt DDeetteecctt iioonn mmeetthhoodd..

OCT

2009

6 ITMC06 DDRRAANNDD:: DDiissttrr iibbuutteedd RRaannddoommiizzeedd

TTDDMM AA SScchheedduull iinngg ffoorr WWiirr eelleessss

AAdd HHoocc NNeettwwoorr kkss..

This paper presents a distributed implementation of RAND, a

randomized time slot scheduling algorithm, called DRAND.The

algorithm is suitable for a wireless network where most nodes do not

move, such as wireless mesh networks and wireless sensor networks.

AAllggoorr ii tthhmm:: DDRRAANNDD..

7 ITMC07 AA NNoovveell SScchheedduulleedd PPoowweerr SSaavviinngg

MM eecchhaanniissmm ffoorr 880022..1111 WWiirr eelleessss

LL AANNss..

To improve power efficiency, a novel scheduled PSM protocol based

on time slicing is proposed in this paper. The protocol adopts the

mechanism of time division, schedules the access point to deliver

pending data at designated time slices, & adaptively adjusts the power

OCT

2009

Page 18: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 18

state of stations. AAllggoorr ii tthhmm:: PPSSMM pprr oottooccooll

8 ITMC08 JJooiinntt TTaasskk MM iiggrr aatt iioonn aanndd PPoowweerr

MM aannaaggeemmeenntt iinn WWiirr eelleessss

CCoommppuutt iinngg

In this project We investigate a wireless computing architecture,

where mobile terminals can execute their computation tasks either

1) Locally, at the terminal’s processor, or 2) remotely, assisted by the

network infrastructure, resulting in Energy savings in terminal.

SEPT

2009

9 ITMC09 RRoouuttee SSttaabbii ll ii ttyy iinn MM AANNEETTss

uunnddeerr tthhee RRaannddoomm DDiirr eecctt iioonn

MM oobbii ll ii ttyy MM ooddeell ..

In this work, we study both the availability and the duration

probability of a routing path that is subject to link failures caused by

node mobility. In particular, we focus on the case where the network

nodes move according to the Random Direction model, and we derive

both exact and approximate (but simple) expressions of these

probabilities

AAllggoorr ii tthhmm:: RRaannddoomm MM oobbii ll ii ttyy MM ooddeell ..

SEPT

2009

10 ITMC10 MM ii tt iiggaatt iioonn ooff CCoonnttrr ooll CChhaannnneell

JJaammmmiinngg uunnddeerr NNooddee CCaappttuurr ee

AAttttaacckkss

In this paper, we develop a framework for control channel access

schemes that are robust to control channel jamming. Furthermore, we

provide techniques for random allocation of control channels to users

which yield graceful performance degradation as the number of user’s

increases.

AALL GGOO :: GGuuiiddee AAllggoorr ii tthhmm

SEPT

2009

11 ITMC11 DDyynnaammiiccss ooff MM uull tt iippllee--SSeell lleerr aanndd

MM uull tt iippllee--BBuuyyeerr SSppeecctt rr uumm

TTrr aaddiinngg iinn CCooggnnii tt ii vvee RRaaddiioo

NNeettwwoorr kkss..

To model the competition among the primary users, a non cooperative

game is formulated where the Nash equilibrium is considered as the

solution.

AAllggoorr ii tthhmm :: II tteerr aatt iivvee AAllggoorr ii tthhmm

AUG

2009

12 ITMC12 RRaannddoomm CCaasstt :: EEnneerr ggyy EEffff iicciieenntt

CCoommmmuunniiccaatt iioonn SScchheemmee ffoorr

MM oobbii llee AAdd HHoocc NNeettwwoorr kkss..

This paper proposes a new communication mechanism, called Random

Cast, via which a sender can specify the desired level of overhearing,

making a prudent balance between energy and routing performance.

AAllggoorr ii tthhmm :: RRaannddoomm CCaasstt AAllggoorr ii tthhmm

AUG

2009

13 ITMC13 AA GGeenn22--bbaasseedd RRFFII DD

AAuutthheenntt iiccaatt iioonn PPrr oottooccooll ffoorr

SSeeccuurr ii ttyy aanndd PPrr iivvaaccyy..

This project uses the safest method of authenticating data from a Tag

into a tag reader and transfers data in a safe manner.

AAllggoorr ii tthhmm :: GGeenneerr aall 22 PPrroottooccooll pplluuss ,, PPRRNNGG,,CCRRCC

AUG

2009

14 ITMC14 EEnneerr ggyy--EEff ff iicciieenntt CClluusstteerr iinngg

uunnddeerr tthhee JJooiinntt RRoouutt iinngg aanndd

CCoovveerr aaggee CCoonnssttrr aaiinntt..

In this paper, we address an energy-optimal topology that maximizes

network lifetime, While ensuring simultaneously full area coverage

and sensor connectivity to cluster heads.

AAllggoorr ii tthhmm:: TTaabbuu--RRCCCC AAllggoorr ii tthhmm..

AUG

2009

15 ITMC15 II nnffoorr mmaatt iioonn CCoonntteenntt --BBaasseedd

SSeennssoorr SSeelleecctt iioonn && TTrr aannssmmiissssiioonn

A mutual-information-based sensor selection (MISS) algorithm is

adopted which allows the sensor nodes with the highest mutual

information about the target state to transmit data so that the energy

AUG

2009

Page 19: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 19

PPoowweerr AAddjj uussttmmeenntt ffoorr

CCooll llaabboorr aatt iivvee TTaarr ggeett TTrr aacckkiinngg..

consumption is reduced while the desired target position estimation

accuracy is met.

AAllggoorr ii tthhmm uusseedd:: MM II SSSS && II CCTTPP MM eetthhoodd

16 ITMC16 ppDDCCSS:: SSeeccuurr ii ttyy aanndd PPrr iivvaaccyy

SSuuppppoorr tt ffoorr DDaattaa--CCeennttrr iicc SSeennssoorr

NNeettwwoorr kkss

To address the security problem of Data Centric Sensor networks, we

present pDCS, a privacy enhanced DCS network which offers different

levels of data privacy based on different cryptographic keys.

AUG

2009

17 ITMC17 MM eessssaaggee aauutthheenntt iiccaatt iioonn iinn

ccoommppuuttaatt iioonnaall llyy ccoonnsstt rr aaiinneedd

EEnnvvii rr oonnmmeennttss

In this project RFID and Wireless Sensor Networks Exemplify

computational constrained environments, where the compact nature of

the components cannot support complex computations or high

communication overhead.

AAllggoorr ii tthhmm :: HHaasshh MM eessssaaggee AAuutthheenntt iiccaatt iioonn CCooddeess

July

2009

18 ITMC18 DDeessiiggnn ooff FFaaii rr SScchheedduull iinngg

SScchheemmeess ffoorr tthhee QQooSS--OOrr iieenntteedd

WWii rr eelleessss LL AANN..

This project simultaneously achieves fairness and quality-of-service

(QoS) guarantee in QoS-oriented wireless local area networks (LANs)

is an important and challenging issue.

AAllggoorr ii tthhmm:: II nntteerr ff rr aammee SSppaaccee ((II FFSS)) aanndd AAll lloowwaannccee

19 ITMC19 GGrr eeeeddyy RRoouutt iinngg wwii tthh AAnntt ii --VVooiidd

TTrr aavveerr ssaall ffoorr WWiirr eelleessss SSeennssoorr

NNeettwwoorr kkss..

In this paper, a greedy antivoid routing (GAR) protocol is proposed to

solve the void problem with increased routing efficiency by exploiting

the boundary finding technique for the unit disk graph (UDG).

JULY

20 ITMC20 CCeell ll BBrr eeaatthhiinngg TTeecchhnniiqquueess ffoorr

LL ooaadd BBaallaanncciinngg iinn WWiirr eelleessss

LL AANNss..

In this paper we present a new load balancing technique by controlling

the size of WLAN cells (i.e., AP’s coverage range)

AAllggoorr ii tthhmm uusseedd:: MM iinn--MM aaxx AAllggoorr ii tthhmm

JUNE

21 ITMC21 EEnneerr ggyy--EEff ff iicciieenntt SSII NNRR--BBaasseedd

RRoouutt iinngg ffoorr MMuull tt iihhoopp WWii rr eelleessss

NNeettwwoorr kkss..

In this paper, we develop an energy-efficient routing scheme that takes

into account the interference created by existing flows in the network.

AAllggoorr ii tthhmm uusseedd:: EEnneerr ggyy EEffff iicciieenntt RRoouutt iinngg TTeecchhnniiqquuee..

22 ITMC22 WWaarr ddrr oopp RRoouutt iinngg iinn WWiirr eelleessss

NNeettwwoorr kkss..

Routing protocols for multihop wireless networks have traditionally

used shortest path routing to obtain paths to destinations & do not

consider traffic load or delay as an explicit factor in the choice of

routes for which the project is designed.

AAllggoorr ii tthhmm:: SSTTAARRAA

MAY

23 ITMC23 EEffff iicciieenntt BBrr ooaaddccaasstt iinngg iinn MM oobbii llee

AAdd HHoocc NNeettwwoorr kkss

In our project two efficient broadcasting algorithms based on 1-hop

neighbor information is performed.

MAY

24 ITMC24 AAnn II nntteeggrr aatteedd AApppprr ooaacchh ttoo

SSeennssoorr RRoollee SSeelleecctt iioonn..

We propose an integrated route discovery and sensor selection

protocol called DAPR that further lengthens network lifetime by

jointly selecting routers and active sensors, again with the goal of

minimizing the use of sensors in sparsely covered areas.

MAY

Page 20: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 20

AAllggoorr ii tthhmm uusseedd:: DDAAPPRR..

25 ITMC25 AA ttaabbuu sseeaarr cchh aallggoorr ii tthhmm ffoorr

CClluusstteerr bbuuii llddiinngg iinn wwii rr eelleessss

SSeennssoorr nneettwwoorr kkss

In this project the main challenge in wireless sensor network

deployment pertains to optimizing energy consumption when

collecting data from sensor nodes.

Algorithm : Tabu Search

APR

26 ITMC26 BBSSMM RR:: BByyzzaanntt iinnee--RReessii ll iieenntt

SSeeccuurr ee MM uull tt iiccaasstt RRoouutt iinngg iinn

MM uull tt ii --hhoopp WWiirr eelleessss NNeettwwoorr kkss..

We identify vulnerabilities of on-demand multicast routing protocols

for multihop wireless networks and propose BSMR, a novel secure

multicast routing protocol designed to withstand insider attacks from

colluding adversaries.

AAllggoorr ii tthhmm:: RRoouuttee ddiissccoovveerr yy

APR

27 ITMC27 LL ooccaall CCoonnssttrr uucctt iioonn ooff NNeeaarr --

OOpptt iimmaall PPoowweerr SSppaannnneerr ss ffoorr

WWii rr eelleessss AAdd HHoocc NNeettwwoorr kkss..

We present a local distributed algorithm that, given a wireless ad hoc

network modeled as a unit disk graph .

AAllggoorr ii tthhmm uusseedd:: RRaannddoomm WWaallkk AAllggoorr ii tthhmm..

APR

28 ITMC28 BBiiaasseedd RRaannddoomm WWaallkkss iinn

UUnnii ffoorr mm WWiirr eelleessss NNeettwwoorr kkss..

This paper studies the effect of biasing random walk toward the target

on the hitting time. For a walk running over a network with uniform

node distribution, a simple upper bound that connects the hitting time

to the bias level is obtained. The key result is that even a modest bias

level is able to reduce the hitting time significantly

AAllggoorr ii tthhmm uusseedd:: RRaannddoomm WWaallkk AAllggoorr ii tthhmm

APR

29 ITMC29 MM ooddeell--BBaasseedd TTeecchhnniiqquueess ffoorr

DDaattaa RReell iiaabbii ll ii ttyy iinn WWiirr eelleessss

SSeennssoorr NNeettwwoorr kkss..

This paper presents a new method that makes use of the properties of

sensor data to enable reliable data collection. The approach consists of

creating predictive models based on the temporal correlation in the

data and using them for real-time error correction.

AAllggoorr ii tthhmm:: MM iinn EERRRR AAllggoorr ii tthhmm..

APR

30 ITMC30 AAnn EEppiiddeemmiicc TThheeoorr eett iicc

FFrr aammeewwoorr kk ffoorr VVuullnneerr aabbii ll ii ttyy

AAnnaallyyssiiss ooff BBrr ooaaddccaasstt PPrr oottooccoollss

iinn WWiirr eelleessss SSeennssoorr NNeettwwoorr kkss..

In this paper, we propose a general framework based on the principles

of epidemic theory, for vulnerability analysis of current broadcast

protocols in wireless sensor networks. In particular, we develop a

common mathematical model for propagation that incorporates

important parameters derived from the communication patterns of the

protocol. AAllggoorr ii tthhmm:: EEppiiddeemmiicc tthheeoorr yy

MAR

31 ITMC31 EEffff iicciieenntt BBrr ooaaddccaasstt iinngg iinn MM oobbii llee

AAdd HHoocc NNeettwwoorr kkss

In our project two efficient broadcasting algorithms based on 1-hop

neighbor information is proposed & implemented.

FEB

32 ITMC32 HHeeaaddll iigghhtt pprr eeffeettcchhiinngg && ddyynnaammiicc

cchhaaiinniinngg ffoorr ccooooppeerr aatt iivvee mmeeddiiaa

sstt rr eeaammiinngg

In this project our goal is to sharing audio and video resources between

media environments

AAllggoorr ii tthhmm:: DDiissttrr iibbuutteedd II nnddeexx MM aaiinntteennaannccee AAllggoorr ii tthhmm..

FEB

Page 21: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 21

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN NNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTTWWWWWWWWWWWWOOOOOOOOOOOORRRRRRRRRRRRKKKKKKKKKKKK SSSSSSSSSSSSEEEEEEEEEEEECCCCCCCCCCCCUUUUUUUUUUUURRRRRRRRRRRRIIIIIIIIIIIITTTTTTTTTTTTYYYYYYYYYYYY

JJJJJJJJJJJJAAAAAAAAAAAAVVVVVVVVVVVVAAAAAAAAAAAA &&&&&&&&&&&& DDDDDDDDDDDDOOOOOOOOOOOOTTTTTTTTTTTTNNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTT 1 ITNS01 FFaasstt CCRRCCss

AAllggoorr ii tthhmm :: TTwwoo AAll tteerr nnaatt ii vvee CCRRCC

aallggoorr ii tthhmm

CRCs have desirable properties for effective error detection. But their

software implementation, which relies on many steps of the

polynomial division, is typically slower than other codes such as

weaker checksums. In this paper, we introduce such fast CRCs as well

as an effective technique to implement them.

OCT

2 ITNS02 SSeeccuurr iinngg ssttrr uuccttuurr eedd oovveerr llaayyss

aaggaaiinnsstt II ddeenntt ii ttyy aatt ttaacckkss

In this paper, we define a generalized form of the Identity attack, and

propose a lightweight detection and tracking system that protects

applications by Redirecting traffic away from attackers.

OCT

20

09

3 ITNS03 HHiigghh--PPeerr ffoorr mmaannccee RReekkeeyyiinngg

PPrr oocceessssoorr AArr cchhii tteeccttuurr ee ffoorr GGrr oouupp

KK eeyy MM aannaaggeemmeenntt

AAllggoorr ii tthhmm :: SSeeccuurr ii ttyy YY--DDiiaaggrr aamm

Group key management is a critical task in secure multicast

applications such as Pay-TV over the Internet. In this paper, a novel

hardware/software architecture is proposed, which optimizes the

rekeying performance not only by minimizing the number of

cryptographic operations, but also by reducing the execution times of

these operations including digital signing with the aid of hardware

acceleration

OCT

4 ITNS04 RReeccoonnff iigguurr aabbllee CCoommppuutt iinngg

AApppprr ooaacchh ffoorr TTaattee PPaaii rr iinngg

CCrr yyppttoossyysstteemmss oovveerr BBiinnaarr yy FFiieellddss

Tate-pairing-based cryptosystems, because of their ability to be used in

multiparty identity-based key management schemes, have recently

emerged as an alternative to traditional public key cryptosystems. In

this paper, we propose a new FPGA based architecture of the Tate-

pairing-based computation over binary fields.

AAllggoorr ii tthhmm :: TTaattee PPaaii rr iinngg CCoommppuuttaatt iioonn

SEPT

5 ITNS05 KK TTRR:: AAnn EEff ff iicciieenntt KK eeyy

MM aannaaggeemmeenntt SScchheemmee ffoorr SSeeccuurr ee

DDaattaa AAcccceessss CCoonnttrr ooll iinn WWiirr eelleessss

BBrr ooaaddccaasstt SSeerr vviicceess..

Wireless broadcast is an effective approach for disseminating data to a

number of users. In this paper, we propose an efficient key

management scheme, namely, key tree reuse (KTR), to handle key

distribution with regard to complex subscription options and user

activities AAllggoorr ii tthhmm :: KK TTRR

SEPT

6 ITNS06 EErr rr oorr DDeetteecctt iioonn aanndd FFaauull tt

TToolleerr aannccee iinn EECCSSMM UUssiinngg II nnppuutt

RRaannddoommiizzaatt iioonn..

In this paper, error-detecting and fault-tolerant elliptic curve

cryptosystems are considered. Error detection may be a sufficient

countermeasure for many security applications; however, fault-tolerant

characteristic enables a system to perform its normal operation in spite

of faults. AAllggoorr ii tthhmm :: eell ll iipptt iicc ccuurr vvee ssccaallaarr mmuull tt iippll iiccaatt iioonn

SEPT

7 ITNS07 EEnnhhaanncceedd SSeeccuurr ii ttyy ffoorr oonnll iinnee

EExxaammss uussiinngg GGrr oouupp

CCrr yyppttooggrr aapphhyy..

This project proposes enhanced secure online exam management

mediated by group cryptography using remote monitoring and control

of ports.

aug

8 ITNS08 AAnn EEffff iicciieenntt BByyzzaanntt iinnee--RReessii ll iieenntt This paper presents an efficient implementation of a Linearizable aug

Page 22: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 22

TTuuppllee SSppaaccee

Byzantine fault-tolerant Tuple Space (LBTS) that uses a novel

Byzantine quorum systems replication technique in which most

operations are implemented by quorum protocols while stronger

operations are implemented by more expensive protocols based on

consensus. AAllggoorr ii tthhmm :: LL BBTTSS

9 ITNS09 MM eessssaaggee aauutthheenntt iiccaatt iioonn iinn

ccoommppuuttaatt iioonnaall llyy ccoonnsstt rr aaiinneedd

EEnnvvii rr oonnmmeennttss

In this project RFID and Wireless Sensor Networks Exemplify

computational constrained environments, where the compact nature of

the components cannot support complex computations or high

communication overhead.

AAllggoorr ii tthhmm :: HHaasshh MM eessssaaggee AAuutthheenntt iiccaatt iioonn CCooddeess

July

200

9

10 ITNS10 AAnn EEff ff iicciieenntt aanndd SSccaallaabbllee QQuuaassii--

AAggggrreeggaattee SSiiggnnaattuurr ee SScchheemmee

BBaasseedd oonn LL FFSSRR SSeeqquueenncceess..

In this paper, we present an efficient and scalable quasi-aggregate

signature scheme, based on third-order linear feedback shift register

(cubic LFSR) sequences that can be instantiated using both XTR and

GH public key cryptosystems. AAllggoorr ii tthhmm :: LL FFSSRR SSeeqquueenncceess

JULY

11 ITNS11 DDeessiiggnn aanndd VVeerr ii ff iiccaatt iioonn ooff

EEnnhhaanncceedd SSeeccuurr ee LL ooccaall iizzaatt iioonn

SScchheemmee iinn WWii rr eelleessss SSeennssoorr

NNeettwwoorr kkss

In this paper, we focus on the need for secure and efficient localization

for wireless sensor networks in adversarial settings.

Algorithm :Enhanced Secure Localization Scheme

July

12 ITNS12 CCooll lluussiivvee PPiirr aaccyy PPrr eevveenntt iioonn iinn PP22PP

CCoonntteenntt DDeell iivveerr yy NNeettwwoorr kkss..

AAllggoorr ii tthhmm:: ppeeeerr aauutthhoorr iizziinngg

pprr oottooccooll ..

Collusive piracy is the main source of intellectual property violations

within the boundary of a P2P network. Paid clients (colluders) may

illegally share copyrighted content files with unpaid clients (pirates).

The scheme stops collusive piracy without hurting legitimate P2P

clients by targeting poisoning on detected violators,Exclusively.

JULY

13 ITNS13 BBeeyyoonndd OOuuttppuutt VVoott iinngg::

DDeetteecctt iinngg CCoommpprr oommiisseedd RReeppll iiccaass

UUssiinngg HHMM MM --BBaasseedd BBeehhaavviioorr aall

DDiissttaannccee

Many host-based anomaly detection techniques have been proposed to

detect code-injection attacks on servers. In this paper, we present a

novel approach to behavioral distance measurement using a new type

of HMM, and present an architecture realizing this new approach.

Algorithm : Hidden Markov Model

JUN

14 ITNS14 EEffffeecctt iivvee CCooll llaabboorr aatt iioonn wwii tthh

II nnffoorr mmaatt iioonn SShhaarr iinngg iinn VVii rr ttuuaall

UUnniivveerr ssii tt iieess

Information sharing of virtual universities usually occurs in broad,

highly dynamic network-based environments, & formally accessing

the resources in a secure manner poses a difficult and challenge. This

paper aims to build a new rule-based framework to identify & address

issues of sharing in virtual university environments through Role

Based Access Control Management.

AAllggoorr ii tthhmm :: RRoollee BBaasseedd AAcccceessss CCoonnttrr ooll

JUN

15 ITNS15 AA llaarr ggee ––ssccaallee hhiiddddeenn SSeemmii--

mmaarr kkoovv mmooddeell ffoorr aannoommaallyy

ddeetteecctt iioonn oonn uusseerr bbrr oowwssiinngg

bbeehhaavviioorr ss

This project is to achieve early attack detection and filtering for the

application layer based DDOS attack by using extended hidden semi –

markov model.

AAllggoorr ii tthhmm :: HHMM MM

JUN

Page 23: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 23

16 ITNS16 II nntteerr nneett aanndd oonnll iinnee iinnffoorr mmaatt iioonn

pprr iivvaaccyy:: AAnn EExxpplloorr aattoorr yy ssttuuddyy ooff

pprr eetteeeennss aanndd EEaarr llyy tteeeennss..

In this project, we explored private information sharing behavior of

preteen and early teen internet users by social Cognitive theory and

protection Motivation Theory.

Jun

17 ITNS17 PPrr oovvaabbllyy SSeeccuurr ee SStteeggaannooggrr aapphhyy

This paper introduces a cryptographic formalization of steganographic

security in terms of computational indistinguishability from a channel,

an indexed family of probability distributions on cover messages

AAllggoorr ii tthhmm :: ccoommpplleexxii ttyy--tthheeoorr eett iicc pprr ooooff tteecchhnniiqquueess.

MAY

18 ITNS18 AA SSeeccuurr ee MM oobbii llee HHeeaall tthhccaarr ee

ssyysstteemm uussiinngg tt rr uusstt –– bbaasseedd

MM uull tt iiccaasstt sscchheemmee..

This project shows about the technique of trust evaluation without a

centralized trust management authority and propose a trust evaluation

model that can efficiently calculate the trustworthiness of mobile

healthcare.

MAY

19 ITNS19 BBSSMM RR:: BByyzzaanntt iinnee--RReessii ll iieenntt SSeeccuurr ee

MM uull tt iiccaasstt RRoouutt iinngg iinn MM uull tt iihhoopp

WWii rr eelleessss NNeettwwoorr kkss

In this work we identify vulnerabilities of on- demand multicast

routing protocols for multi-hop wireless networks & discuss the

challenges encountered in designing mechanisms to defend them.

Algorithm : BByyzzaanntt iinnee--RReessii ll iieenntt SSeeccuurr ee MM uull tt iiccaasstt RRoouutt iinngg

APR

20 ITNS20 MM ooddeell--BBaasseedd TTeecchhnniiqquueess ffoorr DDaattaa

RReell iiaabbii ll ii ttyy iinn WWii rr eelleessss SSeennssoorr

NNeettwwoorr kkss

This paper presents a new method that makes use of the properties of

sensor data to enable reliable data collection. The approach consists of

creating predictive models based on the temporal correlation in the

data and using them for real-time error correction.

AAllggoorr ii tthhmm :: mmooddeell --bbaasseedd eerr rr oorr ccoorr rr eecctt iioonn

APR

21 ITNS21 MM ii tt iiggaatt iinngg ddeenniiaall ooff sseerr vviiccee

aatt ttaacckkss oonn tthhee cchhoorr dd oovveerr llaayy

nneettwwoorr kk aa llooccaatt iioonn hhiiddiinngg

aapppprr ooaacchh

In this projects location guard a location hiding technique for

securing overlay file storage system from targeted file attacks.

AAllggoorr ii tthhmm :: LL ooccaatt iioonn GGuuaarr dd

APR

22 ITNS22 TThhee eeffffeecctt iivveenneessss ooff CChheecckkssuummss

ffoorr eemmbbeeddddeedd ccoonntt rr ooll nneettwwoorr kkss..

This project is to detect data transmission errors by using checksum

computations and Embedded Control Networks.

Mar

23 ITNS23 SSMM OOCCKK :: AA SSccaallaabbllee MM eetthhoodd ooff

CCrr yyppttooggrr aapphhiicc KK eeyy MM aannaaggeemmeenntt

ffoorr MM iissssiioonn--CCrr ii tt iiccaall WWiirr eelleessss AAdd--

HHoocc NNeettwwoorr kkss..

In this paper we present a self contained public management scheme, a

scalable method of cryptographic key management (SMOCK), which

achieves almost zero communication overhead for authentication.

AAllggoorr ii tthhmm:: SSeell ff--CCoonnttaaiinneedd PPuubbll iicc KK eeyy--MM aannaaggeemmeenntt

Mar

24 ITNS24 EEffff iicciieenntt nnooddee aaddmmiissssiioonn aanndd

cceerr tt ii ff iiccaattee lleessss sseeccuurr ee

ccoommmmuunniiccaatt iioonn iinn sshhoorr tt ll iivveedd

MM AANNEETT

This projects we focus on a common type of MANET that is

formed on a temporary basis and a fully no a interactive

admission techniques geared for this type of a network.

AAllggoorr ii tthhmm :: ggeenneerr iicc aaddmmiissssiioonn pprr oottooccooll

FEb

25 ITNS25 DDyynnaammiicc rr oouutt iinngg wwii tthh sseeccuurr ii ttyy

ccoonnssiiddeerr aatt iioonn

In this projects a dynamic routing algorithm that could

randomize delivery paths for data transition.

AAllggoorr ii tthhmm :: SSEECCUURRII TTYY--EENNHHAANNCCEEDD DDYYNNAAMM II CC RROOUUTTII NNGG

Jan

Page 24: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 24

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN NNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTTWWWWWWWWWWWWOOOOOOOOOOOORRRRRRRRRRRRKKKKKKKKKKKKIIIIIIIIIIIINNNNNNNNNNNNGGGGGGGGGGGG

JJJJJJJJJJJJAAAAAAAAAAAAVVVVVVVVVVVVAAAAAAAAAAAA &&&&&&&&&&&& DDDDDDDDDDDDOOOOOOOOOOOOTTTTTTTTTTTT NNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTT 1 ITNJ01 OOnn GGaammee TThheeoorr eett iicc PPeeeerr SSeelleecctt iioonn ffoorr

RReessii ll iieenntt PPeeeerr --ttoo--PPeeeerr MM eeddiiaa

SStt rr eeaammiinngg

AAllggoorr ii tthhmm :: GGaammee TThheeoorr eett iicc PPeeeerr

SSeelleeccttiioonn AApppprr ooaacchh

A plethora of approaches have been suggested and

implemented to support P2P media streaming. In our study, we

first classified existing approaches and studied their

characteristics by looking at three important quantities: number

of upstream peers (parents), number of downstream peers

(children), and average number of links per peer.

OCT

200

9

2 ITNJ02 FFuull ll --II nnffoorr mmaatt iioonn LL ooookkuuppss ffoorr PPeeeerr --ttoo--

PPeeeerr OOvveerr llaayyss

AAllggoorr ii tthhmm :: OOnnee HHoopp DDeessiiggnn

In this paper, we present a peer-to-peer routing algorithm with

small lookup paths. Our algorithm, called “One Hop,”

maintains full information about the system membership at

each node, routing in a single hop whenever that information is

up to date and in a small number of hops otherwise.

SEP

T

200

9

3 ITNJ03 SSccaallaabbllee RRoouutt iinngg iinn CCyyccll iicc MM oobbii llee

NNeettwwoorr kkss

AAllggoorr ii tthhmm :: DDTTNN HHiieerr aarr cchhiiaall RRoouutt iinngg

In this project we propose a routing algorithm, DTN

Hierarchical Routing (DHR) for scalable Routing and represent

its advantage over other routing algorithms for cyclic mobile

networks.

SEP

T

200

9

4 ITNJ04 EEnnffoorr cciinngg MM iinniimmuumm--CCoosstt MM uull tt iiccaasstt

RRoouutt iinngg aaggaaiinnsstt SSeell ff iisshh II nnffoorr mmaatt iioonn

FFlloowwss

We study multicast in a noncooperative environment where

information flows selfishly route themselves through the

cheapest paths available.

AAllggoorr ii tthhmm :: sshhaaddooww--pprr iiccee--bbaasseedd ccoosstt aall llooccaattiioonn

SEP

T

200

9

5 ITNJ05 EEffff iicciieenntt aanndd SSccaallaabbllee HHaarr ddwwaarr ee--

BBaasseedd MM uull tt iiccaasstt iinn FFaatt--TTrr eeee NNeettwwoorr kkss

tt rr aaddii tt iioonnaall ssoolluutt iioonnss..

This article presents an efficient and scalable mechanism to

overcome the limitations of collective communication in

switched interconnection networks in the presence of faults.

AAllggoorr ii tthhmm :: NNeeww HHaarr ddwwaarree bbaasseedd RRoouutt iinngg ffoorr MM uull tt iiccaasstt

SEP

T

200

9

6 ITNJ06 MM uull tt iippaatthh ddiisssseemmiinnaatt iioonn iinn rr eegguullaarr

mmeesshh ttooppoollooggiieess

AAllggoorr ii tthhmm:: OOpptt iimmaall SSpprr eeaaddiinngg

AAllggoorr ii tthhmm..

In this project we present a scalable approach for

dissemination that exploits all the shortest paths between a

pair of nodes of and improve the Qos.

AUG

200

9

7 ITNJ07 EErr rr oorr CCoonnttrr ooll iinn WWiirr eelleessss SSeennssoorr

NNeettwwoorr kkss:: AA CCrr oossss LL aayyeerr AAnnaallyyssiiss

In this paper, a cross-layer methodology for the analysis of

error control schemes in WSNs is presented such that the

effects of multi-hop routing and the broadcast nature of the

wireless channel are investigated.

AUG

8 ITNJ08 SSiinnggllee--LL iinnkk FFaaii lluurr ee DDeetteecctt iioonn iinn AAll ll --

OOpptt iiccaall NNeettwwoorr kkss UUssiinngg MM oonnii ttoorr iinngg

In this paper, we consider the problem of fault localization in

all-optical networks. We introduce the concept of monitoring

cycles (MCs) and monitoring paths (MPs) for unique

AUG

Page 25: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 25

CCyycclleess aanndd PPaatthhss identification of single-link failures.

9 ITNJ09 PPRRII MM EE:: PPeeeerr --ttoo--PPeeeerr RReecceeiivveerr --ddrr iivveenn

MM EESSHH--bbaasseedd SSttrr eeaammiinngg

AAllggoorr ii tthhmm :: PPRRII MM EE

This paper presents PRIME, the first mesh-based P2P

streaming for live content that effectively incorporates

swarming content delivery.

AUG

10 ITNJ10 OOppppoorr ttuunniisstt iicc UUssee ooff CCll iieenntt RReeppeeaatteerr ss

ttoo II mmpprr oovvee PPeerr ffoorr mmaannccee ooff WWLL AANNss

Algorithm: Soft Repeater Approach.

Currently deployed IEEE 802.11 WLANs (Wi-Fi networks)

share access point (AP) bandwidth on a per-packet basis.

However, various stations communicating with the AP often

have different signal qualities, resulting in different

transmission rates. We propose Soft Repeater, a practical,

deployable system in which stations cooperatively address the

rate anomaly problem.

AUG

11 ITNJ11 PPrr eessttoo:: FFeeeeddbbaacckk--DDrr iivveenn DDaattaa

MM aannaaggeemmeenntt iinn sseennssoorr NNeettwwoorr kkss..

AAllggoorr ii tthhmm uusseedd:: PPRREESSTTOO mmeetthhoodd

This paper presents PRESTO, a novel two-tier sensor data

management architecture comprising proxies & sensors that

cooperate with one another for acquiring data & processing

AUG

12 ITNJ12 AAnn II nn--NNeettwwoorr kk QQuueerr yyiinngg FFrr aammeewwoorr kk

ffoorr WWiirr eelleessss SSeennssoorr NNeettwwoorr kkss

AAllggoorr ii tthhmm:: DDiissttrr iibbuutteedd QQuuaadd TTrr eeee..

We propose an in-network querying framework, namely, the

Distributed Quad-Tree (DQT). We use a multiresolution

algorithm, which is optimal with respect to least square errors

that model the data in a decentralized way.

AUG

200

9

13 ITNJ13 LL iigghhttwweeiigghhtt oonnll iinnee ppeerr ffoorr mmaannccee

mmoonnii ttoorr iinngg aanndd ttuunniinngg wwii tthh

eemmbbeeddddeedd ggoossssiipp

In this project a new performance monitoring approach

called (EG) is designed to enable lightweight online

performance monitoring and tuning

AAllggoorr ii tthhmm :: EEmmbbeeddddeedd GGoossssiipp

July

200

9

14 ITNJ14 EEvveennttuuaall cclluusstteerr aa mmoodduullaarr aapppprr ooaacchh

ttoo ddeessiiggnniinngg hhiieerr aarr cchhiiccaall ccoonnsseennssuuss

pprr oottooccooll iinn MM AANNEETT ss

IN this project a clustering function called eventual

blusterer is designed for constructing and monitoring the two

layer hierarchy

AAllggoorr ii tthhmm :: EEvveennttuuaall CClluusstteerr eerr FFuunncctt iioonn

June

15 ITNJ15 OOnn tthhee ff ll yy eesstt iimmaatt iioonn ooff tthhee pprr oocceesssseess

tthhaatt aarr ee aall iivvee iinn aann aassyynncchhrr oonnoouuss

mmaassssaaggee ppaassssiinngg ssyysstteemm

In this project propose a protocol plus a second protocol

that allows to cope with heterogeneous communication

network in fault _tolerant distributed computing

AAllggoorr ii tthhmm :: GGlloobbaall cclloocckk bbaasseedd PPrr oottooccooll

June

16 ITNJ16 AA ccaassee ffoorr ccoonntt iinnuueess ddaattaa pprr ootteecctt iioonn

aatt bblloocckk lleevveell iinn ddiisskk aarr rr aayy

ssttoorr aaggeess AAllggoorr ii tthhmm:: TTRRAAPP

In this project we propose a new disk array architecture

that provides timely recovery to any point _in _time

referred to as TRAP .

June

17 ITNJ17 UUssiinngg ddaattaa aacccceessssiibbii ll ii ttyy ffoorr

rr eessoouurr ccee sseelleecctt iioonn iinn llaarr ggee ssccaallee

ddiissttrr iibbuutteedd ssyysstteemm

IN this project we present accessibility aware resource

selection techniques by which it is possible to choose node

that will have efficient data access to remote data source

AAllggoorr ii tthhmm ::AAcccceessssiibbii ll ii ttyy bbaasseedd RReessoouurr ccee SSeelleecctt iioonn

JUN

Page 26: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 26

18 ITNJ18 PPrr iivvaaccyy AAwwaarr ee ccooll llaabboorr aatt iivvee iinn

ssppaamm ff ii ll tteerr iinngg

AAllggoorr ii tthhmm :: AALL PPAACCAASS

In this project a privacy _aware framework for

collaborative spam filtering preserving massage

transformation techniques that is highly resilient against the

latest kinds of spam attacks

may

19 ITNJ19 DDyynnaammiicc sseeaarr cchh aallggoorr ii tthhmm iinn

uunnsstt rr uuccttuurreedd ppeeeerr __ttoo __ ppeeeerr

nneettwwoorr kk

In this project we propose the dynamic search (DS)

algorithm which is a generalization of flooding and RW.

AAllggoorr ii tthhmm:: DDyynnaammiicc SSeeaarr cchh AAllggoorr ii tthhmm..

May

20 ITNJ20 HHiissttooggrr aamm –– bbaasseedd gglloobbaall llooaadd

bbaallaanncciinngg iinn sstt rr uuccttuurr eedd ppeeeerr –– ttoo ––

ppeeeerr ssyysstteemmss..

This project explains load balancing in networks.

1. Maintaining load information.

2. Redistributing the load if it is exceed the limit.

AAllggoorr ii tthhmm :: HHII GGLL OOBB

APR

21 ITNJ21 AA DDeecceennttrr aall ii zzeedd mmeetthhoodd ffoorr ssccaall iinngg

uupp ggeennoommee ssiimmii llaarr ii ttyy sseeaarr cchh sseerr vviiccee

This paper tackle this problem in a novel way which treats

sequence search request as content request to both genome

database and similarity detection method.

AAllggoorr ii tthhmm :: DDeecceennttrr aall iizzeedd QQuueerr yy SScchheedduull iinngg

MA

R

22 ITNJ22 SShhaarr iinngg mmeemmoorr yy bbeettwweeeenn BByyzzaanntt iinnee

pprr oocceessss uussiinngg ppooll iiccyy –– eennffoorr cceedd ttuuppllee

ssppaacceess

The constructions presented in this paper demonstrate that this

approach allows the development of simple delegant

algorithms, at the cost of defining access policies for the shared

memory objects they use.

AAllggoorr ii tthhmm :: PPooll iiccyy--EEnnffoorr cceedd AAuuggmmeenntteedd TTuuppllee SSppaaccee

MA

R

23 ITNJ23 AAnn eeff ff iicciieenntt aaddaapptt ii vvee tt rr aannssmmiissssiioonn

ccoonntt rr ooll sscchheemmee ffoorr llaarr ggee __ssccaallee

ddiissttrr iibbuutteedd ssiimmuullaatt iioonn ssyysstteemm

IN this project the aim of DDM is to reduce and control

the volume of information exchanged among the simulated

entities in a large scale distributed simulation system

AAllggoorr ii tthhmm :: AAddaapptt ii vvee GGrr iidd bbaasseedd DDDDMM

FEB

24 ITNJ24 PPlleexxuuss;; AA ssccaallaabbllee ppeeeerr ttoo ppeeeerr

pprr oottooccooll eennaabbll iinngg eeffff iicciieenntt ssuubbsseett

sseeaarr cchh

In this project plexus a peer_ to peer search protocol the

provides an efficient machine for advertising a bit sequence

and discovering it using any subset of its l bits.

AAllggoorr ii tthhmm :: PPLL EEXXUUSS

FEB

25 ITNJ25 DDeetteecctt iinngg mmaall iicciioouuss ppaacckkeett lloooossee

AAllggoorr ii tthhmm :: RREEDD AAllggoorr ii tthhmm

IN this project the problem of detecting whether a

compromised router is maliciously manipulating its stream

of packets .

FEB

26 ITNJ26 CCooooppeerr aatt iivvee sseeccoonnddaarr yy aauutthhoorr iizzeedd

rr eeccyyccll iinngg

AAllggoorr ii tthhmm ::CCSSAARR

In this project an approach where each application server

recycles previously received authorization and shears

them with other application server to mask authorization

server failures and network delays.

FEB

Page 27: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 27

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN DDDDDDDDDDDDAAAAAAAAAAAATTTTTTTTTTTTAAAAAAAAAAAA MMMMMMMMMMMMIIIIIIIIIIIINNNNNNNNNNNNIIIIIIIIIIIINNNNNNNNNNNNGGGGGGGGGGGG

JJJJJJJJJJJJAAAAAAAAAAAAVVVVVVVVVVVVAAAAAAAAAAAA &&&&&&&&&&&& DDDDDDDDDDDDOOOOOOOOOOOOTTTTTTTTTTTTNNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTT 1 ITDM01 TThhee CCyyccll iicc MM ooddeell AAnnaallyyssiiss oonn

SSeeqquueenntt iiaall PPaatt tteerr nnss

AAllggoorr ii tthhmm :: GGeenneerr aall iizzeedd PPeerr iiooddiiccii ttyy

DDeetteecctt iioonn

in this paper, data mining skills and the fundamentals of

statistics are combined to develop a set of algorithms to unearth

the cyclic properties of discovered sequential patterns. The

algorithms, coupled with the sequential pattern mining process,

constitute a thorough scheme to analyze and predict likely

consumer behavior

NOV

2 ITDM02 eessttMM aaxx:: TTrr aacciinngg MM aaxxiimmaall FFrr eeqquueenntt

II tteemm SSeettss II nnssttaanntt llyy oovveerr OOnnll iinnee

TTrr aannssaacctt iioonnaall DDaattaa SSttrr eeaammss

The method, namely estMax, maintains the set of frequent item

sets by a prefix tree and extracts all MFIs without any

additional superset/subset checking mechanism.

AAllggoorr ii tthhmm :: MM AAXXII MM AALL FFRREEQQUUEENNTT II TTEEMM SSEETTSS

OCT

3 ITDM03 AApppprr ooxxiimmaattee DDiisstt rr iibbuutteedd KK --MM eeaannss

CClluusstteerr iinngg oovveerr aa PPeeeerr --ttoo--PPeeeerr

NNeettwwoorr kk

AAllggoorr ii tthhmm :: GGrr aannuullaarr ccoommppuutt iinngg

This paper considers the distributed K-means clustering

problem where the data and computing resources are

distributed over a large P2P network. It offers two algorithms

which produce an approximation of the result produced by the

standard centralized K-means clustering algorithm

oct

4 ITDM04 AAuuttoommaatt iinngg tthhee DDeessiiggnn aanndd

CCoonnsstt rr uucctt iioonn ooff QQuueerr yy FFoorr mmss

AAllggoorr ii tthhmm uusseedd:: TTuunnaabbllee cclluusstteerr iinngg

aallggoorr ii tthhmm

We design a tunable clustering algorithm for establishing form

structure based on multiple “similar” queries, which includes a

mechanism for extending forms to support future “similar”

queries. The algorithm is adaptive and can incrementally adjust

forms to reflect the most current querying trends.

5 ITDM05 GGeenneerr aall CCoosstt MM ooddeellss ffoorr EEvvaalluuaatt iinngg

DDiimmeennssiioonnaall ii ttyy RReedduucctt iioonn iinn HHiigghh--

DDiimmeennssiioonnaall SSppaacceess

AAllggoorr ii tthhmm :: PPaarr tt ii tt iioonniinngg bbaasseedd oonn

RRaannddoommiizzeedd SSeeaarr cchh

in this paper, we propose general cost models for evaluating the

query performance over the reduced data sets by GDR, LDR,

and ADR, in light of which we introduce a novel (A)LDR

method, Partitioning based on RANdomized Search (PRANS).

It can achieve high retrieval efficiency with the guarantee of

optimality given by the formal models.

6 ITDM06 DDiisstt rr iibbuutteedd VViieeww DDiivveerr ggeennccee CCoonnttrr ooll

ooff DDaattaa FFrr eesshhnneessss iinn RReeppll ii ccaatteedd

DDaattaabbaassee SSyysstteemmss

AAllggoorr ii tthhmm uusseedd:: DDiisstt rr iibbuutteedd aallggoorr ii tthhmm

In this paper, we propose a distributed method to control the

view divergence of data freshness for clients in replicated

database systems whose facilitating or administrative roles are

equal. Our method provides data with statistically defined

freshness to clients when updates are initially accepted by any

of the replicas, and then, asynchronously propagated among the

replicas that are connected in a tree structure.

7 ITDM07 BBaattcchh MM ooddee AAcctt iivvee LL eeaarr nniinngg wwii tthh

AAppppll iiccaatt iioonnss ttoo TTeexxtt CCaatteeggoorr iizzaatt iioonn

aanndd II mmaaggee RReettrr iieevvaall

Algorithm : batch mode active learning

we present a framework for batch mode active learning, which

selects a number of informative examples for manual labeling

in each iteration. We apply our batch mode active learning

framework to both text categorization and image retrieval

Page 28: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 28

8 ITDM08 LL eeaarr nniinngg ff rr oomm II mmbbaallaanncceedd DDaattaa The imbalanced learning problem is concerned with the

performance of learning algorithms in the presence of

underrepresented data and severe class distribution skews. In

this paper, we provide a comprehensive review of the

development of research in learning from imbalanced data

SEP

T

9 ITDM09 VViissiibbllee RReevveerr ssee kk--NNeeaarreesstt NNeeiigghhbboorr

QQuueerr yy PPrr oocceessssiinngg iinn SSppaatt iiaall DDaattaabbaasseess

We propose an efficient algorithm for VRNN query processing,

assuming that P and O are indexed by R-trees. Our techniques

do not require any preprocessing and employ half-plane

property and visibility check to prune the search space

Algorithm :VRNN

SEP

10 ITDM10 RReessuull tt MM eerr ggiinngg TTeecchhnniiqquuee ffoorr

AAnnsswweerr iinngg XXPPaatthh QQuueerr yy oovveerr XXSSLL TT

TTrr aannssffoorr mmeedd DDaattaa

Caching stores the results of previously answered queries in

order to answer succeeding queries faster by reusing these

results. We propose two different approaches for using caches

of XSLT transformed XML data in order to answer queries.

The first approach checks whether or not a current query Q can

be directly answered from the result of a previously answered

query Qi stored in the cache. The new query is otherwise

submitted to the source over the network, the answer of the

query is determined, transmitted

back to the client, and stored in the cache.

SEP

11 ITDM11 SSiimmii llaarr ii ttyy--PPrr ooff ii lleedd TTeemmppoorr aall

AAssssoocciiaatt iioonn MM iinniinngg

Given a time stamped transaction database and a user-defined

reference sequence of interest over time, similarity-profiled

temporal association mining discovers all associated item sets

whose prevalence variations over time are similar to the

reference sequence. The similar temporal association patterns

can reveal interesting relationships of data items which co-

occur with a particular event over time.

AUG

12 ITDM12 MM uull tt ii rr eellaatt iioonnaall kk--AAnnoonnyymmii ttyy k-Anonymity protects privacy by ensuring that data cannot be

linked to a single individual. In a k-anonymous data set, any

identifying information occurs in at least k tuples. (good)

AUG

13 ITDM13 RRaannkkiinngg aanndd SSuuggggeesstt iinngg PPooppuullaarr

II tteemmss

Abstract—We consider the problem of ranking the popularity

of items and suggesting popular items based on user feedback.

User feedback is obtained by iteratively presenting a set of

suggested items, and users selecting items based on their own

preferences either from this suggestion set or from the set of all

possible items

AUG

14 ITDM14 OOpptt iimmaall--LL ooccaatt iioonn--SSeelleecctt iioonn QQuueerr yy

PPrr oocceessssiinngg iinn SSppaatt iiaall DDaattaabbaasseess

This paper introduces and solves a novel type of spatial

queries, namely, Optimal-Location-Selection (OLS) search,

which has many applications in real life In this paper, we

present the optimality metric, formalize the OLS query, and

propose several algorithms for processing OLS queries

AUG

Page 29: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 29

efficiently

15 ITDM15 OOlleexx:: EEff ffeecctt iivvee RRuullee LL eeaarr nniinngg ffoorr TTeexxtt

CCaatteeggoorr iizzaatt iioonn

Olex is an inductive rule learning method for Text

Categorization

Algorithm: OLEX

Aug

16 ITDM16 PPrr eeddiicctt iinngg MM iissssiinngg II tteemmss iinn SShhooppppiinngg

CCaarr ttss

This paper contributes to the latter task by proposing a

technique that uses partial information about the contents of a

shopping cart for the prediction of what else the customer is

likely to buy.

july

17 ITDM17 DDeetteerr mmiinniinngg AAtttt rr iibbuutteess ttoo

MM aaxxiimmiizzee VViissiibbii ll ii ttyy ooff OObbjj eeccttss

We introduce a complementary problem: How to guide a seller

in selecting the best attributes of a new tuple (e.g., a new

product) to highlight so that it stands out in the crowd of

existing competitive products and is widely visible to the pool

of potential buyers

July

18 ITDM18 MM oonnii ttoorr iinngg OOnnll iinnee TTeessttss tthhrr oouugghh DDaattaa

VViissuuaall iizzaatt iioonn

We present an approach and a system to let tutors monitor

several important aspects related to online tests, such as

learner behavior and test quality.

JUN

E

19 ITDM19 EExxaacctt KK nnoowwlleeddggee HHiiddiinngg tthhrr oouugghh

DDaattaabbaassee EExxtteennssiioonn

In this paper, we propose a novel, exact border-based approach

that provides an optimal solution for the hiding of sensitive

frequent item sets

MA

Y

20 ITDM20 FFaasstt QQuueerr yy PPooiinntt MM oovveemmeenntt

TTeecchhnniiqquueess ffoorr LL aarr ggee CCBBII RR SSyysstteemmss

Target search in content-based image retrieval (CBIR) systems

refers to finding a specific (target) image such as a particular

registered logo or a specific historical photograph. Existing

techniques, designed around query refinement based on

relevance feedback (RF), suffer from slow convergence, and do

not guarantee to find intended targets. To address these

limitations, we propose this system.

may

21 ITDM21 AA GGeenneerr iicc LL ooccaall AAllggoorr ii tthhmm ffoorr MM iinniinngg

DDaattaa SSttrr eeaammss iinn LL aarr ggee DDiissttrr iibbuutteedd

SSyysstteemmss

First, we describe a highly efficient local algorithm that can be

used to monitor a wide class of data mining models. Then, we

use this algorithm as a feedback loop for the monitoring of

complex functions of the data such as its k-means clustering.

APR

22 ITDM22 II MM iinnee:: II nnddeexx SSuuppppoorr tt ffoorr II tteemm SSeett

MM iinniinngg

APR

23 ITDM23 II mmpprr oovviinngg PPeerr ssoonnaall iizzaatt iioonn SSoolluutt iioonnss

tthhrr oouugghh OOpptt iimmaall SSeeggmmeennttaatt iioonn ooff

CCuussttoommeerr BBaasseess

This paper shows that finding an optimal customer partition is

NP-hard, proposes several suboptimal direct grouping

segmentation methods, and empirically compares them among

themselves, traditional statistics-based hierarchical and affinity

propagation-based segmentation, and one-to-one methods

across multiple experimental conditions.

MA

R

Page 30: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 30

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN IIIIIIIIIIIIMMMMMMMMMMMMAAAAAAAAAAAAGGGGGGGGGGGGEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOCCCCCCCCCCCCEEEEEEEEEEEESSSSSSSSSSSSSSSSSSSSSSSSIIIIIIIIIIIINNNNNNNNNNNNGGGGGGGGGGGG

JJJJJJJJJJJJAAAAAAAAAAAAVVVVVVVVVVVVAAAAAAAAAAAA &&&&&&&&&&&& DDDDDDDDDDDDOOOOOOOOOOOOTTTTTTTTTTTTNNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTT

1 ITIM01 PPCCAA--BBaasseedd ssppaatt iiaall llyy aaddaapptt iivvee

ddeennooiissiinngg ooff CCFFAA iimmaaggeess ffoorr ssiinnggllee

sseennssoorr ddiiggii ttaall ccaammeerr aa

In this projects a principle component analysis (PCA) based

spatially adaptive denoising algorithm which works directly

on the (CFA) data using

2009

2 ITIM02 AA NNoo--RReeffeerr eennccee oobbjj eecctt iivvee iimmaaggee

sshhaarr ppnneessss mmeettrr iicc bbaasseedd oonn tthhee nnoott iioonn

ooff jj uusstt nnoott iicceeaabbllee bblluurr ((JJNNBB))

This works presents a perceptual based no reference objective

image sharpness/blurriness metric by integrating the concept of the

a probability summation model.

2009

3 ITIM03 BBaayyeessiiaann iimmaaggee rr eeccoovveerr yy ffoorr ddeennddrr ii tt iicc

sstt rr uuccttuurr eess uunnddeerr llooww SSNNCC

we present a Bayesian approach for estimating the neuronal shape

given low-SNR observations. 2009

4 ITIM04 EEmmppii rr iiccaall ccaappaaccii ttyy ooff aa RReeccooggnnii tt iioonn

CChhaannnneell ffoorr SSiinnggllee && mmuull tt iippuurr ppoossee

oobbjj eecctt rr eeccooggnnii tt iioonn uunnddeerr tthhee ccoonnssttaaiinntt

ooff PPCCAA eennccooddiinngg..

,we evaluate the empirical recognition capacity of PCA based

object recognition systems. The encoded data (templates) and the

additive noise in query templates are modeled to be Gaussian

distributed with zero mean

2009

5 ITIM05 HHiigghh ff iiddeell ii ttyy ffoorr iimmaaggee aannnnoottaatt iioonn.. a visual perception model that aims at quantifying the local

tolerance to noise for arbitrary imagery is developed. 2009

6 ITIM06 II mmaaggee RReessttoorr aatt iioonn UUssiinngg SSppaaccee vvaarr iiaanntt

GGaauussssiiaann ssccaallee mmiixxttuurr eess iinn oovveerr

ccoommpplleettee ppyyrr aammiiddss

In this project, we present an enhancement of the model by

introducing a coarser neighborhood is used to estimate the local

signal covariance within every sub band.

2009

7 ITIM07 II nnccrr eemmeennttaall lleeaarr nniinngg ooff cchhuunnkk ddaattaa ffoorr

oonnll iinnee ppaatttteerr nn ccllaassssii ff iiccaatt iioonn ssyysstteemmss

In this project , a pattern classification system in which feature

extraction and classifier learning are simultaneously carried out

not only online but also in one pass where training samples are

presented only once.

2009

8 ITIM08 NNoonnnneeggaatt ii vvee MM aattrr iixx ffaaccttoorr iizzaatt iioonn iinn

ppoollyynnoommiiaall ffeeaattuurr ee ssppaaccee

we propose a generation of the NMF algorithm by translating the

objective function into a Hilbert space 2009

9 ITIM09 GGrr aaddiieenntt eesstt iimmaatt iioonn uussiinngg wwiiddee

ssuuppppoorr tt ooppeerr aattoorr ss

This projects propose removing noise from picture by

detecting edge 2009

10 ITIM10 SShhaarr ppeenniinngg ddeerr mmaattoollooggiiccaall ccoolloorr

iimmaaggee iinn tthhee wwaavveelleett ddoommaaiinn

This projects propose finding boundaries in the image and

adaptive image demising 2009

11 ITIM11 II nntteerr ppoollaatt iioonn aarr tt ii ffaaccttss iinn ssuubb ppiixxeell

iimmaaggee rr eeggiisstt rr aatt iioonn

In this projects we comparing two images by image pixel by

pixel 2009

12 ITIM12 CCoonntt iinnuueess ggllaassss ppaatttteerr nnss ffoorr

ppaaiinntteerr llyy rr eennddeerr iinngg

In this projects we are converting digital photograph into

painting image 2009

13 ITIM13 AAcctt iivvee lleeaarr nniinngg mmeetthhooddss ffoorr

iinntteerr aacctt iivvee iimmaaggee rr eellaatt iivvee

In this projects we search a image with respect to RGB

combination and difference is plotted in a graph 2009

14 ITIM14 DDeetteecctt iioonn aanndd rr eemmoovvaall ooff ccrr aacckk iinn

ddiiggii tt iizzeedd ppaaiinntt iinngg

this projects involves exacts crack detection and filling

procedure using top hat transformation region growing

algorithm and median filter procedures

2009

Page 31: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 31

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN MMMMMMMMMMMMUUUUUUUUUUUULLLLLLLLLLLLTTTTTTTTTTTTIIIIIIIIIIIIMMMMMMMMMMMMEEEEEEEEEEEEDDDDDDDDDDDDIIIIIIIIIIIIAAAAAAAAAAAA

JJJJJJJJJJJJAAAAAAAAAAAAVVVVVVVVVVVVAAAAAAAAAAAA &&&&&&&&&&&& DDDDDDDDDDDDOOOOOOOOOOOOTTTTTTTTTTTTNNNNNNNNNNNNEEEEEEEEEEEETTTTTTTTTTTT

1 ITMM01 SSeeggmmeennttaatt iioonn –– ddrr iivveenn iimmaaggee ffuussiioonn

bbaasseedd oonn aallpphhaa ssttaabbllee

In this project. A novel region based image fusion framework

based on multiscale image segmentation and statistical

feature extraction is proposed.

AUG

2 ITMM02 SStt rr uuccttuurr eedd nneettwwoorr kk ccooddiinngg aanndd

ccooooppeerr aatt iivvee wwiirr eelleessss AAdd--HHoocc ppeeeerr ttoo

PPeeeerr RReeppaaii rr ffoorr WWAANN VViiddeeoo bbrr ooaaddccaasstt..

In this project, we propose a network coding based

cooperative repair framework for the Ad-Hoc Peer group to

improve broadcast video quality during Channel Losses.

AUG

3 ITMM03 UUnnsseeeenn vviissiibbllee wwaatteerr mmaarr kkiinngg:: AA nnoovveell

MM eetthhooddoollooggyy ffoorr AAuuxxii ll iiaarr yy iinnffoorr mmaatt iioonn

ddeell iivveerr yy vviiaa VViissuuaall ccoonntteennttss

In this project, a novel data hiding scheme, denoted as unseen

visible watermarking (UVW), is proposed. In UVW schemes,

hidden information can be embedded covertly and then

directly extracted using the human visual system as long as

appropriate operations are performed.

AUG

4 ITMM04 AAnn EEff ff ii cciieenntt AAuutthheenntt iiccaatt iioonn SScchheemmee ffoorr

AAcccceessss CCoonnttrr ooll iinn MM oobbii llee PPaayy--TTVV

SSyysstteemmss

In this paper, we propose an innovative authentication

scheme, in which, by providing one-to-many facility, only

one authentication message for multiple requests is

broadcasted from the head end system to subscribers. By

employing bilinear property of pairing and elliptic curve

cryptography, our scheme provides one-to-many facility in

the case of multiple requests for the same service in a short

period of time.

AUG

5 ITMM05 TTeexxtt --LL iikkee SSeeggmmeennttaatt iioonn ooff GGeenneerr aall

AAuuddiioo ffoorr CCoonntteenntt --BBaasseedd RReettrr iieevvaall

We propose in this paper a novel approach to discover audio

scenes, based on an analysis of audio elements and key audio

elements, which can be seen as equivalents to the words and

keywords in a text document, respectively.

6 ITMM06 II nnvveesstt iiggaatt iioonn tthhee sscchheedduull iinngg sseennssii tt iivvii ttyy

ooff PP22PP vviiddeeoo sstt rr eeaammiinngg:: AAnn

EExxppeerr iimmeennttaall ssttuuddyy

In this project, We see several representatiive P2P streaming

designs, ranging from theoretically proved optimal designs

to straightforward naïve designs

June

7 ITMM07 UUssiinngg vviissuuaall ccoonntteexxtt aanndd rr eeggiioonn

sseemmaanntt iicc ffoorr hhiigghh lleevveell ccoonncceepptt

ddeetteecctt iioonn

In this project we investigate detection of high- level

concept through an integrated approach of visual

thesaurus analysis and visual context

June

8 ITMM08 PPeerr ffoorr mmaannccee AAnnaallyyssiiss ffoorr oovveerr llaayy

mmuull tt iimmeeddiiaa mmuull tt ii ccaasstt oonn RR--aarr yy ttrr eeee

This Project, Sending Binary information to multicast

network and find out average, worst, best performance. June

9 ITMM09 II nncceenntt iivvee CCooooppeerr aatt iioonn SStt rr aatteeggiieess ffoorr

PPeeeerr ttoo ppeeeerr ll iivvee MM uull tt iimmeeddiiaa SSttrr eeaammiinngg

This project, splitting the videos into so many chunks &

sending video files based on the Chuck request . June

10 ITMM10 WWAAMM :: AA mmaarr kkiinngg --bbaasseedd

ssyynncchhrr oonniizzeedd mmuull tt iimmeeddiiaa ttuuttoorr iinngg

ssyysstteemm

This projects typing words based on the admin voice Apr

11 ITMM11 AAuuttoommaatteedd bbiiddddiinngg ooff mmeeddiiaa sseerr vviiccee aatt

tthhee eeddggee ooff aa ccoonntteenntt ddeell ii vveerr yy

nneettwwoorr kk

This projects downloading and transmitting data

depending on user accounts Apr

Page 32: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 32

12 ITMM12 CCoonntteenntt ––bbaasseedd aatttteenntt iioonn rr aannkkiinngg

uussiinngg vviissuuaall aanndd ccoonntteexxttuuaall aatt tteenntt iioonn

mmooddeell ffoorr bbaasseebbaall ll vviiddeeooss

This projects ranking of multimedia files depends on the

user interest and feedback Apr

13 ITMM13 OOrr tthhooggoonnaall ddaattaa eemmbbeeddddiinngg ffoorr bbiinnaarr yy

iimmaaggee iinn mmoorr pphhoollooggiicc tt rr aannssffoorr mm

ddoommaaiinn

In this projects a picture given as input and a text is

embedded by encrypting and decrypting the picture to get

the appropriate image

2008

14 ITMM14 AA nnoovveell ffrr aammeewwoorr kk ffoorr sseemmaanntt iicc

aannnnoottaatt iioonn aanndd ppeerr ssoonnaall ii zzeedd rr eett rr iieevvaall

ooff ssppoorr ttss vviiddeeoo

In this projects various image are displayed on clicking the

respective image we get the appropriate videos with

respect to that image

2008

15 ITMM15 VViiddeeoo aannnnoottaatt iioonn bbaasseedd oonn kkeerr nneell

ll iinneeaarr nneeiigghhbboorr hhoooodd pprr ooppaaggaatt iioonn

In this projects a description about the video is stored in

the video runs the corresponding description runs below

the video

2008

IIIIIIIIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE PPPPPPPPPPPPRRRRRRRRRRRROOOOOOOOOOOOJJJJJJJJJJJJEEEEEEEEEEEECCCCCCCCCCCCTTTTTTTTTTTTSSSSSSSSSSSS IIIIIIIIIIIINNNNNNNNNNNN JJJJJJJJJJJJ222222222222EEEEEEEEEEEEEEEEEEEEEEEE

1 IEJE01 CClluusstteerr iinngg aanndd sseeqquueenntt iiaall ppaatttteerrnn

mmiinniinngg ooff oonnll iinnee ccooll llaabboorr aatt iivvee

lleeaarr nniinngg ddaattaa

The goal to enable the groups and their facilitator to see

relevant aspects feedbacks if are more likely to be associated

with positive or negative outcomes and indicates where the

problems are

2009

2 IEJE02 EEffffeecctt ooff ccoonntteenntt iinnffoorr mmaatt iioonn oonn tthhee

ccrr eeddiibbii ll ii ttyy ooff oonnll iinnee hheeaall tthh

iinnffoorr mmaatt iioonn

This projects study analyzed the effects of publisher content

information on the credibility of online health information 2009

3 IEJE03 EEnntteerr pprr iissee oonnttoollooggiieess ffoorr ppllaannnniinngg

aanndd iinntteeggrr aatt iioonn ooff bbuussiinneessssss aa

pprr aaggmmaatt iicc aapppprr ooaacchh

This projects describes an approach to build and use Eos for

information on the credibility of online health information 2009

4 IEJE04 AA sseemmaanntt iiccaall llyy eennrr iicchheedd ccll iinniiccaall

gguuiiddeell iinnee mmooddeell eennaabbll iinngg

ddeeppllooyymmeenntt iinn hheetteerr ooggeenneeoouuss

hheeaall tthhccaarr ee eennvvii rr oonnmmeenntt

In this project automated processes can be used to access the

clinical resources for guideline deployment and execution 2009

5 IEJE05 II mmpprr oovviinngg ppeerr ssoonnaall iizzaatt iioonn ssoolluutt iioonn

tthhrr oouugghh oopptt iimmaall sseeggmmeennttaatt iioonn ooff

ccuussttoommeerr bbaassee

In this projects we present a direct grouping based approach to

computing customer segments that group customer not based

on computed statistics

2009

6 IEJE06 RRFFII DD –– eennaabbllee ddiissccoovveerr yy ooff ssuuppppllyy

nneettwwoorr kk

This paper aims at providing hybrid innovative solution for

organization to discover their supply network 2009

7 IEJE07 AAnn eeff ff iicciieenntt aanndd eeff ffeecctt iivvee

ppeerr ssoonnaall iizzeedd rr eeccoommmmeennddeerr ssyysstteemm ooff

TTVV pprr ooggrr aammss

This proposed hybrid approach also provides all typical

advantage of any social network as comments tagging rating

2009

8 IEJE08 GGuueesstt eeddii ttoorr ss iinnttrr oodduucctt iioonn kknnoowwlleeddggee

aanndd ddaattaa eennggiinneeeerr iinngg ffoorr EE ––

LL eeaarr nniinngg

The rapid development of web -based learning and new

concepts like virtual classroom virtual laboratories and many

new issues are addressed

2009

9 IEJE09 TThhee sstt rr aatteeggiicc iimmppll iiccaatt iioonn ooff wweebb

tteecchhnnoollooggiieess eennhhaannccee oorr ggaanniizzaatt iioonn

ppeerr ffoorr mmaannccee

In this projects a theoretical lens is constructed from five core

logics in organization literature performance 2009

Page 33: main embedded + software

II MM PPUULL SSEE TTEECCHHNNOOLL OOGGII EESS

CCoonnttaacctt:: 9988440011 0033330011,, 9988441100 9911111177.. MMaaii ll :: iieeeeeepprroojjeeccttss@@yyaahhoooo..ccoomm wwwwww..iimmppuullssee..nneett..iinn

Your Ideas can be implemented. Any project better pricing with Up gradation being done. 33