Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
IEEE Project List
#1

EMBEDDED PROJECTS
BIOMETRICS
Biometric finger print identification based security system.
Biometric finger print identification based access control system.
Biometric finger print identification based time recorder with Wigand output
system.
Biometric finger print identification based bank locker security system.
Monitoring of time and attendance with fingerprint bio-metric solution.
Fingerprint identification based security system for bank locker.
High level authentication for power plant using voice recognition
IVRS based home automation with immediate voice feedback
Electronic voting system with automatic image comparing system
Home automation for disable persons using his personal voice tag
NETWORKING
Wireless home automation system using telephone line with WAP
Wireless heart beat monitoring system with WAP
COMMUNICATION SYSTEM
RF based wireless Encryption & Decryption method
GPS BASED PROJECTS
Global Positioning System
GPS Based Active Fleet Management - Automated Vehicle Tracking
GPS Based Highway Monitoring & Control
GPS Based Intelligent Guided Vehicle with Collision Mitigation
GPS Enabled PC Based Geographic Information System (GIS) and
Routing/Scheduling System
GPS Based Vehicle Parameter Monitoring With Intelligent Data Analysis
Global Positioning System with AI
BLUETOOTH ENABLED SECURITY SYSTEM & ACCESS CONTROL
PROJECTS
Wireless Code Modulation For Secure Communication Using Encryption &
Decryption
Bluetooth Enabled Wireless Network Synchronization
Wireless Heart Beat Rate Monitoring & A Cardiac Pacemaker Simulation
Mobile Messenger
Wireless AI Based Intelli-Robo For Materials Handling
Wireless AI Based Fire Fighting Robot For Relief Operation
Wireless Industrial Security Robot With Motion Detection System
Wireless AI Based Mobile Robot For Multi Specialty Operations
Smart / Proximity Based College Campus Card & Access Control System
Smart / Proximity Based Employee Id Cards & Access Control System
Smart Card / Proximity Based Bio Medical Health Card Design
Smart Card / Proximity Based Human Resources Management System
Smart Card / Proximity Based Membership Management System
Smart / Proximity Based Punctuality Monitoring System For Public
Transport System
C To C Communication Microcontroller To Microcontroller
Communication System With LCD Display
Wireless Temperature Monitor & Controller Based On Vhf Transmission
Wireless Motor Speed Controller Using RF Module
Electrical Parameters In Industries Is Monitoring Through Pc Using Wireless
Data Transfer
ADVANCED ROBOTICS SOLUTIONS
Artificial Intelligence, Fuzzy Logic, Neural Networks
Wireless AI Based Mobile Robot For Multi Specialty Operations
Wireless AI Based Fire Fighting Robot For Relief Operations
Wireless AI Based Intelli-robot For Materials Handling
Integrated Rule Based Control Of Robot Using Fuzzy System & Neural
Networks
AI Based Fire Fighting Robot For Relief Operations
AI Based Intelli-robot For Materials Handling
AI Based Mobile Robot For Multi Specialty Operations
Industrial Security Robot With Motion Detection System
Microcontroller Controlled Robot Arm For Paint Spraying
Production Monitoring Robot
Two Axis Robot With Artificial Intelligence
Three Axis Robot With Artificial Intelligence
Four Axis Robot With Artificial Intelligence
Five Axis Robot With Artificial Intelligence
Wireless Industrial Security Robot
Alive Human Detector Robot With Counter Using Wireless Pc Interfacing
Microcontroller Based Surveillance Robot For A Military Application
PC Controlled Wireless Robot Using RF Module With Feedback Sensor To
Detect Fire, Temperature And Human
SECURITY & ACCESS CONTROL SYSTEM
Intelligent Industrial Security Surveillance System With Auto Dialer
Smart Networked Home Connected Devices With Auto Design
Methodology For Modeling A Microcontroller With The Tele-load Switch
Application
Code Modulation Based Encryption & Decryption For Secured Wireless
Communication
Automatic Railway Gate Signaling Simulator & Controller
Smart / Proximity Based College Campus Card & Access Control System
Smart Card / Proximity Based Membership Management System
Smart / Proximity Based Punctuality Monitoring System For Public
Transport System
Smart / Proximity Based Employee Id Cards & Access Control
Smart Card / Proximity Based Human Resources Management System
Smart Networked Home Connected Devices With Auto Dialer
Wireless Bluetooth Enabled Network Synchronizer
Wireless Code Modulation For Secure Communication Using Encryption &
Decryption
Wireless Heart Beat Rate Monitoring & A Cardiac Pacemaker Simulation
Mobile Messenger
Smart Card / Proximity Based Vehicle Identification & Access Control
System
ARTIFICIAL INTELLIGENCE, FUZZY LOGIC BASED EMBEDDED
PROJECTS
Speed Control Of DC / Induction Motor Using PID / Fuzzy Controller
Fuzzy Logic Control Of Stepper Motor
Fuzzy Logic Controller Design DC Motor Speed Control System
Elevator Control System Using Fuzzy Logic
Integrated Rule Based Control Of Robot Using Fuzzy System & Neural
Networks
Intelligent Fuzzy Control Guided Vehicle For Collision Intelligent
Application Of Fuzzy Logic In Automated Train Speed Control System
AI Based Fire Fighting Robot For Relief Operations
AI Based Intelli-robot For Materials Handling
AI Based Mobile Robot For Multi Specialty Operations
Instrumentation With Artificial Intelligence
Frequency Jammer For Remote Controlled Bomb Blasting System
Fuzzy Logic Based Collision Prevention For Vehicle
Microcontroller Based Speed Control Of A Vehicle
POWER ELECTRONICS
Intelligent Power Factor Correction With Multiple Capacitors Banks
Intellectual Power Analyzer & Phase Changer
Hand Held Intelligent Multi Parameter Monitoring System Das With LCD
Display
Smart Multi Functional Power Meter With LCD Display
Digital Energy Meter & Voice Annunciation With Proximity Card Contact
Less
Intelligent Power Sharing Of Transformers With Auto Protection
Prepaid Digital Energy Meter Billing & Cost Indicator With Voice
Annunciation
Multiple Starter With Overload & High, Low Voltage Protection
Prepaid Electricity Billing Automation & Cost Indicator
Industrial Power Management System
Smart Power Monitoring For Efficient Energy Management
Distribution & Sub Station Automation With SCADA
Automatic Phase Changer Cum Change Over & Load Breaker
Microcontroller Based SCADA For Substation By WAP
Microcontroller Controlled Power Supply For Testing Application
Power Line Monitoring System
ELECTRICAL PROJECTS
Noise Less Speed Control Of DC Motor Using PWM Converter
Remote Control Of AC / DC Motor With Parameter Monitoring
Remote On / Off Of An AC / DC Motor
Remote On/Off Controller For AC Motors With Parameter Monitoring
Remote Speed Control Of AC / DC Motor
Remote Switching System For Home Appliances And
Hardware
Substation Monitoring System - Electrical Transmission And Distribution
Process
Electrical Network Automation & Communication Systems
Remote Data Monitoring & Data Analysis For Power Station
Post Paid Electricity Billing Automation
Power Sharing Of Transformer With Overload Protection
EB Theft Monitoring And Control System
Artificial Intelligent Solar Tracking System With True Graph & PC Interface
MECHANICAL, MODEL BASED & MECHATRONICS EMBEDDED
PROJECTS
Smart Solar Tracking System For Optimal Power Generation
GPS Based Intelligent Guided Vehicle With Collision Mitigation
Automatic Electrolyte Battery Filling Using Conveyer System
SCADA & PLC BASED EMBEDDED PROJECTS
INSTRUMENTATION
Electrical Station Variables Reader/Controller With True Graph And SCADA
Microcontroller Based SCADA For Substation By WAP
Multi Channel Voltage Scanner SCADA
Multi Parameter Measurement System SCADA
Plc Based Bottle Filling Station With Conveyors
Automatic Anesthesia Controller Using Infusion Pump With Heart Beat
Rate
Automatic Anesthesia Controller Using Infusion Pump With Respiratory
BIO MEDICAL SYSTEM AND APPLICATIONS
Smart Medicare System ICU Care Taker & Life Support System
Wireless Heart Beat Rate Monitoring & A Cardiac Pacemaker Simulation
Mobile Messenger
Automatic Anesthesia Controller Using Infusion Pump With Heart Beat Rate
Automatic Anesthesia Controller With Respiratory Using Infusion Pump
Smart Card Based Bio Medical Health Card System
Bedside Patient Monitoring System With Remote Alert
Unique System For Remote Monitoring Patients With Data Mining
Heart Beat Monitoring System With Wireless Pc Interfacing Including Body
& Respiratory Temperature
RF Based Heart Beat Monitoring System With Pacemaker
Detection Of Cardiac Disorder Using Bio-Medical Sensor
Automatic Anesthesia Feeder Based On Medical Analysis
Reply

#2
. Supervised Learning of Semantic Classes for Image Annotation and Retrieval
. Face Recognition Using Laplacianfaces
. Digital Image Processing Techniques for the Detection and Removal
Of Cracks in Digitized Paintings
IEE TRANSACTION ON DATA MINING
. Hiding Sensitive Association Rules with Limited Side Effects.
. Truth Discovery with Multiple Conflicting Information Providers on the Web.
. Online Index Recommendation for High Dimensional Databases
Using Query Workloads.
. C Trend: Temporal Cluster Graphs For Identifying and Visualization
Trends In Multi Attribute Transaction Data.
. A Signature Based Indexing Method for Efficient Content Based Retrieval
Of Relative Temporal Patterns.
. Ranked Reverse nearest Neighbor Search.
. Increasing Scalability of the Database Using Heuristic Method.


. Effective Querying In Highly Correlated Network.
. Hierarchical Grouping of Different Web Transactions.
. Mining Generalized Associations of Semantic Relations from Textual
Web Content
IEE TRANSACTION ON SOFTWARE ENGINEERING
. A Formal Framework for Automated Round trip Software
Engineering in Static Aspect Weaving and Transformations
. Using the Conceptual Cohesion of Classes for Fault Prediction in
Object Oriented Systems
IEE TRANSACTION ON NETWORKING
. Incremental Service Deployment Using the Hop By Hop Multicast Routing Protocol
. Noise Reduction by Fuzzy Image Filtering
. On Selfish Routing in Internet like Environment
. A New Top for Persistent Packet Reordering
. Distributed collaborative key agreement and authentication protocols for dynamic peer groups
. Enhancing Search Performance in
Unstructured PP Networks Based on Users Common Interest


. A New Kind of Cluster based Key Management Protocol in Wireless Sensor Network
.
Analyses of VOIP services using vex DO Revision System
IEE TRANSACTION ON NETWORKS & SECURUTY
. Distributed cache updating for the Dynamic source routing protocol
. An Adaptive Programming Model for Fault Tolerant Distributed Computing
. Face Recognition Using Laplacian faces
. Predictive Job Scheduling in a Connection Limited System using
Parallel Genetic Algorithm
. Image Processing Techniques for the Detection and Removal of Cracks
In Digitized Paintings
. A Distributed Database Architecture for Global Roaming in
Next Generation Mobile Networks
. Noise Reduction by Fuzzy Image Filtering
. Online Handwritten Script Recognition
. ODAM: An Optimized Distributed Association Rule Mining Algorithm
. Protocol Scrubbing: Network Security through Transparent Flow Modification
. Workflow Mining: Discovering Process Models from Event Logs


. Structure and Texture Filling In of Missing Image Blocks in Wireless
Transmission and Compression App
. An Agent Based Intrusion Detection, Response and blocking using signature
Method in Active Networks
. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
. ITP: An Image Transport Protocol for the Internet
. Hybrid Intrusion Detection with Weighted Signature Generation over
Anomalous Internet Episodes (HIDS)
. Incremental deployment service of Hop by hop multicast routing protocol
. Network border patrol: preventing congestion collapse and promoting
Fairness in the Internet
. Application of BPCS steganography to wavelet compressed video
. Neural Networks for Unicode Optical Character Recognition
. An Acknowledgment Based Approach for the Detection of Routing
Misbehavior in MANETs
. Neural Network Based Face Detection
. XTC: A Practical Topology Control Algorithm for Ad Hoc Networks
. A near optimal multicast scheme for mobile ad hoc networks using a
Hybrid genetic algorithm


. Mobile Agents in Distributed Multimedia Database Systems
. Image Stream Transfer Using Real Time Transmission Protocol
. Neural Networks for Handwritten character and Digits
. Evaluating the Performance of Versatile RMI Approach in Java
. Effective Packet Analyzing and Filtering System for ATM Network
. Selective Encryption of Still Image
. Homogenous Network Control and Implementation
. Retrieving Files Using Content Based Searching and presenting it in Carousel view
. Dynamic Signature Verification Using Pattern Recognition
. Embedding in Video Steganography
. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
. Location Aided Routing for Mobile Ad Hoc Networks
. Image Rendering for Grid Technology
. Java Network File Sharing System
. Java Visual Editor with Compiler
. E Mail Server Using Multithreaded Sockets
. Network Component for XML Migration
. Image Water Marking and Combustion


. Image Processing for Convolution Filters
. Artificial intelligence network load balancing using Ant Colony Optimization
. Image Processing for Edge Detection Filters
. Flood Fill Algorithms in C# and GDI+
. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
. Hiding messages in the Noise of a Picture
. Windows Management Instrumentation WMI Implementation
. Steganography for Hiding Data in Wave Audio Files
Reply

#3
transaction routing in distributed database systems

The transaction routing is a process in which a front- end router selects
an execution node for an incoming transaction.Since response time
estimation and decision making depend on the assumed transaction model
and parameters, it is important to examine the robustness or sensitivity
to the inaccuracy in the assumptions and parameter values.
Though it is robust with respect to change in the number of database calls
per transaction, we find through simulations that the dynamic routing
strategy based strictly on response time is too aggressive in sharing loads
and makes too many non-preferred system routings. Dynamic routing strategy
is relatively sensitive to the distribution of database calls. In this
article, two new refinements are proposed which improve system performance
as well as robustness of routing decisions.

Transaction Routing in Shared Disks Clusters
The cluster technology enables highly available real-time databases which
can be found at the heart of many telecommunication services. By using
internode parallelism, the cluster can reach high performance.
The two major objectives of transaction routing algorithms are:
1) Load balancing: This means to avoid the overloading of individual nodes.

2) Transaction a nity: This means to execute transactions with same or similar
data access patterns on the same node which is called a nity node.

We also have the transaction priority in order to support real time transactions. This involves considering the deadline as a priority and reducing the number of transactions missing their deadlines. The traditional algorithm for cluster allocation is called DACA(dynamic a nity cluster allocation.)
Reply

#4
a. Wireless weather Station monitoring using GSM Modem
b. Substation monitoring and control system using GSM Modem
c. Supervisory Control and Data Acquisition System using GSM
d. PC based Stepper motor Controller
e. PC Based Speed control of DC motor using PWM Technique
f. 89C51 Based PC Based Home Automation
g. PC based Substation monitoring and control system
h. Remote Electricity Billing System Using GSM Modem
i. Embedded Industrial Security System with Auto-Dialer using 89C51 Microcontroller
j. Digital Temperature Monitoring with closed loop control Using AT Mega 8515 Microcontroller
k. Embedded Automatic Street light control with LDR-ADC Interfacing using AT Mega 8515 Microcontroller
l. Embedded Prepaid Energy Meter using AT Mega 8515 Microcontroller
m. Wireless DC motor speed and direction control using RF (PWM)
n. Wireless Stepper motor control using RF
o. Wireless electrical appliances control system with Speed control in a plant using IR communication
p. PC based POWER DISTRIBUTION SYSTEM MONITORING AND CONTROL
q. RFID based access control security system
r. POWER UPGRADING OF TRANSMISSION LINE BY COMBINING AC-DC TRANSMISSION
s. STUDY OF ELECTRICAL EQUIPMENTS IN THE APPM
t. DYANMIC VOLTAGE STABLITY ANALYSIS USING P-V & Q-V CURVES
u. DESIGN & DEVELOPMENT OF SINGLE PHASE INVERTER
v. SMART card based access control security system
w. Security integrated system based on wireless access Protocol for industrial applications with SMS Alert System using GSM Modem
x. Power grid control system using GSM modem
Reply

#5
1. Accurately Measuring Denial of Service in
2. Simulation and Test bed Experiments
3. The Design of a Generic Intrusion-Tolerant Architecture For Web Servers
4. Detecting Network-Wide and Router-Specific Misconfigurations Through Data Mining
5. OntoDM: An Ontology of Data Mining
6. Mining projected Clusters in High-Dimensional spaces
7. Glip: A Concurrency control protocol Clipping Indexing
8. Boundary State Routing (BSR) in Ad Hoc Networks
9. Global Roaming
10. Point coordination function (PCF) in Media Access Control (MAC) layer of Wireless Local Area Network (WLAN)
11. Energy Efficient and Scalable Search in Dense Wireless Sensor Networks

12. Multiresolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications
13. Automated synthesis of image processing procedures for a large scale image database
14. A Modular Advanced Pipeline Processing Accelerator
15. Opti-Acoustic Stereo Imaging: On system calibration and 3-D Target Reconstruction
16. Mining Projected Clusters in High-Dimensional Spaces
17. Fast Query Point Movement Techniques for Large CBIR Systems
18. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
19. Improving Personalization Solutions through Optimal Segmentation Of Customer Bases
Reply

#6
1. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
2. Controlling IP Spoofing through Interdomain Packet Filters
3. Credit Card Fraud Detection Using Hidden Markov Model
4. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
5. Protection of Database security via collaborative inference detection.
6. A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
7. A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites.
8. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
9. Hybrid Scheduling of Dynamic Task Graphs with Selective Duplication for Multiprocessors under Memory and Time Constraints
10. Minimizing Broadcast Latency and Redundancy in Adhoc Networks
11. A Geometric Approach to Improving Active Packet Loss Measurement
12. Efficient Broadcasting Using Network Coding
13. A Service-Centric Multicast Architecture and Routing Protocol
14. Enhancing Search Performance in Unstructured P2P Networks Based on Users Common Interest
15. sIncentive-Based Scheduling for Market-Like Computational Grids
Reply

#7
1. TRANSCATION ON DATA MINING
2. TRANSCATION ON DISTRIBUTED SYSTEM
3. TRANSCATION ON NETWORKING
4. TRANSCATION ON SECURE COMPUTING
5. TRANSACTIONS ON MULTIMEDIA
6. TRANSACTIONS ON CRYPTO SYSTEMS
7. TRANSCATION ON WEB SERVICE
8. TRANSACTIONS ON SOFTWARE ENGINEERING
9. TRANSCATION ON NETWORK SECURITY
10. TRANSACTIONS ON MOBILE COMPUTING
11. DIGITAL IMAGE PROCESSING
12. TRANSCATION ON WEB APPLICATION
13. TRANSCATION ON NETWORKING
14. TRANSCATION ON NETWORKING SECURITY
15. TRANSCATION ON DATA MINING
16. TRANSCATION ON SOFTWARE ENGINEERING
17. TRANSCATION ON DISTRIBUTED SYSTEM
18. TRANSACTIONS ON INTERNET COMPUTING
19. TRANSACTIONS ON MULTIMEDIA
20. TRANSACTIONS ON GRID COMPUTING
21. TRANSACTIONS ON IMAGE PROCESSING
22. TRANSACTIONS ON WIRELESS SENSOR NETWORKS
23. TRANSACTIONS ON ADHOC NETWORK
24. TRANSACTIONS ON DISTRIBUTED SYSTEM
25. TRANSACTIONS ON SIGNAL PROCESSING
26. TRANSACTIONS ON WIRELESS COMMUNICATION
27. TRANSACTIONS ON SECURE COMPUTING
28. TRANSACTIONS ON MOBILE COMPUTING
Reply

#8

* Light weight online performance monitoring and tuning with embedded gossip.
* credit card fraud detection using hidden markov model.
* Intelligent industrial Security Surveillance System with Auto dialer.
* wireless home automation system using telephone line with WAP.
*wireless charging of mobile phones using micrewaves
*tracking and positioning mobile system in telecom network
*electronic road pricing
*smart home technique
*wireless home automation system using telephone line with WAP
*RF based wireless encryption and decryption methods
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.