top of page
  1. Voice based E-mail for the Blind

  2. A Railway Anti-Collision System with Auto-Track Changing and Phis Plate Removal Sensing

  3. Computer Folders ‘Security with a Bluetooth-Enabled Mobile Phone and Rinjdal Security Extension

  4. Speech Stress Analysis based Cheap Lie Detector for Loyalty Test

  5. Credit Card Reader with Face Recognition based on Webcam

  6. Recognition of Hand Movement for Paralytic Persons Based on a Neural Network

  7. Network Security Implementation Layer through Voice Biometric

  8. Agent Based Blocking and Response, Intrusion Detection using Signature

  9. Load Balancing of Artificial Intelligence Network using Ant Colony Optimization

  10. Authentication and Adaptive Security for DNS System

  11. Multicasting of Bandwidth Efficient Video in Multiradio Multicellular Wireless networks

  12. ADHOC Networks Based Bandwidth Estimation of IEEE 802.11

  13. Data Mining Technique Based Building Intelligent Shopping for Web Services

  14. Automatic Teller Machine Network Implementation based Controlling of CAC Connection Admission

  15. Adaptive Coaching and Co-Operative System for MANETS

  16. Multidimensional and Color Imaging Projections

  17. Inter Domain Packet Filters based Controlling of IP Spoofing

  18. Hidden Markov Models Based Credit Card Fraud Detection

  19. XML Enable SQL Server Based Data Storage and Minimization

  20. Artificial Neural Network Based Verification of Digital Signature

  21. Design and Implementation of E Secure Transaction

  22. Pattern Recognition and Dynamic Character Using Neural Network

  23. Verification of Dynamic Signature Using Pattern Signature

  24. Data Integrity Maintenance and Dynamic University Linking

  25. Filtering and Analyzing of Effective Packet System for ATM Network

  26. Efficient and Distribution and Secure Content Processing by Cooperative Intermediaries

  27. Rule Mining Algorithm for Efficient Association in Distributed Databases

  28. Digest Algorithm for Efficient Message for Data Security

  29. By Using Concurrent Engineering Train Simulation Based on Genetic Algorithm

  30. Travelling Salesman and Genetic Algorithm Problem Using ATL COM and C#

  31. Channel Rate Allocation for Scalable Video Streaming Using Genetic Algorithm over Error-Prone Networks Based on GOP

  32. High Speed Face Recognition Based on RBF Neural Networks and Discrete Cosine Transform.

  33. Storage Systems Based HBA Distributed Meta Data Management for large Cluster

  34. Image Analysis and Compression with PSNR and MSE Technique

  35. Implementation of Threshold Cryptography for MANET Based on Elliptic Curve Cryptography

  36. Image Processing for Resizing and Bilinear Filters

  37. Architecture of Distributed Database in Next Generation Mobile Networks for Global Roaming

  38. Recognition of Dynamic Pattern and Character Using Neural Networks

  39. Customer Relationship Management Based on Distributed Component Router

  40. Supply Chain Management System Based on Distributed Component Router

  41. Dynamic Logistics Management and Support Systems

  42. Multithreaded Socket Based Email Server

  43. Design and implementation of Mobile Banking

  44. JMX Based Managing and Monitoring the Clusters

  45. Implementation of Multi Router Traffic Monitoring

  46. Real Time Transmission Protocol Based Broadcasting of Multicast Video

  47. Multicast Routing For Collaborative Applications with Delay Variation Constrains On Overlay Networks

  48. Near-Optimal Multicast Scheme Using a Hybrid Genetic Algorithm for Hoc and Mobile Networks

  49. SNMP Based Network Monitoring and Analyzer Tool

  50. Network Border Patrol for Promoting Fairness in the Internet and Preventing Congestion Collapse

  51. Recognition of Digits Back Propagation and Handwritten Based on Neural Network

  52. Novel Framework for Personalized Retrieval and Semantic Annotation of Sports Video

  53. Query Workload Based Online Index Recommendations of High Dimensional Data Bases

  54. Image Retrieval Imaging Based on Content, Adaptive and Personal

  55. Software and Algorithms for problems in Radiation Therapy and Radio Surgery and Medical Applications

  56. Bluetooth and J3ME Enabled Full Duplex Automation Based on Mobile

  57. Development of an Application for Weekly Automatic College Timetable

  58. Using Pythagoras and Trigonometry to Watermark an Image

  59. By Using Steganography Compression and Decompression of Wavelet

  60. Coded Structured Light Based Real Time 3-D Data Processing

  61. A Distributed Learning System with Desktop recording, VoIP, Desktop Sharing and Session Sharing.

  62. A Wireless Communication Protocol Based on Electric Bulb

  63. Musical Conversion and Recognition for Music Compression

  64. Data Warehousing and Data Mining Dictionary

  65. Fuzzy Keyword Search in Cloud Computing over Encrypted Data

  66. Web Based Online Blood Donation System

  67. Web Based Graphical Password Authentication System

  68. Identification and Matching of Robust-Face Name Graph for Movie Character

  69. Controlling of Topology in Ad hoc Networks by Using Cooperative Communications

  70. An SSL Back End Forwarding Scheme of Clusters Based On Web Servers

  71. Motion Extraction Techniques Based Identifying the Level of Perception Power from Video

  72. Approximate and Efficient Processing of Query in Peer-to-Peer Networks

  73. Web Based Bus Ticket Reservation System

  74. Chinese Input with Eye Tracking and Keyboard

  75. Automated Image Enhancement Based Identification of Plaque

  76. Developing the Encryption, API, Architecture and Security of Biometric Technology

  77. Automated Transport Enquiry System in MySQL and C# Based on Voice

  78. Modeling and Detection of the Camouflaging Worm

  79. Increased Development Process Quality Based Testing of Automotive Real Time

  80. SQL Based Employee Management System in ASP and C# .NET

  81. Management System of Pharmacy in MySQL and PHP

  82. Graph Analysis and Generation for Detecting the Source Code Plagiarism Based on Program

  83. Implicit Approach Based Animating and Buildup of Wind Driven Snow

  84. Bullet Physics and Cinder Graphics Based Doodle Processing System

  85. Simulation and Modeling of Unknown Factors in Acquisition

  86. Image Processing Segmentation Based Verification of Secured Fingerprint Using Computational Geometry Algorithms

  87. Mathematical Morphology Based Algorithm for Image Noise Reduction

  88. Flexible Data Dissemination Strategy in Mobile Wireless Communication Networks for Effective Cache Consistency

  89. Fingerprint Verification System Based on a Correction

  90. Automatic Removal and Estimation of Noise in From a Single Image

  91. Dynamic Time Warping and Triangular matching Based on a Fingerprint Verification System

  92. Smart Card Security and Static Analysis Perspective from a Java

  93. Internet Based Monitoring of Remote Electrocardiogram

  94. Internet Protocol Trace Back Based Detection and Modeling of Camouflaging Worm

  95. Ridges and Fusion of Minutiae Based Fingerprint Identification Using Strength Factors

Meet The Team

C.Naveen Kumar

Diploma in the Electronics stream and presently pursuing 4th year B.tech (ECE),PVKK IT ,ATP.

B.Naveen Kumar

Diploma in the Electronics stream and presently pursuing 3rd year B.tech (ECE),PVKK IT ,ATP.

@ 2018 by  Naveen & Sravan

  • w-facebook
  • Twitter Clean
  • White Google+ Icon
bottom of page