EMBEDDED SYSTEM PROJECT LIST 2015-2016

ABOUT EMBEDDED SYSTEM PROJECT 2015 – 2016

A Precise Definition of Embedded Systems is Not Easy. Simply Stated, All Computing Systems other than General Purpose Computer (with Monitor, Keyboard, Etc.) are Embedded Systems

SNO

          Projects List

1

A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems

2

A New Approach for Authentication using Water marking Technique

3

Advance Secure ATM Transaction Using Biometric Fingerprint Technology

4

Dynamics of Malware Spread in Decentralized Peer to Peer Networks

5

Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks

7

A Competitive Study of Cryptography Techniques over Block Cipher

8

A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems

9

Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast

10

Dynamic Routing for Reducing the Compromised Node Attacks

11

Designing routing protocols for mobile ad hoc network

12

Lossless Compression and information hiding in images using Steganography

13

Video Steganography Using Mordell Curve Cryptography Technique

14

Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service

15

Intrusion detection An Energy efficient approach

16

Balancing Revocation and Storage Trade Offs in Secure Group Communication

17

Ontology Based Business Process Customization for Composite Web Services

18

A foundation for stochastic bandwidth estimation of networks with random service

19

On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents

20

Caching Scheme for Distributed Data Processing in Peer-to-Peer Environments

21

Restoring Inter node connectivity using Rim algorithm

22

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

23

Optimized Resource Allocation for Software Release Planning

24

A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows

25

Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis