ABOUT EMBEDDED SYSTEM PROJECT 2015 – 2016
A Precise Definition of Embedded Systems is Not Easy. Simply Stated, All Computing Systems other than General Purpose Computer (with Monitor, Keyboard, Etc.) are Embedded Systems
SNO |
Projects List |
1 |
A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems |
2 |
A New Approach for Authentication using Water marking Technique |
3 |
Advance Secure ATM Transaction Using Biometric Fingerprint Technology |
4 |
Dynamics of Malware Spread in Decentralized Peer to Peer Networks |
5 |
Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks |
7 |
A Competitive Study of Cryptography Techniques over Block Cipher |
8 |
A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems |
9 |
Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast |
10 |
Dynamic Routing for Reducing the Compromised Node Attacks |
11 |
Designing routing protocols for mobile ad hoc network |
12 |
Lossless Compression and information hiding in images using Steganography |
13 |
Video Steganography Using Mordell Curve Cryptography Technique |
14 |
Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service |
15 |
Intrusion detection An Energy efficient approach |
16 |
Balancing Revocation and Storage Trade Offs in Secure Group Communication |
17 |
Ontology Based Business Process Customization for Composite Web Services |
18 |
A foundation for stochastic bandwidth estimation of networks with random service |
19 |
On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents |
20 |
Caching Scheme for Distributed Data Processing in Peer-to-Peer Environments |
21 |
Restoring Inter node connectivity using Rim algorithm |
22 |
Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding |
23 |
Optimized Resource Allocation for Software Release Planning |
24 |
A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows |
25 |
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis |