a. Real time Clock SPI Interface.
b. Auto Dialer.
c. Automatic EB Billing.
d. Access Control System Voice Output.
e. Ultrasonic based distance measurement.
f. IR communication with Manchester encoding/decoding.
g. RF communication with Manchester encoding/decoding.
h. Dot matrix scrolling display.
i. Winding machine control.
j. Automatic street lamp operating.
k. Home security system.
l. Study of SPI interface.
m. Study of IC interface.
n. Braille machine for blind.
o. Multipurpose on/off timer module with loss regain.
p. IR based robotic control.
q. RF based robotic control.
r. Optical robot.
s. Robotic based Measuring diameter ,length and weight of a Bar.
t. Three phase ups monitoring.
u. Inverter control.
v. Single/three Phase voltage control .
w. Industrial inverter battery monitoring and control.
x. Automatic car parking system monitoring.
y. Smart card based accessing/attendance maintenance system.
z. Fire/temperature monitoring system and control.
aa. Call point management system for hotels
bb. Staffing Level and Cost Analyses for Software Debugging Activities Through Rate-Based Simulation Approaches
cc. Implementation of the Storage Manager for an IPTSet-Top Box
dd. Strategic Guidance in the Development of New Aircraft Programs: A Practical Real Options Approach
ee. Using Open Web APIs in Teaching Web Mining
ff. Context-Based Matching and Ranking of Web Services for Composition
gg. Correlation Clustering Based on Genetic Algorithm for Documents Clustering
hh. Distributed Structures, Sequential Optimization, and Quantization for Detection
ii. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
jj. Performance of the IDS Method as a Soft Computing Tool
kk. An Artificial Neural Network Based Method for Harmonic Detection inpower system
ll. Extension of a Soft-Computing Framework for Activity Analysis from Linguistic Summarizations of Video
mm. Distributed Decision and Control for Cooperative UAVs Using Ad Hoc Communication
nn. A GA-Based Effective Fault-Tolerant Model for Channel Allocation in Mobile computing
oo. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure broadcasting
pp. On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
qq. Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
rr. Efficient Approximate Query Processing In Peer To Peer Networks
ss. Semantic web services on query based system for automatic invocation
tt. An Anti-phishing Strategy Based on Visual Similarity Assessment
uu. A General Model of Probabilistic Packet Marking for IP Trace Back
vv. Diversity-Integration Trade-offs in MIMO Detection
ww. Wallet Based Flexible E-Cash System
xx. NIRA Full code
yy. A Blog Mining Framework
zz. A Unified Framework for Providing Recommendations in Social Tagging Systems based on Ternary Semantic Analysis
aaa. A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites
bbb. iOLAP: A Framework for Analyzing the Internet, Social Networks, and Other Networked Data
ccc. Truth Discovery with Multiple Conflicting Information Providers on the Web
ddd. The Context â€œ Based Image Retrieval System
eee. Web People Search via Connection Analysis