Java Projects
 

Java Projects


JAVA PROJECT TITILES
1 Rate Adaptation in Congested Wireless Networks through Real-Time Measurements (Parallel & Distributed)
2 Secure Data Objects Replication in Data Grid (Network Security)
3 On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network (Parallel & Distributed)
4 Layered Approach Using Conditional Random Fields for Intrusion Detection (Network)
5 IRM Integrated File Replication and Consistency Maintenance in P2P Systems (Parallel & Distributed)
6 Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks (Parallel & Distributed)
7 Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation (Wireless Network)
8 Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks (Network Security)
9 A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming (Parallel & Distributed)
10 A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization (Image Processing)
11 Conditional Shortest Path Routing in Delay Tolerant Networks (Wireless Network)
12 Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast (Wireless)
13 Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks (Mobile Computing)
14 Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks (Wireless Network)
15 MABS: Multicast Authentication Based on Batch Signature (Network Security)
16 TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks (Mobile Computing)
17 Deriving Concept-Based User Profiles from Search Engine Logs (Data Mining)
18 Inside the Permutation-Scanning Worms Propagation Modeling and Analysis (Network Security)
19 Privacy-Conscious Location-Based Queries in Mobile Environments (Parallel Computing)
20 Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking (Mobile Computing)
   
21 A Competitive Study of Cryptography Techniques over Block Cipher
22 A Dual Framework and Algorithms for Targeted Online Data Delivery
23 A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service
24 A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
25 A Link-Analysis Extension Of Correspondence Analysis For Mining Relational Databases
26 A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
27 A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
28 Analysis on Credit Card Fraud Detection Methods
29 Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
30 Clustering with Multi-Viewpoint based Similarity Measure
31 Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
32 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
33 Effective Navigation of Query Results Based on Concept Hierarchies
34 Embedded Extended Visual Cryptography Schemes
35 Fast Simulation of services avalibility in mesh network with dynamic path restoration
36 Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds
37 Intrusion detection An Energy efficient approach in Heterogeneous WSN
38 Live Streaming With Receiver-Based Peer-Division Multiplexing
39 Modeling and Detection of Camouflaging Worm
40 More Secure Steganography Method in Spatial Domain
41 Nymble Blocking Misbehaving Users in Anonymizing Networks
42 Online Intrusion Alert Aggregation with Generative Data Stream Modeling
43 Optimal Bandwidth Assignment for Multiple Description Coded Video
44 Optimal Stochastic Location Updatees in Mobile Ad Hoc Network
45 Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding
46 SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
47 Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
48 Secure and Practical Outsourcing of Linear Programming in Cloud Computing
49 Secure High-Throughput Multicast Routing in Wireless Mesh Networks
50 Sketch4Match – Content-based Image Retrieval System Using Sketches

 

Our Services

  • Final Year IEEE Projects
  • Acadamic Projects
  • Software Devlopment
  • SEO Services
  • Website Devlopment
  • Computer Education
  • E-Mail Marketing
  • Bulk SMS Marketing