2012 JAVA IEEE PROJECTS
S.NO.
|
Project Title
|
Domain
|
Year
|
1.
|
Online Modeling of Proactive Moderation System for Auction Fraud Detection
|
Network Security
|
2012
|
2.
|
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
|
Cloud Computing
|
2012
|
3.
|
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
|
Data Mining
|
2012
|
4.
|
Packet-Hiding Methods for Preventing Selective Jamming Attacks
|
Network Security
|
2012
|
5.
|
Learn to Personalized Image Search from the Photo Sharing Websites
|
Multimedia
|
2012
|
6.
|
multiparty access control for online social networks: model and mechanisms
|
Data Mining
|
2012
|
7.
|
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
|
Networking
|
2012
|
8.
|
Game-Theoretic Pricing for Video Streaming inMobile Networks
|
Networking
|
2012
|
9.
|
In Tags We Trust: Trust modeling in social tagging of multimedia content
|
Multimedia
|
2012
|
10.
|
Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
|
Data Mining
|
2012
|
11.
|
Packet Loss Control Using Tokens at the Network Edge
|
Networking
|
2012
|
12.
|
Ensuring Distributed Accountability for Data Sharing in the Cloud
|
Cloud Computing
|
2012
|
13.
|
Cut detection in wireless sensor networks
|
Wireless Communication
|
2012
|
14.
|
Organizing User Search Histories
|
Data Mining
|
2012
|
15.
|
Ranking Model Adaptation for Domain-Specific Search
|
Data Mining
|
2012
|
16.
|
Risk-Aware Mitigation for MANET Routing Attacks
|
Network Security
|
2012
|
17.
|
Slicing: A New Approach to Privacy Preserving Data Publishing
|
Data Mining
|
2012
|
18.
|
Fast Data Collection in Tree-Based Wireless Sensor Networks.
|
Mobile Computing
|
2012
|
19.
|
Cloud Data Production for Masses
|
Cloud Computing
|
2012
|
20.
|
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
|
Cloud Computing
|
2011JAVA IEEE PROJECTS
S.NO.
|
Project Title
|
Domain
|
Year
|
1.
|
Effective Navigation of Query Results Based on Concept Hierarchies
|
Data Mining
|
2011
|
2.
|
Modeling and Detection of Camouflaging Worm
|
Network Security
|
2011
|
3.
|
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
|
Networking
|
2011
|
4.
|
Nymble: Blocking Misbehaving Users in Anonymizing Networks
|
Network Security
|
2011
|
5.
|
Ranking Spatial Data by Quality Preferences
|
Data Mining
|
2011
|
6.
|
Discovering Conditional Functional Dependencies
|
Data Mining
|
2011
|
7.
|
Buffer Sizing for 802.11 Based Networks
|
Networking
|
2011
|
8.
|
Extended XML Tree Pattern Matching: Theories and Algorithms
|
Data Mining
|
2011
|
9.
|
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
|
Network Security
|
2011
|
10.
|
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
|
Data Mining
|
2011
|
11.
|
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
|
Mobile Computing
|
2011
|
12.
|
Decision Trees for Uncertain Data
|
Data Mining
|
2011
|
13.
|
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
|
Cloud Computing
|
2011
|
14.
|
Authenticated multi step nearest neighbor search
|
Networking
|
2011
|
15.
|
Adaptive cluster Distance bounding for high dimensional indexing
|
Data mining
|
2011
|
16.
|
Making aggregation work in uncertain and probabilistic databases
|
Data Mining
|
2011
|
17.
|
Improving utilization of infrastructure clouds
|
Cloud Computing
|
2011
|
18.
|
Wireless sensor network security model using zero knowledge protocol
|
Mobile Computing
|
2011
|
19.
|
Selfish overlay network creation and maintenance.
|
Networking
|
2011
|
20.
|
SPAF: Stateless FSA - based packet filters
|
Networking
|
2011
|
2010 JAVA IEEE PROJECTS
S.No
|
Project Title
|
Domain
|
Year
|
1
|
A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks.
|
Networking
|
2010
|
2
|
On wireless scheduling algorithms for minimizing the queue-overflow probability.
|
Networking
|
2010
|
3
|
Always Acyclic Distributed Path Computation.
|
Networking
|
2010
|
4
|
Ensuring Data Storage Security in Cloud Computing.
|
Cloud computing
|
2010
|
5
|
Demonstration of lightpath sharing for video streaming and data collection in lambda grid networks.
|
Grid Networking
|
2010
|
6
|
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains-abs.
|
Data Mining
|
2010
|
7
|
PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.
|
Data Mining
|
2010
|
8
|
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.
|
Mobile Computing
|
2010
|
9
|
Layered Approach Using Conditional Random Fields for Intrusion Detection.
|
Network Security
|
2010
|
10
|
Closeness a new privacy measure for data publishing.
|
Data Security
|
2010
|
11
|
Host-to-Host Congestion Control for TCP.
|
Networking
|
2010
|
12
|
Mesh Based Multicast Routing in MANET Stable Link Based Approach.
|
Networking
|
2010
|
13
|
Mitigating selective forwarding attacks with a channel-aware approach in WMNS.
|
On Wireless Comunnication
|
2010
|
14
|
Novel defense mechanism against data flooding attacks in wireless ad hoc networks.
|
Network Security
|
2010
|
15
|
Random Access Transport Capacity.
|
On Wireless Communication
|
2010
|
16
|
A Review of the Applications of Agent Technology In Traffic and Transportation Systems.
|
On Intelligence Systems
|
2010
|
17
|
Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs
.
|
Data Mining
|
2010
|
18
|
Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks.
|
Data Mining
|
2010
|
19
|
A Distributed Protocol to Serve Dynamic
Groups for Peer-to-Peer Streaming.
|
Networking
|
2010
|
20
|
Cooperative Caching in Wireless P2P
Networks: Design, Implementation.
|
Networking
|
2010
|
21
|
IRM: Integrated File Replication And Consistency Maintenance In P2p Systems.
|
Networking
|
2010
|
2009 JAVA Projects
SR NO
|
Project Title
|
Domain
|
Year
|
1
|
Glip A concurrency Control Protocol for Clipping Indexing
|
Data Mining
|
2009
|
2
|
Interactive Correction and Recommendations for computer language learning and training
|
Data Mining
|
2009
|
3
|
Storing and Indexing spatial data in P2P systems.
|
Data Mining
|
2009
|
4
|
Mobility management approaches for mobile IP networks: performance comparision and use recommendations
|
Mobile Computing
|
2009
|
5
|
Evaluating the vulnerability of N/W traffic using joint security and routing analysis
|
Mobile Computing
|
2009
|
6
|
Mitigation performance Degradation in congested sensor networks.
|
Mobile Computing
|
2009
|
7
|
Mitigation of control channel jamming under ode capture attacks
|
Mobile Computing
|
2009
|
8
|
Energy maps for mobile wireless. N/W: coherence Time versus spreading period
|
Mobile Computing
|
2009
|
9
|
Simps: Using sociology for personal Mobility
|
Networking
|
2009
|
10
|
Multiple routing configurations for fast IP network recovery
|
Networking
|
2009
|
11
|
Residual-Based estimation of peer and link lifetimes in P2P N/W.
|
Networking
|
2009
|
12
|
Flexible roll back recovery in dynamic heterogeneous grid computing
|
Networking
|
2009
|
13
|
SAR Image Regularization with Fast Approximate discrete minimization
|
Image Processing
|
2009
|
14
|
Dynamic routing with security considerations
|
Network Security
|
2009
|
15
|
Cryptographic versus Trust-based methods for MANET routing security
|
Network Security
|
2009
|
16
|
A Decentralized Method for Scaling Up
Genome Similarity Search Services
|
Networking
|
2009
|
17
|
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
|
On Wireless Communications
|
2009
|
18
|
Capturing Router Congestion and Delay
|
Networking
|
2009
|
19
|
Catching the Trend: A Framework for Clustering
Concept-Drifting Categorical Data
|
Data Mining
|
2009
|
20
|
CDNs Content Outsourcing Via Generalized Communities
|
Data Mining
|
2009
|
21
|
Cooperative Secondary Authorization Recycling
|
Networking
|
2009
|
22
|
Detecting Malicious Packet Losses
|
Network Security
|
2009
|
23
|
Dynamic Search Algorithm in Unstructured
Peer-to-Peer Networks
|
Networking
|
2009
|
24
|
Efficient Node Admission and Certificate less Secure Communication in Short-Lived MANETs
|
Network Security
|
2009
|
25
|
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach
|
Network Security
|
2009
|
26
|
Multi-path Dissemination in Regular Mesh Topologies
|
Networking
|
2009
|
27
|
Privacy-Aware Collaborative Spam Filtering
|
Networking
|
2009
|
28
|
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis
|
Networking
|
2009
|
2008JAVA Projects
SR No
|
Project Title
|
Domain
|
Year
|
1
|
On the Performance Benefits of Multihoming Route Control.
|
Networking
|
2008
|
2
|
Two techniques for fast computation of constrained shortest paths
|
Networking
|
2008
|
3
|
Probabilistic packet marking for Large-Scale IP trace back
|
Network Security
|
2008
|
4
|
A geometric approach to improving active packet loss measurement
|
Networking
|
2008
|
5
|
A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
|
Networking
|
2008
|
6
|
Minimizing File download time in stochastic Peer to Peer N/W
|
Networking
|
2008
|
7
|
Computation Efficient multicast key distribution
|
Networking
|
2008
|
8
|
Quiver: Consistent Object Sharing for Edge Services
|
Networking
|
2008
|
9
|
Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest
|
Networking
|
2008
|
10
|
Modeling and Automated Containment of Worms
|
Network Security
|
2008
|
11
|
Controlling IP spoofing through interdomain packet filters
|
Network Security
|
2008
|
12
|
C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data
|
Data Mining
|
2008
|
13
|
Probabilistic Group Nearest Neighbor Queries
|
Data Mining
|
2008
|
14
|
A Lossless Compression Scheme for Bayer Color Filter Array Images
|
image processing
|
2008
|
15
|
Image Restoration Using Space-Variant Gaussian Scale Mixtures in over complete pyramids
|
Image Processing
|
2008
|
16
|
Bandwidth Estimation for IEEE 802.11 Based Ad Hoc Networks
|
Mobile computing
|
2008
|
17
|
Efficient Resource Allocation for Wireless Multicast
|
Mobile Computing
|
2008
|
18
|
Mining the E-commerce Data to Analyze the Target Customer Behavior
|
Data Mining
|
2008
|
19
|
Incremental Learning of Chunk Data for Online Pattern Classification Systems
|
Neural Networks
|
2008
|
20
|
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
|
Software Engineering
|
2008
|
21
|
Video Semantic Event/Concept Detection Using a Subspace-Based Multimedia Data Mining Framework
|
Multimedia
|
2008
|
22
|
Face Recognition Using Laplacian Faces
| ||
23
|
Improving The Performance of Distributed Virtual Environment System(networking)
|
JAVA WEB APPLICATION
SNO
|
PROJECT NAME
|
1.
|
Communal Contact
|
2.
|
Back Forty Dense
|
3.
|
Bureaucrat Defended Entity
|
4.
|
Baccalaureate Gateway
|
5.
|
Rescue Squad Overhaul Contributor
|
6.
|
Reckoning Inquisitor
|
7.
|
Bacillus Eavesdropper
|
8.
|
Online Itemization Structure
|
9.
|
Hospice Dossier Control
|
10.
|
Electrorate Conspiracy
|
11.
|
Symposium Schema
|
12.
|
Restrained Netting
|
13.
|
Banter Porch
|
14.
|
Grime Dissolution Scheme
|
15.
|
Endurance Of Employee Particulars
|
16.
|
Paraquat Stockpile
|
17.
|
On-stream Troutville
|
18.
|
Project Regulation
|
19.
|
Ostentatious Storehouse Structure
|
20.
|
Digital Placard
|
21.
|
Almanac Ascertain
|
22.
|
Appositeness Intendance
|
23.
|
Blemish Ascertainers
|
24.
|
Online Allegation
|
25.
|
Mortal Policy Outline
|
26.
|
Confrontation Reconnoiter
|
27.
|
Erudition Damper
|
28.
|
Cartel Communiqué
|
29.
|
Inherent Envoy Scheme
|
30.
|
E-Chain Communicator
|
31.
|
Enormous Employment
|
32.
|
Vendible Internuncio
|
33.
|
First-Rate Sanatorium
|
34.
|
Misdemeanor Abjurer
|
35.
|
Web Linoleum
|
36.
|
Directorial Dispensation
|
37.
|
Haul able Overhaul
|
38.
|
Electronic Depository
|
39.
|
Endowment Fathom
|
40.
|
Disburse Mobile Scheme
|
41.
|
Venture Scrutiny
|
42.
|
Stately Sojourn
|
43.
|
e-Acquirements
|
44.
|
Disposition Prospectus
|
45.
|
Tele Dormitory
|
46.
|
Fleet Conveyor
|
47.
|
Velocipede Dime store
|
48.
|
Widespread Catalog
|
49.
|
Travel Permit Indulgence Scheme
|
50.
|
Infobahn Vendue
|
51.
|
Village Communic Bureau
|
52.
|
Weald Supervision Scheme
|
53.
|
Online Women Kibitzer
|
54.
|
Clodhopper's Pal
|
55.
|
Online Dodge
|
56.
|
Web Athenaeum Governance
|
57.
|
Web Vernacular Referendum
|
58.
|
Web Venture Governance
|
59.
|
Convertible Leaflet Governance
|
60.
|
Mobility Bill Defrayment
|
61.
|
Relevance to Scattered Precinct
|
62.
|
Cast Your Referendum
|
63.
|
Embellish Bureau
|
64.
|
Aero Shuttle
|
65.
|
Online Symphony
|
66.
|
Salvage Scheme
|
67.
|
Barristerial Atrium
|
68.
|
Mortgage Scheme
|
69.
|
Online Nuptial
|
70.
|
Belligerent Tackle Hire Classification
|
71.
|
e-Conscription
|
72.
|
On-Line Patronizing
|
73.
|
Bistro Stipulation
|
74.
|
Tangle Emporium
|
75.
|
Online Fretfulness
|
76.
|
Hoard Clinician
|
77.
|
Inure-Avocation Unit
|
78.
|
Sales Auditing Tool
|
79.
|
Pragmatic Academy
|
80.
|
Online Burgeons Exposition
|
81.
|
Panchayathi Financial Aid
|
82.
|
Menage Swop
|
83.
|
Epoch Indemnification Directorate
|
84.
|
E- Celluloid Rain check Bespeaking
|
85.
|
E-Voucher on Railway
|
86.
|
Sophomore Strategy Apportionment and Directorate FEC Coding
|
87.
|
Lastingness Slots
|
88.
|
Hamlet Possession
|
89.
|
Online Sedative
|
90.
|
Manifold Entrust Scheme
|
91.
|
Conjunct Expedient
|
92.
|
E-Assessment Instructor
|
93.
|
Plunge Fraternization
|
94.
|
Online Negotiation
|
95.
|
Indemnification Stratagem Directorate Scheme
|
96.
|
Malleate Bureau Directorate Scheme
|
97.
|
Chattels Mega crop
|
98.
|
Ecumenical Archives
|
99.
|
Online Prodigy
|
100.
|
Motel Recourses Tool
|
101.
|
Warehouse Executer
|
102.
|
Forensic Manager
|
103.
|
Transport Plus
|
104.
|
Travel Management System
|
105.
|
Graphics Data Visualization System
|
106.
|
Hospice Management System
|
107.
|
Medi Tracker
|
108.
|
Common Application System For Employment Exchanges
|
109.
|
Automated Business Process
|
110.
|
Flow well Automation
|
111.
|
Automated Sports Club
|
112.
|
Net Banking
|
113.
|
NETPOD
|
114.
|
Easy-pay finance
|
115.
|
Upholding of corporate sector
|
116.
|
Info ware Services
|
CORE JAVA PROJECT
SNO
|
PROJECT TITLE NAME
|
1.
|
Data –File apportioning
|
2.
|
Java Envoy
|
3.
|
Intranet Control System
|
4.
|
Cryptographic Scheme
|
5.
|
Gouging Scheme
|
6.
|
Net Chatter
|
7.
|
Secure Socket Layer Protocol
|
8.
|
Precedence Based Routing
|
9.
|
FEC in Network Packet Losses
|
10.
|
Consignment Harmonizing
|
11.
|
Multicast Gouging
|
12.
|
Secure Authentication Key
|
13.
|
Sachet Short-out
|
14.
|
Robust Spanning Data Dissemination
|
15.
|
Query Dispensation in Networks
|
16.
|
Adhoc Network Using Lar Protocol
|
17.
|
Cliamable Overlay Multicast System
|
18.
|
Client Server Protocol
|
19.
|
Distributed Cooperative Intermediaries
|
20.
|
Improved Virtual Environment Systems
|
21.
|
Layer To Forward Protocol
|
22.
|
Measurement Control Edge Routers
|
23.
|
Net survey Simulation
|
24.
|
Networks With Double Coverage
|
25.
|
Proactive Secure Scheme
|
26.
|
Randomized Protocols Networks
|
27.
|
Routing In Intermittently Networks
|
28.
|
Scheduling Mechanisms In Network
|
29.
|
Secure Routing Control
|
30.
|
Selfish Routing In Online
|
31.
|
Server Reassign Load
|
2012 DOTNET
IEEE PROJECTS
S.No.
|
Project Title
|
Domain
|
Year
|
1
|
AMPLE: An
Adaptive Traffic Engineering System
Based on Virtual Routing Topologies.
|
Wireless Communication
|
2012
|
2
|
Compressed-Sensing-Enabled
Video Streaming for Wireless Multimedia Sensor Networks.
|
Image Processing
|
2012
|
3
|
Design and Implementation of TARF: A
Trust-Aware Routing Framework for WSNs.
|
Network Security
|
2012
|
5
|
Network Assisted Mobile Computing with
Optimal Uplink Query Processing.
|
Mobile Computing
|
2012
|
6
|
Optimal Power Allocation in
Multi-Relay MIMO Cooperative Networks: Theory and Algorithms.
|
Networking
|
2012
|
7
|
Scalable and Secure Sharing of
Personal Health Records in Cloud Computing usingAttribute-based Encryption
|
Cloud Computing
|
2012
|
8
|
SPOC: A Secure and Privacy-preserving
Opportunistic Computing Framework forMobile-Healthcare Emergency
|
Parallel and Distributed system
|
2012
|
9
|
Topology control in mobile ad hoc
networks with cooperative communications
|
Mobile Computing
|
2012
|
10
|
Image Processing
|
2012
|
|
11
|
Securing Node Capture Attacks for Hierarchical
Data Aggregation in Wireless Sensor Networks
|
Wireless Communication
|
2012
|
12
|
Automatic Reconfiguration for
Large-Scale Reliable Storage Systems
|
Network Security
|
2012
|
13
|
Expert Discovery and Interactions in
Mixed Service-Oriented Systems
|
SOA
(Service Computing)
|
2012
|
14
|
Semi supervised Biased Maximum Margin
Analysis for Interactive Image Retrieval
|
Image Processing
|
2012
|
15
|
Joint Relay and
Jammer Selection for Secure Two-Way Relay Networks
|
Network security
|
2012
|
16
|
Efficient
Audit Service Outsourcing for Data Integrity in Clouds.
|
Cloud Computing
|
2012
|
17
|
Defenses
Against Large Scale Online Password Guessing Attacks by using Persuasive click
Points.
|
Image Processing
|
2012
|
18
|
A New Cell
Counting Based Attack Against Tor.
|
Networking
|
2012
|
19
|
BECAN: A
Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected
False Data in Wireless Sensor Networks.
|
Parallel and Distributed system
|
2012
|
20
|
Towards
Secure and Dependable Storage Services in Cloud Computing.
|
Cloud Computing
|
2012
|
2011
DOTNET IEEE PROJECTS
S.No.
|
Project
Title
|
Domain
|
Year
|
1
|
Exploiting dynamic resource allocation for
efficient parallel data processing in the cloud
|
Parallel and
Distributed systems
|
2011
|
2
|
Adaptive provisioning of human expertise in
service-oriented systems
|
Service Computing
|
2011
|
3
|
Bridging socially-enhanced virtual communities
|
Datamining
|
2011
|
4
|
Data integrity proofs in cloud storage
|
Cloud Computing
|
2011
|
5
|
Efficient computation of range aggregates against
uncertain location based queries
|
Data Mining
|
2011
|
6
|
Exploring application-level semantics for data compression.
|
Data Mining
|
2011
|
7
|
Improving aggregate recommendation diversity using
ranking-based techniques
|
Data Mining
|
2011
|
8
|
Monitoring
service systems from a language-action perspective
|
Data Mining
|
2011
|
9
|
One size
does not fit all towards user- and query-dependent ranking for web databases.
|
Data Mining
|
2011
|
10
|
Optimal service pricing for a cloud cache
|
Cloud Computing
|
2011
|
11
|
A personalized ontology model for web information
gathering
|
Data Mining
|
2011
|
12
|
Publishing search logs – a comparative study of
privacy guarantees
|
Data Mining
|
2011
|
13
|
Scalable learning of collective behavior.
|
Data Mining
|
2011
|
14
|
The awareness network, to whom should i display my
actions? And, whose actions should i monitor?
|
Software Engineering
|
2011
|
15
|
The world in a nutshell concise range queries.
|
Data Mining
|
2011
|
16
|
A query formulation language for the data web
|
Data Mining
|
2011
|
17
|
Horizontal aggregations in sql to prepare data
sets for data mining analysis
|
Data Mining
|
2011
|
18
|
Automated certification for compliant cloud-based business processes\
|
Service Computing SOA
|
2011
|
19
|
Continuous neighbor discovery in asynchronous
Sensor networks
|
Networking
|
2011
|
20
|
Distributed
adaptation of quantized feedback for downlink network mimo systems
|
Wireless Communication
|
2011
|
21
|
The
geometric efficient matching algorithm for firewalls
|
Network Security
|
2011
|
22
|
Adaptive
fault tolerant qos control algorithms for maximizing system lifetime of
query-based wireless sensor networks
|
Network Security
|
2011
|
23
|
Jamming-aware traffic allocation for multiple-path
routing using portfolio selection
|
Networking
|
2011
|
24
|
Robust correlation of encrypted attack traffic
through stepping stones by flow watermarking
|
Network Security
|
2011
|
25
|
Vulnerability analysis in soa-based business
processes
|
Service Computing SOA
|
2011
|
26
|
Integration of Sound Signature in Graphical
Password Authentication System
|
Data Mining
|
2011
|
2010 DOTNET
IEEE PROJECTS
S.No.
|
Project Title
|
Domain
|
Year
|
1
|
VEBEK
:Virtual Energy –Based Encryption and Keying for Wireless Sensor Network
|
Mobile
Computing
|
2010
|
2
|
Conditional
Shortest Path Routing in Delay
Tolerant Networks.
|
Networking
|
2010
|
3
|
Efficient
and Robust Detection of Duplicate Videos in a Large Database.
|
Circuits
and System for Video Technology
|
2010
|
4
|
Data
Leakage Detection
|
Knowledge
and Data Engineering
|
2010
|
5
|
A
Study for Important Criteria of Feature Selection in Text Categorization.
|
Knowledge
and Data Engineering
|
2010
|
6
|
Inference
From Aging Information.
|
Nural
Networks
|
2010
|
7
|
Dynamic
Authentication for Cross-Realm SOA-Business Processor.
|
Service
Computing
|
2010
|
8
|
Al
and Opinion Mining.
|
Intelligent Systems
|
2010
|
9
|
Achieving
Secure , Scalable, and Fine-grained Data Access Control in Cloud Computing
|
Cloud
Computing
|
2010
|
10
|
Privacy-Preserving
Public Auditing for Data Storage Security
in Cloud Computing
|
Cloud
Computing
|
2010
|
2009
DOTNET IEEE PROJECTS
S.No.
|
Project Title
|
Domain
|
Year
|
1
|
A Gen2-Based
RFID Authentication Protocol for Security and Privacy.
|
Mobile
Computing
|
2009
|
2
|
A
Tabu Search Algorithm for Cluster Building
|
Mobile
Computing
|
2009
|
3
|
Biased
Random Walks in Uniform Wireless Networks
|
Mobile
Computing
|
2009
|
4
|
Cell
Breathing Techniques for Load Balancing in Wireless LANS
|
Mobile
Computing
|
2009
|
5
|
Energy
Maps for Mobile Wireless Network
|
Mobile
Computing
|
2009
|
6
|
Greedy
Routing with Anti-Void Traversal
Wireless Sensor NWS
|
Mobile
Computing
|
2009
|
7
|
Information
Content-Based Sensor Selection and
Transmission Power Adjustment for Collaborative Target
|
Mobile
Computing
|
2009
|
8
|
Signaling
for Multimedia conferencing in Standalone Mobile Ad Hoc Networks
|
Mobile
Computing
|
2009
|
9
|
Analysis
of Shortest Path Routing for Large
|
Networking
|
2009
|
10
|
Explicit
Load Balancing Technique for NGEO Satellite IP Networks with On-Board Processing
Capabilities
|
Networking
|
2009
|
11
|
Random Cast An Energy Efficient Communication
Schema for Mobile Ad Hoc Networks
|
Networking
|
2009
|
12
|
Resequencing
Analysis Stop-and-Wait ARQ for Parallel Multi-Channel Communication
|
Networking
|
2009
|
13
|
Resource
Allocation in OFDMA Wireless
|
Networking
|
2009
|
14
|
Secure
and Policy-Complaint Source Routing
|
Networking
|
2009
|
15
|
Histogram-Based
Global Load Balancing in Structured Peer-to-Peer System
|
Networking
|
2009
|
16
|
A
Trace-Driven Approach to Evaluate the Scalability of P2P-Based
Video-on-Demand
|
Networking
|
2009
|
17
|
A
Parameterized Approach to Spam-Resilient Link Analysis of a Web
|
Networking
|
2009
|
18
|
Measuring
Capacity Bandwidth of Targeted Path Segments.
|
Networking
|
2009
|
19
|
Effective
Collaboration with Information Sharing in Virtual Universities
|
Networking
|
2009
|
20
|
Network-Coding-Based
Signal Recovery for Efficient
Scheduling in Wireless Network
|
Networking
|
2009
|
21
|
Enforcing
Minimum-Cost Multicast Routing Against Selfish Information Flows
|
Parallel
And Distributed System
|
2009
|
22
|
Movement-Assisted
Connectivity Restoration In Wireless Sensor and ActorNetworks
|
Parallel
And Distributed System
|
2009
|
23
|
Variability
and Reproducibility in Software Engineering A Study of Four Companies that
Developed the Same System
|
Knowledge
and Data Engineering
|
2009
|
24
|
Design and
Evaluation of the iMed Intelligent medical Search Engine
|
Data
Mining
|
2009
|
25
|
Distributional
Features for Text Categorization
|
Data
Mining
|
2009
|
26
|
Design of a
robust and secure digital signature schema for image authentication over
wireless channel
|
Network
Securities
|
2009
|
27
|
Enhanced
Security for Online Exams Using Group Cryptography
|
Network
Securities
|
2009
|
28
|
Internet and
Online Information Privacy: An Exploratory Study of Preteens and Early Teens
|
Network Securities
|
2009
|
29
|
A Secure
Mobile Healthcare System using Trust-Based Multicast Scheme
|
Network Securities
|
2009
|
30
|
Gradient
Estimation Using Wide Support Operators
|
Image Processing
|
2009
|
31
|
Continuous
Glass Patterns for Painterly Rendering
|
Image Processing
|
2009
|
32
|
Automated
Bidding for Media Services at the Edge of a Content Delivery Network
|
Image Processing
|
2009
|
2008
DOTNET IEEE PROJECTS
S.No.
|
Project Title
|
Domain
|
Year
|
1
|
Benefit Based Data Caching in Ad-Hoc
Networks
|
Mobile
Computing
|
2008
|
2
|
Location Based Spatial Query
Processing in Wireless Broadcast Environment.
|
Mobile
Computing
|
2008
|
3
|
Characterizing Unstructured Overlay
Topologies in p2p file sharing systems.
|
Networking
|
2008
|
4
|
Efficient Broadcasting Using Network
Coding
|
Networking
|
2008
|
5
|
On the Computation Complexity and
Effectiveness of N-Hub Shortest- Path Routing
|
Networking
|
2008
|
6
|
Probabilistic Packet Making for
Large-Scale IP Trackback
|
Networking
|
2008
|
7
|
Securing User Controlled Routing
Infrastructures
|
Networking
|
2008
|
8
|
Statistical techniques for detecting
Traffic Anomalies Through Packet Header Data
|
Networking
|
2008
|
9
|
Incentive Based Scheduling for market
like Computational Grids.
|
Parallel
and Distributed Systems
|
2008
|
10
|
A Web Usage Mining Framework for
Mining Evolving User Profiles in Dynamic Web Sites
|
Knowledge
and Data Engineering
|
2008
|
11
|
An Efficient Clustering Scheme to
Exploit hierarchical data in Network Traffic Analysis
|
Knowledge
and Data Engineering
|
2008
|
12
|
On the Design of Distributed Object
Placement and Load Balancing Strategies in Large-Scale Networked Multimedia
Storage Systems
|
Knowledge
and Data Engineering
|
2008
|
13
|
Semantic Ideation Learning for
Agent-Based E-Brainstorming-2008
|
Knowledge
and Data Engineering
|
2008
|
14
|
An efficient time-bound hierarchically
key Management Scheme for Secure Broadcasting
|
Dependable
and Secure Computing
|
2008
|
15
|
CREADIT CARD Fraud Detection Using
Hidden Markov Model
|
Dependable
and Secure Computing
|
2008
|
16
|
Security Requirements Engineering: A
Framework for Representation and Analysis
|
Software
Engineering
|
2008
|
DOTNET WEB APPLICATION
Sr.No.
|
PROJECT NAME
|
1
|
Academic web wizard
|
2
|
Access controlled dairy
|
3
|
Accord Leage Counsel
|
4
|
Acreage Affairs
|
5
|
Agri Help Line
|
6
|
Auro Poll
|
7
|
Automated trouble shooting
|
8
|
Aviation Bounty Schema
|
9
|
Bureau Affair System
|
10
|
Capital Pivot
|
11
|
Cargo Coup
|
12
|
City Pilot
|
13
|
Civic Referendum
|
14
|
Cogs e-Synnergy
|
15
|
Communique Board
|
16
|
Counsulting org
|
17
|
Content mangement sys
|
18
|
Corporate legistlature
|
19
|
Countrysideontogency
|
20
|
Craft cynosure
|
21
|
Crusicharater
|
22
|
Curb Obsession
|
23
|
Customized web deals
|
24
|
CyberClassifids
|
25
|
Distributed Catalogue System
|
27
|
Economic cinch
|
28
|
Ehookup
|
29
|
Electro Genesis Cue
|
30
|
E-Merchantry
|
31
|
E-Ndorse
|
32
|
Enterprise Catalog
|
33
|
Equity Surveillance
|
34
|
Errata Overhaul
|
35
|
Fabric Banking
|
36
|
Feminine Fortified
|
37
|
Financial Suit Axis
|
38
|
Fiscal Score Card
|
39
|
Fleet Consignment
|
40
|
Forfeit Control
|
41
|
Globe TrotChannel
|
42
|
Go Carting Online
|
43
|
Image Processing
|
44
|
Indoor Navigation System
|
45
|
Information cognizance
|
46
|
Market plus
|
47
|
Metopolis Excise Payoff
|
48
|
On Stream Verdict
|
49
|
Online Job Portal
|
50
|
OnstreamTelecom
|
51
|
Optimal In-Stack Absorption
|
52
|
Panoptic Crux
|
53
|
PC-Grid
|
54
|
Pharma Scoop Cache
|
55
|
Planetary freight
|
56
|
Plugged Inquest
|
57
|
Project Tabulation Tool
|
58
|
Project Trade Pool
|
59
|
Quasi Academia
|
60
|
Readers Digest Bustle
|
61
|
Restitution E-Channel
|
62
|
ScrapCollation&Dispatch
|
63
|
Sedan Biz
|
64
|
Statesville Sustention
|
65
|
Stock Exchange
|
66
|
Stock pile control
|
67
|
Student Help Desk
|
68
|
Summon Cuisine
|
69
|
Surplus Syndicate System
|
70
|
Synthetic Clinic
|
71
|
Terrain Critique
|
72
|
CallcenterExecuter
|
73
|
Titanic Mart
|
74
|
Trade talk center
|
75
|
Treasure where house
|
76
|
Tune up & step up
|
77
|
Ubiquitous Chronicle Manager 1st Review
|
78
|
Veggie Delights
|
79
|
Vendible Cabinet
|
80
|
Askaspecilist
|
81
|
ExpenditionCharter
|
82
|
Global Employee Acclaimer
|
83
|
Online Project Approval System
|
84
|
SportsFileDatabase
|
85
|
Stop Global Warming
|
86
|
The Lawman Modus Operandi
|
87
|
Yellow Pages
|
88
|
University Admission System
|
89
|
Impro
|
90
|
OrphanFoundationDevelopment
|
No comments:
Post a Comment