2012 JAVA IEEE PROJECTS
|
S.NO.
|
Project Title
|
Domain
|
Year
|
|
1.
|
Online Modeling of Proactive Moderation System for Auction Fraud
Detection
|
Network
Security
|
2012
|
|
2.
|
Cooperative
Provable Data Possession for Integrity Verification in Multi-Cloud Storage
|
Cloud Computing
|
2012
|
|
3.
|
Automatic Discovery of Association Orders between Name and Aliases from
the Web using Anchor Texts-based Co-occurrences
|
Data
Mining
|
2012
|
|
4.
|
Packet-Hiding
Methods for Preventing Selective Jamming Attacks
|
Network
Security
|
2012
|
|
5.
|
Learn to Personalized
Image Search from the Photo
Sharing Websites
|
Multimedia
|
2012
|
|
6.
|
multiparty
access control for online social networks: model and mechanisms
|
Data
Mining
|
2012
|
|
7.
|
An Efficient
Caching Scheme and Consistency Maintenance in Hybrid P2P System
|
Networking
|
2012
|
|
8.
|
Game-Theoretic
Pricing for Video Streaming inMobile Networks
|
Networking
|
2012
|
|
9.
|
In
Tags We Trust: Trust modeling in social tagging of multimedia content
|
Multimedia
|
2012
|
|
10.
|
Confucius: A
Tool Supporting Collaborative Scientific Workflow Composition
|
Data
Mining
|
2012
|
|
11.
|
Packet Loss
Control Using Tokens at the Network Edge
|
Networking
|
2012
|
|
12.
|
Ensuring
Distributed Accountability for Data Sharing in the Cloud
|
Cloud
Computing
|
2012
|
|
13.
|
Cut detection
in wireless sensor networks
|
Wireless
Communication
|
2012
|
|
14.
|
Organizing
User Search Histories
|
Data
Mining
|
2012
|
|
15.
|
Ranking Model
Adaptation for Domain-Specific Search
|
Data
Mining
|
2012
|
|
16.
|
Risk-Aware
Mitigation for MANET Routing Attacks
|
Network
Security
|
2012
|
|
17.
|
Slicing: A New Approach to Privacy Preserving Data Publishing
|
Data
Mining
|
2012
|
|
18.
|
Fast Data Collection in Tree-Based Wireless Sensor Networks.
|
Mobile
Computing
|
2012
|
|
19.
|
Cloud Data Production for Masses
|
Cloud Computing
|
2012
|
|
20.
|
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
|
Cloud
Computing
|
|
2011 JAVA IEEE PROJECTS
|
S.NO.
|
Project Title
|
Domain
|
Year
|
|
1.
|
Effective Navigation of
Query Results Based on Concept Hierarchies
|
Data
Mining
|
2011
|
|
2.
|
Modeling
and Detection of Camouflaging Worm
|
Network
Security
|
2011
|
|
3.
|
Delay
Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless
Networks
|
Networking
|
2011
|
|
4.
|
Nymble:
Blocking Misbehaving Users in Anonymizing Networks
|
Network
Security
|
2011
|
|
5.
|
Ranking
Spatial Data by Quality Preferences
|
Data
Mining
|
2011
|
|
6.
|
Discovering Conditional Functional Dependencies
|
Data
Mining
|
2011
|
|
7.
|
Buffer
Sizing for 802.11 Based Networks
|
Networking
|
2011
|
|
8.
|
Extended XML Tree Pattern
Matching: Theories and Algorithms
|
Data
Mining
|
2011
|
|
9.
|
SAT: A Security
Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
|
Network
Security
|
2011
|
|
10.
|
The CoQUOS Approach to
Continuous Queries in Unstructured Overlays
|
Data
Mining
|
2011
|
|
11.
|
A Privacy-Preserving
Location Monitoring System for Wireless Sensor Networks
|
Mobile
Computing
|
2011
|
|
12.
|
Decision
Trees for Uncertain Data
|
Data Mining
|
2011
|
|
13.
|
Secure and Practical
Outsourcing of Linear Programming in
Cloud Computing
|
Cloud
Computing
|
2011
|
|
14.
|
Authenticated multi step
nearest neighbor search
|
Networking
|
2011
|
|
15.
|
Adaptive cluster Distance
bounding for high dimensional indexing
|
Data
mining
|
2011
|
|
16.
|
Making aggregation work in
uncertain and probabilistic databases
|
Data
Mining
|
2011
|
|
17.
|
Improving utilization of
infrastructure clouds
|
Cloud
Computing
|
2011
|
|
18.
|
Wireless sensor network
security model using zero knowledge protocol
|
Mobile
Computing
|
2011
|
|
19.
|
Selfish overlay network
creation and maintenance.
|
Networking
|
2011
|
|
20.
|
SPAF: Stateless FSA - based
packet filters
|
Networking
|
2011
|
2010 JAVA IEEE PROJECTS
|
S.No
|
Project Title
|
Domain
|
Year
|
|
1
|
A
Distributed CSMA Algorithm for Throughput and Utility Maximization in
Wireless Networks.
|
Networking
|
2010
|
|
2
|
On wireless scheduling
algorithms for minimizing the queue-overflow probability.
|
Networking
|
2010
|
|
3
|
Always Acyclic
Distributed Path Computation.
|
Networking
|
2010
|
|
4
|
Ensuring Data
Storage Security in Cloud Computing.
|
Cloud
computing
|
2010
|
|
5
|
Demonstration
of lightpath sharing for video streaming and data collection in lambda grid
networks.
|
Grid
Networking
|
2010
|
|
6
|
P2P
Reputation Management Using Distributed Identities and Decentralized
Recommendation Chains-abs.
|
Data Mining
|
2010
|
|
7
|
PAM
An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving
Objects.
|
Data Mining
|
2010
|
|
8
|
Secure
Data Collection in Wireless Sensor Networks Using Randomized Dispersive
Routes.
|
Mobile Computing
|
2010
|
|
9
|
Layered
Approach Using Conditional Random Fields for Intrusion Detection.
|
Network Security
|
2010
|
|
10
|
Closeness
a new privacy measure for data publishing.
|
Data Security
|
2010
|
|
11
|
Host-to-Host
Congestion Control for TCP.
|
Networking
|
2010
|
|
12
|
Mesh
Based Multicast Routing in MANET Stable Link Based Approach.
|
Networking
|
2010
|
|
13
|
Mitigating
selective forwarding attacks with a channel-aware approach in WMNS.
|
On Wireless Comunnication
|
2010
|
|
14
|
Novel
defense mechanism against data flooding attacks in wireless ad hoc networks.
|
Network Security
|
2010
|
|
15
|
Random Access Transport Capacity.
|
On Wireless Communication
|
2010
|
|
16
|
A
Review of the Applications of Agent Technology In Traffic and Transportation Systems.
|
On Intelligence Systems
|
2010
|
|
17
|
Binrank: Scaling Dynamic Authority-Based Search
Using Materialized Sub Graphs
.
|
Data Mining
|
2010
|
|
18
|
Managing Multidimensional Historical
Aggregate Data in Unstructured P2P Networks.
|
Data Mining
|
2010
|
|
19
|
A Distributed Protocol to Serve
Dynamic
Groups for
Peer-to-Peer Streaming.
|
Networking
|
2010
|
|
20
|
Cooperative Caching in Wireless
P2P
Networks: Design, Implementation.
|
Networking
|
2010
|
|
21
|
IRM: Integrated File Replication
And Consistency Maintenance In P2p Systems.
|
Networking
|
2010
|
2009
JAVA Projects
|
SR
NO
|
Project Title
|
Domain
|
Year
|
|
1
|
Glip A concurrency Control Protocol for Clipping
Indexing
|
Data Mining
|
2009
|
|
2
|
Interactive Correction and Recommendations for
computer language learning and training
|
Data Mining
|
2009
|
|
3
|
Storing and Indexing spatial data in P2P systems.
|
Data Mining
|
2009
|
|
4
|
Mobility management approaches for mobile IP
networks: performance comparision and use recommendations
|
Mobile Computing
|
2009
|
|
5
|
Evaluating the vulnerability of N/W traffic using
joint security and routing analysis
|
Mobile Computing
|
2009
|
|
6
|
Mitigation performance Degradation in congested
sensor networks.
|
Mobile Computing
|
2009
|
|
7
|
Mitigation of control channel jamming under ode
capture attacks
|
Mobile Computing
|
2009
|
|
8
|
Energy maps for mobile wireless. N/W: coherence
Time versus spreading period
|
Mobile Computing
|
2009
|
|
9
|
Simps: Using sociology for personal Mobility
|
Networking
|
2009
|
|
10
|
Multiple routing configurations for fast IP
network recovery
|
Networking
|
2009
|
|
11
|
Residual-Based estimation of peer and link
lifetimes in P2P N/W.
|
Networking
|
2009
|
|
12
|
Flexible roll back recovery in dynamic
heterogeneous grid computing
|
Networking
|
2009
|
|
13
|
SAR Image Regularization with Fast Approximate discrete
minimization
|
Image Processing
|
2009
|
|
14
|
Dynamic routing with security considerations
|
Network Security
|
2009
|
|
15
|
Cryptographic versus Trust-based methods for MANET
routing security
|
Network Security
|
2009
|
|
16
|
A Decentralized Method for Scaling
Up
Genome
Similarity Search Services
|
Networking
|
2009
|
|
17
|
A Routing-Driven Elliptic Curve Cryptography
Based Key Management Scheme for Heterogeneous Sensor Networks
|
On Wireless Communications
|
2009
|
|
18
|
Capturing Router Congestion
and Delay
|
Networking
|
2009
|
|
19
|
Catching the Trend: A
Framework for Clustering
Concept-Drifting Categorical Data
|
Data Mining
|
2009
|
|
20
|
CDNs Content Outsourcing
Via Generalized Communities
|
Data Mining
|
2009
|
|
21
|
Cooperative
Secondary Authorization Recycling
|
Networking
|
2009
|
|
22
|
Detecting Malicious Packet Losses
|
Network Security
|
2009
|
|
23
|
Dynamic Search Algorithm in
Unstructured
Peer-to-Peer
Networks
|
Networking
|
2009
|
|
24
|
Efficient Node Admission and Certificate less
Secure Communication in Short-Lived MANETs
|
Network
Security
|
2009
|
|
25
|
Mitigating Denial-of-Service Attacks on the
Chord Overlay Network: A Location Hiding Approach
|
Network
Security
|
2009
|
|
26
|
Multi-path Dissemination in Regular Mesh
Topologies
|
Networking
|
2009
|
|
27
|
Privacy-Aware Collaborative
Spam Filtering
|
Networking
|
2009
|
|
28
|
TCP Performance in
Flow-Based Mix Networks: Modeling and Analysis
|
Networking
|
2009
|
2008JAVA Projects
|
SR No
|
Project Title
|
Domain
|
Year
|
|
1
|
On the Performance Benefits of Multihoming Route
Control.
|
Networking
|
2008
|
|
2
|
Two techniques for fast computation of constrained
shortest paths
|
Networking
|
2008
|
|
3
|
Probabilistic packet marking for Large-Scale IP
trace back
|
Network Security
|
2008
|
|
4
|
A geometric approach to improving active packet
loss measurement
|
Networking
|
2008
|
|
5
|
A Bidirectional Routing Abstraction for Asymmetric
Mobile Ad Hoc Networks
|
Networking
|
2008
|
|
6
|
Minimizing File download time in stochastic Peer
to Peer N/W
|
Networking
|
2008
|
|
7
|
Computation Efficient multicast key distribution
|
Networking
|
2008
|
|
8
|
Quiver:
Consistent Object Sharing for Edge Services
|
Networking
|
2008
|
|
9
|
Enhancing
Search Performance in Unstructured P2P Networks Based on Users’ Common
Interest
|
Networking
|
2008
|
|
10
|
Modeling and Automated Containment of Worms
|
Network Security
|
2008
|
|
11
|
Controlling IP spoofing through interdomain packet
filters
|
Network Security
|
2008
|
|
12
|
C-TREND: Temporal Cluster Graphs for Identifying
and Visualizing Trends in
Multiattribute Transactional Data
|
Data Mining
|
2008
|
|
13
|
Probabilistic
Group Nearest Neighbor Queries
|
Data Mining
|
2008
|
|
14
|
A Lossless Compression Scheme for Bayer Color
Filter Array Images
|
image processing
|
2008
|
|
15
|
Image Restoration Using Space-Variant Gaussian
Scale Mixtures in over complete pyramids
|
Image Processing
|
2008
|
|
16
|
Bandwidth Estimation for IEEE 802.11 Based Ad Hoc
Networks
|
Mobile computing
|
2008
|
|
17
|
Efficient Resource Allocation for Wireless
Multicast
|
Mobile Computing
|
2008
|
|
18
|
Mining the E-commerce Data to Analyze the Target
Customer Behavior
|
Data Mining
|
2008
|
|
19
|
Incremental
Learning of Chunk Data for Online Pattern Classification Systems
|
Neural Networks
|
2008
|
|
20
|
WASP: Protecting Web Applications Using Positive
Tainting and Syntax-Aware Evaluation
|
Software Engineering
|
2008
|
|
21
|
Video Semantic
Event/Concept Detection Using a Subspace-Based Multimedia Data Mining
Framework
|
Multimedia
|
2008
|
|
22
|
Face Recognition Using Laplacian Faces
|
|
|
|
23
|
Improving The Performance of Distributed
Virtual Environment System(networking)
|
|
|
JAVA WEB APPLICATION
|
SNO
|
PROJECT NAME
|
|
1.
|
Communal
Contact
|
|
2.
|
Back
Forty Dense
|
|
3.
|
Bureaucrat
Defended Entity
|
|
4.
|
Baccalaureate
Gateway
|
|
5.
|
Rescue
Squad Overhaul Contributor
|
|
6.
|
Reckoning
Inquisitor
|
|
7.
|
Bacillus
Eavesdropper
|
|
8.
|
Online
Itemization Structure
|
|
9.
|
Hospice
Dossier Control
|
|
10.
|
Electrorate
Conspiracy
|
|
11.
|
Symposium
Schema
|
|
12.
|
Restrained
Netting
|
|
13.
|
Banter
Porch
|
|
14.
|
Grime
Dissolution Scheme
|
|
15.
|
Endurance
Of Employee Particulars
|
|
16.
|
Paraquat
Stockpile
|
|
17.
|
On-stream
Troutville
|
|
18.
|
Project
Regulation
|
|
19.
|
Ostentatious
Storehouse Structure
|
|
20.
|
Digital
Placard
|
|
21.
|
Almanac
Ascertain
|
|
22.
|
Appositeness
Intendance
|
|
23.
|
Blemish
Ascertainers
|
|
24.
|
Online
Allegation
|
|
25.
|
Mortal Policy Outline
|
|
26.
|
Confrontation
Reconnoiter
|
|
27.
|
Erudition Damper
|
|
28.
|
Cartel
Communiqué
|
|
29.
|
Inherent
Envoy Scheme
|
|
30.
|
E-Chain
Communicator
|
|
31.
|
Enormous
Employment
|
|
32.
|
Vendible
Internuncio
|
|
33.
|
First-Rate
Sanatorium
|
|
34.
|
Misdemeanor
Abjurer
|
|
35.
|
Web
Linoleum
|
|
36.
|
Directorial
Dispensation
|
|
37.
|
Haul
able Overhaul
|
|
38.
|
Electronic
Depository
|
|
39.
|
Endowment
Fathom
|
|
40.
|
Disburse
Mobile Scheme
|
|
41.
|
Venture
Scrutiny
|
|
42.
|
Stately
Sojourn
|
|
43.
|
e-Acquirements
|
|
44.
|
Disposition
Prospectus
|
|
45.
|
Tele
Dormitory
|
|
46.
|
Fleet
Conveyor
|
|
47.
|
Velocipede
Dime store
|
|
48.
|
Widespread
Catalog
|
|
49.
|
Travel
Permit Indulgence Scheme
|
|
50.
|
Infobahn
Vendue
|
|
51.
|
Village
Communic Bureau
|
|
52.
|
Weald
Supervision Scheme
|
|
53.
|
Online
Women Kibitzer
|
|
54.
|
Clodhopper's Pal
|
|
55.
|
Online
Dodge
|
|
56.
|
Web
Athenaeum Governance
|
|
57.
|
Web
Vernacular Referendum
|
|
58.
|
Web
Venture Governance
|
|
59.
|
Convertible
Leaflet Governance
|
|
60.
|
Mobility
Bill Defrayment
|
|
61.
|
Relevance to
Scattered Precinct
|
|
62.
|
Cast Your Referendum
|
|
63.
|
Embellish Bureau
|
|
64.
|
Aero Shuttle
|
|
65.
|
Online Symphony
|
|
66.
|
Salvage Scheme
|
|
67.
|
Barristerial Atrium
|
|
68.
|
Mortgage Scheme
|
|
69.
|
Online Nuptial
|
|
70.
|
Belligerent Tackle
Hire Classification
|
|
71.
|
e-Conscription
|
|
72.
|
On-Line Patronizing
|
|
73.
|
Bistro Stipulation
|
|
74.
|
Tangle Emporium
|
|
75.
|
Online Fretfulness
|
|
76.
|
Hoard Clinician
|
|
77.
|
Inure-Avocation Unit
|
|
78.
|
Sales Auditing Tool
|
|
79.
|
Pragmatic Academy
|
|
80.
|
Online Burgeons
Exposition
|
|
81.
|
Panchayathi
Financial Aid
|
|
82.
|
Menage
Swop
|
|
83.
|
Epoch
Indemnification Directorate
|
|
84.
|
E-
Celluloid Rain check Bespeaking
|
|
85.
|
E-Voucher
on Railway
|
|
86.
|
Sophomore
Strategy Apportionment and Directorate FEC Coding
|
|
87.
|
Lastingness
Slots
|
|
88.
|
Hamlet
Possession
|
|
89.
|
Online
Sedative
|
|
90.
|
Manifold
Entrust Scheme
|
|
91.
|
Conjunct
Expedient
|
|
92.
|
E-Assessment
Instructor
|
|
93.
|
Plunge
Fraternization
|
|
94.
|
Online
Negotiation
|
|
95.
|
Indemnification Stratagem Directorate Scheme
|
|
96.
|
Malleate
Bureau Directorate Scheme
|
|
97.
|
Chattels
Mega crop
|
|
98.
|
Ecumenical
Archives
|
|
99.
|
Online
Prodigy
|
|
100.
|
Motel
Recourses Tool
|
|
101.
|
Warehouse Executer
|
|
102.
|
Forensic Manager
|
|
103.
|
Transport Plus
|
|
104.
|
Travel Management
System
|
|
105.
|
Graphics Data
Visualization System
|
|
106.
|
Hospice Management
System
|
|
107.
|
Medi Tracker
|
|
108.
|
Common Application
System For Employment Exchanges
|
|
109.
|
Automated Business
Process
|
|
110.
|
Flow well Automation
|
|
111.
|
Automated Sports Club
|
|
112.
|
Net Banking
|
|
113.
|
NETPOD
|
|
114.
|
Easy-pay finance
|
|
115.
|
Upholding of
corporate sector
|
|
116.
|
Info ware Services
|
CORE JAVA PROJECT
|
SNO
|
PROJECT TITLE NAME
|
|
1.
|
Data –File apportioning
|
|
2.
|
Java Envoy
|
|
3.
|
Intranet
Control System
|
|
4.
|
Cryptographic
Scheme
|
|
5.
|
Gouging
Scheme
|
|
6.
|
Net
Chatter
|
|
7.
|
Secure
Socket Layer Protocol
|
|
8.
|
Precedence
Based Routing
|
|
9.
|
FEC
in Network Packet Losses
|
|
10.
|
Consignment
Harmonizing
|
|
11.
|
Multicast
Gouging
|
|
12.
|
Secure
Authentication Key
|
|
13.
|
Sachet
Short-out
|
|
14.
|
Robust
Spanning Data Dissemination
|
|
15.
|
Query
Dispensation in Networks
|
|
16.
|
Adhoc Network Using Lar
Protocol
|
|
17.
|
Cliamable Overlay Multicast
System
|
|
18.
|
Client Server Protocol
|
|
19.
|
Distributed Cooperative
Intermediaries
|
|
20.
|
Improved Virtual
Environment Systems
|
|
21.
|
Layer To Forward Protocol
|
|
22.
|
Measurement Control Edge
Routers
|
|
23.
|
Net survey Simulation
|
|
24.
|
Networks With Double Coverage
|
|
25.
|
Proactive Secure Scheme
|
|
26.
|
Randomized Protocols
Networks
|
|
27.
|
Routing In
Intermittently Networks
|
|
28.
|
Scheduling Mechanisms In
Network
|
|
29.
|
Secure Routing Control
|
|
30.
|
Selfish Routing In Online
|
|
31.
|
Server Reassign Load
|
No comments:
Post a Comment