Thursday, 28 February 2013

Java Title List

2012 JAVA IEEE PROJECTS

S.NO.
Project Title
Domain
Year
1.       
Online Modeling of Proactive Moderation System for Auction Fraud Detection
Network Security
2012
2.       
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
Cloud Computing
2012
3.       
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
Data Mining
2012
4.       
Packet-Hiding Methods for Preventing Selective Jamming Attacks
Network Security
2012
5.       
Learn to Personalized Image Search from  the Photo Sharing  Websites
Multimedia
2012
6.       
multiparty access control for online social networks: model and mechanisms
Data Mining
2012
7.       
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
Networking
2012
8.       
Game-Theoretic Pricing for Video Streaming inMobile Networks
Networking
2012
9.       
In Tags We Trust: Trust modeling in social tagging of multimedia content
Multimedia
2012
10.   
Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
Data Mining
2012
11.   
Packet Loss Control Using Tokens at the Network Edge
Networking
2012
12.   
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud Computing
2012
13.   
Cut detection in wireless sensor networks
Wireless Communication
2012
14.   
Organizing User Search Histories
Data Mining
2012
15.   
Ranking Model Adaptation for Domain-Specific Search
Data Mining
2012
16.   
Risk-Aware Mitigation for MANET Routing Attacks
Network Security
2012
17.   
Slicing: A New Approach to Privacy Preserving Data Publishing
Data Mining
2012
18.   
Fast Data Collection in Tree-Based Wireless Sensor Networks.
Mobile Computing
2012
19.   
Cloud Data Production for Masses
 Cloud Computing
2012
20.   
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Cloud Computing


2011 JAVA IEEE PROJECTS

S.NO.
Project Title
Domain
Year
1.       
Effective Navigation of Query Results Based on Concept Hierarchies
Data Mining
2011
2.       
Modeling and Detection of Camouflaging Worm
Network Security
2011
3.       
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
Networking
2011
4.       
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Network Security
2011
5.       
Ranking Spatial Data by Quality Preferences
Data Mining
2011
6.       
Discovering Conditional Functional Dependencies
Data Mining
2011
7.       
Buffer Sizing for 802.11 Based Networks
Networking
2011
8.       
Extended XML Tree Pattern Matching: Theories and Algorithms
Data Mining
2011
9.       
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
Network Security
2011
10.   
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
Data Mining
2011
11.   
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Mobile Computing
2011
12.   
Decision Trees for Uncertain Data
Data Mining
2011
13.   
Secure and Practical Outsourcing of Linear  Programming in Cloud Computing
Cloud Computing
2011
14.   
Authenticated multi step nearest neighbor search
Networking
2011
15.   
Adaptive cluster Distance bounding for high dimensional indexing
Data mining
2011
16.   
Making aggregation work in uncertain and probabilistic databases
Data Mining
2011
17.   
Improving utilization of infrastructure clouds
Cloud Computing
2011
18.   
Wireless sensor network security model using zero knowledge protocol
Mobile Computing
2011
19.   
Selfish overlay network creation and maintenance.
Networking
2011
20.   
SPAF: Stateless FSA - based packet filters
Networking
2011

2010 JAVA IEEE PROJECTS
S.No
Project Title
Domain
Year
1
A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks.

Networking
2010
2
On wireless scheduling algorithms for minimizing the queue-overflow probability.

Networking
2010
3
Always Acyclic Distributed Path Computation.

Networking
2010
4
Ensuring Data Storage Security in Cloud Computing.
Cloud computing

2010
5
Demonstration of lightpath sharing for video streaming and data collection in lambda grid networks.

Grid Networking

2010
6
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains-abs.

Data Mining
2010
7
PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.

Data Mining
2010
8
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.

Mobile Computing
2010
9
Layered Approach Using Conditional Random Fields for Intrusion Detection.

Network Security
2010
10
Closeness a new privacy measure for data publishing.

Data Security
2010
11
Host-to-Host Congestion Control for TCP.

Networking
2010
12
Mesh Based Multicast Routing in MANET Stable Link Based Approach.

Networking
2010
13
Mitigating selective forwarding attacks with a channel-aware approach in WMNS.

On Wireless Comunnication
2010
14
Novel defense mechanism against data flooding attacks in wireless ad hoc networks.
Network Security
2010
15
Random Access Transport Capacity.
On Wireless Communication
2010
16
A Review of the Applications of Agent Technology In Traffic and Transportation Systems.
On Intelligence  Systems
2010
17
Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs
.
Data Mining
2010
18
Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks.

Data Mining

2010
19
A Distributed Protocol to Serve Dynamic
Groups for Peer-to-Peer Streaming.

Networking
2010
20
Cooperative Caching in Wireless P2P
Networks: Design, Implementation.

Networking
2010
21
IRM: Integrated File Replication And Consistency Maintenance In P2p Systems.

Networking
2010

2009 JAVA Projects

SR NO

Project Title

Domain

Year
1
Glip A concurrency Control Protocol for Clipping Indexing

Data Mining

2009
 2
Interactive Correction and Recommendations for computer language learning and training

Data Mining

2009
 3
Storing and Indexing spatial data in P2P systems.


Data Mining

2009
 4
Mobility management approaches for mobile IP networks: performance comparision and use recommendations


Mobile Computing

2009
 5
Evaluating the vulnerability of N/W traffic using joint security and routing analysis


Mobile Computing

2009
 6
Mitigation performance Degradation in congested sensor networks.


Mobile Computing

2009
 7
Mitigation of control channel jamming under ode capture attacks


Mobile Computing

2009
 8
Energy maps for mobile wireless. N/W: coherence Time versus spreading period


Mobile Computing

2009
 9
Simps: Using sociology for personal Mobility


Networking

2009
 10
Multiple routing configurations for fast IP network recovery


Networking

2009
 11
Residual-Based estimation of peer and link lifetimes in P2P N/W.


Networking

2009
 12
Flexible roll back recovery in dynamic heterogeneous grid computing


Networking

2009
 13
SAR Image Regularization with Fast Approximate discrete minimization


Image Processing


2009
 14
Dynamic routing with security considerations


Network Security

2009
 15
Cryptographic versus Trust-based methods for MANET routing security


Network Security

2009
 16
A Decentralized Method for Scaling Up
Genome Similarity Search Services

Networking

2009
 17
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

On Wireless Communications

2009
 18
Capturing Router Congestion and Delay


Networking

2009
 19
Catching the Trend: A Framework for Clustering
Concept-Drifting Categorical Data


Data Mining

2009
 20
CDNs Content Outsourcing Via Generalized Communities


Data Mining

2009
 21
Cooperative Secondary Authorization Recycling

Networking

2009
 22
Detecting Malicious Packet Losses

Network Security

2009
23
Dynamic Search Algorithm in Unstructured
Peer-to-Peer Networks


Networking

2009
 24
Efficient Node Admission and Certificate less Secure Communication in Short-Lived MANETs

Network Security


2009
 25
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach

Network Security


2009
 26
Multi-path Dissemination in Regular Mesh Topologies

Networking

2009
 27
Privacy-Aware Collaborative Spam Filtering


Networking

2009
 28
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis


Networking

2009






2008JAVA Projects
SR No
Project Title
Domain
Year
1
On the Performance Benefits of Multihoming Route Control.


Networking

2008
2
Two techniques for fast computation of constrained shortest paths


Networking

2008
3
Probabilistic packet marking for Large-Scale IP trace back


Network Security

2008
4
A geometric approach to improving active packet loss measurement


Networking

2008
5
A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks


Networking

2008
6
Minimizing File download time in stochastic Peer to Peer N/W


Networking

2008
7
Computation Efficient multicast key distribution

Networking
2008
8
Quiver: Consistent Object Sharing for Edge Services


Networking
2008
9
Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest


Networking

2008
10
Modeling and Automated Containment of Worms


Network Security

2008
11
Controlling IP spoofing through interdomain packet filters
Network Security

2008
12
C-TREND: Temporal Cluster Graphs for Identifying and Visualizing    Trends in Multiattribute Transactional Data
Data Mining

2008
13
Probabilistic Group Nearest Neighbor Queries
Data Mining

2008
14
A Lossless Compression Scheme for Bayer Color Filter Array Images
image processing

2008
15
Image Restoration Using Space-Variant Gaussian Scale Mixtures in over complete pyramids
Image Processing

2008
16
Bandwidth Estimation for IEEE 802.11 Based Ad Hoc Networks
Mobile computing

2008
17
Efficient Resource Allocation for Wireless Multicast
Mobile Computing

2008
18
Mining the E-commerce Data to Analyze the Target Customer Behavior
Data Mining


2008
19
Incremental Learning of Chunk Data for Online Pattern Classification Systems
Neural Networks

2008
20
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Software Engineering

2008
21
Video Semantic Event/Concept Detection Using a Subspace-Based Multimedia Data Mining Framework

Multimedia

2008



22
Face Recognition Using Laplacian Faces


23
Improving The Performance of Distributed Virtual Environment System(networking)











JAVA WEB APPLICATION
SNO
PROJECT NAME
1.       
Communal Contact
2.       
Back Forty Dense
3.       
Bureaucrat Defended Entity
4.       
Baccalaureate Gateway
5.       
Rescue Squad Overhaul Contributor
6.       
Reckoning Inquisitor
7.       
Bacillus Eavesdropper
8.       
Online Itemization Structure
9.       
Hospice Dossier Control
10.   
Electrorate Conspiracy
11.   
Symposium Schema
12.   
Restrained Netting
13.   
Banter Porch
14.   
Grime Dissolution Scheme
15.   
Endurance Of Employee Particulars
16.   
Paraquat Stockpile
17.   
On-stream Troutville
18.   
Project Regulation
19.   
Ostentatious Storehouse Structure
20.   
Digital Placard
21.   
Almanac Ascertain
22.   
Appositeness Intendance
23.   
Blemish Ascertainers
24.   
Online Allegation
25.   
Mortal Policy Outline
26.   
Confrontation Reconnoiter
27.   
Erudition Damper
28.   
Cartel Communiqué
29.   
Inherent Envoy Scheme
30.   
E-Chain Communicator
31.   
Enormous Employment
32.   
Vendible Internuncio
33.   
First-Rate Sanatorium
34.   
Misdemeanor Abjurer
35.   
Web Linoleum
36.   
Directorial Dispensation                                
37.   
Haul able Overhaul
38.   
Electronic Depository
39.   
Endowment Fathom
40.   
Disburse Mobile Scheme
41.   
Venture Scrutiny
42.   
Stately Sojourn
43.   
e-Acquirements
44.   
Disposition Prospectus
45.   
Tele Dormitory
46.   
Fleet Conveyor                                                          
47.   
Velocipede Dime store
48.   
Widespread Catalog
49.   
Travel Permit Indulgence Scheme
50.   
Infobahn Vendue
51.   
Village Communic Bureau
52.   
Weald Supervision Scheme
53.   
Online Women Kibitzer
54.   
Clodhopper's Pal
55.   
Online Dodge
56.   
Web Athenaeum Governance
57.   
Web Vernacular Referendum
58.   
Web Venture Governance                             
59.   
Convertible Leaflet Governance                    
60.   
Mobility Bill Defrayment                             
61.   
Relevance to Scattered Precinct        
62.   
Cast Your Referendum          
63.   
Embellish Bureau       
64.   
Aero Shuttle   
65.   
Online Symphony      
66.   
Salvage Scheme         
67.   
Barristerial Atrium     
68.   
Mortgage Scheme      
69.   
Online Nuptial           
70.   
Belligerent Tackle Hire Classification
71.   
e-Conscription
72.   
On-Line Patronizing  
73.   
Bistro Stipulation       
74.   
Tangle Emporium       
75.   
Online Fretfulness      
76.   
Hoard Clinician          
77.   
Inure-Avocation Unit
78.   
Sales Auditing Tool   
79.   
Pragmatic Academy   
80.   
Online Burgeons Exposition  
81.   
Panchayathi Financial Aid
82.   
Menage Swop
83.   
Epoch Indemnification  Directorate
84.   
E- Celluloid Rain check  Bespeaking
85.   
E-Voucher on Railway
86.   
Sophomore Strategy   Apportionment and      Directorate FEC Coding
87.   
Lastingness Slots
88.   
Hamlet Possession
89.   
Online Sedative
90.   
Manifold Entrust Scheme                            
91.   
Conjunct Expedient
92.   
E-Assessment Instructor
93.   
Plunge Fraternization
94.   
Online Negotiation
95.   
Indemnification  Stratagem Directorate Scheme
96.   
Malleate Bureau  Directorate Scheme
97.   
Chattels Mega crop
98.   
Ecumenical Archives
99.   
Online Prodigy
100.                       
Motel Recourses Tool
101.                       
Warehouse Executer
102.                       
Forensic Manager
103.                       
Transport Plus
104.                       
Travel Management System
105.                       
Graphics Data Visualization System
106.                       
Hospice Management System
107.                       
Medi Tracker
108.                       
Common Application System For Employment Exchanges
109.                       
Automated Business Process
110.                       
Flow well Automation
111.                       
Automated Sports Club
112.                       
Net Banking
113.                       
NETPOD
114.                       
Easy-pay finance
115.                       
Upholding of corporate sector
116.                       
Info ware Services





CORE JAVA PROJECT
SNO
PROJECT TITLE NAME
1.       
Data –File apportioning
2.       
Java Envoy
3.       
Intranet Control System
4.       
Cryptographic Scheme
5.       
Gouging Scheme
6.       
Net Chatter
7.       
Secure Socket Layer Protocol
8.       
Precedence Based Routing
9.       
FEC in Network Packet Losses
10.   
Consignment Harmonizing
11.   
Multicast Gouging
12.   
Secure Authentication Key
13.   
Sachet Short-out
14.   
Robust Spanning Data Dissemination
15.   
Query Dispensation in Networks
16.   
Adhoc Network Using Lar Protocol
17.   
Cliamable Overlay Multicast System
18.   
Client Server Protocol
19.   
Distributed Cooperative Intermediaries
20.   
Improved Virtual Environment Systems
21.   
Layer To Forward Protocol
22.   
Measurement Control Edge Routers
23.   
Net survey Simulation
24.   
Networks With Double Coverage
25.   
Proactive  Secure Scheme
26.   
Randomized Protocols Networks
27.   
Routing In Intermittently  Networks
28.   
Scheduling Mechanisms In Network
29.   
Secure Routing Control
30.   
Selfish Routing  In Online
31.   
Server Reassign Load





No comments:

Post a Comment