Tuesday, September 6, 2011

2011 IEEE Java Project Titles


2011 IEEE Project Titles, Java  
Java IEEE 2011 Project Titles

PROJECT TITLES & DOMAINS
MOBILE COMPUTING PROJECT TITLES (IEEE 2011 Java Mobile Computing Project Titles)
  • On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
  • Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
  • Spatial -Temporal Coverage optimization in wireless Sensor Network
  • A Control Theoretic Approach to Distributed Optimal Configuration of 80211 WLANs
  • Autonomous Deployment of Heterogeneous Mobile Sensors
  • Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding
  • Effective Scheduling in Infrastructure Based Cognitive Radio Networks
  • Endpoint Based Call Admission Control and Resource Management for VoWLAN
  • Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
  • MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
  • Mobile Sampling of Sensor Field Data Using Controlled Broadcast
  • Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
  • QoS Aware Routing and Admission Control in Shadow Fading Environments for Multirate MANETs
  • Secure High-Throughput Multicast Routing in Wireless Mesh Networks
  • The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems
  • Throughput Optimization in Mobile Backbone Networks

NETWORKING PROJECT TITLES (IEEE 2011 Java Networking Project Titles)
  • Component-Based Localization in Sparse Wireless Networks
  • Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
  • Model-Based Identification of Dominant Congested Links
  • Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks
  • TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks
  • On the Complexity of the Regenerator Placement Problem in Optical Networks
  • Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection
  • A Novel Approach for Failure Localization in All-Optical Mesh Networks
  • Energy Efficient Protocol for Cooperative Networks
  • Licklider Transmission Protocol (LTP) Based DTN for Cislunar Communications
  • Scheduling Algorithms for Multicarrier Wireless Data Systems
  • Selfish Overlay Network Creation and Maintenance
  • Star Block Design in Two-Level Survivable Optical Networks
  • Stochastic Model and Connectivity Dynamics for VANETs in Signalized Road Systems

NETWORK AND SERVICE MANAGEMENT PROJECT TITLES (IEEE 2011 Java Network and Service Management Project Titles)
  • Low-Overhead End-to-End Performance Measurement for Next Generation Networks
  • On the Impact of Security Protocols on the Performance of SNMP
  • Locating Equivalent Servants over P2P Networks

CLOUD COMPUTING PROJECT TITLE(IEEE 2011 Java Cloud Computing Project Titles)
  • Towards Secure and Dependable Storage Services in Cloud Computing
  • Going Back and forth Efficient Multi deployment and multisnapshotting on Clouds
  • Enabling public Auditability and data dynamics for storage security in clouding Computing
  • Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
  • Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
  • Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
  • Optimization of Resource Provisioning Cost in Cloud Computing
  • Performance Analysis of Cloud Computing Services for MTC-Based Scientific Computing
  • CloudTPS: Scalable Transactions for Web Applications in the Cloud

DEPENDABLE AND SECURE COMPUTING PROJECT TITLES (IEEE 2011 Java Dependable and Secure Computing Project Titles)
  • Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling 
  • ELMO: Energy Aware Local Monitoring in Sensor Networks
  • Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring 
  • Privacy-Preserving Updates to Anonymous and Confidential Databases
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 
  • Low-Energy Symmetric Key Distribution in Wireless Sensor Networks 
  • Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
  • Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
  • Online Intrusion Alert Aggregation with Generative Data Stream Modeling

KNOWLEDGE AND DATA ENGINEERING PROJECT TITLES (IEEE 2011 Java Knowledge and Data Engineering Project Titles)
  • Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments
  • A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
  • A Personalized Ontology Model for Web Information Gathering
  • A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
  • Design and Implementation of an Intrusion Response System for Relational Databases
  • Adaptive Cluster Distance Bounding for High Dimensional Indexing 
  • Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
  • Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
  • Discovering Conditional Functional Dependencies
  • Clustering with Multi-Viewpoint based Similarity Measure KD

PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLE(IEEE 2011 Java Parallel and Distributed System Project Titles)
  • Cooperative Channelization in Wireless Networks with Network Coding
  • Video Streaming Distribution in VANETs
  • Throughput Optimization in Multihop Wireless Networks with Multipacket Reception and Directional Antennas
  • Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
  • Network Immunization with Distributed Autonomy-Oriented Entities
  • Optimization of Rate Allocation with Distortion Guarantee in Sensor Networks
  • A Data Throughput Prediction and Optimization Service for Widely Distributed Many-Task Computing
  • Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
  • Toward Efficient and Simplified Distributed Data Intensive Computing

IMAGE PROCESSING PROJECT TITLES (IEEE 2011 Java Image Processing Project Titles)
  • Nonlocal PDEs-Based Morphology on Weighted Graphs for Image and Data Processing
  • Image Segmentation Using Fuzzy Region Competition and Spatial/Frequency Information 
  • Perceptual Segmentation: Combining Image Segmentation With Object Tagging
  • ViBe: A Universal Background Subtraction Algorithm for Video Sequences
  • Contextual Kernel and Spectral Methods for Learning the Semantics of Images
  • JPEG2000-Based Scalable Interactive Video (JSIV)
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891 
IEEE JAVA PROJECT TITLES 
 
CLOUD COMPUTING PROJECT TITLES 2011

 
  • Towards Secure and Dependable Storage Services in Cloud Computing
  • Going Back and forth Efficient Multi deployment and multisnapshotting on Clouds
  • Enabling public Auditability and data dynamics for storage security in clouding Computing
  • Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
  • Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
  • Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
  • Optimization of Resource Provisioning Cost in Cloud Computing
  • Performance Analysis of Cloud Computing Services for MTC-Based Scientific Computing
  • CloudTPS: Scalable Transactions for Web Applications in the Cloud
  • Ensuring Data Storage Security in Cloud Computing, Cloud Computing - 2010

Monday, September 5, 2011

IEEE Java Project Titles in WSN


IEEE Java Project Titles in WSN, 2011 

  • A Dynamic Intrusion Detection Model Based on Immunity for Wireless Sensor Network
  • A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks
  • A PCA-based Distributed Approach for Intrusion Detection in Wireless Sensor Networks
  • Adaptive Data-Centric Storage in Wireless Sensor Networks
  • Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks
  • Autonomous Background Coordination Technology for Timely Sensor Connection in Wireless Sensor Networks
  • Clustering based Energy Efficient Congestion Aware Protocol for Wireless Sensor Networks 
  • Continuous Neighbor Discovery in Asynchronous Sensor Networks
  • Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
  • Energy Conservation using Network Coding in Grid Wireless Sensor Networks
  • Energy-Aware Distributed Tracking in Wireless Sensor Networks
  • Energy-efficient Trust-based Aggregation in Wireless Sensor Networks
  • EPC Energy-aware Probability-based Clustering Algorithm for Correlated Data Gathering in Wireless Sensor Networks
  • Fault Management Frameworks in Wireless Sensor Networks
  • Fault-Tolerant and Scalable Key
  • Honey Ant Based Cooperative Data Accumulation
  • Hummingbird Key Establishment Protocol For Low-Power ZigBee
  • IBE-Trust A Security Framework for Wireless Sensor Networks
  • Key Distribution in Wireless Sensor Networks using Finite Af?ne Plane
  • Long Lifetime Routing in Unreliable Wireless Sensor Networks
  • MOBINET Mobility Management Across Different Wireless Sensor Networks
  • Multi-stage AUV-aided Localization for Underwater Wireless Sensor Networks
  • Network Supporting Multilayered Quality of Service Routing  in Wireless Sensor Networks
  • Performance Analysis of Real-Time Detection in Fusion-Based Sensor Networks
  • Prediction or Not An Energy-Efficient Framework for Clustering-Based Data Collection in Wireless Sensor Networks
  • Quality-based Event Reliability Protocol in Wireless Sensor Networks
  • The Optimal Sleep Control for Wireless Sensor Networks

www.ncct.in, ncctchennai@gmail.com

IEEE Java Project Titles in ADHOC Networking


IEEE Java Project Titles in ADHOC Networking 

  • A Cellular Automata based Network Security Model
  • A Cluster-Based Key Management Scheme for MANET
  • A Clustering Algorithm Based on Subjective Trust in MANET
  • A Distributed Intrusion Detection System Against Flooding Denial of Services Attacks
  • A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
  • A Dynamic Context-Aware Access Network Selection for Handover in Heterogeneous Network Environments
  • A Virtual Topology for Routing in Adhoc Networks
  • AMLeT Adaptive Multi Level Trust framework for MANETs
  • Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
  • Detecting Forged Acknowledgements in MANETs
  • Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
  • Forming Vehicular Web of Trust in VANET
  • Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Network
  • Long-term Reputation System for Vehicular Networking based on Vehicle's Daily Commute Routine
  • Mitigating Routing Misbehavior in Dynamic Source Routing Protocl Using Trust-Based Reputation Mechanism for Wireless Ad-Hoc Networks
  • Mobility Assisted Routing in Mobile Ad Hoc Networks
  • Multi-path Encrypted Data Security Architecture for Mobile Ad hoc Networks
  • Reliability Estimate of Mobile Agent System for QoS MANET Applications
  • Secure Routing Protocol for Mobile Wireless Sensor Network
  • SMSS Symmetric-Masquerade Security Scheme for vanets
  • Symmetric Key Approaches to Securing BGP-A Little Bit Trust Is Enough
  • TEAM Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks
  • The Effect of Direct Interactions on Reputation Based Schemes in Mobile Ad hoc Networks
  • TraceGray An Application-layer Scheme for Intrusion Detection in MANET using Mobile Agents
  • TrustGuard A Flow-level Reputation-based DDoS Defense System

www.ncct.in, ncctchennai@gmail.com

IEEE Java Project Titles in various Domains

SOFTWARE ENGINEERING, 2011 
  • The Awareness Network, To Whom Should I Display My Actions  And, Whose Actions Should I Monitor
  • A Comparative Study of Software Model Checkers as Unit Testing Tools
  • Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
  • Genetic Algorithms for Randomized Unit Testing
  • Semi-Proving An Integrated Method for Program Proving, Testing, and Debugging
  • Software Module Clustering as a Multi–Objective Search Problem
  • Verifying the Evolution of Probability Distributions Governed by a DTMC 
  • Embedded extended visual cryptography schemes, INFORMATION FORENSICS AND SECURITY, 2011
  • Monitoring Service Systems from a Language-Action Perspective, SERVICE COMPUTING, 2011 
  • A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, SERVICE COMPUTING, 2011 
  • Vulnerability Analysis in SOA-based Business Processes, SERVICE COMPUTING, 2011 
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816

  • Effects of Denial of sleep attacks on wireless sensor networks MAC protocols, Vehicular Technology - 2010
  • Upper Bounds for Dynamic Memory Allocation, Computers - 2010
  • Data Mining Techniques For Dynamically Classifying And Analyzing Library Database, Datamining - 2010
  • Analysis of Computational Time of Simple Estimation of Distribution Algorithms, Evolutionary Computation - 2010
  • An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics And Security - 2010
  • Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, Multimedia - 2009
  • Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions, Neural Networks - 2009
  • CHARMY: A Framework for Designing and Verifying Architectural Specifications,   Software Engineering - 2009
  • Optimized Resource Allocation for Software Release Planning, Software Engineering - 2009
  • Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies, Biomedicine - 2009
  • Continuous Flow Wireless Data Broadcasting for High Speed Environments, Broadcasting - 2009
  • Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, Communications - 2009
  • SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, Communications - 2009
  • Collusive piracy prevention in P2P content delivery network, Computers - 2009
  • A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, Distributed Computing - 2009
  • EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks, Industrial Informatics - 2009
  • SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - 2009
  • Agent Mining: The Synergy of Agents and Data Mining, Intelligent Systems - 2009
  • DAIOS - Efficient Dynamic Web Service Invocation, Internet Computing - 2009
  • A Survey of Learning-Based Techniques of Email Spam Filtering, Neural Networks - 2008
  • Modeling & Automated Containment of Worms, Secure Computing - 2008
  • Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems, Software Engineering - 2008
  • Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Systems For Secure Systems - 2008
  • Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol, Computer and Communication Engineering - 2008
  • High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths, Consumer Electronics - 2008
  • Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, Data Engineering - 2008
  • Online Index Recommendations for High-Dimensional Databases Using Query Workloads, Data Mining - 2008
  • BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, Data Mining - 2008
  • Face Recognition for Smart Recognitions, Gesture Recognition - 2008
  • Protection of Database Security via Collaborative Inference Detection, Intelligence and Security Informatics - 2008
  • Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs, Computer Science & Network Security - 2007
  • Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm, Intelligent and Advanced Systems - 2007
  • An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net, Machine Learning And Cybernetics - 2007
  • A Wireless Distributed Intrusion Detection System and a New Attack Model, Computers and Communications - 2006
  • Building Intelligent Shopping Assistants Using Individual Consumer Models, Data mining - 2005
  • GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions, Data Mining - 2005
  • Mobile Objects and Mobile Agents: The Future of Distributed Computing, Distributed Computing - 2004
  • ODAM An Optimized Distributed Association Rule Mining Algorithm, Distributed Systems - 2004
  • A Reputation based Trust Model for Peer to Peer E - Commerce Communities, E-Commerce Technology - 2003
  • Noise Reduction by Fuzzy Image Filtering, Fuzzy Systems - 2003
  • Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - 2006
  • Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - 2006
  • E-Secure Transactions - Secure Electronic Data Interchange over Internet, Internet Computing - 2005
  • Face Recognition using Laplacian Faces, Pattern Analysis and Machine Intelligence - 2005
  • Online Handwritten Script Recognition, Pattern Analysis and Machine Intelligence - 2004
  • Modeling Peer-Peer File Sharing Systems, Web Intelligence - 2003
  • Unified Network Monitoring For Web Technology, Web Technology - 2003
  • Personal Identification Based On Iris Texture Analysis, 2003
  • Location-Aided Routing (LAR) in Mobile Ad Hoc Networks, Wireless Networks - 2000
  • Location based Service Routing, 2005
  • A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
  • Coupling based metrics for measuring the quality of a software
  • Demonstration of Secure Sockets Layer Protocol Working and Implementation
  • Information Retrieval from Web Search using Keyword Spices
  • Security in large Mediator Protocols
  • SybilGuard Defending Against Sybil Attacks via Social Networks
  • User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
  • Towards Multimodal Interfaces for Intrusion Detection, Computer Networks
  • Distributed Data Mining in Credit Card Fraud Detection, Datamining & Intelligent Systems
  • E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management, Innovative Computing
  • Secured Password Based Protocol For Downloading A Private Key, Network and Distributed System
  • A Software Defect Report and Tracking System in an Intranet, Software Maintenance and Reengineering

www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816

IEEE Java Project Titles in Wireless Communications

IEEE JAVA PROJECT TITLES
WIRELESS COMMUNICATIONS PROJECT TITLES 2011
  • A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
  • A Threshold-Selective Multiuser Downlink MAC scheme for 802.11n Wireless Networks
  • Blind Channel Estimation for STBC Systems Using Higher-Order Statistics
  • Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
  • Fundamental Limits of Information Dissemination in Wireless Ad Hoc Networks
  • Generalized Analysis of a Distributed Energy Efficient Algorithm for Change Detection
  • Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
  • Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
  • Throughput Optimization in High Speed Downlink Packet Access (HSDPA)
  • Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
  • Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design


IEEE JAVA PROJECT TITLES
WIRELESS COMMUNICATIONS PROJECT TITLES 2010, 2009...
  • Random access Transport Capacity, 2010
  • Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks, 2010
  • Multi-Service Load Sharing for Resource Management in the CellularWLAN Integrated Network, 2009
  • Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks, 2009
  • Robust cooperative routing protocol in mobile wireless sensor networks, 2009
  • Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks, 2009
  • SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets, 2009

IEEE Java Project Titles in Image Processing


IEEE JAVA PROJECT TITLES
IMAGE PROCESSING PROJECT TITLES 2011
  • Nonlocal PDEs-Based Morphology on Weighted Graphs for Image and Data Processing
  • Image Segmentation Using Fuzzy Region Competition and Spatial/Frequency Information 
  • Perceptual Segmentation: Combining Image Segmentation With Object Tagging
  • ViBe: A Universal Background Subtraction Algorithm for Video Sequences
  • Contextual Kernel and Spectral Methods for Learning the Semantics of Images
  • JPEG2000-Based Scalable Interactive Video (JSIV)
  • A closed-form approximation of the exact unbiased inverse of the Anscombe variance-stabilizing transformation
  • Gradient Profile Prior and Its Applications in Image Super-Resolution and Enhancement
  • Hybrid No-reference Natural Image Quality Assessment of Noisy, Blurry, JPEG2000, and JPEG Images
  • Boosting Color Feature Selection for Color Face Recognition
  • Color Extended Visual Cryptography Using Error Diffusion


IMAGE PROCESSING PROJECT TITLES 2010, 2009...
  • Unequal Power Allocation for JPEG Transmission Over MIMO Systems, 2010
  • Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos, 2009
  • Hierarchical Bayesian sparse image reconstruction with application to MRFM, 2009
  • Image Transformation using Grid, 2006
  • A Memory Learning Framework for Effective Image Retrieval, 2005
  • Application of BPCS steganography to wavelet compressed video, 2004
  • Identification of Humans Using Gait, 2004
  • Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress, 2003

IEEE Java Project Titles in Parallel and Distributed Systems


IEEE JAVA PROJECT TITLES
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES 2011
  • Cooperative Channelization in Wireless Networks with Network Coding
  • Video Streaming Distribution in VANETs
  • Throughput Optimization in Multihop Wireless Networks with Multipacket Reception and Directional Antennas
  • Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
  • Network Immunization with Distributed Autonomy-Oriented Entities
  • Optimization of Rate Allocation with Distortion Guarantee in Sensor Networks
  • A Data Throughput Prediction and Optimization Service for Widely Distributed Many-Task Computing
  • Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
  • Toward Efficient and Simplified Distributed Data Intensive Computing


PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES 2010, 2009...
  • A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming, 2010
  • Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation, 2010
  • IRM Integrated File Replication and Consistency Maintenance, 2010
  • Privacy-Conscious Location-Based Queries in Mobile Environments, 2010
  • Detecting Malicious Packet Losses, 2009
  • Dynamic Routing with Security Considerations, 2009
  • Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks, 2009
  • Virtual-Force-Based Geometric Routing Protocol in MANETs, 2009
  • A Tree-Based Peer-to-Peer Network with Quality Guarantees, 2008
  • Computation Efficient Multicast Key Distribution, 2008
  • Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, 2008
  • Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System, 2008
  • QUIVER Consistent Object Sharing For Edge Services, 2008
  • The Server Reassignment Problem for Load Balancing in Structured P2P Systems, 2008
  • Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode, 2008
  • Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding, 2008
  • A Fully Distributed Proactively Secure Threshold-Multisignature Scheme, 2007
  • A New Operational Transformation Framework for Real-Time Group Editors, 2007
  • Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach, 2007
  • OCGRR - A New Scheduling Algorithm for Differentiated Services Networks, 2007
  • Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems, 2007

www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 28235816 

IEEE Java Project Titles in Knowledge and Data Engineering


IEEE JAVA PROJECT TITLES
KNOWLEDGE AND DATA ENGINEERING PROJECT TITLES 2011
  • Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments
  • A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
  • A Personalized Ontology Model for Web Information Gathering
  • A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
  • Design and Implementation of an Intrusion Response System for Relational Databases
  • Adaptive Cluster Distance Bounding for High Dimensional Indexing 
  • Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
  • Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
  • Discovering Conditional Functional Dependencies
  • Clustering with Multi-Viewpoint based Similarity Measure KD
  • A Dual Framework and Algorithms for Targeted Online Data Delivery
  • A Fast Multiple Longest Common Subsequence (MLCS) Algorithm
  • A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification
  • A Generic Multilevel Architecture for Time Series Prediction
  • Data Leakage Detection
  • Decision Trees for Uncertain Data
  • Effective Navigation of Query Results Based on Concept Hierarchies
  • Efficient Computation of Range Aggregates against Uncertain Location Based Queries
  • Exploring Application-Level Semantics for Data Compression
  • Extended XML Tree Pattern Matching Theories and Algorithms
  • Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
  • Learning Semi-Riemannian Metrics for Semisupervised Feature Extraction
  • Load Shedding in Mobile Systems with MobiQual
  • One Size Does Not Fit All Towards User and Query Dependent Ranking For Web Databases
  • Publishing Search Logs - A Comparative Study of Privacy Guarantees
  • Ranking Spatial Data by Quality Preferences
  • Scalable Learning of Collective Behavior
  • The CoQUOS Approach to Continuous Queries in Unstructured Overlays
  • The World in a Nutshell - Concise Range Queries
  • Continuous Monitoring of Distance Based Range Queries
  • Efficient and Accurate Discovery of Patterns in Sequence Datasets
  • Efficient Top-k Approximate Subtree Matching in Small Memory
  • Energy Time Series Forecasting Based on Pattern Sequence Similarity



KNOWLEDGE AND DATA ENGINEERING PROJECT TITLES 2010, 2009...
  • Adaptive Join Operators for Result Rate optimization, 2010
  • False Negative Problem of Counting Bloom Filter, 2010
  • FiVaTech Page-Level Web Data Extraction from Template Pages, 2010
  • k-Anonymity in the Presence of External Databases, 2010
  • LIGHT A Query-Efficient Yet Low-Maintenance --DHT, 2010
  • PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects, 2010
  • Prospective Infectious Disease Outbreak detection using Markov switching model, 2010
  • Queries Optimization in SQL using Linear Recursion, 2010
  • Approximate Distributed K-Means Clustering over a Peer-to-Peer Network, 2009
  • OLEX : effective Rule Learning for Text Categorization, 2009
  • ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication, 2009
  • Efficient Range Query Processing in Peer-to-Peer Systems, 2009
  • A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern, 2008
  • Distributed Suffix Tree Overlay for Peer-to-Peer Search, 2008
  • Probabilistic Group Nearest Neighbor Queries in Uncertain Databases, 2008
  • Truth Discovery with multiple Conflicting Information Providers on web, 2008
  • C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi attribute Transactional Data, 2008
  • An Efficient Association Rule Mining Algorithm In Distributed Databases, 2008
  • An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis, 2008 
 www.ncct.in, ncctchennai@gmail.com

044-28235816, 98411 93224, 93901 02891 

 IEEE Java Project Titles in Dependable and Secure Computing


IEEE JAVA PROJECT TITLES 
DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2011
  • Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling 
  • ELMO: Energy Aware Local Monitoring in Sensor Networks
  • Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring 
  • Privacy-Preserving Updates to Anonymous and Confidential Databases
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 
  • Low-Energy Symmetric Key Distribution in Wireless Sensor Networks 
  • Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
  • Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
  • Online Intrusion Alert Aggregation with Generative Data Stream Modeling
  • A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
  • Chip Self-Organization and Fault-Tolerance in Massively Defective Multicore Arrays
  • Comparative Evaluation of Spoofing Defense
  • Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
  • Modeling and Detection of Camou?aging Worm
  • Nymble Blocking Misbehaving Users in Anonymizing Networks
  • RITAS Services for Randomized Intrusion Tolerance
  • SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
  • A Fault-Tolerant Token based Atomic Broadcast Algorithm
  • A Tamper-Resistant Programming Language System
  • Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime
  • The Geometric Efficient Matching Algorithm for Firewalls


DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2010, 2009...
  • Layered Approach Using Conditional Random Fields for Intrusion Detection, 2010
  • SiGFree Asignature based free buffer overflow attack blocker, 2010
  • Secure Data Objects Replication in Data Grid, 2010
  • Evaluating the Vulnerability of Network Traffic Using Joint, 2009
  • Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, 2009
  • Security Analysis of the SASI Protocol, 2009
  • Controlling IP Spoofing Through Inter Domain Packet Filters, 2008
  • A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, 2008
  • An Adaptive Programming Model for Fault Tolerant Distributed Computing, 2007
  • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, 2007

IEEE Java Project Titles in Cloud Computing


IEEE JAVA PROJECT TITLES 
CLOUD COMPUTING PROJECT TITLES 2011
  • Towards Secure and Dependable Storage Services in Cloud Computing
  • Going Back and forth Efficient Multi deployment and multisnapshotting on Clouds
  • Enabling public Auditability and data dynamics for storage security in clouding Computing
  • Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
  • Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
  • Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
  • Optimization of Resource Provisioning Cost in Cloud Computing
  • Performance Analysis of Cloud Computing Services for MTC-Based Scientific Computing
  • CloudTPS: Scalable Transactions for Web Applications in the Cloud
  • Ensuring Data Storage Security in Cloud Computing, Cloud Computing - 2010

IEEE Java Project Titles in Networking


IEEE JAVA PROJECT TITLES 
NETWORKING / NETWORK SECURITY PROJECT TITLES 2011

  • Component-Based Localization in Sparse Wireless Networks
  • Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
  • Model-Based Identification of Dominant Congested Links
  • Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
  • TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks
  • On the Complexity of the Regenerator Placement Problem in Optical Networks
  • Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection
  • A Novel Approach for Failure Localization in All-Optical Mesh Networks
  • Energy Efficient Protocol for Cooperative Networks
  • Licklider Transmission Protocol (LTP) Based DTN for Cislunar Communications
  • Scheduling Algorithms for Multicarrier Wireless Data Systems
  • Selfish Overlay Network Creation and Maintenance
  • Star Block Design in Two-Level Survivable Optical Networks
  • Stochastic Model and Connectivity Dynamics for VANETs in Signalized Road Systems
  • A Simple Model for Chunk-Scheduling Strategies in P2P Streaming
  • A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
  • Buffer Sizing for 802.11 Based Networks
  • Coloring Spatial Point Processes With Applications to Peer Discovery in Large Wireless Networks
  • Continuous Neighbor Discovery in Asynchronous Sensor Networks
  • Crosstalk Preventing Scheduling in Single and Two Stage AWG Based Cell Switches
  • Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks
  • Efficient Multipath Communication for Time Critical Applications in Underwater Acoustic Sensor Networks
  • Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration
  • Forward Correction and Fountain Codes in Delay-Tolerant Networks
  • Live Streaming With Receiver Based Peer-Division Multiplexing
  • Mobile Sampling of Sensor Field Data Using Controlled Broadcast
  • Network Coding Multicast Networks With QoS Guarantees
  • On the Price of Security in Large-Scale Wireless Ad Hoc Networks
  • Parametric Methods for Anomaly Detection in Aggregate Traffic
  • Practical Computation of Optimal Schedules in Multihop Wireless Networks
  • Primary User Activity Modeling Using First-Difference Filter Clustering and Correlation in Cognitive Radio Networks
  • ProgME - Towards Programmable Network MEasurement
  • ROC Resilient Online Coverage for Surveillance Applications
  • Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
  • Self Reconfigurable Wireless Mesh Networks
  • SPAF - Stateless FSA-Based Packet Filters
  • Topological Transformation Approaches to TCAM-Based Packet Classification
  • Low-Overhead End-to-End Performance Measurement for Next Generation Networks
  • On the Impact of Security Protocols on the Performance of SNMP
  • Locating Equivalent Servants over P2P Networks
  • Achieving Bounded Matching Delay and Maximized Throughput in Information Dissemination Management 
 
NETWORKING, NETWORK SECURITY  PROJECT TITLES 2010, 2009...

  • Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
  • Conditional Shortest Path Routing in Delay Tolerant Networks
  • Constrained Relay node placement in Wireless Sensor Network
  • Demand-Aware Content Distribution on the Internet
  • Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
  • Host-to-Host Congestion Control for TCP
  • Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
  • Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
  • On Multihop Distances in Wireless Sensor Networks with Random Node Locations
  • POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
  • Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes
  • TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS
  • The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System
  • Virtual Database Technology for Distributed Database
  • Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
  • A New Reliable Broadcasting in Mobile Ad Hoc Networks 
  • A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution  
  • Anonymity in Wireless Broadcast Networks 
  • Capturing Router Congestion and Delay 
  • Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments
  • Entropy Based Adaptive Flow Aggregation 
  • Measuring Capacity Bandwidth of Targeted Path Segments 
  • Monitoring the Application-Layer DDoS Attacks for Popular Websites
  • Multiple Routing Configurations for Fast IP Network Recovery 
  • Node Isolation model and age-based neighbor selection in unstructured P2P networks 
  • SIMPS Using Sociology for Personal Mobility 
  • Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures 
  • Optimal Bandwidth Assignment for Multiple Descriptions Coding in Media Streaming
  • BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
  • Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
  • Securing User-Controlled Routing Infrastructures
  • Two Techniques for Fast Computation of Constrained Shortest Paths
  • Scalable and Efficient End-To-End Network Topology Inference
  • Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing 
  • A Geometric Approach to Improving Active Packet Loss Measurement 
  • Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion 
  • Minimizing File Download Time in Stochastic Peer-to-Peer Networks 
  • Packet caches on Routers the Implications of Universal Redundant Traffic Elimination 
  • Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction 
  • Cryptographic versus Trust based Method for Manet Routing Security
  • Authenticating Network Attached Storage 
  • A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm 
  • Online Detection and Prevention of Phishing Attacks
  • A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks 
  • Incremental deployment service of Hop by hop multicast routing protocol 
  • Network Border Patrol For Congestion Collapse Preventing 
  • TCP-LP Low-Priority Service via End-Point Congestion Control 
  • AI NET - A network that integrates ATM and IP 
  • Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups 
  • Dynamic Parallel Access to Replicated Content in the Internet 
  • ITP: An Image Transport Protocol for the Internet 

www.ncct.in, ncctchennai@gmail.com, 044-28235816, 98411 93224, 93801 02891

IEEE Java Project Titles in Mobile Computing


IEEE JAVA PROJECT TITLES 
MOBILE COMPUTING PROJECT TITLES 2011

  • On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
  • Cross Layer Optimization for Multimedia Transport over Multicode CDMA Networks
  • Spatial -Temporal Coverage optimization in wireless Sensor Network
  • A Control Theoretic Approach to Distributed Optimal Configuration of 80211 WLANs
  • Autonomous Deployment of Heterogeneous Mobile Sensors
  • Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding
  • Effective Scheduling in Infrastructure Based Cognitive Radio Networks
  • Endpoint Based Call Admission Control and Resource Management for VoWLAN
  • Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
  • MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
  • Mobile Sampling of Sensor Field Data Using Controlled Broadcast
  • Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
  • QoS Aware Routing and Admission Control in Shadow Fading Environments for Multirate MANETs
  • Secure High-Throughput Multicast Routing in Wireless Mesh Networks
  • The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems
  • Throughput Optimization in Mobile Backbone Networks
  • A Cooperative Clustering Protocol for Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces
  • A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
  • A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
  • Adaptive Location Oriented Content Delivery in Delay Sensitive Pervasive Applications
  • Design and Performance of an Optimal Inertial Power Harvester for Human-Powered Devices
  • Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries
  • Dynamic Time Slot Partitioning for Multimedia Transmission in Two Hop Cellular Networks
  • Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks
  • Interference Aware Routing in Wireless Multihop Networks
  • Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
  • Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model
  • On the Design of Opportunistic MAC Protocols for Multihop Wireless Networks with Beamforming Antennas
  • Processing Continuous Range Queries with Spatiotemporal Tolerance
  • Scalable Localization with Mobility Prediction for Underwater Sensor Networks
  • Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
  • Traffic Differentiation Based Modular QoS Localized Routing for Wireless Sensor Networks 


MOBILE COMPUTING PROJECT TITLES 2010, 2009...

  • A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal
  • Energy-Efficient VoIP over Wireless LANs
  • Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
  • MABS Multicast Authentication Based on Batch Signature
  • Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink
  • Optimal Jamming Attack Strategies and Network Defense
  • Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes
  • TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks
  • A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice 
  • Contention-Aware Performance Analysis of Mobility-Assisted Routing
  • Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period
  • Energy-Efficient SINR-Based Routing for Multihop Wireless
  • Mobility Management Approaches for Mobile IP Networks
  • Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks 
  • RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks  
  • Continuous Monitoring of Spatial Queries in Wireless Broadcast
  • Large Connectivity for Dynamic Random Geometric Graphs
  • Mitigation of Control Channel Jamming Under Node Capture Attacks
  • Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless
  • Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks 
  • Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks 
  • A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks 
  • An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs 
  • A Location-Based Routing Method for Mobile Ad Hoc Networks 
  • Benefit based Data Caching in Ad Hoc Networks 
  • Distributed Cache Updating for the Dynamic Source Routing Protocol 
  • A Novel Secure Communication Protocol for Ad Hoc Networks [SCP] 
  • Scalable Wireless Adapt Network Simulator Using XTC 
  • Slow Start Algorithm Improvement of TCP Performance 

www.ncct.in, ncctchennai@gmail.com, 044-28235816, 98411 93224, 93801 02891

2010,09 IEEE Java Project Titles

2010, 2009, 2008 IEEE Project Titles, Java - Java IEEE 2010, 2009, 2008 Project Titles

PROJECT TITLES & DOMAINS

2010 JAVA IEEE PROJECT TITLES

* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal
Domain - Mobile Computing, Year - 2010

* Energy-Efficient VoIP over Wireless LANs
Domain - Mobile Computing, Year - 2010

* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
Domain - Mobile Computing, Year - 2010

* MABS Multicast Authentication Based on Batch Signature
Domain - Mobile Computing, Year - 2010

* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink
Domain - Mobile Computing, Year - 2010

* Optimal Jamming Attack Strategies and Network Defense
Domain - Mobile Computing, Year - 2010

* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes
Domain - Mobile Computing, Year - 2010

* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks
Domain - Mobile Computing, Year - 2010

* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
Domain - Networking, Year - 2010

* Conditional Shortest Path Routing in Delay Tolerant Networks
Domain - Networking, Year - 2010

* Constrained Relay node placement in Wireless Sensor Network
Domain - Networking, Year - 2010

* Demand-Aware Content Distribution on the Internet
Domain - Networking, Year - 2010

* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
Domain - Networking, Year - 2010

* Host-to-Host Congestion Control for TCP
Domain - Networking, Year - 2010

* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Domain - Networking, Year - 2010

* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
Domain - Networking, Year - 2010

* On Multihop Distances in Wireless Sensor Networks with Random Node Locations
Domain - Networking, Year - 2010

* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
Domain - Networking, Year - 2010

* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes
Domain - Networking, Year - 2010

* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS
Domain - Networking, Year - 2010

* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System
Domain - Networking, Year - 2010

* Virtual Database Technology for Distributed Database
Domain - Networking, Year - 2010

* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming
Domain - Parallel and Distributed Systems, Year - 2010

* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation
Domain - Parallel and Distributed Systems, Year - 2010

* IRM Integrated File Replication and Consistency Maintenance
Domain - Parallel and Distributed Systems, Year - 2010

* Privacy-Conscious Location-Based Queries in Mobile Environments
Domain - Parallel and Distributed Systems, Year - 2010

* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols
Domain - Vehicular Technology, year - 2010

* Random access Transport Capacity
Domain - Wireless Communications, Year - 2010

* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks
Domain - Wireless Communications, Year - 2010

* Ensuring Data Storage Security in Cloud Computing
Domain - Cloud Computing, Year - 2010

* Upper Bounds for Dynamic Memory Allocation
Domain - Computers, Year - 2010

* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database 
Domain - Datamining, Year - 2010

* Layered Approach Using Conditional Random Fields for Intrusion Detection
Domain - Dependable and Secure Computing, Year - 2010

* SiGFree Asignature based free buffer overflow attack blocker
Domain - Dependable and Secure Computing, Year - 2010

* Secure Data Objects Replication in Data Grid
Domain - Dependable and Secure Computing, Year - 2010

* Analysis of Computational Time of Simple Estimation of Distribution Algorithms
Domain - Evolutionary Computation, Year - 2010

* Unequal Power Allocation for JPEG Transmission Over MIMO Systems
Domain - Image Processing, Year - 2010

* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature
Domain - Information Forensics And Security, Year - 2010

* Adaptive Join Operators for Result Rate optimization
Domain - Knowledge and Data Engineering, Year - 2010

* False Negative Problem of Counting Bloom Filter
Domain - Knowledge and Data Engineering, Year - 2010

* FiVaTech Page-Level Web Data Extraction from Template Pages
Domain - Knowledge and Data Engineering, Year - 2010

* k-Anonymity in the Presence of External Databases
Domain - Knowledge and Data Engineering, Year - 2010

* LIGHT A Query-Efficient Yet Low-Maintenance --DHT
Domain - Knowledge and Data Engineering, Year - 2010

* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
Domain - Knowledge and Data Engineering, Year - 2010

* Prospective Infectious Disease Outbreak detection using Markov switching model
Domain - Knowledge and Data Engineering, Year - 2010

* Queries Optimization in SQL using Linear Recursion
Domain - Knowledge and Data Engineering, Year - 2010

----------------------------------------------------------------------------------------------------------
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 

2009 JAVA IEEE PROJECT TITLES

* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
Domain - Mobile Computing, Year - 2009

* Contention-Aware Performance Analysis of Mobility-Assisted Routing
Domain - Mobile Computing, Year - 2009

* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period
Domain - Mobile Computing, Year - 2009

* Energy-Efficient SINR-Based Routing for Multihop Wireless
Domain - Mobile Computing, Year - 2009

* Mobility Management Approaches for Mobile IP Networks
Domain - Mobile Computing, Year - 2009

* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
Domain - Mobile Computing, Year - 2009

* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks  
Domain - Mobile Computing, Year - 2009

* Continuous Monitoring of Spatial Queries in Wireless Broadcast
Domain - Mobile Computing, Year - 2009

* Large Connectivity for Dynamic Random Geometric Graphs
Domain - Mobile Computing, Year - 2009

* Mitigation of Control Channel Jamming Under Node Capture Attacks
Domain - Mobile Computing, Year - 2009

* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos  
Domain - Multimedia, Year - 2009

* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
Domain - Network Computing, Year - 2009

* A New Reliable Broadcasting in Mobile Ad Hoc Networks
Domain - Network Security, Year - 2009

* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution  
Domain - Network Security, Year - 2009

* Anonymity in Wireless Broadcast Networks
Domain - Network Security, Year - 2009

* Capturing Router Congestion and Delay
Domain - Networking, Year - 2009

* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments
Domain - Networking, Year - 2009

* Entropy Based Adaptive Flow Aggregation
Domain - Networking, Year - 2009

* Measuring Capacity Bandwidth of Targeted Path Segments
Domain - Networking, Year - 2009

* Monitoring the Application-Layer DDoS Attacks for Popular Websites
Domain - Networking, Year - 2009

* Multiple Routing Configurations for Fast IP Network Recovery
Domain - Networking, Year - 2009

* Node Isolation model and age-based neighbor selection in unstructured P2P networks
Domain - Networking, Year - 2009

* SIMPS Using Sociology for Personal Mobility
Domain - Networking, Year - 2009

* Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
Domain - Networking, Year - 2009

* Optimal Bandwidth Assignment for Multiple Descriptions Coding in Media Streaming
Domain - Networking, Year - 2009

* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions  
Domain - Neural Networks, Year - 2009

* Detecting Malicious Packet Losses
Domain - Parallel and Distributed Systems, Year - 2009

* Dynamic Routing with Security Considerations
Domain - Parallel and Distributed Systems, Year - 2009

* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks
Domain - Parallel and Distributed Systems, Year - 2009

* Virtual-Force-Based Geometric Routing Protocol in MANETs
Domain - Parallel and Distributed Systems, Year - 2009

* CHARMY: A Framework for Designing and Verifying Architectural Specifications
Domain - Software Engineering, Year - 2009

* Optimized Resource Allocation for Software Release Planning
Domain - Software Engineering, Year - 2009

* Multi-Service Load Sharing for Resource Management in the CellularWLAN Integrated Network
Domain - Wireless Communications, Year - 2009

* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks  
Domain - Wireless Communications, Year - 2009

* Robust cooperative routing protocol in mobile wireless sensor networks
Domain - Wireless Communications, Year - 2009

* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks
Domain - Wireless Communications, Year - 2009

* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets
Domain - Wireless Communications, Year - 2009

* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
Domain - Biomedicine, Year - 2009

* Continuous Flow Wireless Data Broadcasting for High Speed Environments
Domain - Broadcasting, Year - 2009

* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary
Domain - Communications, Year - 2009

* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
Domain - Communications, Year - 2009

* Collusive piracy prevention in P2P content delivery network
Domain - Computers, Year - 2009

* Evaluating the Vulnerability of Network Traffic Using Joint
Domain - Dependable and Secure Computing, Year - 2009

* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
Domain - Dependable and Secure Computing, Year - 2009

* Security Analysis of the SASI Protocol  
Domain - Dependable and Secure Computing, Year - 2009

* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
Domain - Distributed Computing, Year - 2009

* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos  
Domain - Image Processing, Year - 2009

* Hierarchical Bayesian sparse image reconstruction with application to MRFM  
Domain - Image Processing, Year - 2009

* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks
Domain - Industrial Informatics, Year - 2009

* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
Domain - Information Forensics and Security, Year - 2009

* Agent Mining: The Synergy of Agents and Data Mining
Domain - Intelligent Systems, Year - 2009

* DAIOS - Efficient Dynamic Web Service Invocation
Domain - Internet Computing, Year - 2009

* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network
Domain - Knowledge and Data Engineering, Year - 2009

* OLEX : effective Rule Learning for Text Categorization
Domain - Knowledge and Data Engineering, Year - 2009

* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication
Domain - Knowledge and Data Engineering, Year - 2009

* Efficient Range Query Processing in Peer-to-Peer Systems
Domain - Knowledge and Data Engineering, Year - 2009


----------------------------------------------------------------------------------------------------------
www.ncct.inncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 

2008 JAVA IEEE PROJECT TITLES

* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless
Domain - Mobile Computing, Year - 2008

* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
Domain - Mobile Computing, Year - 2008

* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Domain - Mobile Computing, Year - 2008

* BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
Domain - Network Computing, Year - 2008

* Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
Domain - Network Computing, Year - 2008

* Securing User-Controlled Routing Infrastructures
Domain - Network Computing, Year - 2008

* Two Techniques for Fast Computation of Constrained Shortest Paths
Domain - Network Computing, Year - 2008

* Scalable and Efficient End-To-End Network Topology Inference
Domain - Network Computing, Year - 2008

* Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing
Domain - Network Security, Year - 2008

* A Geometric Approach to Improving Active Packet Loss Measurement
Domain - Networking, Year - 2008

* Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
Domain - Networking, Year - 2008

* Minimizing File Download Time in Stochastic Peer-to-Peer Networks
Domain - Networking, Year - 2008

* Packet caches on Routers the Implications of Universal Redundant Traffic Elimination
Domain - Networking, Year - 2008

* Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
Domain - Networking, Year - 2008

* Cryptographic versus Trust based Method for Manet Routing Security
Domain - Networking, Year - 2008

* A Survey of Learning-Based Techniques of Email Spam Filtering
Domain - Neural Networks, Year - 2008

* A Tree-Based Peer-to-Peer Network with Quality Guarantees
Domain - Parallel and Distributed Systems, Year - 2008

* Computation Efficient Multicast Key Distribution
Domain - Parallel and Distributed Systems, Year - 2008

* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Domain - Parallel and Distributed Systems, Year - 2008

* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System
Domain - Parallel and Distributed Systems, Year - 2008

* QUIVER Consistent Object Sharing For Edge Services
Domain - Parallel and Distributed Systems, Year - 2008

* The Server Reassignment Problem for Load Balancing in Structured P2P Systems
Domain - Parallel and Distributed Systems, Year - 2008

* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode
Domain - Parallel and Distributed Systems, Year - 2008

* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
Domain - Parallel and Distributed Systems, Year - 2008

* Modeling & Automated Containment of Worms
Domain - Secure Computing, Year - 2008

* Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems
Domain - Software Engineering, Year - 2008

* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies
Domain - Software Systems For Secure Systems, Year - 2008

* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol
Domain - Computer and Communication Engineering, Year - 2008

* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths
Domain - Consumer Electronics, Year - 2008

* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments
Domain - Data Engineering, Year - 2008

* Online Index Recommendations for High-Dimensional Databases Using Query Workloads
Domain - Data Mining, Year - 2008

* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Domain - Data Mining, Year - 2008

* Controlling IP Spoofing Through Inter Domain Packet Filters
Domain - Dependable and Secure Computing, Year - 2008

* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
Domain - Dependable and Secure Computing, Year - 2008

* Face Recognition for Smart Recognitions
Domain - Gesture Recognition, Year - 2008

* Protection of Database Security via Collaborative Inference Detection  
Domain - Intelligence and Security Informatics, Year - 2008

* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern
Domain - Knowledge and Data Engineering, Year - 2008

* Distributed Suffix Tree Overlay for Peer-to-Peer Search
Domain - Knowledge and Data Engineering, Year - 2008

* Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
Domain - Knowledge and Data Engineering, Year - 2008

* Truth Discovery with multiple Conflicting Information Providers on web
Domain - Knowledge and Data Engineering, Year - 2008

* C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi attribute Transactional Data
Domain - Knowledge and Data Engineering, Year - 2008

* An Efficient Association Rule Mining Algorithm In Distributed Databases
Domain - Knowledge Discovery and Data Mining, Year - 2008

* An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis
Domain - Knowledge Discovery and Data Mining, Year - 2008

----------------------------------------------------------------------------------------------------------
www.ncct.inncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 

* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs
Domain - Computer Science & Network Security, Year - 2007

* An Adaptive Programming Model for Fault Tolerant Distributed Computing
Domain - Dependable and Secure Computing, Year - 2007

* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
Domain - Dependable and Secure Computing, Year - 2007

* Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm
Domain - Intelligent and Advanced Systems, Year - 2007

* An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net
Domain - Machine Learning And Cybernetics, Year - 2007

* A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2007

* An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs
Domain - Mobile Computing, Year - 2007

* A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
Domain - Parallel and Distributed Systems, Year - 2007

* A New Operational Transformation Framework for Real-Time Group Editors
Domain - Parallel and Distributed Systems, Year - 2007

* Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach
Domain - Parallel and Distributed Systems, Year - 2007

* OCGRR - A New Scheduling Algorithm for Differentiated Services Networks
Domain - Parallel and Distributed Systems, Year - 2007

* Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Domain - Parallel and Distributed Systems, Year - 2007

* A Wireless Distributed Intrusion Detection System and a New Attack Model
Domain - Computers and Communications, Year - 2006

* Building Intelligent Shopping Assistants Using Individual Consumer Models
Domain - Data mining, Year - 2005

* GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
Domain - Data Mining, Year - 2005

* Mobile Objects and Mobile Agents: The Future of Distributed Computing
Domain - Distributed Computing, Year - 2004

* ODAM An Optimized Distributed Association Rule Mining Algorithm
Domain - Distributed Systems, Year - 2004

* A Reputation based Trust Model for Peer to Peer E - Commerce Communities
Domain - E-Commerce Technology, Year - 2003

* Noise Reduction by Fuzzy Image Filtering
Domain - Fuzzy Systems, Year - 2003

* Image Transformation using Grid
Domain - Image Processing, Year - 2006

* A Memory Learning Framework for Effective Image Retrieval
Domain - Image Processing, Year - 2005

* Application of BPCS steganography to wavelet compressed video
Domain - Image Processing, Year - 2004

* Identification of Humans Using Gait
Domain - Image Processing, Year - 2004

* Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress
Domain - Image Processing, Year - 2003

* Network Topology against Distributed Denial of Service Attacks DDOS
Domain - Information Forensics and Security, Year - 2006

* Personal Authentication Using 3-D Finger Geometry
Domain - Information Forensics and Security, Year - 2006

* E-Secure Transactions - Secure Electronic Data Interchange over Internet
Domain - Internet Computing, Year - 2005

* A Location-Based Routing Method for Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2005

* Benefit based Data Caching in Ad Hoc Networks
Domain - Mobile Computing, Year - 2005

* Distributed Cache Updating for the Dynamic Source Routing Protocol
Domain - Mobile Computing, Year - 2005

* A Novel Secure Communication Protocol for Ad Hoc Networks [SCP]
Domain - Mobile Computing, Year - 2004

* Scalable Wireless Adapt Network Simulator Using XTC
Domain - Mobile Computing, Year - 2004

* Slow Start Algorithm Improvement of TCP Performance
Mobile Computing, Year - 2004

* Authenticating Network Attached Storage
Domain - Network & Distributed System, Year - 2003

* A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Domain - Networking, Year - 2006

* Online Detection and Prevention of Phishing Attacks
Domain - Networking, Year - 2006

* A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
Domain - Networking, Year - 2004

* Incremental deployment service of Hop by hop multicast routing protocol
Domain - Networking, Year - 2004

* Network Border Patrol For Congestion Collapse Preventing
Domain - Networking, Year - 2004

* TCP-LP Low-Priority Service via End-Point Congestion Control
Domain - Networking, Year - 2003

* AI NET - A network that integrates ATM and IP 
Domain - Networking, Year - 2002

* Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
Domain - Networking, Year - 2002

* Dynamic Parallel Access to Replicated Content in the Internet
Domain - Networking, Year - 2002

* ITP: An Image Transport Protocol for the Internet
Domain - Networking, Year - 2002

* Face Recognition using Laplacian Faces
Domain - Pattern Analysis and Machine Intelligence, Year - 2005

* Online Handwritten Script Recognition
Domain - Pattern Analysis and Machine Intelligence, Year - 2004

* Modeling Peer-Peer File Sharing Systems
Domain - Web Intelligence, Year - 2003

* Unified Network Monitoring For Web Technology
Domain - Web Technology, Year - 2003

* Personal Identification Based On Iris Texture Analysis
Year - 2003

* Location-Aided Routing (LAR) in Mobile Ad Hoc Networks
Domain - Wireless Networks, Year - 2000

* Location based Service Routing
Year - 2005

* A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
* Coupling based metrics for measuring the quality of a software

* Demonstration of Secure Sockets Layer Protocol Working and Implementation

* Information Retrieval from Web Search using Keyword Spices

* Security in large Mediator Protocols

* SybilGuard Defending Against Sybil Attacks via Social Networks

* User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine

* Towards Multimodal Interfaces for Intrusion Detection
Domain - Computer Networks

* Distributed Data Mining in Credit Card Fraud Detection
Domain - Datamining & Intelligent Systems

* E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management
Domain - Innovative Computing

* Secured Password Based Protocol For Downloading A Private Key
Domain - Network and Distributed System

* A Software Defect Report and Tracking System in an Intranet
Domain - Software Maintenance and Reengineering


----------------------------------------------------------------------------------------------------------
www.ncct.inncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 


IEEE 2011 Java Projects availale @ NCCT in All Domains. For more Details - www.ncct.in

for more Details Contact 044-28235816, 98411 93224, 93801 02891, Email to us - ncctchennai@gmail.com.....

2011 IEEE Java Project Titles  |  2010,09 IEEE Java Project Titles  | Java Project Titles  |  Java Application Project Titles  |  J2EE Project Titles  |  J2ME Project Titles 
2011 IEEE Java Project Abstracts |  2010,09 IEEE Java Project Abstracts | Java Project Abstracts  |  Java Application Project Abstracts  |  J2EE Project Abstracts  |  J2ME Project Abstracts  
 
IEEE Java Project Abstracts in Mobile Computing |  IEEE Java Project Abstracts in Networking  |  IEEE Java Project Abstracts in Cloud Computing  |  IEEE Java Project Abstracts in Network Security  |  IEEE Java Project Abstracts in Knowledge and Data Engineering  |  IEEE Java Project Abstracts in Dependable and Secure Computing  |  IEEE Java Project Abstracts in Image Processing  |  IEEE Java Project Abstracts in Parallel and Distributed Systems | IEEE Java Project Abstracts in ADHOC Networking | IEEE Java Project Abstracts in WSN
Java at a Glance | Java-Introduction | Java-History | Java- Principles | Java-Versions | Java-Advantages | Java Editions | Java-Standard Edition | Java-Enterprise Edition | Java-Micro Edition
 
Java Struts | Java Hibernate | Java Spring | Netbeans | Eclipse | WebLogic | Websphere | JBoss | Tomcat | JCreator | Oracle | JavaFx  
 
Java Questions | Java Adv Questions | J2EE Questions | J2ME Questions
 
About IEEE | Scope of IEEE | IEEE Mobile Computing | IEEE Networking | IEEE Data Security | IEEE Cloud Computing | IEEE Knowledge and Data Engineering | IEEE Dependable and Secure Computing | IEEE Parallel and Distributed Systems | IEEE Datamining | IEEE Image Processing | IEEE Multimedia| IEEE Software Engineering | IEEE Grid Computing | IEEE Web Services