Monday, September 5, 2011

IEEE Java Project Titles in various Domains

SOFTWARE ENGINEERING, 2011 
  • The Awareness Network, To Whom Should I Display My Actions  And, Whose Actions Should I Monitor
  • A Comparative Study of Software Model Checkers as Unit Testing Tools
  • Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
  • Genetic Algorithms for Randomized Unit Testing
  • Semi-Proving An Integrated Method for Program Proving, Testing, and Debugging
  • Software Module Clustering as a Multi–Objective Search Problem
  • Verifying the Evolution of Probability Distributions Governed by a DTMC 
  • Embedded extended visual cryptography schemes, INFORMATION FORENSICS AND SECURITY, 2011
  • Monitoring Service Systems from a Language-Action Perspective, SERVICE COMPUTING, 2011 
  • A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, SERVICE COMPUTING, 2011 
  • Vulnerability Analysis in SOA-based Business Processes, SERVICE COMPUTING, 2011 
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816

  • Effects of Denial of sleep attacks on wireless sensor networks MAC protocols, Vehicular Technology - 2010
  • Upper Bounds for Dynamic Memory Allocation, Computers - 2010
  • Data Mining Techniques For Dynamically Classifying And Analyzing Library Database, Datamining - 2010
  • Analysis of Computational Time of Simple Estimation of Distribution Algorithms, Evolutionary Computation - 2010
  • An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics And Security - 2010
  • Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, Multimedia - 2009
  • Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions, Neural Networks - 2009
  • CHARMY: A Framework for Designing and Verifying Architectural Specifications,   Software Engineering - 2009
  • Optimized Resource Allocation for Software Release Planning, Software Engineering - 2009
  • Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies, Biomedicine - 2009
  • Continuous Flow Wireless Data Broadcasting for High Speed Environments, Broadcasting - 2009
  • Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, Communications - 2009
  • SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, Communications - 2009
  • Collusive piracy prevention in P2P content delivery network, Computers - 2009
  • A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, Distributed Computing - 2009
  • EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks, Industrial Informatics - 2009
  • SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - 2009
  • Agent Mining: The Synergy of Agents and Data Mining, Intelligent Systems - 2009
  • DAIOS - Efficient Dynamic Web Service Invocation, Internet Computing - 2009
  • A Survey of Learning-Based Techniques of Email Spam Filtering, Neural Networks - 2008
  • Modeling & Automated Containment of Worms, Secure Computing - 2008
  • Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems, Software Engineering - 2008
  • Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Systems For Secure Systems - 2008
  • Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol, Computer and Communication Engineering - 2008
  • High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths, Consumer Electronics - 2008
  • Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, Data Engineering - 2008
  • Online Index Recommendations for High-Dimensional Databases Using Query Workloads, Data Mining - 2008
  • BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, Data Mining - 2008
  • Face Recognition for Smart Recognitions, Gesture Recognition - 2008
  • Protection of Database Security via Collaborative Inference Detection, Intelligence and Security Informatics - 2008
  • Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs, Computer Science & Network Security - 2007
  • Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm, Intelligent and Advanced Systems - 2007
  • An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net, Machine Learning And Cybernetics - 2007
  • A Wireless Distributed Intrusion Detection System and a New Attack Model, Computers and Communications - 2006
  • Building Intelligent Shopping Assistants Using Individual Consumer Models, Data mining - 2005
  • GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions, Data Mining - 2005
  • Mobile Objects and Mobile Agents: The Future of Distributed Computing, Distributed Computing - 2004
  • ODAM An Optimized Distributed Association Rule Mining Algorithm, Distributed Systems - 2004
  • A Reputation based Trust Model for Peer to Peer E - Commerce Communities, E-Commerce Technology - 2003
  • Noise Reduction by Fuzzy Image Filtering, Fuzzy Systems - 2003
  • Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - 2006
  • Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - 2006
  • E-Secure Transactions - Secure Electronic Data Interchange over Internet, Internet Computing - 2005
  • Face Recognition using Laplacian Faces, Pattern Analysis and Machine Intelligence - 2005
  • Online Handwritten Script Recognition, Pattern Analysis and Machine Intelligence - 2004
  • Modeling Peer-Peer File Sharing Systems, Web Intelligence - 2003
  • Unified Network Monitoring For Web Technology, Web Technology - 2003
  • Personal Identification Based On Iris Texture Analysis, 2003
  • Location-Aided Routing (LAR) in Mobile Ad Hoc Networks, Wireless Networks - 2000
  • Location based Service Routing, 2005
  • A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
  • Coupling based metrics for measuring the quality of a software
  • Demonstration of Secure Sockets Layer Protocol Working and Implementation
  • Information Retrieval from Web Search using Keyword Spices
  • Security in large Mediator Protocols
  • SybilGuard Defending Against Sybil Attacks via Social Networks
  • User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
  • Towards Multimodal Interfaces for Intrusion Detection, Computer Networks
  • Distributed Data Mining in Credit Card Fraud Detection, Datamining & Intelligent Systems
  • E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management, Innovative Computing
  • Secured Password Based Protocol For Downloading A Private Key, Network and Distributed System
  • A Software Defect Report and Tracking System in an Intranet, Software Maintenance and Reengineering

www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816

1 comment:

  1. Nice collection of IEEE java project titles. I found projects on data mining, neural networks, Denial of sleep attacks are really good domains and will be interesting for students to do it. In Denial of Sleep attack is the method of making the network resources unavailable for users.

    ReplyDelete

IEEE 2011 Java Projects availale @ NCCT in All Domains. For more Details - www.ncct.in

for more Details Contact 044-28235816, 98411 93224, 93801 02891, Email to us - ncctchennai@gmail.com.....

2011 IEEE Java Project Titles  |  2010,09 IEEE Java Project Titles  | Java Project Titles  |  Java Application Project Titles  |  J2EE Project Titles  |  J2ME Project Titles 
2011 IEEE Java Project Abstracts |  2010,09 IEEE Java Project Abstracts | Java Project Abstracts  |  Java Application Project Abstracts  |  J2EE Project Abstracts  |  J2ME Project Abstracts  
 
IEEE Java Project Abstracts in Mobile Computing |  IEEE Java Project Abstracts in Networking  |  IEEE Java Project Abstracts in Cloud Computing  |  IEEE Java Project Abstracts in Network Security  |  IEEE Java Project Abstracts in Knowledge and Data Engineering  |  IEEE Java Project Abstracts in Dependable and Secure Computing  |  IEEE Java Project Abstracts in Image Processing  |  IEEE Java Project Abstracts in Parallel and Distributed Systems | IEEE Java Project Abstracts in ADHOC Networking | IEEE Java Project Abstracts in WSN
Java at a Glance | Java-Introduction | Java-History | Java- Principles | Java-Versions | Java-Advantages | Java Editions | Java-Standard Edition | Java-Enterprise Edition | Java-Micro Edition
 
Java Struts | Java Hibernate | Java Spring | Netbeans | Eclipse | WebLogic | Websphere | JBoss | Tomcat | JCreator | Oracle | JavaFx  
 
Java Questions | Java Adv Questions | J2EE Questions | J2ME Questions
 
About IEEE | Scope of IEEE | IEEE Mobile Computing | IEEE Networking | IEEE Data Security | IEEE Cloud Computing | IEEE Knowledge and Data Engineering | IEEE Dependable and Secure Computing | IEEE Parallel and Distributed Systems | IEEE Datamining | IEEE Image Processing | IEEE Multimedia| IEEE Software Engineering | IEEE Grid Computing | IEEE Web Services