Showing posts with label IEEE Java Project Titles in various Domains. Show all posts
Showing posts with label IEEE Java Project Titles in various Domains. Show all posts

Monday, September 5, 2011

IEEE Java Project Titles in various Domains

SOFTWARE ENGINEERING, 2011 
  • The Awareness Network, To Whom Should I Display My Actions  And, Whose Actions Should I Monitor
  • A Comparative Study of Software Model Checkers as Unit Testing Tools
  • Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
  • Genetic Algorithms for Randomized Unit Testing
  • Semi-Proving An Integrated Method for Program Proving, Testing, and Debugging
  • Software Module Clustering as a Multi–Objective Search Problem
  • Verifying the Evolution of Probability Distributions Governed by a DTMC 
  • Embedded extended visual cryptography schemes, INFORMATION FORENSICS AND SECURITY, 2011
  • Monitoring Service Systems from a Language-Action Perspective, SERVICE COMPUTING, 2011 
  • A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, SERVICE COMPUTING, 2011 
  • Vulnerability Analysis in SOA-based Business Processes, SERVICE COMPUTING, 2011 
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816

  • Effects of Denial of sleep attacks on wireless sensor networks MAC protocols, Vehicular Technology - 2010
  • Upper Bounds for Dynamic Memory Allocation, Computers - 2010
  • Data Mining Techniques For Dynamically Classifying And Analyzing Library Database, Datamining - 2010
  • Analysis of Computational Time of Simple Estimation of Distribution Algorithms, Evolutionary Computation - 2010
  • An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics And Security - 2010
  • Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, Multimedia - 2009
  • Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions, Neural Networks - 2009
  • CHARMY: A Framework for Designing and Verifying Architectural Specifications,   Software Engineering - 2009
  • Optimized Resource Allocation for Software Release Planning, Software Engineering - 2009
  • Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies, Biomedicine - 2009
  • Continuous Flow Wireless Data Broadcasting for High Speed Environments, Broadcasting - 2009
  • Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, Communications - 2009
  • SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, Communications - 2009
  • Collusive piracy prevention in P2P content delivery network, Computers - 2009
  • A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, Distributed Computing - 2009
  • EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks, Industrial Informatics - 2009
  • SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - 2009
  • Agent Mining: The Synergy of Agents and Data Mining, Intelligent Systems - 2009
  • DAIOS - Efficient Dynamic Web Service Invocation, Internet Computing - 2009
  • A Survey of Learning-Based Techniques of Email Spam Filtering, Neural Networks - 2008
  • Modeling & Automated Containment of Worms, Secure Computing - 2008
  • Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems, Software Engineering - 2008
  • Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Systems For Secure Systems - 2008
  • Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol, Computer and Communication Engineering - 2008
  • High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths, Consumer Electronics - 2008
  • Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, Data Engineering - 2008
  • Online Index Recommendations for High-Dimensional Databases Using Query Workloads, Data Mining - 2008
  • BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, Data Mining - 2008
  • Face Recognition for Smart Recognitions, Gesture Recognition - 2008
  • Protection of Database Security via Collaborative Inference Detection, Intelligence and Security Informatics - 2008
  • Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs, Computer Science & Network Security - 2007
  • Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm, Intelligent and Advanced Systems - 2007
  • An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net, Machine Learning And Cybernetics - 2007
  • A Wireless Distributed Intrusion Detection System and a New Attack Model, Computers and Communications - 2006
  • Building Intelligent Shopping Assistants Using Individual Consumer Models, Data mining - 2005
  • GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions, Data Mining - 2005
  • Mobile Objects and Mobile Agents: The Future of Distributed Computing, Distributed Computing - 2004
  • ODAM An Optimized Distributed Association Rule Mining Algorithm, Distributed Systems - 2004
  • A Reputation based Trust Model for Peer to Peer E - Commerce Communities, E-Commerce Technology - 2003
  • Noise Reduction by Fuzzy Image Filtering, Fuzzy Systems - 2003
  • Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - 2006
  • Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - 2006
  • E-Secure Transactions - Secure Electronic Data Interchange over Internet, Internet Computing - 2005
  • Face Recognition using Laplacian Faces, Pattern Analysis and Machine Intelligence - 2005
  • Online Handwritten Script Recognition, Pattern Analysis and Machine Intelligence - 2004
  • Modeling Peer-Peer File Sharing Systems, Web Intelligence - 2003
  • Unified Network Monitoring For Web Technology, Web Technology - 2003
  • Personal Identification Based On Iris Texture Analysis, 2003
  • Location-Aided Routing (LAR) in Mobile Ad Hoc Networks, Wireless Networks - 2000
  • Location based Service Routing, 2005
  • A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
  • Coupling based metrics for measuring the quality of a software
  • Demonstration of Secure Sockets Layer Protocol Working and Implementation
  • Information Retrieval from Web Search using Keyword Spices
  • Security in large Mediator Protocols
  • SybilGuard Defending Against Sybil Attacks via Social Networks
  • User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
  • Towards Multimodal Interfaces for Intrusion Detection, Computer Networks
  • Distributed Data Mining in Credit Card Fraud Detection, Datamining & Intelligent Systems
  • E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management, Innovative Computing
  • Secured Password Based Protocol For Downloading A Private Key, Network and Distributed System
  • A Software Defect Report and Tracking System in an Intranet, Software Maintenance and Reengineering

www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816