Monday, September 5, 2011

2010,09 IEEE Java Project Titles

2010, 2009, 2008 IEEE Project Titles, Java - Java IEEE 2010, 2009, 2008 Project Titles

PROJECT TITLES & DOMAINS

2010 JAVA IEEE PROJECT TITLES

* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal
Domain - Mobile Computing, Year - 2010

* Energy-Efficient VoIP over Wireless LANs
Domain - Mobile Computing, Year - 2010

* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
Domain - Mobile Computing, Year - 2010

* MABS Multicast Authentication Based on Batch Signature
Domain - Mobile Computing, Year - 2010

* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink
Domain - Mobile Computing, Year - 2010

* Optimal Jamming Attack Strategies and Network Defense
Domain - Mobile Computing, Year - 2010

* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes
Domain - Mobile Computing, Year - 2010

* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks
Domain - Mobile Computing, Year - 2010

* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
Domain - Networking, Year - 2010

* Conditional Shortest Path Routing in Delay Tolerant Networks
Domain - Networking, Year - 2010

* Constrained Relay node placement in Wireless Sensor Network
Domain - Networking, Year - 2010

* Demand-Aware Content Distribution on the Internet
Domain - Networking, Year - 2010

* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
Domain - Networking, Year - 2010

* Host-to-Host Congestion Control for TCP
Domain - Networking, Year - 2010

* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Domain - Networking, Year - 2010

* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
Domain - Networking, Year - 2010

* On Multihop Distances in Wireless Sensor Networks with Random Node Locations
Domain - Networking, Year - 2010

* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
Domain - Networking, Year - 2010

* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes
Domain - Networking, Year - 2010

* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS
Domain - Networking, Year - 2010

* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System
Domain - Networking, Year - 2010

* Virtual Database Technology for Distributed Database
Domain - Networking, Year - 2010

* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming
Domain - Parallel and Distributed Systems, Year - 2010

* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation
Domain - Parallel and Distributed Systems, Year - 2010

* IRM Integrated File Replication and Consistency Maintenance
Domain - Parallel and Distributed Systems, Year - 2010

* Privacy-Conscious Location-Based Queries in Mobile Environments
Domain - Parallel and Distributed Systems, Year - 2010

* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols
Domain - Vehicular Technology, year - 2010

* Random access Transport Capacity
Domain - Wireless Communications, Year - 2010

* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks
Domain - Wireless Communications, Year - 2010

* Ensuring Data Storage Security in Cloud Computing
Domain - Cloud Computing, Year - 2010

* Upper Bounds for Dynamic Memory Allocation
Domain - Computers, Year - 2010

* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database 
Domain - Datamining, Year - 2010

* Layered Approach Using Conditional Random Fields for Intrusion Detection
Domain - Dependable and Secure Computing, Year - 2010

* SiGFree Asignature based free buffer overflow attack blocker
Domain - Dependable and Secure Computing, Year - 2010

* Secure Data Objects Replication in Data Grid
Domain - Dependable and Secure Computing, Year - 2010

* Analysis of Computational Time of Simple Estimation of Distribution Algorithms
Domain - Evolutionary Computation, Year - 2010

* Unequal Power Allocation for JPEG Transmission Over MIMO Systems
Domain - Image Processing, Year - 2010

* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature
Domain - Information Forensics And Security, Year - 2010

* Adaptive Join Operators for Result Rate optimization
Domain - Knowledge and Data Engineering, Year - 2010

* False Negative Problem of Counting Bloom Filter
Domain - Knowledge and Data Engineering, Year - 2010

* FiVaTech Page-Level Web Data Extraction from Template Pages
Domain - Knowledge and Data Engineering, Year - 2010

* k-Anonymity in the Presence of External Databases
Domain - Knowledge and Data Engineering, Year - 2010

* LIGHT A Query-Efficient Yet Low-Maintenance --DHT
Domain - Knowledge and Data Engineering, Year - 2010

* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
Domain - Knowledge and Data Engineering, Year - 2010

* Prospective Infectious Disease Outbreak detection using Markov switching model
Domain - Knowledge and Data Engineering, Year - 2010

* Queries Optimization in SQL using Linear Recursion
Domain - Knowledge and Data Engineering, Year - 2010

----------------------------------------------------------------------------------------------------------
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 

2009 JAVA IEEE PROJECT TITLES

* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
Domain - Mobile Computing, Year - 2009

* Contention-Aware Performance Analysis of Mobility-Assisted Routing
Domain - Mobile Computing, Year - 2009

* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period
Domain - Mobile Computing, Year - 2009

* Energy-Efficient SINR-Based Routing for Multihop Wireless
Domain - Mobile Computing, Year - 2009

* Mobility Management Approaches for Mobile IP Networks
Domain - Mobile Computing, Year - 2009

* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
Domain - Mobile Computing, Year - 2009

* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks  
Domain - Mobile Computing, Year - 2009

* Continuous Monitoring of Spatial Queries in Wireless Broadcast
Domain - Mobile Computing, Year - 2009

* Large Connectivity for Dynamic Random Geometric Graphs
Domain - Mobile Computing, Year - 2009

* Mitigation of Control Channel Jamming Under Node Capture Attacks
Domain - Mobile Computing, Year - 2009

* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos  
Domain - Multimedia, Year - 2009

* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
Domain - Network Computing, Year - 2009

* A New Reliable Broadcasting in Mobile Ad Hoc Networks
Domain - Network Security, Year - 2009

* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution  
Domain - Network Security, Year - 2009

* Anonymity in Wireless Broadcast Networks
Domain - Network Security, Year - 2009

* Capturing Router Congestion and Delay
Domain - Networking, Year - 2009

* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments
Domain - Networking, Year - 2009

* Entropy Based Adaptive Flow Aggregation
Domain - Networking, Year - 2009

* Measuring Capacity Bandwidth of Targeted Path Segments
Domain - Networking, Year - 2009

* Monitoring the Application-Layer DDoS Attacks for Popular Websites
Domain - Networking, Year - 2009

* Multiple Routing Configurations for Fast IP Network Recovery
Domain - Networking, Year - 2009

* Node Isolation model and age-based neighbor selection in unstructured P2P networks
Domain - Networking, Year - 2009

* SIMPS Using Sociology for Personal Mobility
Domain - Networking, Year - 2009

* Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
Domain - Networking, Year - 2009

* Optimal Bandwidth Assignment for Multiple Descriptions Coding in Media Streaming
Domain - Networking, Year - 2009

* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions  
Domain - Neural Networks, Year - 2009

* Detecting Malicious Packet Losses
Domain - Parallel and Distributed Systems, Year - 2009

* Dynamic Routing with Security Considerations
Domain - Parallel and Distributed Systems, Year - 2009

* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks
Domain - Parallel and Distributed Systems, Year - 2009

* Virtual-Force-Based Geometric Routing Protocol in MANETs
Domain - Parallel and Distributed Systems, Year - 2009

* CHARMY: A Framework for Designing and Verifying Architectural Specifications
Domain - Software Engineering, Year - 2009

* Optimized Resource Allocation for Software Release Planning
Domain - Software Engineering, Year - 2009

* Multi-Service Load Sharing for Resource Management in the CellularWLAN Integrated Network
Domain - Wireless Communications, Year - 2009

* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks  
Domain - Wireless Communications, Year - 2009

* Robust cooperative routing protocol in mobile wireless sensor networks
Domain - Wireless Communications, Year - 2009

* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks
Domain - Wireless Communications, Year - 2009

* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets
Domain - Wireless Communications, Year - 2009

* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
Domain - Biomedicine, Year - 2009

* Continuous Flow Wireless Data Broadcasting for High Speed Environments
Domain - Broadcasting, Year - 2009

* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary
Domain - Communications, Year - 2009

* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
Domain - Communications, Year - 2009

* Collusive piracy prevention in P2P content delivery network
Domain - Computers, Year - 2009

* Evaluating the Vulnerability of Network Traffic Using Joint
Domain - Dependable and Secure Computing, Year - 2009

* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
Domain - Dependable and Secure Computing, Year - 2009

* Security Analysis of the SASI Protocol  
Domain - Dependable and Secure Computing, Year - 2009

* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
Domain - Distributed Computing, Year - 2009

* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos  
Domain - Image Processing, Year - 2009

* Hierarchical Bayesian sparse image reconstruction with application to MRFM  
Domain - Image Processing, Year - 2009

* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks
Domain - Industrial Informatics, Year - 2009

* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
Domain - Information Forensics and Security, Year - 2009

* Agent Mining: The Synergy of Agents and Data Mining
Domain - Intelligent Systems, Year - 2009

* DAIOS - Efficient Dynamic Web Service Invocation
Domain - Internet Computing, Year - 2009

* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network
Domain - Knowledge and Data Engineering, Year - 2009

* OLEX : effective Rule Learning for Text Categorization
Domain - Knowledge and Data Engineering, Year - 2009

* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication
Domain - Knowledge and Data Engineering, Year - 2009

* Efficient Range Query Processing in Peer-to-Peer Systems
Domain - Knowledge and Data Engineering, Year - 2009


----------------------------------------------------------------------------------------------------------
www.ncct.inncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 

2008 JAVA IEEE PROJECT TITLES

* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless
Domain - Mobile Computing, Year - 2008

* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
Domain - Mobile Computing, Year - 2008

* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Domain - Mobile Computing, Year - 2008

* BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
Domain - Network Computing, Year - 2008

* Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
Domain - Network Computing, Year - 2008

* Securing User-Controlled Routing Infrastructures
Domain - Network Computing, Year - 2008

* Two Techniques for Fast Computation of Constrained Shortest Paths
Domain - Network Computing, Year - 2008

* Scalable and Efficient End-To-End Network Topology Inference
Domain - Network Computing, Year - 2008

* Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing
Domain - Network Security, Year - 2008

* A Geometric Approach to Improving Active Packet Loss Measurement
Domain - Networking, Year - 2008

* Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
Domain - Networking, Year - 2008

* Minimizing File Download Time in Stochastic Peer-to-Peer Networks
Domain - Networking, Year - 2008

* Packet caches on Routers the Implications of Universal Redundant Traffic Elimination
Domain - Networking, Year - 2008

* Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
Domain - Networking, Year - 2008

* Cryptographic versus Trust based Method for Manet Routing Security
Domain - Networking, Year - 2008

* A Survey of Learning-Based Techniques of Email Spam Filtering
Domain - Neural Networks, Year - 2008

* A Tree-Based Peer-to-Peer Network with Quality Guarantees
Domain - Parallel and Distributed Systems, Year - 2008

* Computation Efficient Multicast Key Distribution
Domain - Parallel and Distributed Systems, Year - 2008

* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Domain - Parallel and Distributed Systems, Year - 2008

* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System
Domain - Parallel and Distributed Systems, Year - 2008

* QUIVER Consistent Object Sharing For Edge Services
Domain - Parallel and Distributed Systems, Year - 2008

* The Server Reassignment Problem for Load Balancing in Structured P2P Systems
Domain - Parallel and Distributed Systems, Year - 2008

* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode
Domain - Parallel and Distributed Systems, Year - 2008

* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
Domain - Parallel and Distributed Systems, Year - 2008

* Modeling & Automated Containment of Worms
Domain - Secure Computing, Year - 2008

* Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems
Domain - Software Engineering, Year - 2008

* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies
Domain - Software Systems For Secure Systems, Year - 2008

* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol
Domain - Computer and Communication Engineering, Year - 2008

* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths
Domain - Consumer Electronics, Year - 2008

* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments
Domain - Data Engineering, Year - 2008

* Online Index Recommendations for High-Dimensional Databases Using Query Workloads
Domain - Data Mining, Year - 2008

* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Domain - Data Mining, Year - 2008

* Controlling IP Spoofing Through Inter Domain Packet Filters
Domain - Dependable and Secure Computing, Year - 2008

* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
Domain - Dependable and Secure Computing, Year - 2008

* Face Recognition for Smart Recognitions
Domain - Gesture Recognition, Year - 2008

* Protection of Database Security via Collaborative Inference Detection  
Domain - Intelligence and Security Informatics, Year - 2008

* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern
Domain - Knowledge and Data Engineering, Year - 2008

* Distributed Suffix Tree Overlay for Peer-to-Peer Search
Domain - Knowledge and Data Engineering, Year - 2008

* Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
Domain - Knowledge and Data Engineering, Year - 2008

* Truth Discovery with multiple Conflicting Information Providers on web
Domain - Knowledge and Data Engineering, Year - 2008

* C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi attribute Transactional Data
Domain - Knowledge and Data Engineering, Year - 2008

* An Efficient Association Rule Mining Algorithm In Distributed Databases
Domain - Knowledge Discovery and Data Mining, Year - 2008

* An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis
Domain - Knowledge Discovery and Data Mining, Year - 2008

----------------------------------------------------------------------------------------------------------
www.ncct.inncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 

* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs
Domain - Computer Science & Network Security, Year - 2007

* An Adaptive Programming Model for Fault Tolerant Distributed Computing
Domain - Dependable and Secure Computing, Year - 2007

* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
Domain - Dependable and Secure Computing, Year - 2007

* Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm
Domain - Intelligent and Advanced Systems, Year - 2007

* An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net
Domain - Machine Learning And Cybernetics, Year - 2007

* A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2007

* An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs
Domain - Mobile Computing, Year - 2007

* A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
Domain - Parallel and Distributed Systems, Year - 2007

* A New Operational Transformation Framework for Real-Time Group Editors
Domain - Parallel and Distributed Systems, Year - 2007

* Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach
Domain - Parallel and Distributed Systems, Year - 2007

* OCGRR - A New Scheduling Algorithm for Differentiated Services Networks
Domain - Parallel and Distributed Systems, Year - 2007

* Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Domain - Parallel and Distributed Systems, Year - 2007

* A Wireless Distributed Intrusion Detection System and a New Attack Model
Domain - Computers and Communications, Year - 2006

* Building Intelligent Shopping Assistants Using Individual Consumer Models
Domain - Data mining, Year - 2005

* GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
Domain - Data Mining, Year - 2005

* Mobile Objects and Mobile Agents: The Future of Distributed Computing
Domain - Distributed Computing, Year - 2004

* ODAM An Optimized Distributed Association Rule Mining Algorithm
Domain - Distributed Systems, Year - 2004

* A Reputation based Trust Model for Peer to Peer E - Commerce Communities
Domain - E-Commerce Technology, Year - 2003

* Noise Reduction by Fuzzy Image Filtering
Domain - Fuzzy Systems, Year - 2003

* Image Transformation using Grid
Domain - Image Processing, Year - 2006

* A Memory Learning Framework for Effective Image Retrieval
Domain - Image Processing, Year - 2005

* Application of BPCS steganography to wavelet compressed video
Domain - Image Processing, Year - 2004

* Identification of Humans Using Gait
Domain - Image Processing, Year - 2004

* Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress
Domain - Image Processing, Year - 2003

* Network Topology against Distributed Denial of Service Attacks DDOS
Domain - Information Forensics and Security, Year - 2006

* Personal Authentication Using 3-D Finger Geometry
Domain - Information Forensics and Security, Year - 2006

* E-Secure Transactions - Secure Electronic Data Interchange over Internet
Domain - Internet Computing, Year - 2005

* A Location-Based Routing Method for Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2005

* Benefit based Data Caching in Ad Hoc Networks
Domain - Mobile Computing, Year - 2005

* Distributed Cache Updating for the Dynamic Source Routing Protocol
Domain - Mobile Computing, Year - 2005

* A Novel Secure Communication Protocol for Ad Hoc Networks [SCP]
Domain - Mobile Computing, Year - 2004

* Scalable Wireless Adapt Network Simulator Using XTC
Domain - Mobile Computing, Year - 2004

* Slow Start Algorithm Improvement of TCP Performance
Mobile Computing, Year - 2004

* Authenticating Network Attached Storage
Domain - Network & Distributed System, Year - 2003

* A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Domain - Networking, Year - 2006

* Online Detection and Prevention of Phishing Attacks
Domain - Networking, Year - 2006

* A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
Domain - Networking, Year - 2004

* Incremental deployment service of Hop by hop multicast routing protocol
Domain - Networking, Year - 2004

* Network Border Patrol For Congestion Collapse Preventing
Domain - Networking, Year - 2004

* TCP-LP Low-Priority Service via End-Point Congestion Control
Domain - Networking, Year - 2003

* AI NET - A network that integrates ATM and IP 
Domain - Networking, Year - 2002

* Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
Domain - Networking, Year - 2002

* Dynamic Parallel Access to Replicated Content in the Internet
Domain - Networking, Year - 2002

* ITP: An Image Transport Protocol for the Internet
Domain - Networking, Year - 2002

* Face Recognition using Laplacian Faces
Domain - Pattern Analysis and Machine Intelligence, Year - 2005

* Online Handwritten Script Recognition
Domain - Pattern Analysis and Machine Intelligence, Year - 2004

* Modeling Peer-Peer File Sharing Systems
Domain - Web Intelligence, Year - 2003

* Unified Network Monitoring For Web Technology
Domain - Web Technology, Year - 2003

* Personal Identification Based On Iris Texture Analysis
Year - 2003

* Location-Aided Routing (LAR) in Mobile Ad Hoc Networks
Domain - Wireless Networks, Year - 2000

* Location based Service Routing
Year - 2005

* A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
* Coupling based metrics for measuring the quality of a software

* Demonstration of Secure Sockets Layer Protocol Working and Implementation

* Information Retrieval from Web Search using Keyword Spices

* Security in large Mediator Protocols

* SybilGuard Defending Against Sybil Attacks via Social Networks

* User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine

* Towards Multimodal Interfaces for Intrusion Detection
Domain - Computer Networks

* Distributed Data Mining in Credit Card Fraud Detection
Domain - Datamining & Intelligent Systems

* E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management
Domain - Innovative Computing

* Secured Password Based Protocol For Downloading A Private Key
Domain - Network and Distributed System

* A Software Defect Report and Tracking System in an Intranet
Domain - Software Maintenance and Reengineering


----------------------------------------------------------------------------------------------------------
www.ncct.inncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
---------------------------------------------------------------------------------------------------------- 


2011 IEEE Java Project Titles

2011 IEEE Project Titles, Java  
Java IEEE 2011 Project Titles

PROJECT TITLES & DOMAINS
MOBILE COMPUTING PROJECT TITLES (IEEE 2011 Java Mobile Computing Project Titles)
  • On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
  • Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
  • Spatial -Temporal Coverage optimization in wireless Sensor Network
  • A Control Theoretic Approach to Distributed Optimal Configuration of 80211 WLANs
  • Autonomous Deployment of Heterogeneous Mobile Sensors
  • Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding
  • Effective Scheduling in Infrastructure Based Cognitive Radio Networks
  • Endpoint Based Call Admission Control and Resource Management for VoWLAN
  • Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
  • MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
  • Mobile Sampling of Sensor Field Data Using Controlled Broadcast
  • Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
  • QoS Aware Routing and Admission Control in Shadow Fading Environments for Multirate MANETs
  • Secure High-Throughput Multicast Routing in Wireless Mesh Networks
  • The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems
  • Throughput Optimization in Mobile Backbone Networks



NETWORKING PROJECT TITLES (IEEE 2011 Java Networking Project Titles)
  • Component-Based Localization in Sparse Wireless Networks
  • Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
  • Model-Based Identification of Dominant Congested Links
  • Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks
  • TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks
  • On the Complexity of the Regenerator Placement Problem in Optical Networks
  • Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection
  • A Novel Approach for Failure Localization in All-Optical Mesh Networks
  • Energy Efficient Protocol for Cooperative Networks
  • Licklider Transmission Protocol (LTP) Based DTN for Cislunar Communications
  • Scheduling Algorithms for Multicarrier Wireless Data Systems
  • Selfish Overlay Network Creation and Maintenance
  • Star Block Design in Two-Level Survivable Optical Networks
  • Stochastic Model and Connectivity Dynamics for VANETs in Signalized Road Systems



NETWORK AND SERVICE MANAGEMENT PROJECT TITLES (IEEE 2011 Java Network and Service Management Project Titles)
  • Low-Overhead End-to-End Performance Measurement for Next Generation Networks
  • On the Impact of Security Protocols on the Performance of SNMP
  • Locating Equivalent Servants over P2P Networks



CLOUD COMPUTING PROJECT TITLES (IEEE 2011 Java Cloud Computing Project Titles)
  • Towards Secure and Dependable Storage Services in Cloud Computing
  • Going Back and forth Efficient Multi deployment and multisnapshotting on Clouds
  • Enabling public Auditability and data dynamics for storage security in clouding Computing
  • Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
  • Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
  • Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
  • Optimization of Resource Provisioning Cost in Cloud Computing
  • Performance Analysis of Cloud Computing Services for MTC-Based Scientific Computing
  • CloudTPS: Scalable Transactions for Web Applications in the Cloud



DEPENDABLE AND SECURE COMPUTING PROJECT TITLES (IEEE 2011 Java Dependable and Secure Computing Project Titles)
  • Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling 
  • ELMO: Energy Aware Local Monitoring in Sensor Networks
  • Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring 
  • Privacy-Preserving Updates to Anonymous and Confidential Databases
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 
  • Low-Energy Symmetric Key Distribution in Wireless Sensor Networks 
  • Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
  • Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
  • Online Intrusion Alert Aggregation with Generative Data Stream Modeling



KNOWLEDGE AND DATA ENGINEERING PROJECT TITLES (IEEE 2011 Java Knowledge and Data Engineering Project Titles)
  • Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments
  • A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
  • A Personalized Ontology Model for Web Information Gathering
  • A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
  • Design and Implementation of an Intrusion Response System for Relational Databases
  • Adaptive Cluster Distance Bounding for High Dimensional Indexing 
  • Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
  • Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
  • Discovering Conditional Functional Dependencies
  • Clustering with Multi-Viewpoint based Similarity Measure KD



PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES (IEEE 2011 Java Parallel and Distributed System Project Titles)
  • Cooperative Channelization in Wireless Networks with Network Coding
  • Video Streaming Distribution in VANETs
  • Throughput Optimization in Multihop Wireless Networks with Multipacket Reception and Directional Antennas
  • Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
  • Network Immunization with Distributed Autonomy-Oriented Entities
  • Optimization of Rate Allocation with Distortion Guarantee in Sensor Networks
  • A Data Throughput Prediction and Optimization Service for Widely Distributed Many-Task Computing
  • Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
  • Toward Efficient and Simplified Distributed Data Intensive Computing



IMAGE PROCESSING PROJECT TITLES (IEEE 2011 Java Image Processing Project Titles)
  • Nonlocal PDEs-Based Morphology on Weighted Graphs for Image and Data Processing
  • Image Segmentation Using Fuzzy Region Competition and Spatial/Frequency Information 
  • Perceptual Segmentation: Combining Image Segmentation With Object Tagging
  • ViBe: A Universal Background Subtraction Algorithm for Video Sequences
  • Contextual Kernel and Spectral Methods for Learning the Semantics of Images
  • JPEG2000-Based Scalable Interactive Video (JSIV)


www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891 

JAVA PROJECTS 2011 IEEE PROJECTS

JAVA PROJECTS
NETWORKING
1. Component-Based Localization in Sparse Wireless Networks
2. Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
3. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
4. Model-Based Identification of Dominant Congested Links
5. TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks
6. On the Complexity of the Regenerator Placement Problem in Optical Networks
7. Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection



MOBILE COMPUTING
8. On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
9. Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks
10. Spatial -Temporal Coverage optimization in wireless Sensor Network
11. A Privacy preseving location monitoring system for wireless sensor Network



CLOUD COMPUTING
12. Enabling public Auditability and data dynamics for storage security in clouding Computing
13. Going Back and forth Efficient Multideployment and multisnap shotting on clouds
14. Towards Secure and Dependable Storage Services in Cloud Computing



KNOWLEDGE & DATA ENGINEERING
15. A fuzzy self Constructing Feature Clustering Alg for text Classfication
16. Continous Monitoring of distance based range query
17. Data Leakage Detection
18. Locating Equivalent servants over p2p networks

www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891 

Friday, September 2, 2011

NS2 PROJECT TITLES @ NCCT

NS2 PROJECT TITLES @ NCCT
 
IEEE 2011 PROJECTS
  • Channel-Aware Routing in MANETs with Route Handoff

  • Cooperating with Smartness Using Heterogeneous Smart Antennas in Ad-Hoc Networks

  • Dynamic Clustering-Based Adaptive Mobile Gateway Management in Integrated VANET - 3G Heterogeneous Wireless Networks

  • Dynamic Conflict-free Query Scheduling for Wireless Sensor Networks

  • Efficient Target Tracking through Binary-Detection in Sparsely Deployed WSN

  • On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks

  • Optimal Route Selection Method with Satellite System for Cognitive Wireless Network in Disaster Information Network

  • Quality of service-based multi-domain routing under multiple quality of service metrics

  • Schedulability Analysis for Hard Network Lifetime Wireless Sensor Networks With High Energy First Clustering

  • Secured Communication for MANETS in Military

  • Self-Reconfigurable Wireless Mesh Networks

  • Transient Analysis of IEEE 802.15.4 Sensor Networks




IEEE 2010 PROJECTS
  • Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications

  • Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks

  • Two Phase Load Balanced Routing using OSPF

 
 
ncctchennai@gmail.com, 044-28235816, 9841193224, 9380102891, www.ncct.in, www.ieeeprojects.net