Java Project Titles (IEEE 2012, 2011 Java IEEE Project List)   |   Dot Net Project Titles (IEEE 2012, 2011 Dot Net IEEE Project List)    |   Android Project Titles (IEEE 2012, 2011 Android IEEE Project List)   |   Matlab Project Titles (IEEE 2012, 2011 Matlab IEEE Project List)   |   NS2 Project Titles (IEEE 2012, 2011 NS2 IEEE Project List)

Embedded Systems Project Titles (IEEE 2012, 2011 Embedded Systems IEEE Project List)   |   DSP Project Titles (IEEE 2012, 2011 DSP IEEE Project List)   |   VLSI Project Titles (IEEE 2012, 2011 VLSI IEEE Project List)   |   Power Electronics Project Titles (IEEE 2012, 2011 Power Electronics IEEE Project List)   |   Matlab Project Titles (IEEE 2012, 2011 Matlab IEEE Project List)

Java, J2EE, J2ME Project Titles / List   |   Dot Net - ASP.NET, VB.NET, C# Project Titles   |   Embedded Systems Project Titles

Project Supports and Deliverables    |   Software Project Training Process   |   Embedded Project Training Process   |   In Plant Training Details    |   Photo Gallery    |   Contact us   |   Route Map

DOWNLOADS - To get Titles, Abstracts & IEEE Base Paper visit - www.ncct.in

Software Projects in Java, J2EE, J2ME, Java Fx, Dot Net, ASP.NET, VB.NET, C#, NS2, Matlab, Android, PHP

IEEE PROJECT DOMAINS - Networking * Mobile Computing * Cloud Computing * Knowledge and Data Engineering * Network Security * Dependable and Secure Computing * Parallel and Distributed Systems * Data Mining * Image Processing * Android Applications * Software Engineering * Grid Computing * Network and Service Management * Learning Technologies * Web Services & Applications * Wireless Sensor Networks * Services Computing * Biometrics * Pattern Analysis & Machine Language * Fuzzy Systems * Neural Networks * Cluster Computing * Communication System * MANETS, WSNS, WMNS, CRNS, VANETS, QoS * Biometrics & Access Control

Application Projects * System Projects * Enterprise Computing * ERP, CRM, SCM Projects * System to Mobile Communication * WAP Services * Others

Embedded Projects in Embedded Systems using Microcontrollers, VLSI, DSP, Matlab

PROJECTS IN Embedded, Electronics, Electrical, Communication, Hardware, Instrumentation, Mechanical, Biomedical, Tele Communication, Automobile, Power Electronics, Power Systems

EMBEDDED / IEEE PROJECT DOMAINS - Robotics * Biomedical * Jammers * Security & Access Control * Biometrics * Finger Print, Voice Control * Zigbee, RF, RFID, GPS, GSM, EMPCR, Touch * PLC, SCADA, MEMS, CAN, AI * Intelligent Transportation Systems * Industrial Electronics * Motors, Drives & Control * Process Control, PID, Fuzzy Logic * Energy Conversion * Solar Energy, Wind Power * Ultrasonic * Wireless Communication * Image, Voice, Audio, Video Processing * Telecommunication * Networking * IVRS * Sensors Networks * Automotive Projects * Wireless Sensors Networks * Power Electronics * High Voltage Engineering * Power Quality-Harmonics & Active Power Filtering * Converters & Inverters * SMPS * Fuel Cell * Power Factor * Power System * Thermal * Instrumentation Projects * Process Control System * Weighing Systems * Mechanical Projects * Automobile * Device Control * SMS Controllers * Ethernet, USB Controllers * Digital Camera, Satellite, Research, Photoshop, Biomedical, Copyright & Surveillance Applications * Image Processing * Low Power Design * Power Analyzer * TTCAN * VLSI Systems * Broadcasting * Consumer Electronics * Automatic Control * Others

Tuesday 24 July 2012

Java Project Titles (IEEE 2012, 2011 Java IEEE Project List)

JAVA MOBILE COMPUTING PROJECTS
JAVA MOBILE COMPUTING, 2012 IEEE PROJECTS
* A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
* A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
* An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA_ Systems
* Approximation Algorithms for Data Broadcast in Wireless Networks
* Chameleon A Color-Adaptive Web Browser for Mobile OLED Displays
* Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
* Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
* Controlled mobility sensor networks for target tracking using ant colony optimization
* Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming A Structured Matrix-Geometric Method
* Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks
* Efficient and Fair Bandwidth Allocation in Multi-Channel Cognitive Radio Networks
* Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas
* FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
* Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks Investigation of Context Prediction Accuracy for Different Context Abstraction Levels
* Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design
* Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
* Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMACA Networks
* Nature-Inspired Self-Organization, Control, and Optimization in Heterogeneous Wireless Networks
* On the Cost of Knowledge of Mobility in Dynamic Networks An Information-Theoretic Approach
* On the Vulnerabilities of CSI in MIMO Wireless Communication Systems
* ProSpect A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
* STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
* The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks
* Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks Computational Complexity and Efficient Approximations
* Understanding Node Localizability of Wire-less Ad-hoc and Sensor Networks
* A Privacy preseving location monitoring system for wireless sensor Network, IEEE 2011
* BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks, IEEE 2011
* Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks, IEEE 2011
* Dynamic Switching based data forwarding for low duty cycle wireless sensor networks, IEEE 2011
* Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems, IEEE 2011
* Mobile Sampling of Sensor Field Data using controlled Broadcast, IEEE 2011
* Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model, IEEE 2011
* On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents, IEEE 2011
* Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE 2011
* Spatial -Temporal Coverage optimization in wireless Sensor Network, IEEE 2011
* Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks, IEEE 2011
* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal, IEEE 2010
* Energy-Efficient VoIP over Wireless LANs, IEEE 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE 2010
* MABS Multicast Authentication Based on Batch Signature, IEEE 2010
* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink, IEEE 2010
* Optimal Jamming Attack Strategies and Network Defense, IEEE 2010
* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes, IEEE 2010
* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks, IEEE 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice, IEEE 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE 2009
* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period, IEEE 2009
* Energy-Efficient SINR-Based Routing for Multihop Wireless, IEEE 2009
* Mobility Management Approaches for Mobile IP Networks, IEEE 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks, IEEE 2009
* Continuous Monitoring of Spatial Queries in Wireless Broadcast, IEEE 2009
* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE 2009
* Large Connectivity for Dynamic Random Geometric Graphs, IEEE 2009
* Mitigation of Control Channel Jamming Under Node Capture Attacks, IEEE 2009
* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless, IEEE 2008
* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks, IEEE 2008
* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks, IEEE 2008

JAVA NETWORKING PROJECTS
JAVA NETWORKING, 2012 IEEE PROJECTS
* A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
* A Theory for the Connectivity Discovered by Routing Protocols
* Accelerating Multipattern Matching on Compressed HTTP Traffic
* Adaptive Selective Verification An Efficient Adaptive Countermeasure to Thwart DoS Attacks
* Balancing Reliability and Utilization in Dynamic Spectrum Access
* Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers
* Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network
* Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
* Design of Wireless Sensor Networks for Mobile Target Detection
* Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using -Structures
* Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks
* Efficient Network Tomography for Internet Topology Discovery
* Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
* ESM Efficient and Scalable Data Center Multicast Routing
* Greedy Geographic Routing in Large-Scale Sensor Networks A Minimum Network Decomposition Approach
* Multicast Performance With Hierarchical Cooperation
* On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths
* Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
* Performance of PCN-Based Admission Control Under Challenging Conditions
* Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
* Reliable Collective Communications With Weighted SRLGs in Optical Networks
* Router Support for Fine-Grained Latency Measurements
* Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
* Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version)
* Component-Based Localization in Sparse Wireless Networks, IEEE 2011
* Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE 2011
* Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks, IEEE 2011
* Design and Implementation of a Fast Dynamic Packet Filter, IEEE 2011
* Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration, IEEE 2011
* Forward Correction and Fountain Codes in Delay-Tolerant Networks, IEEE 2011
* Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection, IEEE 2011
* Live Streaming With Receiver-Based Peer-Division Multiplexing, IEEE 2011
* Model-Based Identification of Dominant Congested Links, IEEE 2011
* On the Complexity of the Regenerator Placement Problem in Optical Networks, IEEE 2011
* Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks, IEEE 2011
* Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE 2011
* Performance analysis of an unclosed CSMA in the multi channel cognitive radio networks, IEEE 2011
* Prog ME - Towards Programmable Network Measurement, IEEE 2011
* ROC Resilient Online Coverage for Surveillance Applications, IEEE 2011
* Throughput-Competitive Advance Reservation With Bounded Path Dispersion, IEEE 2011
* TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks, IEEE 2011
* Topological Transformation Approaches to TCAM-Based Packet Classification, IEEE 2011
* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks, IEEE 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks, IEEE 2010
* Constrained Relay node placement in Wireless Sensor Network, IEEE 2010
* Demand-Aware Content Distribution on the Internet, IEEE 2010
* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks, IEEE 2010
* Host-to-Host Congestion Control for TCP, IEEE 2010
* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, IEEE 2010
* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast, IEEE 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations, IEEE 2010
* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority, IEEE 2010
* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes, IEEE 2010
* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS, IEEE 2010
* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System, IEEE 2010
* Virtual Database Technology for Distributed Database, IEEE 2010
* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks, IEEE 2009
* A New Reliable Broadcasting in Mobile Ad Hoc Networks, IEEE 2009
* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution, IEEE 2009
* Anonymity in Wireless Broadcast Networks, IEEE 2009
* Capturing Router Congestion and Delay, IEEE 2009
* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments, IEEE 2009
* Entropy Based Adaptive Flow Aggregation, IEEE 2009
* Measuring Capacity Bandwidth of Targeted Path Segments, IEEE 2009
* Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE 2009
* Multiple Routing Configurations for Fast IP Network Recovery, IEEE 2009
* Node Isolation model and age-based neighbor selection in unstructured P2P networks, IEEE 2009
* SIMPS Using Sociology for Personal Mobility, IEEE 2009
JAVA CLOUD COMPUTING PROJECTS
JAVA CLOUD COMPUTING, 2012 IEEE PROJECTS
* A Cloud Infrastructure for Optimization of a Massive Parallel Sequencing Workflow
* A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments
* A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
* A Seeded Cloud Approach to Health Cyberinfrastructure Preliminary Architecture Design and Case Applications
* A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing
* An Autonomous Reliability Aware NEgotiation Strategy for Cloud Computing Environments
* Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures
* Automating Data-Throttling Analysis for Data-Intensive Workflows
* Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants
* Cluster as a Service for self-deployable cloud applications
* Design and Implementation of a Secure Healthcare Social Cloud System
* Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud
* Environmental and Disaster Sensing Using Cloud Computing Infrastructure
* Framework on Large Public Sector Implementation of Cloud Computing
* Global Futures a Multithreaded Execution Model for Global Arrays-based Applications
* Lightweight Resource Scaling for Cloud Applications
* Mining Concept drifting Network traffic in cloud computing environments
* On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
* Optimal Reconfiguration of the Cloud Network for Maximum Energy Savings
* Performance Analysis of Cloud Computing Centers Using M =G=m=m_ r Queuing Systems
* Performance analysis of supporting QoS for multimedia in IEEE 802.11e
* Performance evaluation of multimedia services over wireless LAN using routing protocol Optimized Link State Routing (OLSR)
* Perspectives of UnaCloud An Opportunistic Cloud Computing Solution For Facilitating Research
* Pseudo Random Number Generation for Parallelized Jobs on Clusters
* Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand
* Reward Scheduling for QoS in Cloud Applications
* SLA-based Optimization of Power and Migration Cost in Cloud Computing
* Visualizing Nonmanifold and Singular Implicit Surfaces with Point Clouds
* A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, IEEE 2011
* Enabling public Auditability and data dynamics for storage security in clouding Computing, IEEE 2011
* Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE 2011
* Going Back and forth Efficient Multideployment and multisnap shotting on clouds, IEEE 2011
* Modeling and Analysis of Cloud Computing Availability based on Eucalyptus Platform for E-Government Data Center, IEEE 2011
* Towards Secure and Dependable Storage Services in Cloud Computing, IEEE 2011
JAVA DEPENDABLE & SECURE COMPUTING
JAVA DEPENDABLE AND SECURE COMPUTING, 2012 IEEE PROJECTS
* Packet Hiding Method For Preventing Selective Jamming Attacks
* Secure Trust:- A dynamic trust compilation model for secured communication in multiagent system
* Automated Security Test Generation with Formal Threat Models
* Detecting and Resolving Firewall Policy Anomalies
* Detecting Anomalous Insiders in Collaborative Information Systems
* Enforcing Mandatory Access Control in Commodity OS to Disable Malware
* Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
* Ensuring Distributed Accountability for Data Sharing in the Cloud
* Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
* Iterative Trust and Reputation Management Using Belief Propagation
* JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
* Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
* On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
* Remote Attestation with Domain-Based Integrity Model and Policy Analysis
* Resilient Authenticated Execution of Critical Applications in Untrusted Environments
* ZoneTrust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
* Analyzing a Family of Key Protection Schemes against Modification Attacks, IEEE 2011
* Anomaly Detection in Network Traffic Based on Statistical Inference and -Stable Modeling, IEEE 2011
* Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE 2011
* Modeling and Detection of Camouflaging Worm, IEEE 2011
* Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE 2011
* Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE 2011
* Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking, IEEE 2011
* SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE 2011
* Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE 2010
* SiGFree A signature based free buffer overflow attack blocker, IEEE 2010
* Secure Data Objects Replication in Data Grid, IEEE 2010
* Evaluating the Vulnerability of Network Traffic Using Joint, IEEE 2009
* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, IEEE 2009
* Security Analysis of the SASI Protocol, IEEE 2009
* Modeling & Automated Containment of Worms, IEEE 2008
* Controlling IP Spoofing Through Inter Domain Packet Filters, IEEE 2008
* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, IEEE 2008
* An Adaptive Programming Model for Fault Tolerant Distributed Computing, IEEE 2007
* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, IEEE 2007
JAVA KNOWLEDGE & DATA ENGINEERING
JAVA KNOWLEDGE AND DATA ENGINEERING, 2012 IEEE PROJECTS
* ROAD: A New Spatial Object Search Framework for Road Networks
* Slicing: A New Approach for Privacy Preserving Data Publishing
* A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation
* A Knowledge-Driven Approach to Activity Recognition in Smart Homes
* A Look-Ahead Approach to Secure Multiparty Protocols
* A Performance Anomaly Detection and Analysis Framework for DBMS Development
* A Temporal Pattern Search Algorithm for Personal History Event Visualization
* A Unified Probabilistic Framework for Name Disambiguation in Digital Library
* Combining Tag and Value Similarity for Data Extraction and Alignment
* Data Mining for XML Query-Answering Support
* Dense Subgraph Extraction with Application to Community Detection
* Discriminative Feature Selection by Nonparametric Bayes Error Minimization
* EDISC A Class-Tailored Discretization Technique for Rule-Based Classification
* Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
* Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
* Efficient Fuzzy Type-Ahead Search in XML Data
* Efficient Processing of Uncertain Events in Rule-Based Systems
* Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting
* Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks
* Evaluating Path Queries over Frequently Updated Route Collections
* Extending Recommender Systems for Disjoint UserItem Sets The Conference Recommendation Problem
* Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
* Holistic Top-k Simple Shortest Path Join in Graphs
* Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
* Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
* Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
* Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain
* On the Complexity of View Update Analysis and Its Application to Annotation Propagation
* Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
* Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
* Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
* Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
* A fuzzy self Constructing Feature Clustering Alg for text Classfication, IEEE 2011
* A Generic Multilevel Architecture for Time Series Prediction, IEEE 2011
* A Machine learning approach for identifying disease treatment relations in short test, IEEE 2011
* Adaptive Cluster Distance Bounding for High-Dimensional Indexing, IEEE 2011
* Analysis on Credit Card Fraud Detection Methods, IEEE 2011
* Continous Monitoring of distance based range query, IEEE 2011
* Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme, IEEE 2011
* Data Leakage Detection, IEEE 2011
* Data Mining to Generate Adverse Drug Events Detection Rules, IEEE 2011
* Decision Trees for Uncertain Data, IEEE 2011
* Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units, IEEE 2011
* Adaptive Join Operators for Result Rate optimization, IEEE 2010
* False Negative Problem of Counting Bloom Filter, IEEE 2010
* FiVaTech Page-Level Web Data Extraction from Template Pages, IEEE 2010
* K-Anonymity in the Presence of External Databases, IEEE 2010
* LIGHT A Query-Efficient Yet Low-Maintenance --DHT, IEEE 2010
* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects, IEEE 2010
* Prospective Infectious Disease Outbreak detection using Markov switching model, IEEE 2010
* Queries Optimization in SQL using Linear Recursion, IEEE 2010
* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network, IEEE 2009
* OLEX : effective Rule Learning for Text Categorization, IEEE 2009
* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication, IEEE 2009
* Efficient Range Query Processing in Peer-to-Peer Systems, IEEE 2009
* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, IEEE 2008
* Online Index Recommendations for High-Dimensional Databases Using Query Workloads, IEEE 2009
* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, IEEE 2009
* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern, IEEE 2009
* Distributed Suffix Tree Overlay for Peer-to-Peer Search, IEEE 2009
JAVA PARALLEL & DISTRIBUTED SYSTEMS
JAVA PARALLEL AND DISTRIBUTED SYSTEMS, 2012 IEEE PROJECTS
* BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
* A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
* A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
* A Sequentially Consistent Multiprocessor Architecture for Out-of-Order Retirement of Instructions
* A Survey of Parallel Programming Models and Tools in the Multi and Many-Core Era
* An Online Data Access Prediction and Optimization Approach for Distributed Systems
* Comparison-Based System-Level Fault Diagnosis A Neural Network Approach
* Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
* Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
* Distributed Diagnosis of Dynamic Events in Partitionable Arbitrary Topology Networks
* Distributed Privacy-Preserving Access Control in Sensor Networks
* DRAGON Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks
* Embedded Transitive Closure Network for Runtime Deadlock Detection in Networks-on-Chip
* Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
* Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
* Exploring the Optimal Replication Strategy in P2P-VoD Systems Characterization and Evaluation
* Flash Crowd in P2P Live Streaming Systems Fundamental Characteristics and Design Implications
* Formal Semantics, Compilation and Execution of the GALS Programming Language DSystemJ
* Hamiltonian Decomposition of the Rectangular Twisted Torus
* Large-Scale Transient Stability Simulation of Electrical Power Systems on Parallel GPUs
* Load Balancing Hashing in Geographic Hash Tables
* On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
* On the Design and Deployment of RFID Assisted Navigation Systems for VANETs
* Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications
* Performance and Reliability of Non-Markovian Heterogeneous Distributed Computing Systems
* Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
* Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
* Topology Enhancements in Wireless Multihop Networks A Top-Down Approach
* Trustworthy Coordination of Web Services Atomic Transactions
* Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing, IEEE 2011
* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming, IEEE 2010
* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation, IEEE 2010
* IRM Integrated File Replication and Consistency Maintenance, IEEE 2010
* Privacy-Conscious Location-Based Queries in Mobile Environments, IEEE 2010
* Detecting Malicious Packet Losses, IEEE 2009
* Dynamic Routing with Security Considerations, IEEE 2009
* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks, IEEE 2009
* Virtual-Force-Based Geometric Routing Protocol in MANETs, IEEE 2009
* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, IEEE 2009
* A Tree-Based Peer-to-Peer Network with Quality Guarantees, IEEE 2008
* Computation Efficient Multicast Key Distribution, IEEE 2008
* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE 2008
* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System, IEEE 2008
* QUIVER Consistent Object Sharing For Edge Services, IEEE 2008
* The Server Reassignment Problem for Load Balancing in Structured P2P Systems, IEEE 2008
* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode, IEEE 2008
* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding, IEEE 2008
JAVA IMAGE PROCESSING
JAVA IMAGE PROCESSING, 2012 IEEE PROJECTS
* A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
* A Multiplicative Iterative Algorithm for Box-Constrained Penalized Likelihood Image Restoration
* Cognition and Removal of Impulse Noise With Uncertainty
* Combining Head Pose and Eye Location Information for Gaze Estimation
* Groupwise Registration of Multimodal Images by an Efficient Joint Entropy Minimization Scheme
* Higher Degree Total Variation (HDTV) Regularization for Image Recovery
* Image Deblurring Using Derivative Compressed Sensing for Optical Imaging Application
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* Model-Assisted Adaptive Recovery of Compressed Sensing with Imaging Applications
* Multiple Descriptions Coinciding Lattice Vector Quantizer for Wavelet Image Coding
* Object Segmentation of Database Images by Dual Multiscale Morphological Reconstructions and Retrieval Applications
* Posterior-Mean Super-Resolution With a Causal Gaussian Markov Random Field Prior
* Three-Dimensional Near-Field MIMO Array Imaging Using Range Migration Techniques
* Wavelet-Based Compressed Sensing Using a Gaussian Scale Mixture Model
* A memory learning framework for effective image retrieval, IEEE 2011
* Unequal Power Allocation for JPEG Transmission Over MIMO Systems, IEEE 2010
* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos, IEEE 2009
* Hierarchical Bayesian sparse image reconstruction with application to MRFM, IEEE 2009
* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, IEEE 2009
* Image Transformation using Grid, IEEE 2006
* A Memory Learning Framework for Effective Image Retrieval, IEEE 2005
* Application of BPCS steganography to wavelet compressed video, IEEE 2004
* Identification of Humans Using Gait, IEEE 2004

JAVA NETWORK AND SERVICE MANAGEMENT
2012 IEEE PROJECTS
* A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
* A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
* A Security Management Architecture for Supporting Routing Services on WANETs
* Characterization of ISP Traffic Trends, User Habits, and Access Technology Impact
* Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

JAVA SERVICES COMPUTING
2012 IEEE PROJECTS
* A Dataflow-Based Scientific Workflow Composition Framework
* Dynamic Authentication for Cross-Realm SOA-Based Business Processes
* Energy-Aware Autonomic Resource Allocation in Multitier Virtualized Environments
* Expert Discovery and Interactions in Mixed Service-Oriented Systems
* Runtime Enforcement of Web Service Message Contracts with Data
JAVA SOFTWARE ENGINEERING
2012 IEEE PROJECTS
* An Autonomous Engine for Services Configuration and Deployment
* Comparing Semi-Automated Clustering Methods for Persona Development
* Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
* Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
* Pointcut Rejuvenation Recovering Pointcut Expressions in Evolving Aspect-Oriented Software
* QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
* StakeRare Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation

JAVA COMMUNICATION SYSTEM
2012 IEEE PROJECTS
* A Fourier Based Method for Approximating the Joint Detection Probability in MIMO Communications
* Achieving Joint Diversity in Decode-and-Forward MIMO Relay Networks with Zero-Forcing Equalizers
* Characterization of OFDM Radio Link Under PLL-Based Oscillator Phase Noise and Multipath Fading Channel
* Performance Modeling and Analysis of Cognitive Mesh Networks
* A Secure Single Sign-On Mechanism for Distributed Computer Networks
JAVA FUZZY SYSTEMS
2012 IEEE PROJECTS
* A Generalization of Distance Functions for Fuzzy c -Means Clustering With Centroids of Arithmetic Means
* Adaptive Control Schemes for Discrete-Time T-S Fuzzy Systems With Unknown Parameters and Actuator Failures
* Grouping, Overlap, and Generalized Bientropic Functions for Fuzzy Modeling of Pairwise Comparisons

JAVA LEARNING TECHNOLOGIES
2012 IEEE PROJECTS
* Case-Based Learning, Pedagogical Innovation, and Semantic Web Technologies
* Facilitating Trust in Privacy-Preserving E-Learning Environments
* LaaN Convergence of Knowledge Management and Technology-Enhanced Learning
* Spatial Learning Using Locomotion Interface to Virtual Environment
* Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning

JAVA PATTERN ANALYSIS & MACHINE INTELLIGENCE
2012 IEEE PROJECTS
* A Closed-Form Solution to Tensor Voting Theory and Applications
* Bilinear Modeling via Augmented Lagrange Multipliers (BALM)
* Convergent Iterative Closest-Point Algorithm to Accomodate Anisotropic and Inhomogenous Localization Error
* Difference-Based Image Noise Modeling Using Skellam Distribution
* Discriminative Latent Models for Recognizing Contextual Group Activities
* Edge Structure Preserving 3D Image Denoising by Local Surface Approximation
* Fast Rotation Invariant 3D Feature Computation Utilizing Efficient Local Neighborhood Operators
* IntentSearch Capturing User Intention for One-Click Internet Image Search
* Robust and Efficient Ridge-Based Palmprint Matching
* Trainable Convolution Filters and Their Application to Face Recognition

JAVA WIRELESS COMMUNICATION
* Throughput Optimization in High Speed Downlink Packet Access (HSDPA) Random access Transport Capacity, IEEE 2010
* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks, IEEE 2010
* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, IEEE 2009
* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, IEEE 2009
* Continuous Flow Wireless Data Broadcasting for High Speed Environments, IEEE 2009
* Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network, IEEE 2009
* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks, IEEE 2009
* Robust cooperative routing protocol in mobile wireless sensor networks, IEEE 2009
* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks, IEEE 2009
* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets, IEEE 2009

JAVA OTHERS
* Sketch4Match – Content-based Image Retrieval System Using Sketches - Applied Machine Intelligence and Informatics, IEEE 2011
* Remote Display solution for mobile cloud computing - Computer, IEEE 2011
* A bounded and adaptive memory based approach to mine frequent patterns from very large database - Cybernetics, IEEE 2011
* Embedded Extended Visual Cryptography Schemes - Information Forensics and Security, IEEE 2011
* Cloud Computing for Agent-Based Urban Transportation Systems - Intelligent Transport System, IEEE 2011
* Locating Equivalent servants over p2p networks - Network and Service Management, IEEE 2011
* Ensuring Data Storage Security in Cloud Computing - Cloud Computing, IEEE 2010
* CHARMY: A Framework for Designing and Verifying Architectural Specifications, Software Engineering - IEEE 2009
* Optimized Resource Allocation for Software Release Planning, Software Engineering - IEEE 2009
* Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems, Software Engineering - IEEE 2008
* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Engineering - IEEE 2008
* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics and Security - IEEE 2010
* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - IEEE 2009
* Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - IEEE 2006
* Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - IEEE 2006
* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols - Vehicular Technology, IEEE 2010
* Face Recognition using Laplacian Faces - Pattern Analysis and Machine Intelligence, IEEE 2005
* Online Handwritten Script Recognition - Pattern Analysis and Machine Intelligence, IEEE 2004
* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions - Neural Networks, IEEE 2009
* A Survey of Learning-Based Techniques of Email Spam Filtering - Neural Networks, IEEE 2008
* DAIOS - Efficient Dynamic Web Service Invocation - Internet Computing, IEEE 2009
* E-Secure Transactions - Secure Electronic Data Interchange over Internet - Internet Computing, IEEE 2005
* Agent Mining: The Synergy of Agents and Data Mining - Intelligent Systems, IEEE 2009
* Protection of Database Security via Collaborative Inference Detection - Intelligence and Security Informatics, IEEE 2008
* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks - Industrial Informatics, IEEE 2009
* Face Recognition for Smart Recognitions - Gesture Recognition, IEEE 2008
* Analysis of Computational Time of Simple Estimation of Distribution Algorithms - Evolutionary Computation, IEEE 2010
* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database - Datamining, IEEE 2010
* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths  - Consumer Electronics, IEEE 2008
* Upper Bounds for Dynamic Memory Allocation - Computers, IEEE 2009
* Collusive piracy prevention in P2P content delivery network - Computers, IEEE 2009
* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs - Computer Science & Network Security, IEEE 2007
* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol - Computer and Communication Engineering, IEEE 2008
* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies - Biomedicine, IEEE 2009

No comments:

Post a Comment