JAVA NON-IEEE
PROJECTS
1.A Geometric Approach to Improving ActivePacket Loss Measurement
2.A new architecture of
online trading platform based on cloud computing
3.A precise termination condition the probabilistic packet marking algorithm
4.A
SCALABLE OVERLAY MULTICAST ARCHITECTURE FOR LARGE SCALE APPLICATION
5.A Signature-Based Indexing Method for Efficient
Content-Based Retrieval of Relative Temporal Patterns
6.ACTIVE
MASK SEGMENTATION OF FLUORESCENCE MICROSCOPE IMAGES
7.ACTIVE SOURCE ROUTING PROTOCOL FOR NETWORK
8.Adaptive Join Operators for Result
RateOptimization on Streaming Inputs
9.AN ADAPTIVE PROGRAMMING MODEL FOR FAULT TOLERANT
DISTRIBUTED COMPUTING
10. An suitable programming model for error
Control in network
environment.
11. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc
Networks.
12. BinRank: Scaling Dynamic Authority-Based Search
Using Materialized Sub graphs
13. CONSTRAINED DIMENSIONALITY REDUCTION USING A
MIXED NORM PENALTY WITH NEURAL NETWORKS
14. Constructing Inter-Domain Packet Filters to
Control IPSpoofing Based on BGP Updates
15. C-TREND: Temporal
Cluster Graphs for Identifying and
Visualizing
16. DATA SECLUSION IN AUDIO FILE
17. Decentralized QoS-Aware Check pointing Arrangement
in Mobile Grid Computing
18. DES ALGORITHM
19. Detecting Malicious Packet Losses
20. DISTRIBUTED COLLABORATIVE KEY
AGREEMENT AND AUTHENTICATION PROTOCOL FOR DYNAMIC PEER GROUPS
21. DYNAMIC LOAD BALANCING FOR THE DISTRIBUTED MINING
OF MULTILEVEL AND LOCATION AWARE SERVICE PATTERNS
22. DYNAMIC PARALLEL ACCESS
23. DYNAMIC
SEARCH ALGORITHM IN UNSTRUCTURED PEER TO PEER NETWORK
24. Effective key generation for multimedia and web
application
25. Efficient and Secure Content Processing
and Distribution by Cooperative Intermediaries
and Distribution by Cooperative Intermediaries
26. E-Mail Server
27. ENHANCING FAST FRACTAL IMAGE COMPRESSION USING
ENTROPHY
28. Evaluating the Efficacy of Forward Error
Correction Coding
29. FACE RECOGNITION USING LAPLACIAN FACES
30. File sharing in Hybrid model based P2P Systems
Forthe Expected High Churn
31. Flexible Rollback
Recovery In Dynamic Heterogeneous Grid Computing
32. Geo Spacial Matching for Image Retrieval.
33. Harnessing The Cloud For Securely Outsourcing
Large Scale Systems of Linear EquationsHiding Sensitive Association RulesWith
Limited Side Effects
34. IDE JAVA CODE GENERATION
35. Implementation of BPCS-Steganography
36. Implementing Multicast Distribution through
Recursive Unicast Trees
37. IMPROVING SERVER PERFORMANCE USING
38. LOAD DISTRIBUTION ANDCONTENT SERVICES
39. Incremental Learning of Chunk Data for Online Pattern Classification Systems
40. Incremental Learning of Chunk Data for Online Pattern Classification Systems
41. INTRANET BASED SECURITY SYSTEM FOR
42. DOMAIN NAME SERVER
43. INTRUSION DETECTION IN HOMOGENEOUS AND
HETEROGENEOUS WIRELESS SENSOR NETWORK
44. INTRUSION DETECTION
45. JAVA MUSICIAN USING JAVA SOUND API
46. LIVE VIDEO BROADCASTING USING REAL TIME
TRANSMISSION PROTOCOL
47. Load
balancing algorithms in non-blocking multistage packet switches
48. LOAD BALANCING SERVER
49. Location-Based Spatial Query Processing in
Wireless Broadcast Environments
50. LOGARITHMIC STORE CARRY FORWARD ROUTING FOR
NETWORKS
51. Many-to-One Throughput Capacity of IEEE802.11
Multihop Wireless Networks
52. Minimizing File
Download Time in Stochastic Peer-to-Peer Networks
53. MITIGATING PERFORMANCE DEGRADATION IN
54. CONGESTED SENSORNETWORKS
55. Modeling and Automated
Containment of Worms
56. Modeling and AutomatedContainment of Worms
57. NDT: A Model-Driven ApproachFor Web Requirements
58. NETWORK BANDWIDTH PREDICTOR SYSTEM
59. Online Index Recommendations for High-Dimensional
Databases Using Query Workloads
60. OPTIMAL JAMMING ATTACK
STRATEGIES AND NETWORK DEFENSE POLICIES IN WIRELESS SENSOR NETWORKS
61. Path Diversity over Packet Switched Networks:
62. Performance Analysis and Rate Allocation
63. PATTERN RECOGNITION USING JAVA
64. PayPal Integration for a website
65. Problem Oriented Software EngineeringSolving the
Package Router Control Problem
66. PROXY SERVER FOR FASTER INTERNET ACCESS
67. A Puzzle-Based Defense Strategy AgainstFlooding
Attacks Using Game Theory
68. Security in Large Networks Using Mediator
Protocols
69. Quiver: Consistent Object Sharing for Edge
Services
70. Load
balancing algorithms in non-blocking multistage packet switches
71. Remote Network Monitoring
72. Route Reservation in Inter Networks
73. SCATTERED SYSTEM FOR AIRCRAFT MAINTENANCE
74. SEARCH TOOL FOR
INTRANET FRAMEWORK
75. Secure Data Objects Replication in Data Grid
76. SECURE MULTISIGNATURE
77. GENERATION FOR GROUP
COMMUNICATION
78. Secured Distributed Key Management for
Threshold-Multisignature using Cryptography
79. An Integrated Framework for Security and
Dependability
80. SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY
81. Sequential Object Sharing for Edge Services
82. Simple Search Engine
83. Stegnography – Bit
shift Encrypting and Embedding
84. Testing of
java program based on cohesion
85. TIMED RELEASE CRYPTOSYSTEM
86. TOOLS FOR BUG TRACKING AND
SYSTEMANALYSIS
87. TOWARD PUBLICLY
AUDITABLE SECURE CLOUD DATA STORAGE SERVICES
88. TWO SERVER AUTHENTICATION SYSTEM
89. Two Techniques for Fast Computation ofConstrained
Shortest Paths
90. Using the Conceptual Cohesion of
Classes for Fault Prediction in Object-Oriented Systems
91. WRONG METHOD CALL IDENTIFIER
92. Congestion
Control Using NBP
93. Client
Server Protocol Implementation
94. Data
Transmission Using Multi-Tasking-Sockets
95. Dynamic Load Balancing in Distributed Systems in
the Presence of Delays
96. Routing Simulater
No comments:
Post a Comment