PROJECT NAME DOMAIN
1. A Link-Based Cluster Ensemble Approach For Categorical Data Clustering Data Mining
2. A Semi-Automatic Approach for Extracting Software Product Lines Software
Engineering
3. 1 Ensuring Distributed Accountability for Data Sharing in the Cloud Cloud Computing
4. Cooperative Provable Data Possession for Integrity Verification in Multi-
Cloud Storage
Cloud Computing
5. Cloud Data Protection for Masses Cloud Computing
6. Cloud Computing Security From Single to Multi-Clouds Cloud Computing
7. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing
Cloud Computing
8. Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing
9. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks Cloud Computing
10. Slicing: A New Approach to Privacy Preserving Data Publishing Data Mining
11. Ranking Model Adaptation for Domain-Specific Search Data Mining
12. Confucius: A Tool Supporting Collaborative Scientific Workflow
Composition.
Data Mining
13. Multiparty Access Control for Online Social Networks: model and
mechanisms
Data Mining
14. Organizing User Search Histories Data Mining
15. Clustering With Multi View Point – Based Similarity Measure Data Mining
16. Outsourced Similarity Search on Metric Data Assets Data Mining
17. Efficient Fuzzy Type – A Head Search In Xml Data Data Mining
18. Statistical Entity Extraction from Web Data Mining
19. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks Image Processing
20. Game-Theoretic Pricing for Video Streaming in Mobile Networks Mobile Computing
21. Self Adaptive Contention Aware Routing Protocol For Intermittently
Connected Mobile Networks
Mobile Computing
22. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Mobile Computing
23. On Optimizing Overlay Topologies For Search In Unstructured Peer To Peer
Networks
Mobile Computing
24. Fast Data Collection in Tree-Based Wireless Sensor Networks Mobile Computing
25. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Mobile Computing
26. Learn to Personalized Image Search from the Photo Sharing Websites Multimedia
27. Packet Loss Control Using Tokens at the Network Edge Networking
28. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P
System
Networking
29. Catching Packet Droppers and Modifiers in Wireless Sensor Networks Networking
30. Distributed Packet Buffers For High Band Width Switches & Routers Networking
31. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Networking
32. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks Networking
33. Latency Equalization as a New Network Service
Primitive
Networking
34. Scalable and Cost-Effective Interconnection of Data-Center Servers Using
Dual Server Ports
Networking
35. A Network Coding Equivalent Content Distribution Scheme For Efficient Peer
To Peer Interactive Vod Streaming
Parallel &
Distributed Systems
36. Risk-Aware Mitigation for MANET Routing Attacks Secure Computing
37. Packet-Hiding Methods for Preventing Selective Jamming Attacks Secure Computing
38. Online Modeling of Proactive Moderation System for Auction Fraud Detection Secure Computing
39. Energy-Efficient Cooperative Distribution with Statistical QoS Provisions
Video Over Wireless Networks
Secure Computing
40. Modeling and Detection of Camouflaging Worm Secure Computing
41. Cut detection in wireless sensor networks Wireless Networks
42. Self-Interested Routing In Online Environment Wireless Networks
43. Secure And Practical Outsourcing Of Linear Programming In Cloud
Computing
Cloud Computing
44. Client-side Load Balancer using Cloud Cloud Computing
45. A Fuzzy Self-Constructing Feature Clustering Algorithm For Text
Classification
Data Mining
46. Decision Trees for Uncertain Data Data Mining
47. Analysis on credit card fraud detection methods E-Commerce
48. Embedded Extended Visual Cryptography Schemes Secure Computing
49. Staying Connected in Mobile Healthcare System Mobile Computing
50. Design and Implementation of TARF: A Trust-Aware Routing Framework for
WSNs
Networking
51. Live Streaming With Receiver-Based Peer-Division Multiplexing Networking
52. Buffer Sizing in IEEE 802.11 networks Networking
53. Wireless Sensor Networks A Study on Congestion Wireless Networks
54. A Semi-Automatic Approach for Extracting Software Product Lines Software
Engineering
55. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks Cloud Computing
56. Statistical Entity Extraction from Web Data Mining
57. A Study on Certificate Revocation in Mobile Ad Hoc Networks Mobile Computing
58. An Efficient Density based Improved K- Medoids Clustering algorithm Data Mining
59. An Efficient Paging Scheme for Terminal Mobility using Personal Mobility
Management Information in Interworked Fixed and Mobile Networks
Data Mining
60. Caching Strategies Based on Information Density Estimation in Wireless Ad
Hoc Networks
Mobile Computing
61. Effective Navigation of Query Results Based on Concept Hierarchies Data Mining
62. Fast Simulation of Service Availability in Mesh Networks With Dynamic Path
Restoration
Networking
63. Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques
Data Mining
64. Integration of Sound Signature in Graphical Password Authentication System Networking
65. Online Intrusion Alert Aggregation with Generative Data Stream Modeling Secure Computing
66. A Privacy-Preserving Location Monitoring System for Wireless Sensor
Networks
Mobile Computing
67. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective
Embedding
Data Mining
68. The CoQUOS Approach to Continuous Queries in Unstructured Overlays Data Mining
69. Temporal Data Clustering via Weighted Clustering Ensemble with Different
Representations
Data Mining
70. Sketch4Match – Content-based Image Retrieval System Using Sketches Image Processing
71. Efficient Similarity Search over Encrypted Data
72.

More Related Content

DOC
Ieee 2013 dot net projects list
DOC
Ieee 2014 dot net projects list
DOC
Ieee 2014 java projects list
DOC
Novel secure communication protocol basepaper
DOC
Java IEEE 2013 Projects list
DOC
Java IEEE Projects 2012-2011-2010
PDF
Dotnet ieee 2014 projects
PDF
2015 ieee projects in bangalore
Ieee 2013 dot net projects list
Ieee 2014 dot net projects list
Ieee 2014 java projects list
Novel secure communication protocol basepaper
Java IEEE 2013 Projects list
Java IEEE Projects 2012-2011-2010
Dotnet ieee 2014 projects
2015 ieee projects in bangalore

What's hot (10)

PDF
2015 and 2016 IEEE Projects for Cloud Computing
DOCX
Final year ieee Dot net project titles 2013 2014
PDF
2015 and 2016 ieee projects
DOC
Dotnet application-non-ieee
DOC
Ieee 2012 dot net projects list
DOCX
CREC List.docx
DOC
Ieee 2014 completd dotnet java projects
PDF
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
DOC
Projecttitles 2013
DOCX
2013 2014 ieee project titles
2015 and 2016 IEEE Projects for Cloud Computing
Final year ieee Dot net project titles 2013 2014
2015 and 2016 ieee projects
Dotnet application-non-ieee
Ieee 2012 dot net projects list
CREC List.docx
Ieee 2014 completd dotnet java projects
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Projecttitles 2013
2013 2014 ieee project titles
Ad

Similar to Ieee java projects list (20)

DOC
Ieee 2013 java projects list
DOCX
Java project 2013
PDF
Ieee project title_2013-2014
PDF
FINAL YEAR PROJECTS FOR CSE
PDF
FINAL YEAR PROJECT TITLES
PDF
Ieee project title_2013-2014
PDF
FINAL PROJECT FOR ECE
DOCX
CREC List.docx
DOCX
CREC List.docx
PDF
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
PDF
Final year IEEE projects for 2013-14
DOCX
FINAL YEAR PROJECTS FOR CSE
DOCX
FINAL YEAR PROJECTS FOR CSE 2013-2014
PDF
Ieee 2013 java project titles richbraintech
PDF
Ieee 2013 java project titles richbraintechnologies
PDF
Ieee 2013 java project titles richbrainprojects
DOCX
2013 2014 bulk ieee projects
DOCX
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
PDF
CSE Dot net ieee projects 2015.Nellore
DOC
Low cost Java IEEE Projects 2013
Ieee 2013 java projects list
Java project 2013
Ieee project title_2013-2014
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECT TITLES
Ieee project title_2013-2014
FINAL PROJECT FOR ECE
CREC List.docx
CREC List.docx
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
Final year IEEE projects for 2013-14
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE 2013-2014
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbrainprojects
2013 2014 bulk ieee projects
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
CSE Dot net ieee projects 2015.Nellore
Low cost Java IEEE Projects 2013
Ad

More from Mumbai Academisc (20)

DOC
Non ieee java projects list
DOC
Non ieee dot net projects list
PPT
Spring ppt
PDF
Ejb notes
PDF
Java web programming
PDF
Java programming-examples
PPTX
Hibernate tutorial
DOCX
J2ee project lists:-Mumbai Academics
PPT
Web based development
PPTX
Java tutorial part 4
PPTX
Java tutorial part 3
PPTX
Java tutorial part 2
PDF
Engineering
TXT
Project list
DOC
Personal authentication using 3 d finger geometry (synopsis)
DOC
Predictive job scheduling in a connection limited system using parallel genet...
DOC
Performance of a speculative transmission scheme for scheduling latency reduc...
DOC
Online index recommendations for high dimensional databases using query workl...
Non ieee java projects list
Non ieee dot net projects list
Spring ppt
Ejb notes
Java web programming
Java programming-examples
Hibernate tutorial
J2ee project lists:-Mumbai Academics
Web based development
Java tutorial part 4
Java tutorial part 3
Java tutorial part 2
Engineering
Project list
Personal authentication using 3 d finger geometry (synopsis)
Predictive job scheduling in a connection limited system using parallel genet...
Performance of a speculative transmission scheme for scheduling latency reduc...
Online index recommendations for high dimensional databases using query workl...

Recently uploaded (20)

PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
PDF
African Communication Research: A review
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
Climate Change and Its Global Impact.pptx
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
semiconductor packaging in vlsi design fab
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Farming Based Livelihood Systems English Notes
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
African Communication Research: A review
Journal of Dental Science - UDMY (2022).pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
Thinking Routines and Learning Engagements.pptx
Climate Change and Its Global Impact.pptx
Civil Department's presentation Your score increases as you pick a category
M.Tech in Aerospace Engineering | BIT Mesra
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
semiconductor packaging in vlsi design fab
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
faiz-khans about Radiotherapy Physics-02.pdf
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
Cambridge-Practice-Tests-for-IELTS-12.docx
Farming Based Livelihood Systems English Notes

Ieee java projects list

  • 1. PROJECT NAME DOMAIN 1. A Link-Based Cluster Ensemble Approach For Categorical Data Clustering Data Mining 2. A Semi-Automatic Approach for Extracting Software Product Lines Software Engineering 3. 1 Ensuring Distributed Accountability for Data Sharing in the Cloud Cloud Computing 4. Cooperative Provable Data Possession for Integrity Verification in Multi- Cloud Storage Cloud Computing 5. Cloud Data Protection for Masses Cloud Computing 6. Cloud Computing Security From Single to Multi-Clouds Cloud Computing 7. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing Cloud Computing 8. Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing 9. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks Cloud Computing 10. Slicing: A New Approach to Privacy Preserving Data Publishing Data Mining 11. Ranking Model Adaptation for Domain-Specific Search Data Mining 12. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition. Data Mining 13. Multiparty Access Control for Online Social Networks: model and mechanisms Data Mining 14. Organizing User Search Histories Data Mining 15. Clustering With Multi View Point – Based Similarity Measure Data Mining 16. Outsourced Similarity Search on Metric Data Assets Data Mining 17. Efficient Fuzzy Type – A Head Search In Xml Data Data Mining 18. Statistical Entity Extraction from Web Data Mining 19. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks Image Processing 20. Game-Theoretic Pricing for Video Streaming in Mobile Networks Mobile Computing 21. Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks Mobile Computing
  • 2. 22. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Mobile Computing 23. On Optimizing Overlay Topologies For Search In Unstructured Peer To Peer Networks Mobile Computing 24. Fast Data Collection in Tree-Based Wireless Sensor Networks Mobile Computing 25. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Mobile Computing 26. Learn to Personalized Image Search from the Photo Sharing Websites Multimedia 27. Packet Loss Control Using Tokens at the Network Edge Networking 28. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System Networking 29. Catching Packet Droppers and Modifiers in Wireless Sensor Networks Networking 30. Distributed Packet Buffers For High Band Width Switches & Routers Networking 31. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Networking 32. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks Networking 33. Latency Equalization as a New Network Service Primitive Networking 34. Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Networking 35. A Network Coding Equivalent Content Distribution Scheme For Efficient Peer To Peer Interactive Vod Streaming Parallel & Distributed Systems 36. Risk-Aware Mitigation for MANET Routing Attacks Secure Computing 37. Packet-Hiding Methods for Preventing Selective Jamming Attacks Secure Computing 38. Online Modeling of Proactive Moderation System for Auction Fraud Detection Secure Computing 39. Energy-Efficient Cooperative Distribution with Statistical QoS Provisions Video Over Wireless Networks Secure Computing 40. Modeling and Detection of Camouflaging Worm Secure Computing 41. Cut detection in wireless sensor networks Wireless Networks 42. Self-Interested Routing In Online Environment Wireless Networks 43. Secure And Practical Outsourcing Of Linear Programming In Cloud Computing Cloud Computing
  • 3. 44. Client-side Load Balancer using Cloud Cloud Computing 45. A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification Data Mining 46. Decision Trees for Uncertain Data Data Mining 47. Analysis on credit card fraud detection methods E-Commerce 48. Embedded Extended Visual Cryptography Schemes Secure Computing 49. Staying Connected in Mobile Healthcare System Mobile Computing 50. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Networking 51. Live Streaming With Receiver-Based Peer-Division Multiplexing Networking 52. Buffer Sizing in IEEE 802.11 networks Networking 53. Wireless Sensor Networks A Study on Congestion Wireless Networks 54. A Semi-Automatic Approach for Extracting Software Product Lines Software Engineering 55. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks Cloud Computing 56. Statistical Entity Extraction from Web Data Mining 57. A Study on Certificate Revocation in Mobile Ad Hoc Networks Mobile Computing 58. An Efficient Density based Improved K- Medoids Clustering algorithm Data Mining 59. An Efficient Paging Scheme for Terminal Mobility using Personal Mobility Management Information in Interworked Fixed and Mobile Networks Data Mining 60. Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Mobile Computing 61. Effective Navigation of Query Results Based on Concept Hierarchies Data Mining 62. Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration Networking 63. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Data Mining 64. Integration of Sound Signature in Graphical Password Authentication System Networking 65. Online Intrusion Alert Aggregation with Generative Data Stream Modeling Secure Computing 66. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Mobile Computing
  • 4. 67. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Data Mining 68. The CoQUOS Approach to Continuous Queries in Unstructured Overlays Data Mining 69. Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations Data Mining 70. Sketch4Match – Content-based Image Retrieval System Using Sketches Image Processing 71. Efficient Similarity Search over Encrypted Data 72.