Sei sulla pagina 1di 8

1.

A Geometric Approach to Improving Active Packet Loss Measurement


2. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor
3. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
4. Location Based Spatial Query Processing In Wireless Broadcast Environm
5. Modeling & Automated Containment of Worms
6. Benefit Based Data Caching In Ad Hoc Networks
7. Minimizing File Download Time in Stochastic Peer-to-Peer Networks
8. Rate & Delay Guarantees Provided By Close Packet Switches with Load B
9. Performance of a Speculative Transmission Scheme for Scheduling-Laten
10. QUIVER Consistent Object Sharing For Edge Services
11. Two Techniques for Fast Computation of Constrained Shortest Paths
12. A Precise Termination Condition of the Probabilistic Packet Marking Algo
13. An Efficient Association Rule Mining Algorithm In Distributed Databases
14. BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc N
15. Efficient and Secure Content Processing and Distribution by Cooperative
16. A Signature-Based Indexing Method for Efficient Content-Based Retrieva
17. Security in large Mediator Protocols
18. Securing User-Controlled Routing Infrastructures
19. Controlling IP Spoofing Through Inter Domain Packet Filters
20. Using the Using the Conceptual Cohesion of Classes for Fault Prediction
21. Two Techniques for Fast Computation of Constrained Shortest Paths
22. Protection of Database Security via Collaborative Inference Detection
23. Agent Based Intrusion Detection, Response and Blocking using signatur
24. Distributed Database Architecture for Global Roaming in Next-Generatio
25. Incremental deployment service of Hop by hop multicast routing protoc
26. Noise Reduction by Fuzzy Image Filtering
27. Novel Secure Communication Protocol for Ad Hoc networks
28. ODAM An Optimized Distributed Association Rule Mining Algorithm
29. Peer to Peer Messaging System
30. Predictive Job Scheduling in a Connection Limited System using Parallel
31. Structure and Texture Filling-In of Missing Image Blocks in Wireless Tran
32. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
33. Personal Authentication Using 3-D Finger Geometry
34. Evaluating the Vulnerability of Network Traffic Using Joint Security and R
35. OCGRR - A New Scheduling Algorithm for Differentiated Services Netwo
36. Efficient Packet Marking for Large-Scale IP Trace back

37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.

Capturing Router Congestion and Delay


Distributed cache updating for the Dynamic source routing protocol
Network Border Patrol Preventing Congestion Collapse
Application of BPCS Steganography to wavelet compressed video
Image Transformation using Grid
Image Transport Protocol ITP
XTC A Practical Topology Control Algorithm for Ad-Hoc Networks
ATM Networks and Intelligent Packet Filtering
An Acknowledgment-Based Approach For The Detection Of Routing Misb
Face Recognition Using Laplacianfaces
Online Handwritten Script Recognition
Retrieving Files Using Content Based Searching
Selective Encryption of Still Image
Mobile Agents In a Distributed Multimedia Database System
Virtual force based geometric routing protocol in MANET
ANGEL Enhancing the Utility of Generalization For Privacy Preserving Pu
Effects of Location Awareness on Concurrent Transmissions for Cognitive
One To Many Distribution Using Recursive Unicast Trees
Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage S
DEMONSTRATION OF SECURE SOCKET LAYER
COUPLING-BASED STRUCTURAL METRICS FOR MEASURING THE QUALI
Dynamic Load Balancing in Distributed Systems in the Presence of Dela
Face recognition for smart interactions
Spatio Temporal Network Anomaly Detection by Assessing Deviations of
Clustering and Sequential Pattern Mining of Online Collaborative Learnin
Dynamic Load Balancing in Distributed Systems in the presence of delay
Distributed Collaborative Key Agreement and Authentication Protocols fo
Multiple Routing Configurations for Fast IP Network Recovery
SAT- Solving Approaches to Context-Aware Enterprise Network Security
Controlling IP Spoofing through Inter domain Packet Filters
Gradient Vector Force - A new External Force for Snakes
Computation Efficient Multicast Key Distribution
A New, Efficiet Coordinated Checkpointing Protocol combined with Selec
A wireless Intrusion detection system and a new attack model
Three Party Authentication for key Distributed Protocol using Classical a
Re-Ordering Of Packets Using Retransmission Timer
IMPLEMENTATION OF BPCS-STEGANOGRAPHY

74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.

Mitigating Performance Degradation in Congested Sensor Networks


Truth Discovery with multiple Conflicting Information Providers on web
Constructing Inter-Domain Packet Filters to Control IP
Layered Approach Using Conditional Random Fields for Intrusion Detect
Online Index Recommendations for High-Dimensional Databases Using
Service Level Agreement based Grid Scheduling
Detection of Application Layer DDOS Attack using Hidden Semi Markov
Distributed cache updating for the Dynamic source routing protocol
Identification of Humans Using Gait
Continuous Monitoring of Spatial Queries in Wireless Broadcast
Energy-Efficient SINR-Based Routing for Multihop Wireless
EnergyMaps For Mobile Wireless networks coherence Time Versues Spre
Large Connectivity for Dynamic Random Geometric Graphs
Measuring Capacity Bandwidth of Targeted Path Segments
Mitigation OF Controll Channel Jamming Under Node Caputer Attacks
Mobility Management Approaches for Mobile IP Networks
Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
SIMPS Using Sociology for Personal Mobility
Data leakage detection (2010)

Dotnet IEEE Projects :-

1. Fuzzy Control Model Optimization for Behavior-Constant Traffic Routing U


2. Probabilistic Packet Marking For Large Scale IP Trace Back
3. Credit Card Fraud Detection Using Hidden Markov Models
4. Statistical Techniques for Detecting Traffic Anomalies through Packet Hea
5. Temporal Partioning of Communication Resources in an Integrated Archit
6. DIP Techniques for the Detection and Removal of Cracks in Digitized Pain
7. Workflow Mining Discovering Process Models from Event Logs
8. EFFICIENT APPROXIMATE QUERY PROCESSING IN PEER TO PEER NETWO
9. Digital Image Processing Techniques for the Detection and Removal of Cr
10. Neural Network for Unicode Optical Character Recognition
11. Localized Sensor Area Coverage With Low Communication Overhead
12. EFFICIENT RESOURCE ALLOCATION FOR WIRELESS MULTICAST
13. Active Learning Methods for Interactive Image Retrieval

14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.

Efficient Routing In Intermittently Connected Mobile Networks The Multi


Vision Based Processing For Real-Time 3-D Data Acquisition Based On C
Multiple Ant Colonies Optimization for Load Balancing in Distributed Sys
A Gen2-Based RFID Authentication Protocol for Security and Privacy
Energy Maps for Mobile Wireless Networks: Coherence Time versus Spr
Delay Analysis for Maximum Scheduling with flow control in wireless ne
A Tabu Searching Algorithm For Cluster Building in Wirless Sensor Netw
An Efficient Concept-based Mining Model for Enhancing Text Clustering
Strictly- Localized Construction of Near Optimal Power Spammers for W
Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks
Information Content-Based Sensor Selection & Transmission Power Adju
On the planning of Wireless Sensor Networks Energy efficient clustering
Random Cast An Energy efficient communications scheme for Mobile ad
Resequencing Analysis of Stop and Wait ARQ for Parallel Multichannel C
Route Stability in MANETS under the random direction mobility model
Secure and Policy Complaint Source Routing
Orthogonal Data Embedding for Binary Images in Morphological Transfo
Tabu Searching Algorithm For Cluster Building in Wirless Sensor Networ
Biased Random Walks in Uniform Wirless Networks
On the Planning of Wirless Sensor Networks Energy-Efficient Clustering
Explicit Load Balancing Technique for NGEO Satellite Ip Networks With O
Thresholds for Virus spread on networks
The Effectiveness of Checksums for Embedded Control Networks
Analysis of Shortest Path Routing for Larg Multi-Hop Wirless Networks
Cell Breathing Techniques for Load Balancing in Wirless LANs
Compaction of Schedules and a Two-Stage Approach for DuplicationLocal Construction of Near-Optimal Power Spanners for Wireless Ad Hoc
Performance of Orthogonal Fingerprinting Codes under Worst-Case Nois
PRESTO Feedback-Driven Data Management in Sensor Networks
Resource Allocation in OFDMA Wireless Communications Systems
Spread-Spectrum Watermarking Security
Novel secure communication mobile adhoc networks-2005
Unicode Optical Character Recognition using Artificial Neural Networks
Continuous Delivery Message Dissemination Problems under the Multica
Watermarking Relational Database Using Optimization Based Technique
A Novel Framework for Semantic Annotation and Personalized Retrieval
Estimation of Defects Based On Defect Decay Model ED3M

51.
52.
53.
54.

Hardware enhanced association rule mining with Hashing and Pipelining


HBA Distributed Metadata Management for Large Cluster-Based Storage
Rate Allocation & Network Lifetime Problem for Wireless Sensor Network
Trustworthy Computing Under Resource Constraints With The Down Poli

Core Java Project :1. Audio Video Conferencing


2. Chatting software
3. Chat Server
4. Charting
5. Communication Management Protocol
6. Communication System For Project Development
7. Download Accelarator
8. Desktop VideoConference
9. Group Communication
10. Human Face Identification
11. Imaginationz (similar to photoshop software)
12. Misuse Detection & Monitoring-ORACLE
13. office management system
14. Remote Network Administration
15. Secured Network Conferencing using VOIP
16. SNMP Simulator
17. Steganography
18. Text Editor
19. Tic Toe Game
20. Virtual Class room
21. Virtual Network Monitoring System
22. Exam Suite
23. File Compression (GZIP Algorithm)
24. File compression Huffman algorithm
25. Library Management System
26. Student Management System
27. Vehicle Management System
28. INTRANET CHATTING IN LAN NETWORK
29. A wireless Intrusion detection system and a new attack model
30. Banking systems
31. Image Compression and De-compression

32. Routing Simulator in Java


33. Desktop Sharing using authorized access to the remote system
34. Stock Agent - A Java stock market trading program
35. JFSecurity over stand-alone system using Rijndael algorithm for APTS
36. File Transfer Protocol Client
37. File Transfer Protocol Management
38. Network Proxy Server
39. Domain Name System Server
40. Interactive Classroom System
41. Communication System (java)
42. Digital Image Processing
43. FTP server & client
44. IMAP4 Protocol Implementation
45. Java Chat Systems
46. Layer 2 Forward Protocol implementation
47. Neural Network processing
48.POP3 Mail Filter
49. STEGNOGRAPHY
50. TCP Congestion Control Implementation
52. Video Conferencing
53. Web Application Security Assessor
54. Gover Lan Scanner
55. Coupling based metrics for measuring the quality of a software
56. Routing Simulator
57. Security in large Networks Using Mediator Protocols
58. CryptoSystems using RSA and DES Encryption
59. Data Packets Analyzer and Controller LAN
60. Image Stegnography
61. Video Stegnography
62. Multi User Chat System
63. Network Banking
64. Telephone Directory
65. AES Based Crypto Channel
66. Efficient Routing System
67. Secure Encryption System
68. Data Transmission Using Multi-Tasking-Sockets
69. Efficient Key Management For Threshold-Multi Signature In Distributed

70. INCREASING EFFICIENCYIN WIRELESS NETWORK


71. Active Source Routing Protocol For Mobile Networks
72. Distributed Cycle Minimization Protocol
73. College Attendance System
74. Congestion Control Using NETWORK BASED PROTOCOL
75. Client-Server Protocol Implementation
76. Effective Transmission of Data through RBPH for Group Communication
77. Empowering the RMI in Java Approach
78. Error Control System In Network Environment
79. Error Tracking System
80. Natural Language Processing
81. Image Enhancement Software
82. Java CHAT Systems
83. J-TEXTEDITOR
84. LAYER TO FORWARD PROTOCOL
85. LOAD BALANCING
86. Health Center Management system
87. NetSurey Simulation
88. NETWORK BORDER PATROL SELECTION
89. Network Proxy Server
90. Network Routing Simulator
91. Proposed Key Generation For Multimedia Application
92. SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY
93. Self-Interested Routing In Online Environments
94. Terminode remote routing
95. Video Conferencing System
96. Web Desk Authentication
97. Distributed Cycle Minimization Protocol
98. Bank Account Management Simulator
99. Chat Server system
100. Student Management System
101. Stegnography
102. Kerberos protocol Implementation
103. Network discovery and security analysis
Advanced Java Project :-

1. Activity Management System


2. Automated network administrator tool
3. Call Center Management
4. Corporate recruitment system
5. Customer Support Service Operations
6. Einsurance
7. FAQ-O-MATIC
8. Health Care system
9. Hiring techniques in corporate
10. Inspection Tool
11. integrated db browser
12. Integrated Business Information system
13. Matrimonial Site
14. Mobile Banking
15. Multi-Protocol browser
16. Online Education
17. Oraganization & automation
18. Performance Analyzer
19. ProjectTimeTracking
20. Patron management
21. ResultAnalysis
22. Vechile dealership management
23. Integrated db server
24. sidbi Bank Project
25. AdSense Effective online Advertisement System
26. Authorized category based Non-personal Internet Marketing
27. Category wised Online Knowledge Transfer with FAQs
28. Construction Plus
29. Cyber Space Management System
30. Document Management Versioning System
31. Effective online Network Information Service
32. E-learning and Evalution performance system
33. e-Property cafeteria
34. GOVERNMENT POLYTECHNIC COLLEGE DESK
35. hiding sensitive association rules
36. Hybrid Integrated System For Merchandises Management Over Network

Potrebbero piacerti anche