Java non ieee project titles 2014-2015

7
Software Training & Development, IEEE Projects and Research Division JAVA NON-IEEE PROJECTS 1. A Geometric Approach to Improving ActivePacket Loss Measurement 2. A new architecture of online trading platform based on cloud computing 3. A precise termination condition the probabilistic packet marking algorithm 4. A SCALABLE OVERLAY MULTICAST ARCHITECTURE FOR LARGE SCALE APPLICATION 5. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns 6. ACTIVE MASK SEGMENTATION OF FLUORESCENCE MICROSCOPE IMAGES 7. ACTIVE SOURCE ROUTING PROTOCOL FOR NETWORK 8. Adaptive Join Operators for Result RateOptimization on Streaming Inputs 9. AN ADAPTIVE PROGRAMMING MODEL FOR FAULT TOLERANT DISTRIBUTED COMPUTING 10. An suitable programming model for error Control in network environment. 11. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks. 12. BinRank: Scaling Dynamic Authority-Based Search Using Materialized Sub graphs 13. CONSTRAINED DIMENSIONALITY REDUCTION USING A MIXED NORM PENALTY WITH NEURAL NETWORKS No 22A 2 nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018 Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Transcript of Java non ieee project titles 2014-2015

Page 1: Java non ieee project titles 2014-2015

Software Training & Development, IEEE Projects and Research Division

JAVA NON-IEEE PROJECTS

1. A Geometric Approach to Improving ActivePacket Loss Measurement

2. A new architecture of online trading platform based on cloud computing

3. A precise termination condition the probabilistic packet marking algorithm

4. A SCALABLE OVERLAY MULTICAST ARCHITECTURE FOR LARGE SCALE APPLICATION

5. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative

Temporal Patterns

6. ACTIVE MASK SEGMENTATION OF FLUORESCENCE MICROSCOPE IMAGES

7. ACTIVE SOURCE ROUTING PROTOCOL FOR NETWORK

8. Adaptive Join Operators for Result RateOptimization on Streaming Inputs

9. AN ADAPTIVE PROGRAMMING MODEL FOR FAULT TOLERANT DISTRIBUTED

COMPUTING

10. An suitable programming model for error

Control in network environment.

11. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks.

12. BinRank: Scaling Dynamic Authority-Based Search Using Materialized Sub graphs

13. CONSTRAINED DIMENSIONALITY REDUCTION USING A MIXED NORM PENALTY

WITH NEURAL NETWORKS No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Page 2: Java non ieee project titles 2014-2015

14. Constructing Inter-Domain Packet Filters to Control IPSpoofing Based on BGP

Updates

15. C-TREND: Temporal Cluster Graphs for Identifying and Visualizing

Trends in Multi-attribute Transactional Data

16. DATA SECLUSION IN AUDIO FILE

17. Decentralized QoS-Aware Check pointing Arrangement in Mobile Grid Computing

18. DES ALGORITHM

19. Detecting Malicious Packet Losses

20. DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION

PROTOCOL FOR DYNAMIC PEER GROUPS

21. DYNAMIC LOAD BALANCING FOR THE DISTRIBUTED MINING OF MULTILEVEL

AND LOCATION AWARE SERVICE PATTERNS

22. DYNAMIC PARALLEL ACCESS

23. DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER TO PEER NETWORK

24. Effective key generation for multimedia and web application

25. Efficient and Secure Content Processing

and Distribution by Cooperative Intermediaries

26. E-Mail Server

27. ENHANCING FAST FRACTAL IMAGE COMPRESSION USING ENTROPHY

28. Evaluating the Efficacy of Forward Error Correction Coding

29. FACE RECOGNITION USING LAPLACIAN FACES No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Page 3: Java non ieee project titles 2014-2015

30. File sharing in Hybrid model based P2P Systems Forthe Expected High Churn

31. FLEXIBLE ROLLBACK RECOVERY IN DYNAMIC HETEROGENEOUS GRID

COMPUTING

32. Geo Spacial Matching for Image Retrieval.

33. Harnessing The Cloud For Securely Outsourcing Large Scale Systems of Linear

EquationsHiding Sensitive Association RulesWith Limited Side Effects

34. IDE JAVA CODE GENERATION

35. IMPLEMENTATION OF BPCS-STEGANOGRAPHY

36. Implementing Multicast Distribution through Recursive Unicast Trees

37. IMPROVING SERVER PERFORMANCE USING

38. LOAD DISTRIBUTION ANDCONTENT SERVICES

39. Incremental Learning of Chunk Data for Online Pattern Classification Systems

40. Incremental Learning of Chunk Data for Online Pattern Classification Systems

41. INTRANET BASED SECURITY SYSTEM FOR

42. DOMAIN NAME SERVER

43. INTRUSION DETECTION IN HOMOGENEOUS AND HETEROGENEOUS WIRELESS

SENSOR NETWORK

44. INTRUSION DETECTION

45. JAVA MUSICIAN USING JAVA SOUND API

46. LIVE VIDEO BROADCASTING USING REAL TIME TRANSMISSION PROTOCOL

No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Page 4: Java non ieee project titles 2014-2015

47. Load balancing algorithms in non-blocking multistage packet switches

48. LOAD BALANCING SERVER

49. Location-Based Spatial Query Processing in Wireless Broadcast Environments

50. LOGARITHMIC STORE CARRY FORWARD ROUTING FOR NETWORKS

51. Many-to-One Throughput Capacity of IEEE802.11 Multihop Wireless Networks

52. Minimizing File Download Time in Stochastic Peer-to-Peer Networks

53. MITIGATING PERFORMANCE DEGRADATION IN

54. CONGESTED SENSORNETWORKS

55. Modeling and Automated Containment of Worms

56. Modeling and AutomatedContainment of Worms

57. NDT: A Model-Driven ApproachFor Web Requirements

58. NETWORK BANDWIDTH PREDICTOR SYSTEM

59. Online Index Recommendations for High-Dimensional Databases Using Query

Workloads

60. OPTIMAL JAMMING ATTACK STRATEGIES AND NETWORK DEFENSE POLICIES IN

WIRELESS SENSOR NETWORKS

61. Path Diversity over Packet Switched Networks:

62. Performance Analysis and Rate Allocation

63. PATTERN RECOGNITION USING JAVA

64. PayPal Integration for a website

No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Page 5: Java non ieee project titles 2014-2015

65. Problem Oriented Software EngineeringSolving the Package Router Control Problem

66. PROXY SERVER FOR FASTER INTERNET ACCESS

67. A Puzzle-Based Defense Strategy AgainstFlooding Attacks Using Game Theory

68. Security in Large Networks Using Mediator Protocols

69. Quiver: Consistent Object Sharing for Edge Services

70. Load balancing algorithms in non-blocking multistage packet switches

71. Remote Network Monitoring

72. Route Reservation in Inter Networks

73. SCATTERED SYSTEM FOR AIRCRAFT MAINTENANCE

74. SEARCH TOOL FOR INTRANET FRAMEWORK

75. Secure Data Objects Replication in Data Grid

76. SECURE MULTISIGNATURE

77. GENERATION FOR GROUP COMMUNICATION

78. Secured Distributed Key Management for Threshold-Multisignature using

Cryptography

79. An Integrated Framework for Security and Dependability

80. SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY

81. Sequential Object Sharing for Edge Services

82. Simple Search Engine

No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Page 6: Java non ieee project titles 2014-2015

83. Stegnography – Bit shift Encrypting and Embedding

84. Testing of java program based on cohesion

85. TIMED RELEASE CRYPTOSYSTEM

86. TOOLS FOR BUG TRACKING AND SYSTEMANALYSIS

87. TOWARD PUBLICLY AUDITABLE SECURE CLOUD DATA STORAGE SERVICES

88. TWO SERVER AUTHENTICATION SYSTEM

89. Two Techniques for Fast Computation ofConstrained Shortest Paths

90. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented

Systems

91. WRONG METHOD CALL IDENTIFIER

92. Congestion Control Using NBP

93. Client Server Protocol Implementation

94. Data Transmission Using Multi-Tasking-Sockets

95. Dynamic Load Balancing in Distributed Systems in the Presence of Delays

96. Routing Simulater

No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]

Page 7: Java non ieee project titles 2014-2015

83. Stegnography – Bit shift Encrypting and Embedding

84. Testing of java program based on cohesion

85. TIMED RELEASE CRYPTOSYSTEM

86. TOOLS FOR BUG TRACKING AND SYSTEMANALYSIS

87. TOWARD PUBLICLY AUDITABLE SECURE CLOUD DATA STORAGE SERVICES

88. TWO SERVER AUTHENTICATION SYSTEM

89. Two Techniques for Fast Computation ofConstrained Shortest Paths

90. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented

Systems

91. WRONG METHOD CALL IDENTIFIER

92. Congestion Control Using NBP

93. Client Server Protocol Implementation

94. Data Transmission Using Multi-Tasking-Sockets

95. Dynamic Load Balancing in Distributed Systems in the Presence of Delays

96. Routing Simulater

No 22A 2nd floor ,Sakthinagar (OPP)Daily market Tirupattur-635601 Vellore –DT

Head Office:NO:1 , Rams Complex, Natesan st, T.Nagar, Chennai-600018

Cell: 09841653050,04179-228050 visit: www.xtreamtechnology.net Mail to:[email protected]