Java Available Projects (IEEE)

Welcome to Available 2007, 2008, 2009, 2010, 2011,2012 and 2013 Java based projects.

Contact us for buying single / bulk java projects.

  1. A Clustering Algorithm For Data Mining Based On Swarm Intelligence
  2. A Competitive Study of Cryptography Techniques over Block Cipher
  3. A Competitive Study of Cryptography Techniques
  4. A Decentralized Service Discovery
  5. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
  6. A Distributed Control Law for Load Balancing in Content Delivery Networks
  7. A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
  8. A Dual Framework and Algorithms for Targeted Online Data Delivery
  9. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks
  10. A Fast Cluster ing-Based Feature Subset Selection Algor ithm for High Dimensional Data
  11. A Framework for an Adaptive Intrusion Detection System
  12. A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification
  13. A Gaussian Derivative Based Version Of Jpeg For Image Compression and Decompression
  14. A Generic multilevel architecture for time series prediction
  15. A Genetic Programing Approach to Record Duplicaton
  16. A Geometric Approach To Improving Active Packet Loss Measurement
  17. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
  18. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
  19. A machine learning approach for identifying disease-treatment relations in short texts
  20. A Memory Learning Framework for Effective Image Retrieval
  21. A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Los
  22. A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
  23. A New Algorithm for Inferring User Search Goals with Feedback Sessions
  24. A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
  25. A New Operational Transformation Framework for Real-Time Group Editors
  26. A Novel Association Rule Mining Mechanism in Wireless Sensor Networks
  27. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
  28. A Permutation Based Algorithm to Optimally Reschedule Trains in a Railway Traffic Network
  29. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
  30. A Precise Termination Condition Of The Probabiistic Packet Marking Algorithm
  31. A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
  32. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
  33. A Review of the Applications of Agent Technology In Traffic and Transportation Systems-Project
  34. A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
  35. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
  36. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
  37. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
  38. A Semantically Enriched Clinical Guideline
  39. A Signature based indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns
  40. A Stochastic Approach To Image Retrieval Using Relevance Feedback And Particle Swarm Optimization
  41. A Stochastic Model to Investigate Data
  42. A Survey of Payment Card Industry Data Security Standard
  43. A System to Filter Unwanted Messages from OSN User Walls
  44. A Trigger Identification Service For Defending Reactive Jammers In Wireless Sensor Network
  45. Access Policy Consolidation For Event Processing Systems
  46. Achieving Network Level Privacy in Wireless Sensor Networks
  47. Active Source Routing Protocol For Mobile Networks
  48. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
  49. Adaptive QoS for Mobile Web Services Through Cross Layer Communication
  50. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
  51. Always Acyclic Distributed Path Computation
  52. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
  53. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
  54. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net
  55. An Efficient and secure self organized key mamnagement
  56. An Efficient Association Rule Mining Algorithm In Distributed Databases
  57. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
  58. An Efficient Paging Scheme for Terminal Mobility Using Personal Mobility Management Information in Interworked Fixed and Mobile Networks
  59. An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay- Based IEEE 802.16 Networks
  60. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
  61. Analysis on Credit Card Fraud Detection Methods
  62. ANEW Aalgorithm
  63. Application of BPCS steganography to wavelet compressed video
  64. Architecting a Secure Enterprise Data Sharing Environment to the Edge
  65. Attribute-Based Encryption With Verifiable
  66. Audio Cryptography System
  67. Authorization Recycling In Distributed Systems through Discovery Service
  68. Automatic Database Schema Generation
  69. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
  70. Automatic Discovery of Association
  71. Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks
  72. Back End Communication Management System in Distributed Network
  73. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
  74. Bandwidth Recycling in IEEE 802.16 Networks
  75. BINRANK Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs
  76. Buffer Sizing for 802.11 Based Networks
  77. Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
  78. Call-Stack Coverage for GUI Test Suite Reduction
  79. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  80. Capturing Router Congestion and Delay
  81. Carving and Replaying Differential Unit Test Cases from System Test Cases
  82. Catching Packet Droppers and Modifiers in Wireless Sensor Networks
  83. CCD A Distributed Publish OR Subscribe Framework for Rich Content Formats
  84. Client Side Load Balancer using Cloud
  85. CLOSENESS A New Privacy Measure for Data Publishing
  86. Cloud Computing for agent Based Urban Transportation systems
  87. Cloud Data Protection for the Masses
  88. CloudMoV Cloud-based Mobile Social TV
  89. Cloud Computing Security
  90. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
  91. Clustering with Multi-Viewpoint based Similarity Measure
  92. Super Resolution based Inpainting
  93. Collaboration in Multicloud
  94. collaborative filtering using dual information sources
  95. College Attendance System
  96. Colleges and Students Information System
  97. Comparable Entity Mining from Comparative Questions
  98. Computation-efficient Multicast Key Distribution
  99. Conditional Shortest Path Routing In Delay Tolerant Networks
  100. Confucius A Tool Supporting Collaborative Scientific Workflow Composition
  101. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
  102. Continuous Data Protection using struts frame work
  103. Continuous Monitoring of Spatial Queries in Wireless Broadcast
  104. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation
  105. Cooperative Provable Data Possession for Integrity Veri fication in Multi-Cloud Storage
  106. Costing of Cloud Computing Services A Total Cost of Ownership Approach
  107. Coupling-Based Structural Metrics for Measuring the Quality of Software
  108. Cross-Layer Design for Wireless Networks
  109. Crowd sourcing Predictors of Behavioral Outcomes
  110. Cryptographic Versus Trust-Based Method For Manet Routing Security
  111. Cut Detection in Wireless Sensor Networks
  112. Data Leakage Detection
  113. DECOR A Method for the Specification and Detection of Code and Design Smells
  114. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
  115. Delay Analysis and Optimality of Scheduling
  116. Delay-Based Network Utility Maximization
  117. Demonstration of Secure Socket Layer
  118. Design a Guard System for Sybil Attack
  119. Design and Implementation of TARF  A Trust-Aware Routing Framework for WSNs
  120. Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks
  121. Designing Less-Structured P2P Systems
  122. Detecting Malicious Packet Losses
  123. Detecting Spam Zombies
  124. Detection of Routing Misbehavior in MANETs
  125. Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
  126. Discovering Conditional Functional Dependencies
  127. Distributed Cache Updating for Dynamic Source Routing(DSR) Protocol
  128. Distributed Collaborative Key Agreement And Authentication Protocols For Dynamic Peer Groups
  129. Distributed Cooperative Caching In Social Wireless Networks
  130. Distributed E-Health Care System Using SOA Service-Oriented Distributed Data Mining
  131. Distributed Packet Buffers for High-Bandwidth Switches and Routers
  132. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
  133. Diverse firewall design
  134. Domain name service system with secured manner
  135. Double Guard Detecting Intrusions in Multitier Web Applications
  136. Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
  137. Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
  138. Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries
  139. Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach
  140. Dynamic MallWare Spread in Decentralized P2P System
  141. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
  142. Dynamic Routing with Security Considerations
  143. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
  144. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
  145. E-fraud Prevention Based N The Self-authentication Of E-documents
  146. Effective Navigation of Query Results Based on Concept Hierarchies
  147. Effective Navigation
  148. Effective Pattern Discovery for Text Mining
  149. Effective Software Merging in the Presence of Object-Oriented Refactorings
  150. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
  151. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
  152. Efficient Approximate Query Processing In Peer-to-Peer Networks
  153. Efficient Broadcasting in Mobile Ad Hoc Networks
  154. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
  155. Efficient Error Estimating Coding Feasibility and Applications
  156. Efficient Fuzzy Type-Ahead Search in XML Data
  157. Efficient key Agreement for Large and Dynamic Multicast Groups
  158. Efficient Key Management For Threshold-Multi Signature In Distributed System
  159. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
  160. Efficient Multi-Dimensional Suppression for K-Anonymity
  161. Efficient Processing of Metric Skyline Queries
  162. Embedded Extended Visual Cryptography Schemes
  163. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  164. Encrypted Marking Based Detection And Filtering (EMDAF)
  165. Energy Efficient Cooperative Video
  166. Energy Efficient System
  167. Energy-Efficient Cooperative Video distribution with Statistical QOS provisions over Wireless Networks
  168. Energy-Efficient SINR-Based Routing for Multihop Wireless Networks
  169. EnergyMaps For Mobile Wireless networks coherence Time Versues Spreding Period
  170. Engineering Privacy
  171. Enhanced Ant Algorithm Based Load Balanced Task Scheduling In Grid Computing
  172. Enhancing Search Performance in Unstructured P2P Networks Based on Users Common Interest
  173. Ensuring Data Storage Security in Cloud Computing
  174. Ensuring Distributed Accountability for Data Sharing in the Cloud
  175. Enterprise Collaboration Tool Project
  176. Error Control System In Network Environment
  177. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
  178. Estimation of Defects Based on Defect Decay Model ED3M
  179. Evaluating the Efficacy of Forward Error Correction Coding
  180. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
  181. Evaluation of Accuracy in design pattern occurence detection
  182. Evaluation of User Behavior trust in cloud computing
  183. Extended Boolean Retrieval
  184. Extended XML Tree Pattern Matching Theories and Algorithms
  185. Extracting Actionable Knowledge From Decission Trees
  186. Extracting Spread-Spectrum Hidden Data from Digital Media
  187. Face Recognition For Smart Recognitions
  188. Face Recognition Using Laplacianfaces
  189. Facial Expression Recognition Using Facial Movement Features
  190. Facilitating Effective User Navigation through Website Structure Improvement
  191. FADE Secure Overlay Cloud Storage with File Assured Deletion
  192. Fast Data Collection in Tree-Based Wireless Sensor Networks
  193. Fast Rendering Algorithm of Underwater Optical Effect
  194. Fast Transmission to Remote Cooperative Groups
  195. Fault Tolerant Scheduling for Hard Real Time Tasks in Uniprocessor System
  196. FEBA A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks
  197. Filtering Unwanted Packets On Atm Network
  198. Fingerprint Authentication System
  199. Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing
  200. FoCUS Learning to Crawl Web Forums
  201. Fog Computing Mitigating Insider Data Theft Attacks in the Cloud
  202. Footprint Detecting Sybil Attacks in Urban Vehicular Networks
  203. Fully Anonymous Profile Matching In Mobile Social Networks
  204. Fuzzy Keyword Search over Encrypted Data in Cloud Computing
  205. Game-Theoretic Pricing for Video Streaming in Mobile Networks
  206. Genetic Algorithm Based Train Simulation using Concurrent Engneering
  207. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
  208. Geographical Routing With Location Service in Intermittently Connected MANETs
  209. GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
  210. GLIP A Concurrency Control Protocol for Clipping Indexing
  211. Going Back and Forth Efficient Multideployment and Multisnapshotting on Clouds
  212. Grid Scheduling based on Collaborative Random Early Detection Strategies
  213. Handling Selfishness in Replica Allocation
  214. Handwritten Chinese Text Recognition by Integrating Multiple Contexts
  215. Harnessing the Cloud for Securely Outsourcing
  216. HASBE A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption Decryption in Cloud Computing
  217. HASBE Access Control in Cloud Computing
  218. Hiding Data Distribution in outsourced Archival Databases
  219. HIDS Intrusion Detection System Over Abnormal Internet Sequence
  220. Homogenous Network Control and Implementation
  221. Horizontal aggregation in SQL to prepare data sets for data mining analysis
  222. Host-to-Host Congestion Control for TCP
  223. How Software Developers Use Tagging to Support Reminding and Refinding
  224. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HID)
  225. Hybrid Scheduling Of Dynamic Task Graphs With Selective Duplication For Multiprocessors Under Memory And Time Constraints
  226. Identification of Humans Using Gait
  227. Identity-Based Secure Distributed Data Storage
  228. Image Authentication Over Wireless Channels
  229. IMine Mining Association Rules with Item Constraints
  230. Implementing Multicast Distribution through Recursive Unicast Trees
  231. Implementing security across the networks with Quantum key distribution protocol
  232. Improving Utilization of Infrastructure Clouds
  233. Incentive Compatible Privacy-Preserving Data Analysis
  234. Increasing efficiency in wireless networks using bandwidth routing protocol
  235. Intrusion detection An Energy efficient approach in Heterogeneous WSN
  236. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
  237. Intrusion Detection System Over Abnormal Internet Sequence
  238. IP Fast Reroute Framework
  239. ITP An Image Transport Protocol for the Internet
  240. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
  241. Java Grid Done Using Grid Computing
  242. Java Program Invention With User Integrated Developed Environment
  243. Robust video data hiding using forbidden data hiding
  244. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
  245. KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
  246. Large Connectivity for Dynamic Random Geometric Graphs
  247. Latency Equalization as a New Network Service
  248. Layered Approach Using Conditional Random Fields for Intrusion Detection
  249. Learn to Personalized Image Search from the Photo Sharing Websites
  250. Live Streaming with Receiver-based Peer-division Multiplexing
  251. Load Rebalancing for Distributed File Systems in Clouds
  252. Load-Balancing Multipath. Switching System with Flow Slice
  253. Location Aided Routing In Mobile Adhoc Networks
  254. Location Based Routing For Distance Nodes
  255. Location Based Spatial Query Processing In Wireless Broadcast Environments
  256. Low Latency And Energy Efficient Routing Protocols For Wireless Sensor Networks
  257. M-Privacy for Collaborative Data Publishing
  258. Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks
  259. Maximizing The Number Of Broadcast Operations In Random Geometric Adhoc Wireless Networks
  260. Measuring Capacity Bandwidth of Targeted Path Segments
  261. Message Authentication In Computationally Constrained Environments
  262. Minimizing Delay and Maximizing Lifetime for Wireless sensor Networks with Anycast
  263. Minimizing File Download Time in Stochastic Peer-to-Peer Networks
  264. Mining Contract S For Business Event And Temporal Constraints In Service Engagement
  265. Mitigating Denial-of-Service Attacks on the Chord Overlay Network A Location Hiding Approach
  266. Mitigating Performance Degradation in congested sensor networks
  267. Mitigating selective forwarding attacks with a channel-aware approach in WMNS
  268. Mitigation of Control Channel Jamming under Node Capture Attacks
  269. Mobile Agents In_a_Distributed Multimedia Dabase System
  270. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
  271. Mobile Sampling of Sensor Field Data Using Controlled Broadcast
  272. Mobility Management Approaches for Mobile IP Networks Performance Comparison and Use Recommendations
  273. Modeling & Automated Containment of Worms
  274. Modeling and Detection of Camouflaging Worm
  275. Monitoring Online tests thru data visualisation
  276. Monitoring patients via a secure and mobile healthcare system
  277. Monitoring The Aplication Layer DDOS Attacks
  278. Monitoring the Application-Layer DDoS Attacks for Popular Websites
  279. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
  280. Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
  281. Multiparty Access Control For Online Social Networks Model And Mechanisms
  282. Multipath Dissemination in Regular Mesh Topologies
  283. Multiple Routing Configurations for Fast IP Network Recovery
  284. Network Component for Xml Migration
  285. Network Load Balancing
  286. Network Border Patrol Preventing Congestion Collapse
  287. NICE Network Intrusion Detection and Countermeasure
  288. Noise Reduction by Fuzzy Image Filtering
  289. Nymble Blocking Misbehaving Users in Anonymizing Networks
  290. OCGR A New Scheduling Algorithm for Differentiated Services Networks
  291. ODAM An Optimized Distributed Association Rule Mining Algorithm
  292. On Event-Based Middle ware for Location-Aware Mobile Applications
  293. On Modeling Analysis and Optimization of Packet Aggregation Systems
  294. On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
  295. On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System
  296. On the Impact of Security Protocols on the Performance of SNMP
  297. On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
  298. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
  299. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
  300. Online Intrusion Alert Aggregation For Data Streaming Modeling Final Source Code
  301. Online Modeling of Proactive Moderation System for Auction Fraud Detection
  302. Open Smart Classroom Extensible and Salable Learning System in Smart Space Using Web Service Technology
  303. Optical Character Recognition on a Grid Infrastructure
  304. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  305. Optimal Client-Server Assignment for Internet
  306. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
  307. Optimal Power Allocation in Multi-Relay
  308. Optimal service pricing for a cloud cache
  309. Optimized Resource Allocation for Software Release Planning
  310. Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization
  311. Organizing User Search Histories
  312. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
  313. Packet Loss Control Using Tokens at the Network Edge
  314. Packet-Hiding Methods for Preventing Selective Jamming Attacks
  315. PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
  316. PCA-Based Spatially Adaptive Denoising of CFA Images for Single-Sensor Digital Cameras
  317. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
  318. Personal Authentication Using 3-D Finger Geometry
  319. Pharmacy Management System
  320. Learn to Personalized Image Search from the Photo Sharing Websites
  321. PMSE A Personalized Mobile Search Engine
  322. Policy-by-Example for Online Social Networks
  323. POPI A User-level Tool for Inferring Router Packet Forwarding Priority
  324. Portable Cloud Services Using TOSCA (2012)
  325. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
  326. Preventing Private Information Inference Attacks
  327. Price Differentiation for Communication Networks
  328. Privacy Preserving Data Sharing With Anonymous ID Assignment
  329. Privacy Preserving Delegated Access Control
  330. Privacy-Preserving Distributed Profile Matching In Proximity-Based Mobile Social Networks
  331. Privacy-Preserving Public Auditing for Secure Cloud Storage
  332. ProgME Towards Programmable Network Measurement
  333. Progressive Parametric Query Optimization
  334. QUIVER Consistent object Sharing for Edge Services
  335. Random Access Transport Capacity
  336. Randomized Protocols for Duplicate Elimination in Peer-to Peer Storage Systems
  337. Ranked Reverse nearest Neighbor Search
  338. Ranking Model Adaptation for Domain-Specific Search
  339. Ranking Spatial Data by Quality Preferences
  340. Re-Ordering Of Packets Using Retransmission Timer
  341. Reliable And Energy-Efficient Multipath Communications In Underwater Sensor Networks
  342. Reliable Re-encryption in Unreliable Clouds
  343. Remote Approach for Effective Task Execution and Data Accessing Tool
  344. Remote System Access By Using VN
  345. Research on Ontology-based Representation and Retrieval of Components
  346. Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
  347. Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation
  348. Retrieving Files Using Content Based Searching and Presenting It in Carousel View
  349. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
  350. RIHT A Novel Hybrid IP Traceback Scheme
  351. Risk-Aware Mitigation for MANET Routing Attacks
  352. Robust Face-Name Graph Matching for Movie
  353. Robust Module Based Data Management
  354. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
  355. Route Reservation in Ad Hoc Wireless Networks
  356. SaaAS
  357. SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
  358. SATA Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
  359. Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
  360. Scalable and Secure Sharing of Personal Health Records
  361. Secure and Practical Outsourcing of Linear
  362. secure communication for next generation internet
  363. Secure Communications Over Wireless Broadcast Networks Stability and Utility Maximization
  364. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
  365. Secure Encryption System
  366. Secure Socket Layer Protocol Simulation
  367. Secureand Practical Outsourcing of Linear Programming in Cloud Computing
  368. Secured Architecture for Remote Virtual Desktops
  369. Secured Distributed Key Management for Threshold-Multisignature using Cryptography-
  370. Securing User-Controlled Routing Infrastructures
  371. Security Analysis of a Single Sign-On Mechanism
  372. Security Analysis of the SASI Protocol
  373. Security in large Mediator Protocols
  374. Security in Large Networks Using Mediator Protocols
  375. Security of web forms
  376. Security System for DNS using Cryptography
  377. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
  378. Self Adaptive Contention Aware Routing
  379. Selfish Overlay Network Creation and Maintenance
  380. Sensitive Label Privacy Protection on Social Network Data
  381. SigFree A Signature-free Buffer Overflow Attack Blocker
  382. SIMPS Using Sociology for Personal Mobility
  383. Simulation of Handoff Techniques in Mobile Cellular Networks
  384. Sketch4Match – Content-based Image Retrieval System Using Sketches
  385. Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks(2012)
  386. Slicing A New Approach to Privacy Preserving Data Publishing
  387. Social Cloud Computing A Vision for Socially Motivated Resource Sharing
  388. Software as A Agent Service
  389. Spam Collection and Detection System
  390. SparkClouds Visualizing Trends in Tag Clouds
  391. Spatial Approximate String Search
  392. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
  393. Speculative Transmission for Latency Reduction
  394. SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
  395. Spread Node Relocation by effective tolerant Process
  396. Stateless Multicasting In MANETs
  397. Statistical Entity Extraction from Web
  398. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compress
  399. Subspace-Based Striping Noise Reduction in Hyperspectral Images
  400. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks1
  401. Techniques For A Selective Encryption Of Uncompressed And Compressed Images
  402. Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations
  403. Temporal Partitioning of Communication Resources in an Integrated Architecture
  404. The CoQUOS Approach to Continuous Queries
  405. The District Medical Data Center Based on Cloud
  406. The Security Of Cloud Computing System Enabled By Trusted Computing Technology
  407. Three Party Authentication For Key Distributed Protocol Using Classical And Quantum Cryptography
  408. Throughput Optimization in Mobile Backbone Networks
  409. Toward publicly auditable secure cloud data storage services
  410. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
  411. Toward Secure and Dependable Storage Services in Cloud Computing
  412. Towards A Statistical Framework For Source Anonymity In Sensor Networks
  413. Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
  414. Towards Secure And Dependable
  415. Towards Superhuman Speech Recognition
  416. Trust modeling in social tagging of multimedia content
  417. Truth Discovery with Multiple Conflicting Information Providers on the Web
  418. Two tales of privacy in online social networks
  419. Two Techniques for Fast Computation of Constrained Shortest Paths
  420. Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks
  421. Using Fuzzy Logic Control to Provide
  422. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
  423. Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
  424. Vampire attacks Draining life from wireless ad-hoc sensor networks
  425. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks
  426. Verification and Trade-Off Analysis of Security Properties in UML System Models
  427. Wardrop Routing in wireless networks
  428. Winds of Change from Vendor Lock-In to the Meta Cloud
  429. Wireless Sensor Networks A Study on Congestion
  430. XTC A Practical Topology Control Algorithm for Ad-Hoc Networks
  431. Zero knowledge protocol for WSN’s

15 Replies to “Java Available Projects (IEEE)”

  1. i want a real time project with source code made on javafx,scenebuilder,jsp,jsf and core java.please send me in my mail.

  2. Sir,
    I need a source code for Intrusion Detection System using Decision Tree algorithm.
    I am in dire need of it.
    So, if its possible then can you mail me the source code?

    Thanking you

  3. sir, please send me a whole project of
    36.A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

  4. i want secure user controlled routing infrastructure project in java source code and full project report plz send me its urgent

  5. I want a project “A Competitive Study of Cryptography Techniques over Block Cipher” injava source code full project.

  6. I need source code of fast clustering based feature subset selection algorithm for high dimensional data on my email.So plz send it.

Leave a Reply

Your email address will not be published. Required fields are marked *