You are on page 1of 3

Mr.Venkatsai 9642222622 www.3tinfotech.

co

JAVA IEEE PROJECTS LIST:

S No

Title Of The Project 1 Cloud Data Protection for the Masses 2 Efficient Fuzzy Type-Ahead Search in XML Data Ensuring distributed accountability for data sharing in the 3 cloud Footprint Detecting Sybil Attacks in Urban Vehicular 4 Networks Handwritten Chinese Text Recognition by Integrating 5 Multiple Contexts Learn to Personalized Image Search from the Photo Sharing 6 Websites Multiparty access control for online social networks: model 7 and mechanisms On Optimizing Overlay Topologies for Search in 8 Unstructured Peer-to-Peer Networks Online Modeling of Proactive Moderation System for 9 Auction Fraud Detection Packet-Hiding Methods for Preventing Selective

Domain Cloud Computing Knowledge & Data Engineering Secure Computing

Year 2012 2012 2012

Parallel And Distributed Pattern Analysis & Machine Intelligence Multimedia & Image Processing Knowledge & Data Engineering Parallel And Distributed

2012

2012

2012

2012

2012

Network security

2012

10 Jamming Attacks 11
RANKING MODEL ADAPTATION FOR DOMAIN-SPECIFIC SEARCH

Secure Computing Knowledge & Data Engineering Secure Computing Knowledge & Data Engineering Image Processing Networking Mobile Computing Networking

2012

2012 2012 2012 2012 2012 2012 2012

12 Risk-Aware Mitigation For MANET routing attacks Slicing: A New Approach to Privacy PreservingData 13 Publishing 14 Ttrust modeling in social tagging of multimedia content 15 Adaptive Opportunistic Routing for Wireless Ad Hoc N/ws Handling Selfishness in Replica Allocation over a Mobile Ad 16 Hoc Network 17 Latency Equalization as a New Network Service Primitive

Mr.Venkatsai 9642222622 www.3tinfotech.co

Vehicle Detection in Aerial Surveillance Using Dynamic 18 Bayesian Networks Toward Reliable Data Delivery for Highly Dynamic Mobile 19 Ad Hoc Networks 20 Organizing User Search Histories 21 Packet Loss Control Using Tokens at the Network Edge 22 BibPro: A Citation Parser Based on Sequence Alignment A Gossip Protocol for Dynamic Resource Management in 23 Large Cloud Environments A Secure Erasure Code-Based Cloud Storage System with 24 Secure Data Forwarding HASBE: A Hierarchical Attribute-Based Solution for 25 Flexible and Scalable Access Control in Cloud Computing Self Adaptive Contention Aware Routing Protocol for 26 Intermittently Connected Mobile Networks 27 Robust Video Data Hiding Using Forbidden Data Hiding And Selective Embedding 28 Embedded Extended Visual Crypto Graph Schemes 29 Advanced Routing Technology For Fast Internet Protocol Network Recovery 30 Load Shedding In Mobile Systems In Mobiqual 31 Voronai-Based Continuous Query Processing For Mobile Users 32 Online Intrusion Alert Aggregation with Generative Data Stream Modeling 33 Analysis Of Quality Of Object Oriented Systems Using Object Oriented Metrics Continuous Monitoring of Spatial Queries in Wireless 34 Broadcast Environments 35 Improving Bug Tracking Systems 37 Measuring Capacity Bandwidth Of Targeted Path Segments 38 Minimizing File Download Time In Stochastic Peer-To-Peer Network Parallel And Distributed Image Processing & Secure Computing Image Processing & Secure Computing IEEE Journal Networking + Knowledge & Data Networking Secure Computing Software Engineering Networking Software Engineering Networking Networking 2011 2011 2011 2011 2011 2011 2011 2010 2010 2009 2009 Cloud computing 2012 Cloud computing 2012 Cloud computing 2012 Mobile Computing Knowledge & Data Engineering Networking Data Mining 2012 2012 2012 2012 2012 Image Processing 2012

Mr.Venkatsai 9642222622 www.3tinfotech.co

You might also like