IEEE 2015-2016 JAVA TITLES



Similar documents
JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

Global Soft Solutions JAVA IEEE PROJECT TITLES

IEEE JAVA Project 2012

TOPOLOGIES NETWORK SECURITY SERVICES

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

LIST OF FIGURES. Figure No. Caption Page No.

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

A Catechistic Method for Traffic Pattern Discovery in MANET

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Assessment for Master s Degree Program Fall Spring 2011 Computer Science Dept. Texas A&M University - Commerce

How To Write A Transport Layer Protocol For Wireless Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

List of Projects in Application

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Unit 3 - Advanced Internet Architectures

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Security for Ad Hoc Networks. Hang Zhao

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Wireless Sensor Network: Challenges, Issues and Research

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

NIST Big Data Public Working Group

The 4 Pillars of Technosoft s Big Data Practice

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Intrusion Detection for Mobile Ad Hoc Networks

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Your Data, Any Place, Any Time.

Traffic Management Solutions for Social Innovation Business

Some Security Trends over Wireless Sensor Networks

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

International Journal of Advanced Research in Computer Science and Software Engineering

ANALYTICS IN BIG DATA ERA

Big Data and Analytics: Challenges and Opportunities

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Enterprise Energy Management with JouleX and Cisco EnergyWise

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

About the Authors Preface Acknowledgements List of Acronyms

WEB APPLICATION. A Distributed Control Law for Load Balancing in Content Delivery Networks

Big Data Mining Services and Knowledge Discovery Applications on Clouds

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Internet of Things (IoT): A vision, architectural elements, and future directions

OPNET Network Simulator

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Challenges for Data Driven Systems

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Alexander Nikov. 5. Database Systems and Managing Data Resources. Learning Objectives. RR Donnelley Tries to Master Its Data

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

COMP9321 Web Application Engineering

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

Research of Smart Distribution Network Big Data Model

Distributed Computing and Big Data: Hadoop and MapReduce

Master of Science Service Oriented Architecture for Enterprise. Courses description

Sanjeev Kumar. contribute

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year and thereafter)

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

OPNET - Network Simulator

Data Mining Analytics for Business Intelligence and Decision Support

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

Security Sensor Network. Biswajit panja

Energy Optimal Routing Protocol for a Wireless Data Network

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Lecture 02b Cloud Computing II

Efficient File Sharing Scheme in Mobile Adhoc Network

Big Data - Security and Privacy


Transcription:

ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages: System Requirements: Block Diagram: Dataflow Diagram: UML Diagrams: Use Case Diagram: Class Diagram: Sequence Diagram: Activity Diagram: Implementation: Modules Description: System Study: System Testing: Software Description: Sample code: Conclusion: References: ***Complete Document ***

WIRELESS NETWORK TOPOLOGY YEAR A Topology Potential-Based Method for Identifying Essential Proteins from PPI JAVA APR/2015 Receiver Cooperation in Topology Control for Wireless Ad-Hoc JAVA APR/2015 Delay Optimization and Cross-Layer Design in Multihop Wireless With JAVA APR/2015 Network Coding and Successive Interference Cancelation Energy Efficient Virtual Network Embedding for Cloud JAVA MAY/2015 Statistical Dissemination Control in Large Machine-to-Machine Communication JAVA APR/2015 NETWORK SECURITY YEAR Distributed Denial of Service Attacks in Software-Defined Networking with JAVA APR/2015 Cloud Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce JAVA MAR/2015 Passive IP Traceback Disclosing the Locations of IP Spoofers From Path JAVA MAR/2015 Backscatter Security Optimization of Dynamic with Probabilistic Graph Modeling JAVA MAR/2015 and Linear Programming Security-Aware Relaying Scheme for Cooperative With Untrusted JAVA MAR/2015 Relay Nodes MOBILE COMPUTING YEAR Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in JAVA APR/2015 Heterogeneous Wireless Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse JAVA MAY/2015 Underwater Sensor Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc JAVA APR/2015 with Delay-Constrained Traffics Friendbook A Semantic-Based Friend Recommendation System for Social JAVA MAR/2015 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems JAVA MAR/2015 PARALLEL & DISTRIBUTED

Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer JAVA MAR/2015 Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of JAVA MAR/2015 Things Authenticated Key Exchange Protocols for Parallel Network File Systems JAVA APR/2015 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor JAVA APR/2015 Decentralized Computation Offloading Game for Mobile Cloud JAVA APR/2015 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol JAVA APR/2015 Design Innovative Schemes for Resource Allocation in the Cloud for Media Streaming JAVA APR/2015 Applications Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing JAVA MAR/2015 Algorithm Secure and Distributed Data Discovery and Dissemination in Wireless Sensor JAVA MAR/2015 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless JAVA MAR/2015 CLOUD COMPUTING A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud JAVA MAR/2015 A Scalable and Reliable Matching Service for Content-Based Publish Subscribe JAVA MAR/2015 Systems Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud JAVA MAR/2015 Data Through Blind Storage Enabling Fine-grained Multi-keyword Search Supporting Classified Sub- JAVA FEB/2015 dictionaries over Encrypted Cloud Data Governance Model for Cloud in Building Information Management JAVA MAR/2015 Identity-Based Encryption with Outsourced Revocation in Cloud JAVA FEB/2015 Performing Initiative Data Prefetching in Distributed File Systems for Cloud JAVA MAR/2015 Proof of ownership in deduplicated cloud storage with mobile device efficiency JAVA APR/2015 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User JAVA APR/2015 Revocation

Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud JAVA JAN/2015 WEB SERVICES YEAR Automatic Web Service Composition Based on Uncertainty Execution Effects JAVA APR/2015 Constructing a Global Social Service Network for Better Quality of Web Service JAVA APR/2015 Discovery Data-Driven Composition for Service-Oriented Situational Web Applications JAVA FEB/2015 Designing High Performance Web-Based Services to Promote JAVA FEB/2015 Telemedicine Database Management System Diversifying Web Service Recommendation Results via Exploring Service Usage JAVA FEB/2015 History WEB MINING YEAR Constructing Query-Driven Dynamic Machine Learning Model With Application JAVA JAN/2015 to Protein-Ligand Binding Sites Prediction Improving Web Navigation Usability by Comparing Actual and Anticipated Usage JAVA FEB/2015 Network-Based Modeling and Intelligent Data Mining of Social Media for JAVA JAN/2015 Improving Care Quality of Experience User s Perception about Web Services JAVA FEB/2015 Real-Time Detection of Traffic From Twitter Stream Analysis JAVA FEB/2015 DATA MINING OR DATA ENGINEERING k-nearest Neighbor Classification over Semantically Secure Encrypted JAVA MAY/2015 Relational Data A Ranking Approach on Large-Scale Graph With Multidimensional JAVA APR/2015 Heterogeneous Information Rank-Based Similarity Search Reducing the Dimensional Dependence JAVA JAN/2015 Distributed Multi-Agent Online Learning Based on Global Feedback JAVA MAY/2015 Efficient Motif Discovery for Large-scale Time Series in Healthcare JAVA MAR/2015 Trusted Performance Analysis on Systems With a Shared Memory JAVA FEB/2015 IMAGE PROCESSING Combining Left and Right Palmprint Images for More Accurate Personal JAVA FEB/2015 Identification Learning Compact Binary Face Descriptor for Face Recognition JAVA MAR/2015

Localized Multi-Feature Metric Learning for Image Set Based Face Recognition JAVA MAR/2015 Multiscale Logarithm Difference Edgemaps for Face Recognition Against Varying JAVA MAR/2015 Lighting Conditions Iterative Vessel Segmentation of Fundus Images JAVA FEB/2015 Content Based Image Retrieval by Metric Learning from Radiology Reports JAVA MAR/2015 Application to Interstitial Lung Diseases EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval JAVA JAN/2015 Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding JAVA MAR/2015 Features Local Diagonal Extrema Pattern A New and Efficient Feature Descriptor for CT JAVA SEP/2015 Image Retrieval An AdaBoost-Based Face Detection System Using Parallel Configurable JAVA APR/2015 Architecture With Optimized Computation Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT JAVA FEB/2015 Towards Practical Self-Embedding for JPEG-Compressed Digital Images JAVA FEB/2015 BIG DATA Real-Time Big Data Analytical Architecture for Remote Sensing Application JAVA MAY/2015 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud JAVA FEB/2015 Research Directions for Engineering Big Data Analytics Software JAVA FEB/2015 Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors JAVA MAY/2015 Multilayer Big Data Architecture for Remote Sensing in Eolic Parks JAVA APR/2015 Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage JAVA APR/2015 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data JAVA APR/2015 Applications Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data JAVA APR/2015 Platforms Predicting Asthma-Related Emergency Department Visits Using Big Data JAVA FEB/2015