S.N
|
2011 IEEE Project Titles
|
Year
|
Domain
|
1.
|
Forward Correction and Fountain Codes in Delay Tolerant Networks
|
2011/ Java
|
Networking
|
2.
|
A Personalized Ontology Model For Web Information Gathering
|
2011/ .Net
|
Data Mining
|
3.
|
Continuous Neighbor Discovery in Asynchronous Sensor Networks
|
2011/ Java
|
Networking
|
4.
|
Adaptive Provisioning Of Human Expertise In Service-Oriented Systems
|
2011/ .Net
|
Data Mining
|
5.
|
Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
|
2011/ Java
|
Networking
|
6.
|
Bridging Socially-Enhanced Virtual Communities
|
2011/ .Net
|
Networking
|
7.
|
Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration
|
2011/ Java
|
Networking
|
8.
|
Data Integrity Proofs In Cloud Storage
|
2011/ .Net
|
Cloud Computing
|
9.
|
ROC: Resilient Online Coverage for Surveillance Applications
|
2011/ Java
|
Networking
|
10.
|
Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries
|
2011/ .Net
|
Data Mining
|
11.
|
Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud
|
2011/ .Net
|
Data mining
|
12.
|
Live Streaming With Receiver-Based Peer-Division Multiplexing
|
2011/ Java
|
Networking
|
13.
|
Exploring Application-Level Semantics For Data Compression
|
2011/ .Net
|
Data mining
|
14.
|
Optimal Service Pricing For A Cloud Cache
|
2011/ .Net
|
Data Mining
|
15.
|
A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
|
2011/ Java
|
Network Security
|
16.
|
Digital Image hiding using curve let transform
|
2011/ .Net
|
Secure Computing
|
17.
|
A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service
|
2011/ Java
|
Network
|
18.
|
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
|
2011/ Java
|
Network
|
19.
|
Publishing Search Logs – A Comparative Study Of Privacy Guarantees
|
2011/ .Net
|
Data Mining
|
20.
|
MANET Routing Protocols vs Mobility Models: A Performance Evaluation
|
2011/ Java
|
Network
|
21.
|
The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
|
2011/ .Net
|
Data Mining
|
22.
|
Effective Navigation of Query Results Based on Concept Hierarchies
|
2011/J2EE
|
Data Mining
|
23.
|
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
|
2011/ .Net
|
Data Mining
|
24.
|
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
|
2011/ .Net
|
Data mining
|
25.
|
Integration Of Sound Signature In Graphical Password Authentication System
|
2011/ .Net
|
Data Mining
|
26.
|
Modeling And Detection Of Camouflaging Worm
|
2011/ Java
|
Secure Computing
|
27.
|
Monitoring Service Systems From A Language-Action Perspective
|
2011/ .Net
|
Service Computing
|
28.
|
One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases
|
2011/ .Net
|
Data mining
|
29.
|
Nymble Blocking Misbehaving Users in Anonymizing Networks
|
2011/ Java
|
Network
|
30.
|
Data Integrity Proofs In Cloud Storage
|
2011/ .Net
|
Software Engineering
|
31.
|
The World In A Nutshell: Concise Range Queries
|
2011/ .Net
|
Data mining
|
32.
|
A Generic Multilevel Architecture For Time Series Prediction
|
2011/ Java
|
Data mining
|
33.
|
Intrusion detection: An Energy efficient approach in heterogeneous WSN
|
2011/ .Net
|
Network Security
|
34.
|
NABS Novel Approaches for Biometric Systems
|
2011/ .Net
|
Secure Computing
|
35.
|
A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts
|
2011/ Java
|
Data mining
|
36.
|
A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm
|
2011/ .Net
|
Data mining
|
37.
|
A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
|
2011/ .Net
|
Data mining
|
38.
|
A Link Analysis Extension Of Correspondence
Analysis For Mining Relational Databases
|
2011/ Java
|
Data mining
|
39.
|
A Dual Framework And Algorithms For Targeted Online Data Delivery
|
2011/ Java
|
Data mining
|
40.
|
Adaptive Cluster Distance Bounding For High-Dimensional Indexing
|
2011/ Java
|
Data mining
|
41.
|
Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
|
2011/ Java
|
Network
|
42.
|
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
|
2011/ Java
|
Network Security
|
43.
|
Clustering with Multi- View Point Based Similarity Measure
|
2011/ Java
|
Data mining
|
44.
|
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
|
Network
| |
45.
|
Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds
|
2011/ Java
|
Cloud Computing
|
46.
|
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
|
2011/ Java
|
Cloud Computing
|
47.
|
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
|
2011/ Java
|
Network
|
48.
|
A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
|
2011/ Java
|
Network
|
49.
|
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
|
2011/ .Net
|
Network
|
50.
|
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
|
2011/ .Net
|
Network
|
51.
|
Supporting Efficient and Scalable Multicasting over
|
2011/ Java
|
Network
|
52.
|
Throughput Optimization in High Speed Downlink Packet Access
|
2011/ .Net
|
Network
|
53.
|
Sketch4Match-Content Based Image Retrival System Using Sketches
|
2011/ Java
|
Image Processing
|
54.
|
Embedded Extended Visual Cryptography Schemes
|
2011/ Java
|
Secure Computing
|
55.
|
A Competitive Study of Cryptography Techniques over Block Cipher
|
2011/ Java
|
Secure Computing
|
56.
|
Roboust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
|
2011/ Java
|
Multimedia
|
57.
|
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
|
2011/ Java
|
Network Security
|
58.
|
A More Secure Steganography Method in Spatial Domain
|
2011/ Java
|
Secure Computing
|
59.
|
A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm
|
2011/ .Net
|
Image Processing
|
60.
|
A Web Search Engine Based Approach to Measure Semantic Similarity Between Words
|
2011/ .Net
|
Data Mining
|
61.
|
Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design
|
2011/ .Net
|
Network
|
62.
|
Problems and Solutions of Web Search Engines
|
2011/ .Net
|
Web Mining
|
63.
|
Adaptive Cluster Distance Bounding for High Dimensional Indexing
|
2011/ Java
|
Data Mining
|
64.
|
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
|
2011/ .Net
|
Network
|
65.
|
Live Streaming with Receiver-based Peer-division Multiplex in
|
2011/ .Net
|
Network
|
66.
|
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
|
2011/ .Net
|
Network
|
67.
|
Secure High-Throughput Multicast Routing in Wireless Mesh Networks
|
2011/ Java
|
Mobile Computing
|
68.
|
Optimal Stochastic Location Updates in
|
2011/ Java
|
Mobile Computing
|
69.
|
Throughput Optimization in
|
2011/ Java
|
Mobile Computing
|
70.
|
RITAS: Services for Randomized Intrusion Tolerance
|
2011/ Java
|
Network Security
|
71.
|
Selfish Overlay Network Creation and Maintenance
|
2011/ Java
|
Network
|
72.
|
Comparative Evaluation of Spoofing Defenses
|
2011/ Java
|
Network Security
|
73.
|
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
|
2011/ Java
|
Network Security
|
74.
|
Topological Transformation Approaches to TCAM-Based Packet Classification
|
2011/ Java
|
Network
|
75.
|
Ranking Spatial Data by Quality Preferences
|
2011/ Java
|
Data Mining
|
IEEE 2011 java project titles
Subscribe to:
Post Comments (Atom)
Nice collection of java projects. Thanks for posting it.
ReplyDeletehuge information thanks for ur effort on this collection very useful to me.
ReplyDeleteOracle Fusion Financials Online Training