08:42

Latest IEEE Projects 2011-2012 ( JAVA / J2EE )


Sr.noProject CodeProject TitleDomainSynopsis/Abstract
1WNV_JIE1101A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And Wimax SystemsNetwork SecuritySynopsis
2WNV_JIE1102A Privacy-Preserving Location Monitoring System For Wireless Sensor NetworksMobile ComputingSynopsis
3WNV_JIE1103Buffer Sizing For 802.11 Based NetworksNetworkingSynopsis
4WNV_JIE1104Clustering With Multi-Viewpoint Based Similarity MeasureData EngineeringSynopsis
5WNV_JIE1105Analysis on Credit Card Fraud Detection MethodsData EngineeringSynopsis
6WNV_JIE1106Delay Analysis And Optimality Of Scheduling Policies For Multi-Hop Wireless NetworksNetworkingSynopsis
7WNV_JIE1107Discovering Conditional Functional DependenciesData EngineeringSynopsis
8WNV_JIE1108Effective Navigation Of Query Results Based On Concept HierarchiesData EngineeringSynopsis
9WNV_JIE1109Extended Xml Tree Pattern Matching: Theories And AlgorithmsData EngineeringSynopsis
10WNV_JIE1110Modeling And Detection Of Camouflaging Worm Synopsis
11WNV_JIE1111Nymble: Blocking Misbehaving Users In Anonymizing Networks Synopsis
12WNV_JIE1112Ranking Spatial Data By Quality PreferencesData EngineeringSynopsis
13WNV_JIE1113Sat: A Security Architecture Achieving Anonymity And Traceability In Wireless Mesh NetworksSecure ComputingSynopsis
14WNV_JIE1114Secure And Practical Outsourcing Of Linear Programming In Cloud ComputingCloud ComputingSynopsis
15WNV_JIE1115Sketch4match – Content-Based Image Retrieval System Using SketchesImage ProcessingSynopsis
16WNV_JIE1116Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective EmbeddingVideo TechnologySynopsis
17WNV_JIE1117A Competitive Study Of Cryptography Techniques Over Block CipherSecure ComputingSynopsis
18WNV_JIE1118A Dual Framework and Algorithms for Targeted Online Data DeliveryData EngineeringSynopsis
19WNV_JIE1119Embedded Extended Visual Cryptography SchemesSecuritySynopsis
20WNV_JIE1120Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server PortsNetworkingSynopsis
21WNV_JIE1121Cloud Computing For Agent-Based Urban Transportation SystemsIntelligent SystemsSynopsis
22WNV_JIE1122Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc NetworksMobile ComputingSynopsis
23WNV_JIE1123A Machine Learning Approach for Identifying Disease-Treatment Relations in Short TextsData EngineeringSynopsis
24WNV_JIE1124Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc NetworksNetworkingSynopsis
25WNV_JIE1125Optimal Bandwidth Assignment for Multiple Description Coded VideoMulti MediaSynopsis
26WNV_JIE1126Dynamics of Malware Spread in Decentralized Peer-to-Peer NetworksSecure ComputingSynopsis
27WNV_JIE1127A Fuzzy Self-Constructing Feature Clustering Algorithm For Text ClassificationData MiningSynopsis
28WNV_JIE1128Going Back And Forth: Efficient Multideployment And Multisnapshotting On CloudsCloud ComputingSynopsis
29WNV_JIE1129Progme: Towards Programmable Network MeasurementNetworkingSynopsis
30WNV_JIE1130Live Streaming With Receiver-Based Peer-Division MultiplexingNetworkingSynopsis
31WNV_JIE1131Decision Trees for Uncertain DataData EngineeringSynopsis
32WNV_JIE1132The Coquos Approach To Continuous Queries In Unstructured OverlaysData EngineeringSynopsis
33WNV_JIE1133Ritas: Services For Randomized Intrusion ToleranceSecure ComputingSynopsis
34WNV_JIE1134Selfish Overlay Network Creation And MaintenanceNetworkingSynopsis
35WNV_JIE1135Throughput Optimization in Mobile Backbone NetworksMobile ComputingSynopsis
36WNV_JIE1136Locating Equivalent Servants Over P2p NetworksNetwork & Service ManagementSynopsis
37WNV_JIE1137Improving Utilization Of Infrastructure CloudsCloud ComputingSynopsis
38WNV_JIE1138Wireless Sensor Network Security Model Using Zero Knowledge ProtocolMobile ComputingSynopsis

0 comments: