We have all sorts of IEEE java student assignments. Download the new IEEE Java Project topics for students of BE, CSE, and IT engineering.
|
SL No. |
Project title |
|
1 |
Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups |
|
2 |
Detecting and Resolving Firewall Policy Anomalies |
|
3 |
A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks |
|
4 |
Mobile Relay Configuration in Data-intensive Wireless Sensor Networks. |
|
5 |
A Geometric Approach to Improving Active Packet Loss Measurement |
|
6 |
A New, Efficient Coordinated Checkpointing Protocol combined with Selective Sender – Based Message Logging |
|
7 |
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm |
|
8 |
A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Path |
|
9 |
A wireless Intrusion detection system and a new attack model |
|
10 |
Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud. |
|
11 |
Open-source project management tools |
|
12 |
Storage management in the peer-to-peer storage utility |
|
13 |
Agent-Based Intrusion Detection, Response, and Blocking using the signature method in Active Net |
|
14 |
An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs |
|
15 |
An Efficient Association Rule Mining Algorithm In Distributed Databases |
|
16 |
ANGEL Enhancing the Utility of Generalization For Privacy-Preserving Publication |
|
17 |
Application of BPCS Steganography to wavelet compressed video |
|
18 |
ATM Networks and Intelligent Packet Filtering |
|
19 |
Cloud-Based Video Recommendation System with User behavior Monitoring. |
|
20 |
Bandwidth Estimation for IEEE -Based Ad Hoc Networks |
|
21 |
Benefit Based Data Caching In Ad Hoc Networks |
|
22 |
Capturing Router Congestion and Delay |
|
23 |
Clustering and Sequential Pattern Mining of Online Collaborative Learning Data |
|
24 |
Computation Efficient Multicast Key Distribution |
|
25 |
Constructing Inter-Domain Packet Filters to Control IP |
|
26 |
Continuous Monitoring of Spatial Queries in Wireless Broadcast |
|
27 |
Controlling IP Spoofing Through Inter-Domain Packet Filters |
|
28 |
Controlling IP Spoofing through Inter-domain Packet Filters |
|
29 |
Coupling-based structural metrics for measuring the quality of a software |
|
30 |
DAIOS: Efficient dynamic web service invocation |
|
31 |
Data leakage detection () |
|
32 |
DCMP – A distributed Cycle Minimization Protocol for Peer to Peer Networks |
|
33 |
DCMP a distributed cycle minimization protocol for peer-to-peer networks |
|
34 |
Demonstration of secure socket layer |
|
35 |
Detection of Application Layer DDOS Attack using Hidden Semi Markov Model () |
|
36 |
Distributed cache updating for the dynamic source routing protocol |
|
37 |
Distributed cache updating for the dynamic source routing protocol |
|
38 |
Distributed cache updating of dynamic source routing protocol |
|
39 |
Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks |
|
40 |
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion |
|
41 |
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion |
|
42 |
Dynamic Load Balancing in Distributed Systems in the Presence of Delays |
|
43 |
Dynamic Load Balancing in Distributed Systems in the Presence of Delays: A Regeneration Theory Approach |
|
44 |
Dynamic Load Balancing in Distributed Systems in the presence of delays A regeneration theory Approach |
|
45 |
Dynamic Routing with Security Considerations |
|
46 |
Effective Transmission of Data through RBPH for Group Communication |
|
47 |
Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure |
|
48 |
Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems |
|
49 |
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries |
|
50 |
Efficient Key Agreement for Large and Dynamic Multicast Groups |
|
51 |
Efficient Packet Marking for Large-Scale IP Traceback |
|
52 |
Energy-Efficient SINR-Based Routing for Multihop Wireless |
|
53 |
EnergyMaps For Mobile Wireless networks coherence Time Versus Spreading Period |
|
54 |
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis |
|
55 |
Exact knowledge hiding through Database Extension |
|
56 |
Face recognition for smart interactions |
|
57 |
Face Recognition Using Laplacianfaces |
|
58 |
Gradient Vector Force – A New External Force for Snakes |
|
59 |
Identification of Humans Using Gait |
|
60 |
Image Transformation using Grid |
|
61 |
Image Transport Protocol ITP |
|
62 |
Implementation of BPCS-Steganography |
|
63 |
Incremental deployment service of Hop by hop multicast routing protocol |
|
64 |
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks |
|
65 |
Large Connectivity for Dynamic Random Geometric Graphs |
|
66 |
Layered Approach Using Conditional Random Fields for Intrusion Detection () |
|
67 |
Learning in an Ambient Intelligent World Enabling Technologies and Practices |
|
68 |
Locating Friends and Family Using Mobile Phones With GPS |
|
69 |
Location-Based Spatial Query Processing In Wireless Broadcast Environments |
|
70 |
Lord of the Links – A framework for discovering missing links in the internet topology |
|
71 |
Measuring Capacity Bandwidth of Targeted Path Segments |
|
72 |
Minimizing File Download Time in Stochastic Peer-to-Peer Networks |
|
73 |
Mitigating Performance Degradation in Congested Sensor Networks |
|
74 |
Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs |
|
75 |
Mitigation OF Control Channel Jamming Under Node Computer Attacks |
|
76 |
Mobile Agents In a Distributed Multimedia Database System |
|
77 |
Mobility Management Approaches for Mobile IP Networks |
|
78 |
Modeling & Automated Containment of Worms |
|
79 |
Multiple Routing Configurations for Fast IP Network Recovery |
|
80 |
Multiple Sequence alignment using Genetic Algorithm |
|
81 |
Network Border Patrol Preventing Congestion Collapse |
|
82 |
Node Isolation Model and Age-Based Neighbor Selection in Unstructured PP Networks |
|
83 |
Noise Reduction by Fuzzy Image Filtering |
|
84 |
Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks |
|
85 |
Novel Secure Communication Protocol for Ad Hoc networks |
|
86 |
OCGRR – A New Scheduling Algorithm for Differentiated Services Networks |
|
87 |
ODAM An Optimized Distributed Association Rule Mining Algorithm |
|
88 |
One Too Many Distribution Using Recursive Unicast Trees |
|
89 |
Online Handwritten Script Recognition |
|
90 |
Online Index Recommendations for High-Dimensional Databases Using Query Workloads |
|
91 |
Optimal Server Bandwidth Allocation Among Multiple PP Multicast Live Video Streaming Sessions |
|
92 |
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects |
|
93 |
Peer to Peer Messaging System |
|
94 |
PEER-TO-PEER (PP) networks |
|
95 |
Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction |
|
96 |
Personal Authentication Using -D Finger Geometry |
|
97 |
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm |
|
98 |
Protection of Database Security via Collaborative Inference Detection |
|
99 |
QUIVER Consistent Object Sharing For Edge Services |
|
100 |
Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System |
Download link:
[wpdm_file id=10]
[jetpack_subscription_form title=”Free subscription” subscribe_text=”Receive notifications of new projects by email.” subscribe_button=”Subscribe here” show_subscribers_total=”10″]
DOWNLOAD NOW
