IEEE Java Project topics

We provide all types of student projects in IEEE java. Download latest IEEE Java Project topics for BE, CSE and IT engineering students.

IEEE Java Project topics
SL  No.Project title
1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups
2 Detecting and Resolving Firewall Policy Anomalies
3 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
4 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks.
5 A Geometric Approach to Improving Active Packet Loss Measurement
6 A New, Efficiet Coordinated Checkpointing Protocol combined with Selective Sender – Based Message Logging
7 A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
8 A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Path
9 A wireless Intrusion detection system and a new attack model
10 Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud.
11 Open source project management tools
12 Storage management in the peer-to-peer storage utility
13 Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net
14 An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
15 An Efficient Association Rule Mining Algorithm In Distributed Databases
16 ANGEL Enhancing the Utility of Generalization For Privacy Preserving Publication
17 Application of BPCS Steganography to wavelet compressed video
18 ATM Networks and Intelligent Packet Filtering
19 Cloud-Based Video Recommendation System with User behavior Monitoring.
20 Bandwidth Estimation for IEEE -Based Ad Hoc Networks
21 Benefit Based Data Caching In Ad Hoc Networks
22 Capturing Router Congestion and Delay
23 Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
24 Computation Efficient Multicast Key Distribution
25 Constructing Inter-Domain Packet Filters to Control IP
26 Continuous Monitoring of Spatial Queries in Wireless Broadcast
27 Controlling IP Spoofing Through Inter Domain Packet Filters
28 Controlling IP Spoofing through Inter domain Packet Filters
29 COUPLING-BASED STRUCTURAL METRICS FOR MEASURING THE QUALITY OF A SOFTWARE
30 DAIOS: EFFICIENT DYNAMIC WEB SERVICE INVOCATION
31 Data leakage detection ()
32 DCMP – A distributed Cycle Minimization Protocol for Peer to Peer Networks
33 DCMP A DISTRIBUTED CYCLE MINIMIZATION PROTOCOL FOR PEER-TO-PEER NETWORKS
34 DEMONSTRATION OF SECURE SOCKET LAYER
35 Detection of Application Layer DDOS Attack using Hidden Semi Markov Model ()
36 Distributed cache updating for the Dynamic source routing protocol
37 Distributed cache updating for the Dynamic source routing protocol
38 Distributed cache updating of dynamic source routing protocol
39 Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
40 Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
41 Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
42 Dynamic Load Balancing in Distributed Systems in the presence of Delays
43 Dynamic Load Balancing in Distributed Systems in the Presence of Delays : A Regeneration Theory Approach
44 Dynamic Load Balancing in Distributed Systems in the presence of delays  A regeneration theory Approach
45 Dynamic Routing with Security Considerations
46 Effective Transmission of Data through RBPH for Group Communication
47 Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure
48 Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems
49 Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
50 Efficient Key Agreement for Large and Dynamic Multicast Groups
51 Efficient Packet Marking for Large-Scale IP Trace back
52 Energy-Efficient SINR-Based Routing for Multihop Wireless
53 EnergyMaps For Mobile Wireless networks coherence Time Versues Spreding Period
54 Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
55 EXACT KNOWLEDGE HIDING THROUGH DATABASE EXTENSION
56 Face recognition for smart interactions
57 Face Recognition Using Laplacianfaces
58 Gradient Vector Force – A new External Force for Snakes
59 Identification of Humans Using Gait
60 Image Transformation using Grid
61 Image Transport Protocol ITP
62 IMPLEMENTATION OF BPCS-STEGANOGRAPHY
63 Incremental deployment service of Hop by hop multicast routing protocol
64 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
65 Large Connectivity for Dynamic Random Geometric Graphs
66 Layered Approach Using Conditional Random Fields for Intrusion Detection ()
67 Learning in an Ambient Intelligent World Enabling Technologies and Practices
68 Locating Friends and Family Using Mobile Phones With GPS
69 Location Based Spatial Query Processing In Wireless Broadcast Environments
70 Lord of the Links – A framework for discovering missing links in the internet topology
71 Measuring Capacity Bandwidth of Targeted Path Segments
72 Minimizing File Download Time in Stochastic Peer-to-Peer Networks
73 Mitigating Performance Degradation in Congested Sensor Networks
74 Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs
75 Mitigation OF Controll Channel Jamming Under Node Caputer Attacks
76 Mobile Agents In a Distributed Multimedia Database System
77 Mobility Management Approaches for Mobile IP Networks
78 Modeling & Automated Containment of Worms
79 Multiple Routing Configurations for Fast IP Network Recovery
80 Multiple Sequence alignment using Genetic Algorithm
81 Network Border Patrol Preventing Congestion Collapse
82 Node Isolation Model and Age-Based Neighbor Selection in Unstructured PP Networks
83 Noise Reduction by Fuzzy Image Filtering
84 Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks
85 Novel Secure Communication Protocol for Ad Hoc networks
86 OCGRR – A New Scheduling Algorithm for Differentiated Services Networks
87 ODAM An Optimized Distributed Association Rule Mining Algorithm
88 One To Many Distribution Using Recursive Unicast Trees
89 Online Handwritten Script Recognition
90 Online Index Recommendations for High-Dimensional Databases Using Query Workloads
91 Optimal Server Bandwidth Allocation Among Multiple PP Multicast Live Video Streaming Sessions
92 PAM : An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
93 Peer to Peer Messaging System
94 PEER-TO-PEER (PP) networks
95 Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
96 Personal Authentication Using -D Finger Geometry
97 Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
98 Protection of Database Security via Collaborative Inference Detection
99 QUIVER Consistent Object Sharing For Edge Services
100 Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.