Tuesday, August 20, 2013

IEEE 2013 - 2014 Java Final Year Projects @ Frontline Technolgies. Chennai, Coimbatore, Trichy, Karur, Bangalore




IEEE Java Projects – IEEE 2013




1. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework -- Data mining

2. Ranking on Data Manifold with Sink Points -- Data mining

3. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks -- Data mining

4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse -- Data mining

5. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data -- Data mining

6. A Survey of XML Tree Patterns -- Data mining

7. Region-Based Foldings in Process Discovery -- Data mining

8. Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures -- Data mining

9. T-Drive Enhancing Driving Directions with Taxi Drivers' Intelligence -- Data mining

10. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm -- Data mining

11. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model -- Data mining

12. A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models -- Data mining

13. Ontology Matching: State of the Art and Future Challenges -- Data mining

14. Large Graph Analysis in the GMine System -- Data mining

15. Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies -- Data mining

16. A System to Filter Unwanted Messages from OSN User Walls -- Data mining

17. A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments -- Data mining

18. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments -- Data mining

19. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia -- Data mining

20. AML: Efficient Approximate Membership Localization within a Web-Based Join Framework -- Data mining

21. Event Tracking for Real-Time Unaware Sensitivity Analysis -- Data mining

22. Detecting Intrinsic Loops Underlying Data Manifold -- Data mining

23. Clustering Large Probabilistic Graphs -- Data mining

24. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering -- Data mining

25. Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping -- Data mining

26. Finding Rare Classes: Active Learning with Generative and Discriminative Models -- Data mining

27. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models -- Data mining

28. Simple Hybrid and Incremental Postpruning Techniques for Rule Induction -- Data mining

29. Supporting Search-As-You-Type Using SQL in Databases -- Data mining

30. Reinforced Similarity Integration in Image-Rich Information Networks -- Data mining

31. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing -- Mobile Computing

32. Quality-Differentiated Video Multicast in Multirate Wireless Networks -- Mobile Computing

33. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks -- Mobile Computing

34. Capacity of Hybrid Wireless Mesh Networks with Random APs -- Mobile Computing

35. Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding -- Mobile Computing

36. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation -- Mobile Computing

37. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks -- Mobile Computing

38. Evaluating Temporal Robustness of Mobile Networks -- Mobile Computing

39. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks -- Mobile Computing

40. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System -- Mobile Computing

41. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices' Heterogeneity -- Mobile Computing

42. An Investigation on LTE Mobility Management -- Mobile Computing

43. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks -- Mobile Computing

44. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks -- Mobile Computing

45. On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks -- Mobile Computing

46. Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information -- Mobile Computing

47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks -- Mobile Computing

48. Toward a Statistical Framework for Source Anonymity in Sensor Networks -- Mobile Computing

49. On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling -- Mobile Computing

50. Model-Based Analysis of Wireless System Architectures for Real-Time Applications -- Mobile Computing

51. Successive Interference Cancellation: Carving Out MAC Layer Opportunities -- Mobile Computing

52. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks -- Mobile Computing

53. Group-Based Medium Access Control for IEEE 802.11n Wireless LANs -- Mobile Computing

54. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks -- Mobile Computing

55. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications -- Mobile Computing

56. Secure Communication Based on Ambient Audio -- Mobile Computing

57. Importance of Coherence Protocols with Network Applications on Multicore Processors -- Multimedia

58. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs -- Multimedia

59. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes -- Networking

60. Distance Bounding A Practical Security Solution for Real-Time Location Systems -- Networking

61. Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm -- Parallel & Dis Systems

62. Network Traffic Classification Using Correlation Information -- Parallel & Dis Systems

63. Distributed Web Systems Performance Forecasting Using Turning Bands Method -- Parallel & Dis Systems

64. High Performance Resource Allocation Strategies for Computational Economies -- Parallel & Dis Systems

65. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks -- Parallel & Dis Systems

66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption -- Parallel & Dis Systems

67. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks -- Parallel & Dis Systems

68. Adaptive Network Coding for Broadband Wireless Access Networks -- Parallel & Dis Systems

69. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip -- Parallel & Dis Systems

70. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching -- Parallel & Dis Systems

71. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision -- Parallel & Dis Systems

72. Covering Points of Interest with Mobile Sensors -- Parallel & Dis Systems

73. Topology Abstraction Service for IP-VPNs -- Parallel & Dis Systems

74. Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller -- Parallel & Dis Systems

75. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models -- Parallel & Dis Systems

76. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks -- Parallel & Dis Systems

77. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks -- Parallel & Dis Systems

78. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks -- Parallel & Dis Systems

79. Analysis of Distance-Based Location Management in Wireless Communication Networks -- Parallel & Dis Systems

80. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks -- Parallel & Dis Systems

81. Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery -- Parallel & Dis Systems

82. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks -- Parallel & Dis Systems

83. Dynamic Coverage of Mobile Sensor Networks -- Parallel & Dis Systems

84. In-Network Estimation with Delay Constraints in Wireless Sensor Networks -- Parallel & Dis Systems

85. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks -- Parallel & Dis Systems

86. Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor -- Parallel & Dis Systems

87. IP-Geolocation Mapping for Moderately Connected Internet Regions -- Parallel & Dis Systems

88. IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments -- Parallel & Dis Systems

89. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Parallel and Distributed Systems

90. EAACK-A Secure Intrusion-Detection System for MANETs -- Secure Computing

91. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks -- Signal Processing

92. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper -- Signal Processing

93. Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks -- Signal Processing

94. The Generalization Ability of Online Algorithms for Dependent Data ---- Webmining

95. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks -- Wireless Networks

96. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling -- Wireless Networks

97. A Data Fusion Technique for Wireless Ranging Performance Improvement -- Wireless Networks

98. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks -- Wireless Networks




No comments:

Post a Comment