Final Year Projects, Final Year IEEE Projects for ECE,Final Year IEEE Projects for CSE, Final Year IEEE Projects for EEE, Final Year IEEE Projects on Java, Final Year IEEE Projects on Dotnet, Final Year IEEE Projects on Embedded Systems, Final Year Projects on Matlab, Final Year Projects on Vlsi, IEEE Projects for IT Final Year Students, Final Year Projects BE BTECH, Final Year Projects for MCA, Final Year Projects Titles Abstracts Reports Sourcecode, ncct.in, 044-28235816, ncctchennai@gmail.com
Tuesday, July 24, 2012
Sunday, January 1, 2012
Contact Us - NCCT, Contact Details
NCCT
109, 2nd Floor, Bombay Flats, Nungambakkam High Road
Nungambakkam, Chennai
Tamil Nadu, India. Pin – 600 034
LANDMARKS
Above IOB / Next to ICICI Bank, Near Ganpat Hotel / Taj Hotel, Opp to Cake’n’ Bakes
LANDLINE / MOBILE NOs
044-2823 5816 | 98411 93224 | 89393 63501
EMAIL IDs
ncctchennai@gmail.com | projects@ncct.in
WEBSITES
www.ncct.in | www.ieeeprojects.net
109, 2nd Floor, Bombay Flats, Nungambakkam High Road
Nungambakkam, Chennai
Tamil Nadu, India. Pin – 600 034
LANDMARKS
Above IOB / Next to ICICI Bank, Near Ganpat Hotel / Taj Hotel, Opp to Cake’n’ Bakes
LANDLINE / MOBILE NOs
044-2823 5816 | 98411 93224 | 89393 63501
EMAIL IDs
ncctchennai@gmail.com | projects@ncct.in
WEBSITES
www.ncct.in | www.ieeeprojects.net
NCCT's BLOGS
http://www.ncctieeeprojects.blogspot.in | http://www.ieeeprojectsworld.blogspot.in | http://www.ieeeprojectstitles.blogspot.in | http://www.ncct-javaprojects.blogspot.com | http://www.ncct-dotnetprojects.blogspot.com | http://www.ncct-matlabprojects.blogspot.com | http://www.ncct-ns2projects.blogspot.com | http://www.ncct-androidprojects.blogspot.in | http://www.ncct-embeddedsystemprojects.blogspot.in | http://www.ncct-vlsiprojects.blogspot.com | http://www.ncct-dspprojects.blogspot.in | http://www.ncct-powerelectronics-projects.blogspot.in
OFFICE LOCATION
Located in Heart of the City. Well Connected through Buses, Train, Autos. Parking Space available
Hostel Facilities available, near by our Office / Walkable Distance only
WORKING DAYS
Monday to Sunday, From Hours 10.00 AM to 09.00 PM
FACEBOOK, Find us on Facebook
http://www.facebook.com/NCCTIEEEprojects
TWITTER, Follow us on Twitter
https://twitter.com/ncctfinalyearpr
YOUTUBE VIDEO GALLERY
http://www.youtube.com/user/ncctstudentprojects
DAILY MOTION VIDEO GALLERY
http://www.dailymotion.com/NCCT
Tuesday, September 6, 2011
2011 IEEE Java Project Titles
2011 IEEE Project Titles, Java
Java IEEE 2011 Project Titles
PROJECT TITLES & DOMAINS
MOBILE COMPUTING PROJECT TITLES (IEEE 2011 Java Mobile Computing Project Titles)
- On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
- Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
- Spatial -Temporal Coverage optimization in wireless Sensor Network
- A Control Theoretic Approach to Distributed Optimal Configuration of 80211 WLANs
- Autonomous Deployment of Heterogeneous Mobile Sensors
- Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding
- Effective Scheduling in Infrastructure Based Cognitive Radio Networks
- Endpoint Based Call Admission Control and Resource Management for VoWLAN
- Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
- MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
- Mobile Sampling of Sensor Field Data Using Controlled Broadcast
- Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
- QoS Aware Routing and Admission Control in Shadow Fading Environments for Multirate MANETs
- Secure High-Throughput Multicast Routing in Wireless Mesh Networks
- The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems
- Throughput Optimization in Mobile Backbone Networks
NETWORKING PROJECT TITLES (IEEE 2011 Java Networking Project Titles)
- Component-Based Localization in Sparse Wireless Networks
- Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
- Model-Based Identification of Dominant Congested Links
- Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks
- TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks
- On the Complexity of the Regenerator Placement Problem in Optical Networks
- Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection
- A Novel Approach for Failure Localization in All-Optical Mesh Networks
- Energy Efficient Protocol for Cooperative Networks
- Licklider Transmission Protocol (LTP) Based DTN for Cislunar Communications
- Scheduling Algorithms for Multicarrier Wireless Data Systems
- Selfish Overlay Network Creation and Maintenance
- Star Block Design in Two-Level Survivable Optical Networks
- Stochastic Model and Connectivity Dynamics for VANETs in Signalized Road Systems
NETWORK AND SERVICE MANAGEMENT PROJECT TITLES (IEEE 2011 Java Network and Service Management Project Titles)
- Low-Overhead End-to-End Performance Measurement for Next Generation Networks
- On the Impact of Security Protocols on the Performance of SNMP
- Locating Equivalent Servants over P2P Networks
CLOUD COMPUTING PROJECT TITLES (IEEE 2011 Java Cloud Computing Project Titles)
- Towards Secure and Dependable Storage Services in Cloud Computing
- Going Back and forth Efficient Multi deployment and multisnapshotting on Clouds
- Enabling public Auditability and data dynamics for storage security in clouding Computing
- Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
- Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
- Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
- Optimization of Resource Provisioning Cost in Cloud Computing
- Performance Analysis of Cloud Computing Services for MTC-Based Scientific Computing
- CloudTPS: Scalable Transactions for Web Applications in the Cloud
DEPENDABLE AND SECURE COMPUTING PROJECT TITLES (IEEE 2011 Java Dependable and Secure Computing Project Titles)
- Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling
- ELMO: Energy Aware Local Monitoring in Sensor Networks
- Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring
- Privacy-Preserving Updates to Anonymous and Confidential Databases
- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
- Low-Energy Symmetric Key Distribution in Wireless Sensor Networks
- Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
- Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
- Online Intrusion Alert Aggregation with Generative Data Stream Modeling
KNOWLEDGE AND DATA ENGINEERING PROJECT TITLES (IEEE 2011 Java Knowledge and Data Engineering Project Titles)
- Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments
- A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
- A Personalized Ontology Model for Web Information Gathering
- A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
- Design and Implementation of an Intrusion Response System for Relational Databases
- Adaptive Cluster Distance Bounding for High Dimensional Indexing
- Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
- Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
- Discovering Conditional Functional Dependencies
- Clustering with Multi-Viewpoint based Similarity Measure KD
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES (IEEE 2011 Java Parallel and Distributed System Project Titles)
- Cooperative Channelization in Wireless Networks with Network Coding
- Video Streaming Distribution in VANETs
- Throughput Optimization in Multihop Wireless Networks with Multipacket Reception and Directional Antennas
- Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
- Network Immunization with Distributed Autonomy-Oriented Entities
- Optimization of Rate Allocation with Distortion Guarantee in Sensor Networks
- A Data Throughput Prediction and Optimization Service for Widely Distributed Many-Task Computing
- Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
- Toward Efficient and Simplified Distributed Data Intensive Computing
IMAGE PROCESSING PROJECT TITLES (IEEE 2011 Java Image Processing Project Titles)
- Nonlocal PDEs-Based Morphology on Weighted Graphs for Image and Data Processing
- Image Segmentation Using Fuzzy Region Competition and Spatial/Frequency Information
- Perceptual Segmentation: Combining Image Segmentation With Object Tagging
- ViBe: A Universal Background Subtraction Algorithm for Video Sequences
- Contextual Kernel and Spectral Methods for Learning the Semantics of Images
- JPEG2000-Based Scalable Interactive Video (JSIV)
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
IEEE JAVA PROJECT TITLES
CLOUD COMPUTING PROJECT TITLES 2011
CLOUD COMPUTING PROJECT TITLES 2011
- Towards Secure and Dependable Storage Services in Cloud Computing
- Going Back and forth Efficient Multi deployment and multisnapshotting on Clouds
- Enabling public Auditability and data dynamics for storage security in clouding Computing
- Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing
- Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
- Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
- Optimization of Resource Provisioning Cost in Cloud Computing
- Performance Analysis of Cloud Computing Services for MTC-Based Scientific Computing
- CloudTPS: Scalable Transactions for Web Applications in the Cloud
- Ensuring Data Storage Security in Cloud Computing, Cloud Computing - 2010
Monday, September 5, 2011
IEEE Java Project Titles in WSN
IEEE Java Project Titles in WSN, 2011
- A Dynamic Intrusion Detection Model Based on Immunity for Wireless Sensor Network
- A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks
- A PCA-based Distributed Approach for Intrusion Detection in Wireless Sensor Networks
- Adaptive Data-Centric Storage in Wireless Sensor Networks
- Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks
- Autonomous Background Coordination Technology for Timely Sensor Connection in Wireless Sensor Networks
- Clustering based Energy Efficient Congestion Aware Protocol for Wireless Sensor Networks
- Continuous Neighbor Discovery in Asynchronous Sensor Networks
- Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
- Energy Conservation using Network Coding in Grid Wireless Sensor Networks
- Energy-Aware Distributed Tracking in Wireless Sensor Networks
- Energy-efficient Trust-based Aggregation in Wireless Sensor Networks
- EPC Energy-aware Probability-based Clustering Algorithm for Correlated Data Gathering in Wireless Sensor Networks
- Fault Management Frameworks in Wireless Sensor Networks
- Fault-Tolerant and Scalable Key
- Honey Ant Based Cooperative Data Accumulation
- Hummingbird Key Establishment Protocol For Low-Power ZigBee
- IBE-Trust A Security Framework for Wireless Sensor Networks
- Key Distribution in Wireless Sensor Networks using Finite Af?ne Plane
- Long Lifetime Routing in Unreliable Wireless Sensor Networks
- MOBINET Mobility Management Across Different Wireless Sensor Networks
- Multi-stage AUV-aided Localization for Underwater Wireless Sensor Networks
- Network Supporting Multilayered Quality of Service Routing in Wireless Sensor Networks
- Performance Analysis of Real-Time Detection in Fusion-Based Sensor Networks
- Prediction or Not An Energy-Efficient Framework for Clustering-Based Data Collection in Wireless Sensor Networks
- Quality-based Event Reliability Protocol in Wireless Sensor Networks
- The Optimal Sleep Control for Wireless Sensor Networks
www.ncct.in, ncctchennai@gmail.com
IEEE Java Project Titles in ADHOC Networking
IEEE Java Project Titles in ADHOC Networking
- A Cellular Automata based Network Security Model
- A Cluster-Based Key Management Scheme for MANET
- A Clustering Algorithm Based on Subjective Trust in MANET
- A Distributed Intrusion Detection System Against Flooding Denial of Services Attacks
- A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
- A Dynamic Context-Aware Access Network Selection for Handover in Heterogeneous Network Environments
- A Virtual Topology for Routing in Adhoc Networks
- AMLeT Adaptive Multi Level Trust framework for MANETs
- Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
- Detecting Forged Acknowledgements in MANETs
- Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
- Forming Vehicular Web of Trust in VANET
- Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Network
- Long-term Reputation System for Vehicular Networking based on Vehicle's Daily Commute Routine
- Mitigating Routing Misbehavior in Dynamic Source Routing Protocl Using Trust-Based Reputation Mechanism for Wireless Ad-Hoc Networks
- Mobility Assisted Routing in Mobile Ad Hoc Networks
- Multi-path Encrypted Data Security Architecture for Mobile Ad hoc Networks
- Reliability Estimate of Mobile Agent System for QoS MANET Applications
- Secure Routing Protocol for Mobile Wireless Sensor Network
- SMSS Symmetric-Masquerade Security Scheme for vanets
- Symmetric Key Approaches to Securing BGP-A Little Bit Trust Is Enough
- TEAM Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks
- The Effect of Direct Interactions on Reputation Based Schemes in Mobile Ad hoc Networks
- TraceGray An Application-layer Scheme for Intrusion Detection in MANET using Mobile Agents
- TrustGuard A Flow-level Reputation-based DDoS Defense System
www.ncct.in, ncctchennai@gmail.com
IEEE Java Project Titles in various Domains
SOFTWARE ENGINEERING, 2011
- The Awareness Network, To Whom Should I Display My Actions And, Whose Actions Should I Monitor
- A Comparative Study of Software Model Checkers as Unit Testing Tools
- Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
- Genetic Algorithms for Randomized Unit Testing
- Semi-Proving An Integrated Method for Program Proving, Testing, and Debugging
- Software Module Clustering as a Multi–Objective Search Problem
- Verifying the Evolution of Probability Distributions Governed by a DTMC
- Embedded extended visual cryptography schemes, INFORMATION FORENSICS AND SECURITY, 2011
- Monitoring Service Systems from a Language-Action Perspective, SERVICE COMPUTING, 2011
- A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, SERVICE COMPUTING, 2011
- Vulnerability Analysis in SOA-based Business Processes, SERVICE COMPUTING, 2011
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816
- Effects of Denial of sleep attacks on wireless sensor networks MAC protocols, Vehicular Technology - 2010
- Upper Bounds for Dynamic Memory Allocation, Computers - 2010
- Data Mining Techniques For Dynamically Classifying And Analyzing Library Database, Datamining - 2010
- Analysis of Computational Time of Simple Estimation of Distribution Algorithms, Evolutionary Computation - 2010
- An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics And Security - 2010
- Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, Multimedia - 2009
- Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions, Neural Networks - 2009
- CHARMY: A Framework for Designing and Verifying Architectural Specifications, Software Engineering - 2009
- Optimized Resource Allocation for Software Release Planning, Software Engineering - 2009
- Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies, Biomedicine - 2009
- Continuous Flow Wireless Data Broadcasting for High Speed Environments, Broadcasting - 2009
- Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, Communications - 2009
- SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, Communications - 2009
- Collusive piracy prevention in P2P content delivery network, Computers - 2009
- A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, Distributed Computing - 2009
- EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks, Industrial Informatics - 2009
- SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - 2009
- Agent Mining: The Synergy of Agents and Data Mining, Intelligent Systems - 2009
- DAIOS - Efficient Dynamic Web Service Invocation, Internet Computing - 2009
- A Survey of Learning-Based Techniques of Email Spam Filtering, Neural Networks - 2008
- Modeling & Automated Containment of Worms, Secure Computing - 2008
- Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems, Software Engineering - 2008
- Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Systems For Secure Systems - 2008
- Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol, Computer and Communication Engineering - 2008
- High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths, Consumer Electronics - 2008
- Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, Data Engineering - 2008
- Online Index Recommendations for High-Dimensional Databases Using Query Workloads, Data Mining - 2008
- BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, Data Mining - 2008
- Face Recognition for Smart Recognitions, Gesture Recognition - 2008
- Protection of Database Security via Collaborative Inference Detection, Intelligence and Security Informatics - 2008
- Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs, Computer Science & Network Security - 2007
- Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm, Intelligent and Advanced Systems - 2007
- An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net, Machine Learning And Cybernetics - 2007
- A Wireless Distributed Intrusion Detection System and a New Attack Model, Computers and Communications - 2006
- Building Intelligent Shopping Assistants Using Individual Consumer Models, Data mining - 2005
- GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions, Data Mining - 2005
- Mobile Objects and Mobile Agents: The Future of Distributed Computing, Distributed Computing - 2004
- ODAM An Optimized Distributed Association Rule Mining Algorithm, Distributed Systems - 2004
- A Reputation based Trust Model for Peer to Peer E - Commerce Communities, E-Commerce Technology - 2003
- Noise Reduction by Fuzzy Image Filtering, Fuzzy Systems - 2003
- Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - 2006
- Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - 2006
- E-Secure Transactions - Secure Electronic Data Interchange over Internet, Internet Computing - 2005
- Face Recognition using Laplacian Faces, Pattern Analysis and Machine Intelligence - 2005
- Online Handwritten Script Recognition, Pattern Analysis and Machine Intelligence - 2004
- Modeling Peer-Peer File Sharing Systems, Web Intelligence - 2003
- Unified Network Monitoring For Web Technology, Web Technology - 2003
- Personal Identification Based On Iris Texture Analysis, 2003
- Location-Aided Routing (LAR) in Mobile Ad Hoc Networks, Wireless Networks - 2000
- Location based Service Routing, 2005
- A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
- Coupling based metrics for measuring the quality of a software
- Demonstration of Secure Sockets Layer Protocol Working and Implementation
- Information Retrieval from Web Search using Keyword Spices
- Security in large Mediator Protocols
- SybilGuard Defending Against Sybil Attacks via Social Networks
- User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
- Towards Multimodal Interfaces for Intrusion Detection, Computer Networks
- Distributed Data Mining in Credit Card Fraud Detection, Datamining & Intelligent Systems
- E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management, Innovative Computing
- Secured Password Based Protocol For Downloading A Private Key, Network and Distributed System
- A Software Defect Report and Tracking System in an Intranet, Software Maintenance and Reengineering
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816
Subscribe to:
Posts (Atom)