You are on page 1of 11

ISOFTIND

2012 JAVA IEEE PROJECTS


S.NO 1 Code ICJ120 1 ICJ120 2 ICJ120 3 Title Ensuring Distributed Accountability for Data Sharing in the Cloud Fast Matrix Embedding by Matrix Extending Firecol: A Collaborative Protection Network for the Detection of Flooding ddos Attacks Learn to Personalized Image Search from the Photo Sharing Websites Cloud data protection for the masses Privacy- and Integrity-Preserving Range Queries in Sensor Networks Ranking Model Adaptation for Domain-Specific Search Game-Theoretic Pricing for Video Streaming in Mobile Networks Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage Fast Data Collection in TreeBased Wireless Sensor Networks Packet-Hiding Methods for Preventing Selective Jamming Attacks A Trigger Identification Service for Defending Reactive Jammers in WSN Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols Domain Secure Computing Network Security Networking Yea r 201 2 201 2 201 2

2 3

ICJ120 4 ICJ120 5 ICJ120 6 ICJ120 7 ICJ120 8 ICJ120 9

Web Mining

201 2 201 2 201 2 201 2 201 2 201 2

5 6

Cloud Computing Networking

7 8 9

Knowledge and Data Engineering Image Processing Parallel & Distributed

10 11

ICJ121 0 ICJ121 1 ICJ121 2 ICJ121 3

Mobile Computing Secure Computing Mobile Computing Mobile Computing

201 2 201 2 201 2 201 2

12

13

1 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
14 ICJ121 4 15 16 17 ICJ121 5 ICJ121 6 ICJ121 7 ICJ121 8 ICJ121 9 ICJ122 0 ICJ122 1 ICJ122 2 ICJ122 3 ICJ122 4 ICJ122 5 ICJ122 6 ICJ122 7 ICJ122 FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multi hop Cellular Networks Organizing user search histories Portable cloud services using tosca Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Trust modeling in social tagging of multimedia content Optimizing Cloud Resources for Delivering IPTV Services through Virtualization An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System Cloud Computing Security From Single to Multi-Clouds An Adaptive Opportunistic Routing Scheme for Wireless Adhoc Networks Slicing: A New Approach to Privacy Preserving Data Publishing A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Multiparty Access Control for Online Social Networks: Model and Mechanisms Risk-Aware Mitigation for MANET Routing Attacks Topology Control in Mobile Ad Hoc Networks with Cooperative Communications Load Balancing Multipath Mobile Computing 201 2 Knowledge and Data Engineering Cloud Computing Mobile Computing Secure Computing Networking 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201

18 19

20

Wireless Communication Cloud Computing Wireless Communication Knowledge and Data Engineering Wireless Network Data Engineering Secure Computing Wireless Communication Networking

21 22

23 24

25

26 27

28

2 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
29 8 ICJ122 9 ICJ123 0 30 Switching System with Flow Slice Online modeling of proactive moderation system for auction fraud detection Automatic discovery of association orders between name and aliases from the web using anchor textsbased co-occurrences Clustering with multi view pointbased similarity measure Efficient fuzzy type-ahead search in xml data Distributed packet buffers for highbandwidth switches and routers Handwritten Chinese text recognition by integrating multiple contexts On optimizing overlay topologies for search in unstructured peer-topeer networks Self adaptive contention aware routing protocol for intermittently connected mobile networks Cut Detection in Wireless Sensor Networks (WSN) Secure Computing Data Mining 2 201 2 201 2

31 32 33 34

ICJ123 1 ICJ123 2 ICJ123 3 ICJ123 4 ICJ123 5 ICJ123 6 ICJ123 7

Knowledge and Data Engineering Knowledge and Data Engineering Parallel & Distributed Pattern Analysis Parallel & Distributed Parallel & Distributed Parallel & Distributed

201 2 201 2 201 2 201 2 201 2 201 2 201 2

35

36

37

2011 JAVA IEEE PROJECTS


S.N O.
1

PROJE CT CODE
ICJ1101

PROJECT TITLE

DOMAIN

YEAR

A NEW APPROACH FOR FEC DECODING BASED ON THE BP ALGORITHM IN LTE AND WIMAX SYSTEMS

NETWORK SECURITY

2011

3 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
2 ICJ1102 A PRIVACY-PRESERVING LOCATION MONITORING SYSTEM FOR WIRELESS 3 4 5 6 ICJ1103 ICJ1104 ICJ1105 ICJ1106 SENSOR NETWORKS BUFFER SIZING FOR 802.11 BASED NETWORKS CLUSTERING WITH MULTI-VIEWPOINT BASED SIMILARITY MEASURE ANALYSIS ON CREDIT CARD FRAUD DETECTION METHODS DELAY ANALYSIS AND OPTIMALITY OF SCHEDULING POLICIES FOR MULTI-HOP 7 8 9 10 11 12 13 ICJ1107 ICJ1108 ICJ1109 ICJ1110 ICJ1111 ICJ1112 ICJ1113 WIRELESS NETWORKS DISCOVERING CONDITIONAL FUNCTIONAL DEPENDENCIES EFFECTIVE NAVIGATION OF QUERY RESULTS BASED ON CONCEPT HIERARCHIES EXTENDED XML TREE PATTERN MATCHING: THEORIES AND ALGORITHMS MODELING AND DETECTION OF CAMOUFLAGING WORM NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS RANKING SPATIAL DATA BY QUALITY PREFERENCES SAT: A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY 14 ICJ1114 IN WIRELESS MESH NETWORKS SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD 15 16 ICJ1115 ICJ1116 COMPUTING SKETCH4MATCH CONTENT-BASED IMAGE RETRIEVAL SYSTEM USING SKETCHES ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND 17 18 ICJ1117 ICJ1118 SELECTIVE EMBEDDING A COMPETITIVE STUDY OF CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER A DUAL FRAMEWORK AND ALGORITHMS DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING SECURE COMPUTING SECURE COMPUTING DATA ENGINEERING SECURE COMPUTING CLOUD COMPUTING IMAGE PROCESSING VIDEO TECHNOLOGY SECURE COMPUTING DATA 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 MOBILE COMPUTING NETWORKING DATA ENGINEERING DATA ENGINEERING NETWORKING 2011 2011 2011 2011 2011

4 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
19 20 ICJ1119 ICJ1120 FOR TARGETED ONLINE DATA DELIVERY EMBEDDED EXTENDED VISUAL CRYPTOGRAPHY SCHEMES SCALABLE AND COST-EFFECTIVE INTERCONNECTION OF DATA-CENTER 21 22 ICJ1121 ICJ1122 SERVERS USING DUAL SERVER PORTS CLOUD COMPUTING FOR AGENT-BASED URBAN TRANSPORTATION SYSTEMS SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC 23 ICJ1123 NETWORKS A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT 24 ICJ1124 RELATIONS IN SHORT TEXTS CACHING STRATEGIES BASED ON INFORMATION DENSITY ESTIMATION IN 25 26 27 ICJ1125 ICJ1126 ICJ1127 WIRELESS AD HOC NETWORKS OPTIMAL BANDWIDTH ASSIGNMENT FOR MULTIPLE DESCRIPTION CODED VIDEO A FUZZY SELF-CONSTRUCTING FEATURE CLUSTERING ALGORITHM FOR TEXT 28 ICJ1128 CLASSIFICATION GOING BACK AND FORTH: EFFICIENT MULTIDEPLOYMENT AND 29 30 31 32 33 ICJ1129 ICJ1130 ICJ1131 ICJ1132 ICJ1133 MULTISNAPSHOTTING ON CLOUDS LIVE STREAMING WITH RECEIVER-BASED PEER-DIVISION MULTIPLEXING THE COQUOS APPROACH TO CONTINUOUS QUERIES IN UNSTRUCTURED OVERLAYS SELFISH OVERLAY NETWORK CREATION AND MAINTENANCE THROUGHPUT OPTIMIZATION IN MOBILE BACKBONE NETWORKS LOCATING EQUIVALENT SERVANTS OVER P2P NETWORKS 34 ICJ1134 IMPROVING UTILIZATION OF CLOUD COMPUTING NETWORKING DATA ENGINEERING NETWORKING MOBILE COMPUTING NETWORK & SERVICE MANAGEMENT CLOUD 2011 2011 2011 2011 2011 2011 2011 DATA MINING 2011 2011 MULTI MEDIA 2011 INTELLIGENT SYSTEMS MOBILE COMPUTING DATA ENGINEERING NETWORKING 2011 2011 2011 2011 ENGINEERING SECURITY NETWORKING 2011 2011

5 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
35 ICJ1135 INFRASTRUCTURE CLOUDS WIRELESS SENSOR NETWORK SECURITY MODEL USING ZERO KNOWLEDGE 36 ICJ1136 PROTOCOL SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD 37 ICJ1137 COMPUTING A STUDY ON CERTIFICATE REVOCATION IN MOBILE AD HOC NETWORKS COMPUTING MOBILE COMPUTING CLOUD COMPUTING COMMUNICATI ONS(MOBILE COMPUTING) 38 ICJ1138 AN EFFICIENT SELF-ORGANIZED AUTHENTICATION AND KEY MANAGEMENT SCHEME FOR DISTRIBUTED MULTIHOP RELAYBASED IEEE 802.16 NETWORKS ADVANCED ROUTING TECHNOLOGY FOR FAST INTERNET FUNDAMENTAL LIMITS OF INFORMATION DISSEMINATION IN WIRELESS AD HOC NETWORKSPART II: MULTI-PACKET RECEPTION VORONOI-BASED CONTINUOUS QUERY PROCESSING FOR MOBILE USERS SECURE COMPUTING 2011 2011 2011 2011

39

ICJ1139

ADVANCED COMMUNICATI ON WIRELESS COMMUNICATI ONS COMMUNICATI ONS & NETWORKING

2011

40

ICJ1140

2011

41

ICJ1141

2011

2010 JAVA IEEE PROJECTS


S.NO 1 PROJEC T CODE ICJ1001 PROJECT TITLE DOMAIN DISTRIBUTED SYSTEMS NETWORKING YEA R 201 0 201 0 201 0

A DISTRIBUTED PROTOCOL TO SERVE DYNAMIC GROUPS FOR PEER-TO-PEER STREAMING A REVIEW OF THE APPLICATIONS OF AGENT TECHNOLOGY IN TRAFFIC AND TRANSPORTATION SYSTEMS ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS

ICJ1002

ICJ1003

NETWORKING

6 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
4 5 6 ICJ1004 ICJ1005 ICJ1006 ALWAYS ACYCLIC DISTRIBUTED PATH BANDWIDTH RECYCLING IN IEEE 802.16 NETWORKS COOPERATIVE CACHING IN WIRELESS P2PNETWORKS: DESIGN, 7 8 ICJ1007 ICJ1008 IMPLEMENTATION, AND EVALUATION CORRELATION-BASED TRAFFIC ANALYSIS ATTACKS ON ANONYMITY NETWORKS DISTRIBUTED EXPLICIT RATE SCHEMES IN MULTI-INPUTMULTI-OUTPUT NETWORK 9 10 11 ICJ1009 ICJ1010 ICJ1011 SYSTEMS ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING HOST-TO-HOST CONGESTION CONTROL FOR TCP KTR AN EFFICIENT KEY MANAGEMENT SCHEME FOR SECURE DATA ACCESS CONTROL IN WIRELESS BROADCAST 12 ICJ1012 SERVICES LABEL-BASED DV-HOP LOCALIZATION AGAINST WORMHOLE ATTACKS IN 13 ICJ1013 WIRELESS SENSOR NETWORKS LAYERED APPROACH USING CONDITIONAL RANDOM FIELDS FOR INTRUSION 14 15 ICJ1014 ICJ1015 DETECTION MESH BASED MULTICAST ROUTING IN MANET: STABLE LINK BASED APPROACH MODIFIED DSR (PREEMPTIVE) TO REDUCE LINK BREAKAGE AND ROUTING OVERHEAD FOR MANET USING PROACTIVE ROUTE 16 17 18 ICJ1016 ICJ1017 ICJ1018 MAINTENANCE (PRM) MONITORING PATIENTS VIA A SECURE AND MOBILE HEALTHCARE SYSTEM MULTICAST MULTI-PATH POWER EFFICIENT ROUTING IN MOBILE ADHOC NETWORKS ON MODELING, ANALYSIS, AND TRANSACTION WIRELESS WIRELESS COMMUNICATI ONS NETWORKING 201 0 201 0 201 TRANSACTION S WIRELESS SECURE COMPUTING TRANSACTION WIRELESS NETWORKING 201 0 201 0 201 0 201 0 CLOUD COMPUTING NETWORKING SECURE COMPUTING NETWORKING NETWORKING DISTRIBUTED SYSTEMS DISTRIBUTED SYSTEMS NETWORKING 201 0 201 0 201 0 201 0 201 0 201 0 201 0 201 0

7 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
OPTIMIZATION OF PACKET AGGREGATION 19 20 21 22 23 ICJ1019 ICJ1020 ICJ1021 ICJ1022 ICJ1023 SYSTEMS RANDOM ACCESS TRANSPORT CAPACITY IRM: INTEGRATED FILE REPLICATION AND CONSISTENCY MAINTENANCE IN P2P SYSTEMS RANDOM ACCESS TRANSPORT CAPACITY CLIENT-SIDE LOAD BALANCER USING CLOUD. OPTIMAL JAMMING ATTACKS AND NETWORK DEFENSE POLICIES IN WIRELESS SENSOR NETWORKS A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS TRANSACTION WIRELESS DISTRIBUTED SYSTEMS TRANSACTION WIRELESS CLOUD COMPUTING NETWORKING 0 201 0 201 0 201 0 201 0 201 0 201 0

24

ICJ1024

NETWORKIN G

CORE JAVA APPLICATIONS PROJECTS


1. ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE NETWORKS 2. CHATING MANAGEMENT SYSTEM 3. CLIENT SERVER PROTOCOL IMPLEMENTATION 4. COLLEGE ATTENDENCE SYSTEM 5. COMPUTER ASSISTED HUMAN RELATIOS TRACKING 6. CONGESTION CONTROL USING NETWORK BASED PROTOCOL 7. DATA TRANSMISSION USING MULTITASKING SOCKETS 8. DISTRIBUTED CYCLE MINIMIZATION PROTOCOL 9. EFFECTIVE TRANSMISSION OF DATA THROUGH RBPH FOR GROUP COMMUINICATION 10. 11. 12. 13. 14. EFFICIENT KEY MANAGEMENT FOR THRESHOLD EMPOWERING THE RMI IN JAVA APPROACH ERROR CONTROL SYSTEM IN NETWORK ENVIRONMENT ERROR TRCKING SYSTEM GRAPHICAL USER INTERFACE -MULTISIGNATURE IN DIDTRIBUTED SYSTEMS

8 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. GROUP KEY MANAGEMENT AND SECURED PROTOCOLS FOR IMAGE ENHANCEMENT TECHNOLOGY IMPLEMENTATION OF BPCS STEGANOGRAPHY INCREASING EFFICIENCY IN WIRELESS NETWORK J TEXT EDITOR JCHART LAYER TO FORWARD PROTOCOL LOAD BALANCING NATURAL LANGUAGE PROCESSING NET SURVEY SIMULATION NETWORK BORDER PATROL NETWORK DATABASE JUNCTION NETWORK ROUTING PROPOSED KEY GENERATION FOR MULTIMEDIA APPLICATIONS RE-ORDERING OF PACKETS USING RETRANSMISSION TIMER SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY SELF INTERESTED ROUTING IN ONLINE ENVIRONMENT SV-HOSPITAL MANAGEMENT TERMINODE REMOTE ROUTING THREE PARTY AUTHENTICATION FOR KEY DISTRIBUTION VIDEO CONFERENCING SYSTEM WEB DESK PEER GROUP COMMUNICATION

PROTOCOL USING CLASSICAL AND QUANTUM CRYPTOGRAPHY

JAVA WEBBASED APPLICATIONS PROJECTS


1. ADDITION MODIFICATION AND REPLACEMENT 2. ADXPRESS 3. AMBULANCE SERVICE PROVIDER 4. AUTOMATED SPORTS CLUB 5. AUTOMOBILE STORE AND SERVICE 6. BUG TRACKING 7. Bug Tracking System 8. COLLEGE INFORMATION SYSTEM 9 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
9. COMPUTERIZED LENDING SYSTEM 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. CONFINED WEB SPIDER CONTROL SYSTEM TRACK CORPORATE HOSPITAL HEALTH CARD COURIER SERVICE CREATIVE INSURANCE CRIME INVESTIGATION SYSTEM CRM FOR AIRLINE INDUSTRY CYBER SHOPPING DOCTOR ONLINE E-CLASSIFIEDS E-CONSULTANCY ELEARN ELECTRONIC DESCRIPTIVE EXAMINATION E-MUSIC E-POSTOFFICE E-VOTING EZEE MAIL SYSTEM E-Corporate Project Planning Employee Resource Info system FINANCE MANAGEMENT(APSFC) FORESTRY MANAGEMENT SYSTEM FUJJI DISTRIBUTION GLOBAL COMMUNICATION MEDIA HOTEL MANAGEMENT SYSTEM HUMAN RESOURCE PLANNER IMAGE PROCESSING IMMEGRATION(MEDICAL STAFF) INFORMATION TREASURY MOBILE SERVICE MANAGEMENT NET AUCTIONS NET BANKING NETWORK PROTOCOL SIMULATION

10 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

ISOFTIND
42. 43. 44. 45. 46. 47. 48. 49. 50. 51. ONLINE ADMISSION SYSTEM ONLINE LIBRARY ONLINE ORDER PROCESSING SYSTEM WITH AJAX ENABLED ONLINE RESULTS ONLINE SELECTION PAYROLL PESTICIDES INFORMATION SYSTEM PLACEMENT ACTIVITY SYSTEM PROJECT MANAGEMENT INFORMATION SYSTEM RAILWAY ROUTE SYSTEM

11 Plot num: 103, Opp yashoda hospital, somajiguda, hyderabad,

You might also like