Enquiry

Java Projects      Contact:9789339435 ; 9500580005

Code No. Project Title Base Paper Abstract Video
JV56 A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks(IEEE 2015) Download Download
JV57 Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks(IEEE 2015) Download Download
JV58 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation(IEEE 2015) Download Download
JV59 Energy Efficient Virtual Network Embedding for Cloud Networks(IEEE 2015) Download Download
J60 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks(IEEE 2015) Download Download
JV61 Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing(IEEE 2015) Download Download
JV62 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce(IEEE 2015) Download Download
JV63 Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter(IEEE 2015) Download Download
JV64 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming(IEEE 2015) Download Download
JV65 Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes(IEEE 2015) Download Download
JV66 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks(IEEE 2015) Download Download
JV67 Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks(IEEE 2015) Download Download
JV68 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics (IEEE 2015) Download Download
JV69 Friendbook A Semantic-Based Friend Recommendation System for Social Networks(IEEE 2015) Download Download
JV70 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems(IEEE 2015) Download Download
JV71 Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks(IEEE 2015) Download Download
JV72 Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things (IEEE 2015) Download Download
JV73 Authenticated Key Exchange Protocols for Parallel Network File Systems (IEEE 2015) Download Download
JV74 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks(IEEE 2015) Download Download
JV75 Decentralized Computation Offloading Game for Mobile Cloud Computing(IEEE 2015) Download Download
JV76 A Cocktail Approach for Travel Package Recommendation(IEEE 2016) Download Download
JV77 A Hybrid Cloud Approach for Secure Authorized Deduplication(IEEE 2015) Download Download
JV78 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud(IEEE 2016) Download Download
JV79 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems(IEEE 2016) Download Download
JV80 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data(IEEE 2016) Download Download
JV81 An Incentive Framework for Cellular Traffic Offloading(IEEE 2016) Download Download
JV82 Automatic Test Packet Generation(IEEE 2016) Download Download
JV83 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions(IEEE 2016) Download Download
JV84 BestPeer A Peer-to-Peer Based Large-Scale Data Processing(IEEE 2016) Download Download
JV85 Boundary Cutting for Packet Classification(IEEE 2016) Download Download
JV86 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems(IEEE 2016) Download Download
JV87 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks(IEEE 2016) Download Download
JV88 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes(IEEE 2016) Download Download
JV89 Data Mining with Big Data(IEEE 2016) Download Download
JV90 Dealing With Concept Drifts in Process Mining(IEEE 2016) Download Download
JV91 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds(IEEE 2016) Download Download
JV92 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases(IEEE 2016) Download Download
JV93 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing(IEEE 2016) Download Download
JV94 Efficient Authentication for Mobile and Pervasive Computing(IEEE 2016) Download Download
JV95 Efficient Prediction of Difficult Keyword Queries over Databases(IEEE 2016) Download Download
JV96 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks(IEEE 2016) Download Download
JV97 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage(IEEE 2016) Download Download
JV98 Facilitating Document Annotation Using Content and Querying Value(IEEE 2016) Download Download
JV99 Fast Nearest Neighbor Search with Keywords(IEEE 2016) Download Download
JV100 Friendbook A Semantic-based Friend Recommendation System for Social Networks(IEEE 2015) Download Download
1  |  2  |  3  |  4  |  5  |  6
Call us : 9789339435 / 9500580005
Mail ID : finalyearprojects@s3techindia.com