Enquiry

Java Projects      Contact : 97893 - 39435 , 95005 - 80005, 96298 - 68306

Code No. Project Title Base Paper Abstract Video
JV123 A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks(IEEE 2015) Download Download
JV124 Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks(IEEE 2015) Download Download
JV125 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation(IEEE 2015) Download Download
JV126 Energy Efficient Virtual Network Embedding for Cloud Networks(IEEE 2015) Download Download
JV127 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks(IEEE 2015) Download Download
JV128 Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing(IEEE 2015) Download Download
JV129 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce(IEEE 2015) Download Download
JV130 Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter(IEEE 2015) Download Download
JV131 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming(IEEE 2015) Download Download
JV132 Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes(IEEE 2015) Download Download
JV133 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks(IEEE 2015) Download Download
JV134 Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks(IEEE 2015) Download Download
JV135 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics (IEEE 2015) Download Download
JV136 Friendbook A Semantic-Based Friend Recommendation System for Social Networks(IEEE 2015) Download Download
JV137 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems(IEEE 2015) Download Download
JV138 Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks(IEEE 2015) Download Download
JV139 Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things (IEEE 2015) Download Download
JV140 Authenticated Key Exchange Protocols for Parallel Network File Systems (IEEE 2015) Download Download
JV141 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks(IEEE 2015) Download Download
JV142 Decentralized Computation Offloading Game for Mobile Cloud Computing(IEEE 2015) Download Download
JV143 A Cocktail Approach for Travel Package Recommendation(IEEE 2016) Download Download
JV144 A Hybrid Cloud Approach for Secure Authorized Deduplication(IEEE 2015) Download Download
JV145 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud(IEEE 2016) Download Download
JV146 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems(IEEE 2016) Download Download
JV147 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data(IEEE 2016) Download Download
JV148 An Incentive Framework for Cellular Traffic Offloading(IEEE 2016) Download Download
JV149 Automatic Test Packet Generation(IEEE 2016) Download Download
JV150 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions(IEEE 2016) Download Download
JV151 BestPeer A Peer-to-Peer Based Large-Scale Data Processing(IEEE 2016) Download Download
JV152 Boundary Cutting for Packet Classification(IEEE 2016) Download Download
JV153 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems(IEEE 2016) Download Download
JV154 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks(IEEE 2016) Download Download
JV155 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes(IEEE 2016) Download Download
JV156 Data Mining with Big Data(IEEE 2016) Download Download
JV157 Dealing With Concept Drifts in Process Mining(IEEE 2016) Download Download
JV158 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds(IEEE 2016) Download Download
JV159 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases(IEEE 2016) Download Download
JV160 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing(IEEE 2016) Download Download
JV161 Efficient Authentication for Mobile and Pervasive Computing(IEEE 2016) Download Download
JV162 Efficient Prediction of Difficult Keyword Queries over Databases(IEEE 2016) Download Download
JV163 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks(IEEE 2016) Download Download
JV164 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage(IEEE 2016) Download Download
JV165 Facilitating Document Annotation Using Content and Querying Value(IEEE 2016) Download Download
JV166 Fast Nearest Neighbor Search with Keywords(IEEE 2016) Download Download
JV167 Friendbook A Semantic-based Friend Recommendation System for Social Networks(IEEE 2015) Download Download
1  |  2  |  3  |  4  |  5  |  6
Call us : 9789339435 / 9500580005 / 9629868306
Mail ID : s3finalyearprojects@gmail.com