IEEE Java Project topics

 

We have all sorts of IEEE java student assignments. Download the new IEEE Java Project topics for students of BE, CSE, and IT engineering.

SL  No.

Project title

1

 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups

2

 Detecting and Resolving Firewall Policy Anomalies

3

 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks

4

 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks.

5

 A Geometric Approach to Improving Active Packet Loss Measurement

6

 A New, Efficient Coordinated Checkpointing Protocol combined with Selective Sender – Based Message Logging

7

 A Precise Termination Condition of the Probabilistic Packet Marking Algorithm

8

 A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Path

9

 A wireless Intrusion detection system and a new attack model

10

 Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud.

11

 Open-source project management tools

12

 Storage management in the peer-to-peer storage utility

13

 Agent-Based Intrusion Detection, Response, and Blocking using the signature method in Active Net

14

 An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs

15

 An Efficient Association Rule Mining Algorithm In Distributed Databases

16

 ANGEL Enhancing the Utility of Generalization For Privacy-Preserving Publication

17

 Application of BPCS Steganography to wavelet compressed video

18

 ATM Networks and Intelligent Packet Filtering

19

 Cloud-Based Video Recommendation System with User behavior Monitoring.

20

 Bandwidth Estimation for IEEE -Based Ad Hoc Networks

21

 Benefit Based Data Caching In Ad Hoc Networks

22

 Capturing Router Congestion and Delay

23

 Clustering and Sequential Pattern Mining of Online Collaborative Learning Data

24

 Computation Efficient Multicast Key Distribution

25

 Constructing Inter-Domain Packet Filters to Control IP

26

 Continuous Monitoring of Spatial Queries in Wireless Broadcast

27

 Controlling IP Spoofing Through Inter-Domain Packet Filters

28

 Controlling IP Spoofing through Inter-domain Packet Filters

29

 COUPLING-BASED STRUCTURAL METRICS FOR MEASURING THE QUALITY OF A SOFTWARE

30

 DAIOS: EFFICIENT DYNAMIC WEB SERVICE INVOCATION

31

 Data leakage detection ()

32

 DCMP – A distributed Cycle Minimization Protocol for Peer to Peer Networks

33

 DCMP A DISTRIBUTED CYCLE MINIMIZATION PROTOCOL FOR PEER-TO-PEER NETWORKS

34

 DEMONSTRATION OF SECURE SOCKET LAYER

35

 Detection of Application Layer DDOS Attack using Hidden Semi Markov Model ()

36

 Distributed cache updating for the dynamic source routing protocol

37

 Distributed cache updating for the dynamic source routing protocol

38

 Distributed cache updating of dynamic source routing protocol

39

 Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks

40

 Dual-Link Failure Resiliency through Backup Link Mutual Exclusion

41

 Dual-Link Failure Resiliency through Backup Link Mutual Exclusion

42

 Dynamic Load Balancing in Distributed Systems in the Presence of Delays

43

 Dynamic Load Balancing in Distributed Systems in the Presence of Delays: A Regeneration Theory Approach

44

 Dynamic Load Balancing in Distributed Systems in the presence of delays  A regeneration theory Approach

45

 Dynamic Routing with Security Considerations

46

 Effective Transmission of Data through RBPH for Group Communication

47

 Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure

48

 Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems

49

 Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries

50

 Efficient Key Agreement for Large and Dynamic Multicast Groups

51

 Efficient Packet Marking for Large-Scale IP Traceback

52

 Energy-Efficient SINR-Based Routing for Multihop Wireless

53

 EnergyMaps For Mobile Wireless networks coherence Time Versus Spreading Period

54

 Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis

55

 EXACT KNOWLEDGE HIDING THROUGH DATABASE EXTENSION

56

 Face recognition for smart interactions

57

 Face Recognition Using Laplacianfaces

58

 Gradient Vector Force – A New External Force for Snakes

59

 Identification of Humans Using Gait

60

 Image Transformation using Grid

61

 Image Transport Protocol ITP

62

 IMPLEMENTATION OF BPCS-STEGANOGRAPHY

63

 Incremental deployment service of Hop by hop multicast routing protocol

64

 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

65

 Large Connectivity for Dynamic Random Geometric Graphs

66

 Layered Approach Using Conditional Random Fields for Intrusion Detection ()

67

 Learning in an Ambient Intelligent World Enabling Technologies and Practices

68

 Locating Friends and Family Using Mobile Phones With GPS

69

 Location-Based Spatial Query Processing In Wireless Broadcast Environments

70

 Lord of the Links – A framework for discovering missing links in the internet topology

71

 Measuring Capacity Bandwidth of Targeted Path Segments

72

 Minimizing File Download Time in Stochastic Peer-to-Peer Networks

73

 Mitigating Performance Degradation in Congested Sensor Networks

74

 Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs

75

 Mitigation OF Control Channel Jamming Under Node Computer Attacks

76

 Mobile Agents In a Distributed Multimedia Database System

77

 Mobility Management Approaches for Mobile IP Networks

78

 Modeling & Automated Containment of Worms

79

 Multiple Routing Configurations for Fast IP Network Recovery

80

 Multiple Sequence alignment using Genetic Algorithm

81

 Network Border Patrol Preventing Congestion Collapse

82

 Node Isolation Model and Age-Based Neighbor Selection in Unstructured PP Networks

83

 Noise Reduction by Fuzzy Image Filtering

84

 Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks

85

 Novel Secure Communication Protocol for Ad Hoc networks

86

 OCGRR – A New Scheduling Algorithm for Differentiated Services Networks

87

 ODAM An Optimized Distributed Association Rule Mining Algorithm

88

 One Too Many Distribution Using Recursive Unicast Trees

89

 Online Handwritten Script Recognition

90

 Online Index Recommendations for High-Dimensional Databases Using Query Workloads

91

 Optimal Server Bandwidth Allocation Among Multiple PP Multicast Live Video Streaming Sessions

92

 PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects

93

 Peer to Peer Messaging System

94

 PEER-TO-PEER (PP) networks

95

 Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction

96

 Personal Authentication Using -D Finger Geometry

97

 Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm

98

 Protection of Database Security via Collaborative Inference Detection

99

 QUIVER Consistent Object Sharing For Edge Services

100

 Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System

Download link:
[wpdm_file id=10]


Free subscription

Receive notifications of new projects by email.

Join 10,458 other subscribers

 

DOWNLOAD NOW 🔥110

FreeStudentProjects

A collection of source codes that I wrote in VB 6.0, ASP.NET, PHP, C#.NET, VB.NET and JAVA in a course of my career as web developer and software engineer that I would like to share to my fellow programmers. Some of the codes here is not my original work that I found over the Internet and Books while I'm learning how to program. I hope you find my work useful in your learning in programming. Please share my work to other people also who interested to learn the basics of web development and programming. Thank you very much and Happy Productive Programming Everyone. for more info please WhatsApp us on +91-9481545735 or Email id: freestudentprojectsindia@gmail.com

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.