SlideShare a Scribd company logo
1 of 5
Download to read offline
I3E TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 99436 99916 / 99436 99926/ 99436 99936
IEEE 2015-2016 JAVA TITLES
BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS
***Document Format***
Abstract: Introduction: Literature Survey:
System Analysis: Existing System: Disadvantages:
Proposed System: Advantages: System Requirements:
Block Diagram: Dataflow Diagram: UML Diagrams:
Use Case Diagram: Class Diagram: Sequence Diagram:
Activity Diagram: Implementation: Modules Description:
System Study: System Testing: Software Description:
Sample code: Conclusion: References:
***Complete Document ***
I3E TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 99436 99916 / 99436 99926/ 99436 99936
WIRELESS NETWORK TOPOLOGY DOMAIN YEAR
A Topology Potential-Based Method for Identifying Essential Proteins from PPI
Networks
JAVA APR/2015
Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks JAVA APR/2015
Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With
Network Coding and Successive Interference Cancelation
JAVA APR/2015
Energy Efficient Virtual Network Embedding for Cloud Networks JAVA MAY/2015
Statistical Dissemination Control in Large Machine-to-Machine Communication
Networks
JAVA APR/2015
NETWORK SECURITY DOMAIN YEAR
Distributed Denial of Service Attacks in Software-Defined Networking with
Cloud Computing
JAVA APR/2015
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce JAVA MAR/2015
Passive IP Traceback Disclosing the Locations of IP Spoofers From Path
Backscatter
JAVA MAR/2015
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling
and Linear Programming
JAVA MAR/2015
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted
Relay Nodes
JAVA MAR/2015
MOBILE COMPUTING DOMAIN YEAR
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in
Heterogeneous Wireless Networks
JAVA APR/2015
Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse
Underwater Sensor Networks
JAVA MAY/2015
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks
with Delay-Constrained Traffics
JAVA APR/2015
Friendbook A Semantic-Based Friend Recommendation System for Social
Networks
JAVA MAR/2015
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems JAVA MAR/2015
I3E TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 99436 99916 / 99436 99926/ 99436 99936
PARALLEL & DISTRIBUTED DOMAIN
Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks JAVA MAR/2015
Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of
Things
JAVA MAR/2015
Authenticated Key Exchange Protocols for Parallel Network File Systems JAVA APR/2015
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor
Networks
JAVA APR/2015
Decentralized Computation Offloading Game for Mobile Cloud Computing JAVA APR/2015
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol
Design
JAVA APR/2015
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
JAVA APR/2015
Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing
Algorithm
JAVA MAR/2015
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor
Networks
JAVA MAR/2015
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless
Networks
JAVA MAR/2015
CLOUD COMPUTING DOMAIN
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
Computing
JAVA MAR/2015
A Scalable and Reliable Matching Service for Content-Based Publish Subscribe
Systems
JAVA MAR/2015
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud
Data Through Blind Storage
JAVA MAR/2015
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-
dictionaries over Encrypted Cloud Data
JAVA FEB/2015
Governance Model for Cloud Computing in Building Information Management JAVA MAR/2015
Identity-Based Encryption with Outsourced Revocation in Cloud Computing JAVA FEB/2015
Performing Initiative Data Prefetching in Distributed File Systems for Cloud
Computing
JAVA MAR/2015
Proof of ownership in deduplicated cloud storage with mobile device efficiency JAVA APR/2015
I3E TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 99436 99916 / 99436 99926/ 99436 99936
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User
Revocation
JAVA APR/2015
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud
Computing
JAVA JAN/2015
WEB SERVICES DOMAIN YEAR
Automatic Web Service Composition Based on Uncertainty Execution Effects JAVA APR/2015
Constructing a Global Social Service Network for Better Quality of Web Service
Discovery
JAVA APR/2015
Data-Driven Composition for Service-Oriented Situational Web Applications JAVA FEB/2015
Designing High Performance Web-Based Computing Services to Promote
Telemedicine Database Management System
JAVA FEB/2015
Diversifying Web Service Recommendation Results via Exploring Service Usage
History
JAVA FEB/2015
WEB MINING DOMAIN YEAR
Constructing Query-Driven Dynamic Machine Learning Model With Application
to Protein-Ligand Binding Sites Prediction
JAVA JAN/2015
Improving Web Navigation Usability by Comparing Actual and Anticipated Usage JAVA FEB/2015
Network-Based Modeling and Intelligent Data Mining of Social Media for
Improving Care
JAVA JAN/2015
Quality of Experience User’s Perception about Web Services JAVA FEB/2015
Real-Time Detection of Traffic From Twitter Stream Analysis JAVA FEB/2015
DATA MINING OR DATA ENGINEERING DOMAIN
k-Nearest Neighbor Classification over Semantically Secure Encrypted
Relational Data
JAVA MAY/2015
A Ranking Approach on Large-Scale Graph With Multidimensional
Heterogeneous Information
JAVA APR/2015
Rank-Based Similarity Search Reducing the Dimensional Dependence JAVA JAN/2015
Distributed Multi-Agent Online Learning Based on Global Feedback JAVA MAY/2015
Efficient Motif Discovery for Large-scale Time Series in Healthcare JAVA MAR/2015
Trusted Performance Analysis on Systems With a Shared Memory JAVA FEB/2015
I3E TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 99436 99916 / 99436 99926/ 99436 99936
IMAGE PROCESSING DOMAIN
Combining Left and Right Palmprint Images for More Accurate Personal
Identification
JAVA FEB/2015
Learning Compact Binary Face Descriptor for Face Recognition JAVA MAR/2015
Localized Multi-Feature Metric Learning for Image Set Based Face Recognition JAVA MAR/2015
Multiscale Logarithm Difference Edgemaps for Face Recognition Against Varying
Lighting Conditions
JAVA MAR/2015
Iterative Vessel Segmentation of Fundus Images JAVA FEB/2015
Content Based Image Retrieval by Metric Learning from Radiology Reports
Application to Interstitial Lung Diseases
JAVA MAR/2015
EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval JAVA JAN/2015
Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding
Features
JAVA MAR/2015
Local Diagonal Extrema Pattern A New and Efficient Feature Descriptor for CT
Image Retrieval
JAVA SEP/2015
An AdaBoost-Based Face Detection System Using Parallel Configurable
Architecture With Optimized Computation
JAVA APR/2015
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT JAVA FEB/2015
Towards Practical Self-Embedding for JPEG-Compressed Digital Images JAVA FEB/2015
BIG DATA DOMAIN
Real-Time Big Data Analytical Architecture for Remote Sensing Application JAVA MAY/2015
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud JAVA FEB/2015
Research Directions for Engineering Big Data Analytics Software JAVA FEB/2015
Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors JAVA MAY/2015
Multilayer Big Data Architecture for Remote Sensing in Eolic Parks JAVA APR/2015
Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage JAVA APR/2015
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data
Applications
JAVA APR/2015
Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data
Platforms
JAVA APR/2015
Predicting Asthma-Related Emergency Department Visits Using Big Data JAVA FEB/2015

More Related Content

Viewers also liked

SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETSSECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETSI3E Technologies
 
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKSTOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKSI3E Technologies
 
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESTOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESI3E Technologies
 
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSWORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSI3E Technologies
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...I3E Technologies
 
RELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMS
RELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMSRELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMS
RELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMSI3E Technologies
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...I3E Technologies
 
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARERESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWAREI3E Technologies
 
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...I3E Technologies
 
STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...
STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...
STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...I3E Technologies
 
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...I3E Technologies
 
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...I3E Technologies
 
NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...
NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...
NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...I3E Technologies
 
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...I3E Technologies
 
SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS
SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS
SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS I3E Technologies
 
STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...
STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...
STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...I3E Technologies
 
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...I3E Technologies
 

Viewers also liked (19)

SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETSSECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
 
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKSTOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
 
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESTOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
 
Project Video
Project VideoProject Video
Project Video
 
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSWORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
 
RELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMS
RELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMSRELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMS
RELATIONAL COLLABORATIVE TOPIC REGRESSION FOR RECOMMENDER SYSTEMS
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
 
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARERESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
 
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
 
STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...
STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...
STOCHASTIC DECISION MAKING FOR ADAPTIVE CROWDSOURCING IN MEDICAL BIG-DATA PLA...
 
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
 
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
 
NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...
NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...
NETWORK-BASED MODELING AND INTELLIGENT DATA MINING OF SOCIAL MEDIA FOR IMPROV...
 
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
 
SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS
SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS
SUBSPACE LEARNING AND IMPUTATION FOR STREAMING BIG DATA MATRICES AND TENSORS
 
STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...
STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...
STATE-CLUSTERING BASED MULTIPLE DEEP NEURAL NETWORKS MODELING APPROACH FOR SP...
 
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
 
Add
AddAdd
Add
 

Similar to 2015 2016 ieee java project titles

IEEE JAVA .NET Project titles
IEEE JAVA .NET Project titlesIEEE JAVA .NET Project titles
IEEE JAVA .NET Project titlesI3E Technologies
 
2014 IEEE DATA MINING PROJECTS
2014 IEEE DATA MINING PROJECTS2014 IEEE DATA MINING PROJECTS
2014 IEEE DATA MINING PROJECTSEcway Karur
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Sameer_Updated_Profile
Sameer_Updated_ProfileSameer_Updated_Profile
Sameer_Updated_ProfileSAMEER BASHA
 
Backend for Frontend in Microservices
Backend for Frontend in MicroservicesBackend for Frontend in Microservices
Backend for Frontend in MicroservicesIRJET Journal
 
Islam Salah Elshenawy Elshenawy - Software Testing Lead Specialist
Islam Salah Elshenawy Elshenawy - Software Testing Lead SpecialistIslam Salah Elshenawy Elshenawy - Software Testing Lead Specialist
Islam Salah Elshenawy Elshenawy - Software Testing Lead SpecialistIslam Elshenawy
 
Why and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in AzureWhy and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in AzureRiverbed Technology
 
Why and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureWhy and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureIan Downard
 
Anmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol Rattan Shergill
 
Anmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol Rattan Shergill
 
Anmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol Rattan Shergill
 
Neural Net: Machine Learning Web Application
Neural Net: Machine Learning Web ApplicationNeural Net: Machine Learning Web Application
Neural Net: Machine Learning Web ApplicationIRJET Journal
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mcaJPINFOTECH JAYAPRAKASH
 
ieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesJPINFOTECH JAYAPRAKASH
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherryJPINFOTECH JAYAPRAKASH
 

Similar to 2015 2016 ieee java project titles (20)

IEEE JAVA .NET Project titles
IEEE JAVA .NET Project titlesIEEE JAVA .NET Project titles
IEEE JAVA .NET Project titles
 
Mobile ommunication for Rubber cultivation
Mobile ommunication for Rubber cultivationMobile ommunication for Rubber cultivation
Mobile ommunication for Rubber cultivation
 
2014 IEEE DATA MINING PROJECTS
2014 IEEE DATA MINING PROJECTS2014 IEEE DATA MINING PROJECTS
2014 IEEE DATA MINING PROJECTS
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE
 
Sameer_Updated_Profile
Sameer_Updated_ProfileSameer_Updated_Profile
Sameer_Updated_Profile
 
2015 2016 ieee java project titles
2015 2016 ieee java project titles2015 2016 ieee java project titles
2015 2016 ieee java project titles
 
Backend for Frontend in Microservices
Backend for Frontend in MicroservicesBackend for Frontend in Microservices
Backend for Frontend in Microservices
 
Islam Salah Elshenawy Elshenawy - Software Testing Lead Specialist
Islam Salah Elshenawy Elshenawy - Software Testing Lead SpecialistIslam Salah Elshenawy Elshenawy - Software Testing Lead Specialist
Islam Salah Elshenawy Elshenawy - Software Testing Lead Specialist
 
Why and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in AzureWhy and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in Azure
 
Why and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureWhy and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in Azure
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
 
Anmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineering
 
Anmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineering
 
Anmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineeringAnmol rattan shergill info resume m.s.electrical engineering
Anmol rattan shergill info resume m.s.electrical engineering
 
Neural Net: Machine Learning Web Application
Neural Net: Machine Learning Web ApplicationNeural Net: Machine Learning Web Application
Neural Net: Machine Learning Web Application
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca
 
ieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniques
 
ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherry
 

More from I3E Technologies

Design of a low voltage low-dropout regulator
Design of a low voltage low-dropout regulatorDesign of a low voltage low-dropout regulator
Design of a low voltage low-dropout regulatorI3E Technologies
 
An efficient constant multiplier architecture based on vertical horizontal bi...
An efficient constant multiplier architecture based on vertical horizontal bi...An efficient constant multiplier architecture based on vertical horizontal bi...
An efficient constant multiplier architecture based on vertical horizontal bi...I3E Technologies
 
Aging aware reliable multiplier design with adaptive hold logic
Aging aware reliable multiplier design with adaptive hold logicAging aware reliable multiplier design with adaptive hold logic
Aging aware reliable multiplier design with adaptive hold logicI3E Technologies
 
A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...I3E Technologies
 
A generalized algorithm and reconfigurable architecture for efficient and sca...
A generalized algorithm and reconfigurable architecture for efficient and sca...A generalized algorithm and reconfigurable architecture for efficient and sca...
A generalized algorithm and reconfigurable architecture for efficient and sca...I3E Technologies
 
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
A combined sdc sdf architecture for normal i o pipelined radix-2 fftA combined sdc sdf architecture for normal i o pipelined radix-2 fft
A combined sdc sdf architecture for normal i o pipelined radix-2 fftI3E Technologies
 
Reverse converter design via parallel prefix adders novel components, method...
Reverse converter design via parallel prefix adders  novel components, method...Reverse converter design via parallel prefix adders  novel components, method...
Reverse converter design via parallel prefix adders novel components, method...I3E Technologies
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingI3E Technologies
 
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...I3E Technologies
 
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...I3E Technologies
 
Ultrasparse ac link converters
Ultrasparse ac link convertersUltrasparse ac link converters
Ultrasparse ac link convertersI3E Technologies
 
Single inductor dual-output buck–boost power factor correction converter
Single inductor dual-output buck–boost power factor correction converterSingle inductor dual-output buck–boost power factor correction converter
Single inductor dual-output buck–boost power factor correction converterI3E Technologies
 
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
Ripple minimization through harmonic elimination in asymmetric interleaved mu...Ripple minimization through harmonic elimination in asymmetric interleaved mu...
Ripple minimization through harmonic elimination in asymmetric interleaved mu...I3E Technologies
 
Resonance analysis and soft switching design of isolated boost converter with...
Resonance analysis and soft switching design of isolated boost converter with...Resonance analysis and soft switching design of isolated boost converter with...
Resonance analysis and soft switching design of isolated boost converter with...I3E Technologies
 
Reliability evaluation of conventional and interleaved dc–dc boost converters
Reliability evaluation of conventional and interleaved dc–dc boost convertersReliability evaluation of conventional and interleaved dc–dc boost converters
Reliability evaluation of conventional and interleaved dc–dc boost convertersI3E Technologies
 
Power factor corrected zeta converter based improved power quality switched m...
Power factor corrected zeta converter based improved power quality switched m...Power factor corrected zeta converter based improved power quality switched m...
Power factor corrected zeta converter based improved power quality switched m...I3E Technologies
 
Pfc cuk converter fed bldc motor drive
Pfc cuk converter fed bldc motor drivePfc cuk converter fed bldc motor drive
Pfc cuk converter fed bldc motor driveI3E Technologies
 
Optimized operation of current fed dual active bridge dc dc converter for pv ...
Optimized operation of current fed dual active bridge dc dc converter for pv ...Optimized operation of current fed dual active bridge dc dc converter for pv ...
Optimized operation of current fed dual active bridge dc dc converter for pv ...I3E Technologies
 
Online variable topology type photovoltaic grid-connected inverter
Online variable topology type photovoltaic grid-connected inverterOnline variable topology type photovoltaic grid-connected inverter
Online variable topology type photovoltaic grid-connected inverterI3E Technologies
 
Offline soft switched led driver based on an integrated bridgeless boost–asym...
Offline soft switched led driver based on an integrated bridgeless boost–asym...Offline soft switched led driver based on an integrated bridgeless boost–asym...
Offline soft switched led driver based on an integrated bridgeless boost–asym...I3E Technologies
 

More from I3E Technologies (20)

Design of a low voltage low-dropout regulator
Design of a low voltage low-dropout regulatorDesign of a low voltage low-dropout regulator
Design of a low voltage low-dropout regulator
 
An efficient constant multiplier architecture based on vertical horizontal bi...
An efficient constant multiplier architecture based on vertical horizontal bi...An efficient constant multiplier architecture based on vertical horizontal bi...
An efficient constant multiplier architecture based on vertical horizontal bi...
 
Aging aware reliable multiplier design with adaptive hold logic
Aging aware reliable multiplier design with adaptive hold logicAging aware reliable multiplier design with adaptive hold logic
Aging aware reliable multiplier design with adaptive hold logic
 
A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...
 
A generalized algorithm and reconfigurable architecture for efficient and sca...
A generalized algorithm and reconfigurable architecture for efficient and sca...A generalized algorithm and reconfigurable architecture for efficient and sca...
A generalized algorithm and reconfigurable architecture for efficient and sca...
 
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
A combined sdc sdf architecture for normal i o pipelined radix-2 fftA combined sdc sdf architecture for normal i o pipelined radix-2 fft
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
 
Reverse converter design via parallel prefix adders novel components, method...
Reverse converter design via parallel prefix adders  novel components, method...Reverse converter design via parallel prefix adders  novel components, method...
Reverse converter design via parallel prefix adders novel components, method...
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
 
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
 
Ultrasparse ac link converters
Ultrasparse ac link convertersUltrasparse ac link converters
Ultrasparse ac link converters
 
Single inductor dual-output buck–boost power factor correction converter
Single inductor dual-output buck–boost power factor correction converterSingle inductor dual-output buck–boost power factor correction converter
Single inductor dual-output buck–boost power factor correction converter
 
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
Ripple minimization through harmonic elimination in asymmetric interleaved mu...Ripple minimization through harmonic elimination in asymmetric interleaved mu...
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
 
Resonance analysis and soft switching design of isolated boost converter with...
Resonance analysis and soft switching design of isolated boost converter with...Resonance analysis and soft switching design of isolated boost converter with...
Resonance analysis and soft switching design of isolated boost converter with...
 
Reliability evaluation of conventional and interleaved dc–dc boost converters
Reliability evaluation of conventional and interleaved dc–dc boost convertersReliability evaluation of conventional and interleaved dc–dc boost converters
Reliability evaluation of conventional and interleaved dc–dc boost converters
 
Power factor corrected zeta converter based improved power quality switched m...
Power factor corrected zeta converter based improved power quality switched m...Power factor corrected zeta converter based improved power quality switched m...
Power factor corrected zeta converter based improved power quality switched m...
 
Pfc cuk converter fed bldc motor drive
Pfc cuk converter fed bldc motor drivePfc cuk converter fed bldc motor drive
Pfc cuk converter fed bldc motor drive
 
Optimized operation of current fed dual active bridge dc dc converter for pv ...
Optimized operation of current fed dual active bridge dc dc converter for pv ...Optimized operation of current fed dual active bridge dc dc converter for pv ...
Optimized operation of current fed dual active bridge dc dc converter for pv ...
 
Online variable topology type photovoltaic grid-connected inverter
Online variable topology type photovoltaic grid-connected inverterOnline variable topology type photovoltaic grid-connected inverter
Online variable topology type photovoltaic grid-connected inverter
 
Offline soft switched led driver based on an integrated bridgeless boost–asym...
Offline soft switched led driver based on an integrated bridgeless boost–asym...Offline soft switched led driver based on an integrated bridgeless boost–asym...
Offline soft switched led driver based on an integrated bridgeless boost–asym...
 

Recently uploaded

Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUankushspencer015
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 

Recently uploaded (20)

Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 

2015 2016 ieee java project titles

  • 1. I3E TECHNOLOGIES 2015-16 IEEE Software | Embedded | Mechanical Projects Development OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD Contact: +91 99436 99916 / 99436 99926/ 99436 99936 IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS ***Document Format*** Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages: System Requirements: Block Diagram: Dataflow Diagram: UML Diagrams: Use Case Diagram: Class Diagram: Sequence Diagram: Activity Diagram: Implementation: Modules Description: System Study: System Testing: Software Description: Sample code: Conclusion: References: ***Complete Document ***
  • 2. I3E TECHNOLOGIES 2015-16 IEEE Software | Embedded | Mechanical Projects Development OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD Contact: +91 99436 99916 / 99436 99926/ 99436 99936 WIRELESS NETWORK TOPOLOGY DOMAIN YEAR A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks JAVA APR/2015 Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks JAVA APR/2015 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation JAVA APR/2015 Energy Efficient Virtual Network Embedding for Cloud Networks JAVA MAY/2015 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks JAVA APR/2015 NETWORK SECURITY DOMAIN YEAR Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing JAVA APR/2015 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce JAVA MAR/2015 Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter JAVA MAR/2015 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming JAVA MAR/2015 Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes JAVA MAR/2015 MOBILE COMPUTING DOMAIN YEAR Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks JAVA APR/2015 Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks JAVA MAY/2015 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics JAVA APR/2015 Friendbook A Semantic-Based Friend Recommendation System for Social Networks JAVA MAR/2015 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems JAVA MAR/2015
  • 3. I3E TECHNOLOGIES 2015-16 IEEE Software | Embedded | Mechanical Projects Development OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD Contact: +91 99436 99916 / 99436 99926/ 99436 99936 PARALLEL & DISTRIBUTED DOMAIN Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks JAVA MAR/2015 Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things JAVA MAR/2015 Authenticated Key Exchange Protocols for Parallel Network File Systems JAVA APR/2015 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks JAVA APR/2015 Decentralized Computation Offloading Game for Mobile Cloud Computing JAVA APR/2015 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design JAVA APR/2015 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications JAVA APR/2015 Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm JAVA MAR/2015 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks JAVA MAR/2015 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks JAVA MAR/2015 CLOUD COMPUTING DOMAIN A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing JAVA MAR/2015 A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems JAVA MAR/2015 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage JAVA MAR/2015 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub- dictionaries over Encrypted Cloud Data JAVA FEB/2015 Governance Model for Cloud Computing in Building Information Management JAVA MAR/2015 Identity-Based Encryption with Outsourced Revocation in Cloud Computing JAVA FEB/2015 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing JAVA MAR/2015 Proof of ownership in deduplicated cloud storage with mobile device efficiency JAVA APR/2015
  • 4. I3E TECHNOLOGIES 2015-16 IEEE Software | Embedded | Mechanical Projects Development OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD Contact: +91 99436 99916 / 99436 99926/ 99436 99936 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation JAVA APR/2015 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing JAVA JAN/2015 WEB SERVICES DOMAIN YEAR Automatic Web Service Composition Based on Uncertainty Execution Effects JAVA APR/2015 Constructing a Global Social Service Network for Better Quality of Web Service Discovery JAVA APR/2015 Data-Driven Composition for Service-Oriented Situational Web Applications JAVA FEB/2015 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System JAVA FEB/2015 Diversifying Web Service Recommendation Results via Exploring Service Usage History JAVA FEB/2015 WEB MINING DOMAIN YEAR Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction JAVA JAN/2015 Improving Web Navigation Usability by Comparing Actual and Anticipated Usage JAVA FEB/2015 Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care JAVA JAN/2015 Quality of Experience User’s Perception about Web Services JAVA FEB/2015 Real-Time Detection of Traffic From Twitter Stream Analysis JAVA FEB/2015 DATA MINING OR DATA ENGINEERING DOMAIN k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data JAVA MAY/2015 A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information JAVA APR/2015 Rank-Based Similarity Search Reducing the Dimensional Dependence JAVA JAN/2015 Distributed Multi-Agent Online Learning Based on Global Feedback JAVA MAY/2015 Efficient Motif Discovery for Large-scale Time Series in Healthcare JAVA MAR/2015 Trusted Performance Analysis on Systems With a Shared Memory JAVA FEB/2015
  • 5. I3E TECHNOLOGIES 2015-16 IEEE Software | Embedded | Mechanical Projects Development OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD Contact: +91 99436 99916 / 99436 99926/ 99436 99936 IMAGE PROCESSING DOMAIN Combining Left and Right Palmprint Images for More Accurate Personal Identification JAVA FEB/2015 Learning Compact Binary Face Descriptor for Face Recognition JAVA MAR/2015 Localized Multi-Feature Metric Learning for Image Set Based Face Recognition JAVA MAR/2015 Multiscale Logarithm Difference Edgemaps for Face Recognition Against Varying Lighting Conditions JAVA MAR/2015 Iterative Vessel Segmentation of Fundus Images JAVA FEB/2015 Content Based Image Retrieval by Metric Learning from Radiology Reports Application to Interstitial Lung Diseases JAVA MAR/2015 EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval JAVA JAN/2015 Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features JAVA MAR/2015 Local Diagonal Extrema Pattern A New and Efficient Feature Descriptor for CT Image Retrieval JAVA SEP/2015 An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation JAVA APR/2015 Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT JAVA FEB/2015 Towards Practical Self-Embedding for JPEG-Compressed Digital Images JAVA FEB/2015 BIG DATA DOMAIN Real-Time Big Data Analytical Architecture for Remote Sensing Application JAVA MAY/2015 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud JAVA FEB/2015 Research Directions for Engineering Big Data Analytics Software JAVA FEB/2015 Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors JAVA MAY/2015 Multilayer Big Data Architecture for Remote Sensing in Eolic Parks JAVA APR/2015 Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage JAVA APR/2015 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications JAVA APR/2015 Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms JAVA APR/2015 Predicting Asthma-Related Emergency Department Visits Using Big Data JAVA FEB/2015