SlideShare a Scribd company logo
JAVA 
Contact: 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
1 
CODE 
TITLE 
DESCRIPTION 
IEEE 2013 - NETWORKING 
NW01 
Optimal Client-Server Assignment for Internet Distributed Systems 
Networking, Security, Distributed Systems, Client-Server, Clustering, Load Balancing. 
NW02 
SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems 
Networking, Security, Peer - Peer, Trust Management, Reputation. 
NW03 
Cross-Domain Privacy- Preserving Cooperative Firewall Optimization 
Networking, Security, Firewall Optimization, Privacy-Preserving. 
NW04 
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks 
Networking, Fuzzy Logic Control, Quality Of Service (QOS), Robustness, Traffic Management, University Results Site. 
NW05 
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDOS) Flooding Attacks 
Networking, Security, Distributed Denial of Service (DDOS) Flooding Attack, Intrusion Detection Systems, BOTNET. 
NW06 
SocialTube: P2P-assisted Video Sharing in Online Social Networks 
Networking, Multimedia, Peer-To-Peer, Video-On-Demand (VOD), Video Sharing in Face Book. 
NW07 
Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks 
Networking, Peer-To-Peer, Reputation Systems, Server Selection, Bayesian Networks, Quality Of Service (QOS) 
NW08 
Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks 
Networking, Wireless Sensor Network (WSN), Attribute-Aware Data Aggregation (ADA). 
NW09 
Delay-Tolerant Bulk Data Transfers on the Internet 
Networking, Delay-Tolerant Networks (DTNs), Bulk Data Transfers On The Internet.
JAVA 
Contact: 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
2 
CODE 
TITLE 
DESCRIPTION 
IEEE 2013 - NETWORKING 
NW10 
Range-Based Skyline Queries in Mobile Environments 
Networking, Location-Based Services (LBS), Query Processing, Skyline Queries, Moving Objects 
NW11 
A Symmetric Load Balancing Algorithm with Performance Guarantees for DHT. 
Networking, Distributed Hash Tables (DHT), Load Balance, Virtual Server. 
NW12 
A Distributed Control Law for Load Balancing in Content Delivery Networks 
Networking, Content Delivery Network (CDN), Control Theory, Request Balancing. 
DM01 
Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource 
Data Mining, Fuzzy, Ontology, Ontological and Terminological Resource (OTR) 
IEEE 2013 - DATA MINING 
DM02 
H o w t o U s e S e a r c h E n g i n e Optimization Techniques to Increase Website Visibility 
Data Mining, Organic Search, Search Engine Optimization, Search-Ranking Algorithms, Social Media, Websites. 
DM03 
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 
Data Mining, Adverse Drug Reactions, Medical Centres, Association Rules, Data Mining Algorithms, Healthcare, Decision Model. 
DM04 
Reinforced Similarity Integration in Image-Rich Information Networks 
Data Mining, Networking, Information Retrieval, Image Mining, Information Network, Ranking 
DM05 
Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse 
Data Mining, Ontology, Evidence, Information Fusion, Trust, Data Quality, Web-Enabled Data Warehouse 
DM06 
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data 
Data Mining, Artificial Intelligence, Security, Knowledge Base Management, Knowledge Representation Formalisms and Methods,
JAVA 
Contact: 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
3

More Related Content

What's hot

Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
1pointer
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014onepointer
 
Ieee 2014 2014 java project titles
Ieee 2014 2014 java  project titlesIeee 2014 2014 java  project titles
Ieee 2014 2014 java project titles
Nandha Kumar
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET Journal
 
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
paperpublications3
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computing
iosrjce
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
54
5454
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
ijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
Musthafa Tema
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
LeMeniz Infotech
 

What's hot (16)

Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
Ieee 2014 2014 java project titles
Ieee 2014 2014 java  project titlesIeee 2014 2014 java  project titles
Ieee 2014 2014 java project titles
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
 
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computing
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Sub1522
Sub1522Sub1522
Sub1522
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
54
5454
54
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 

Similar to Java projects

Dot net projects
Dot net projectsDot net projects
Dot net projects
shahu2212
 
Java 2014 15
Java 2014 15Java 2014 15
Java 2014 15
shahu2212
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
Pvrtechnologies Nellore
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
allmightinfo
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
JPINFOTECH JAYAPRAKASH
 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
JPINFOTECH JAYAPRAKASH
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
IJCNCJournal
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
IJCNCJournal
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
IJERD Editor
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
Dharmendrasingh417
 
Secure final
Secure finalSecure final
Secure final
Vinoth Barithi
 
Dotnet ieee 2014 projects
Dotnet ieee 2014 projectsDotnet ieee 2014 projects
Dotnet ieee 2014 projects
Vee Eee Technologies Solution Pvt Ltd.,
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Shakas Technologies
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherry
LeMeniz Infotech
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projects
LeMeniz Infotech
 

Similar to Java projects (20)

Dot net projects
Dot net projectsDot net projects
Dot net projects
 
Java 2014 15
Java 2014 15Java 2014 15
Java 2014 15
 
IEEE 2011 October titles
IEEE 2011 October titles IEEE 2011 October titles
IEEE 2011 October titles
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Secure final
Secure finalSecure final
Secure final
 
Dotnet ieee 2014 projects
Dotnet ieee 2014 projectsDotnet ieee 2014 projects
Dotnet ieee 2014 projects
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherry
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projects
 

Recently uploaded

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

Java projects

  • 1. JAVA Contact: 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 1 CODE TITLE DESCRIPTION IEEE 2013 - NETWORKING NW01 Optimal Client-Server Assignment for Internet Distributed Systems Networking, Security, Distributed Systems, Client-Server, Clustering, Load Balancing. NW02 SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems Networking, Security, Peer - Peer, Trust Management, Reputation. NW03 Cross-Domain Privacy- Preserving Cooperative Firewall Optimization Networking, Security, Firewall Optimization, Privacy-Preserving. NW04 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Networking, Fuzzy Logic Control, Quality Of Service (QOS), Robustness, Traffic Management, University Results Site. NW05 A Survey of Defense Mechanisms Against Distributed Denial of Service (DDOS) Flooding Attacks Networking, Security, Distributed Denial of Service (DDOS) Flooding Attack, Intrusion Detection Systems, BOTNET. NW06 SocialTube: P2P-assisted Video Sharing in Online Social Networks Networking, Multimedia, Peer-To-Peer, Video-On-Demand (VOD), Video Sharing in Face Book. NW07 Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks Networking, Peer-To-Peer, Reputation Systems, Server Selection, Bayesian Networks, Quality Of Service (QOS) NW08 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks Networking, Wireless Sensor Network (WSN), Attribute-Aware Data Aggregation (ADA). NW09 Delay-Tolerant Bulk Data Transfers on the Internet Networking, Delay-Tolerant Networks (DTNs), Bulk Data Transfers On The Internet.
  • 2. JAVA Contact: 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 2 CODE TITLE DESCRIPTION IEEE 2013 - NETWORKING NW10 Range-Based Skyline Queries in Mobile Environments Networking, Location-Based Services (LBS), Query Processing, Skyline Queries, Moving Objects NW11 A Symmetric Load Balancing Algorithm with Performance Guarantees for DHT. Networking, Distributed Hash Tables (DHT), Load Balance, Virtual Server. NW12 A Distributed Control Law for Load Balancing in Content Delivery Networks Networking, Content Delivery Network (CDN), Control Theory, Request Balancing. DM01 Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource Data Mining, Fuzzy, Ontology, Ontological and Terminological Resource (OTR) IEEE 2013 - DATA MINING DM02 H o w t o U s e S e a r c h E n g i n e Optimization Techniques to Increase Website Visibility Data Mining, Organic Search, Search Engine Optimization, Search-Ranking Algorithms, Social Media, Websites. DM03 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs Data Mining, Adverse Drug Reactions, Medical Centres, Association Rules, Data Mining Algorithms, Healthcare, Decision Model. DM04 Reinforced Similarity Integration in Image-Rich Information Networks Data Mining, Networking, Information Retrieval, Image Mining, Information Network, Ranking DM05 Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse Data Mining, Ontology, Evidence, Information Fusion, Trust, Data Quality, Web-Enabled Data Warehouse DM06 Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data Data Mining, Artificial Intelligence, Security, Knowledge Base Management, Knowledge Representation Formalisms and Methods,
  • 3. JAVA Contact: 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 3