IEEE 2013 – 2014 Java Final Year Projects @ Frontline Technolgies. Chennai, Coimbatore, Trichy, Karur, Bangalore

IEEE Java Projects – IEEE 2013

1. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework — Data mining

2. Ranking on Data Manifold with Sink Points — Data mining

3. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks — Data mining

4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse — Data mining

5. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data — Data mining

6. A Survey of XML Tree Patterns — Data mining

7. Region-Based Foldings in Process Discovery — Data mining

8. Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures — Data mining

9. T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence — Data mining

10. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm — Data mining

11. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model — Data mining

12. A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models — Data mining

13. Ontology Matching: State of the Art and Future Challenges — Data mining

14. Large Graph Analysis in the GMine System — Data mining

15. Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies — Data mining

16. A System to Filter Unwanted Messages from OSN User Walls — Data mining

17. A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments — Data mining

18. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments — Data mining

19. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia — Data mining

20. AML: Efficient Approximate Membership Localization within a Web-Based Join Framework — Data mining

21. Event Tracking for Real-Time Unaware Sensitivity Analysis — Data mining

22. Detecting Intrinsic Loops Underlying Data Manifold — Data mining

23. Clustering Large Probabilistic Graphs — Data mining

24. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering — Data mining

25. Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping — Data mining

26. Finding Rare Classes: Active Learning with Generative and Discriminative Models — Data mining

27. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models — Data mining

28. Simple Hybrid and Incremental Postpruning Techniques for Rule Induction — Data mining

29. Supporting Search-As-You-Type Using SQL in Databases — Data mining

30. Reinforced Similarity Integration in Image-Rich Information Networks — Data mining

31. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing — Mobile Computing

32. Quality-Differentiated Video Multicast in Multirate Wireless Networks — Mobile Computing

33. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks — Mobile Computing

34. Capacity of Hybrid Wireless Mesh Networks with Random APs — Mobile Computing

35. Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding — Mobile Computing

36. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation — Mobile Computing

37. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks — Mobile Computing

38. Evaluating Temporal Robustness of Mobile Networks — Mobile Computing

39. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks — Mobile Computing

40. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System — Mobile Computing

41. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity — Mobile Computing

42. An Investigation on LTE Mobility Management — Mobile Computing

43. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks — Mobile Computing

44. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks — Mobile Computing

45. On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks — Mobile Computing

46. Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information — Mobile Computing

47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks — Mobile Computing

48. Toward a Statistical Framework for Source Anonymity in Sensor Networks — Mobile Computing

49. On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling — Mobile Computing

50. Model-Based Analysis of Wireless System Architectures for Real-Time Applications — Mobile Computing

51. Successive Interference Cancellation: Carving Out MAC Layer Opportunities — Mobile Computing

52. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks — Mobile Computing

53. Group-Based Medium Access Control for IEEE 802.11n Wireless LANs — Mobile Computing

54. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks — Mobile Computing

55. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications — Mobile Computing

56. Secure Communication Based on Ambient Audio — Mobile Computing

57. Importance of Coherence Protocols with Network Applications on Multicore Processors — Multimedia

58. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs — Multimedia

59. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes — Networking

60. Distance Bounding A Practical Security Solution for Real-Time Location Systems — Networking

61. Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm — Parallel & Dis Systems

62. Network Traffic Classification Using Correlation Information — Parallel & Dis Systems

63. Distributed Web Systems Performance Forecasting Using Turning Bands Method — Parallel & Dis Systems

64. High Performance Resource Allocation Strategies for Computational Economies — Parallel & Dis Systems

65. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks — Parallel & Dis Systems

66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption — Parallel & Dis Systems

67. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks — Parallel & Dis Systems

68. Adaptive Network Coding for Broadband Wireless Access Networks — Parallel & Dis Systems

69. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip — Parallel & Dis Systems

70. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching — Parallel & Dis Systems

71. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision — Parallel & Dis Systems

72. Covering Points of Interest with Mobile Sensors — Parallel & Dis Systems

73. Topology Abstraction Service for IP-VPNs — Parallel & Dis Systems

74. Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller — Parallel & Dis Systems

75. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models — Parallel & Dis Systems

76. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks — Parallel & Dis Systems

77. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks — Parallel & Dis Systems

78. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks — Parallel & Dis Systems

79. Analysis of Distance-Based Location Management in Wireless Communication Networks — Parallel & Dis Systems

80. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks — Parallel & Dis Systems

81. Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery — Parallel & Dis Systems

82. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks — Parallel & Dis Systems

83. Dynamic Coverage of Mobile Sensor Networks — Parallel & Dis Systems

84. In-Network Estimation with Delay Constraints in Wireless Sensor Networks — Parallel & Dis Systems

85. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks — Parallel & Dis Systems

86. Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor — Parallel & Dis Systems

87. IP-Geolocation Mapping for Moderately Connected Internet Regions — Parallel & Dis Systems

88. IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments — Parallel & Dis Systems

89. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Parallel and Distributed Systems

90. EAACK-A Secure Intrusion-Detection System for MANETs — Secure Computing

91. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks — Signal Processing

92. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper — Signal Processing

93. Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks — Signal Processing

94. The Generalization Ability of Online Algorithms for Dependent Data —- Webmining

95. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks — Wireless Networks

96. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling — Wireless Networks

97. A Data Fusion Technique for Wireless Ranging Performance Improvement — Wireless Networks

98. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks — Wireless Networks

Leave a comment