Report the ad
Java application projects - Pondicherry
Saturday, 12 July, 2014
No photo
Item details
City:
Pondicherry
Offer type:
Offer
Item description
Mini Projects / Application Projects
1. An enhanced model for achieving high throughput using variant buffer size methodology
2. Anomaly based intrusion detection system
3. Bandwidth estimation systems in networks
4. Blocking intruders for secured network maintenance
5. Caching techniques in MANET and various routing protocols in MANET.
6. CFR: an efficient congestion free router
7. Channel allocation system in mobile networks
8. Coding for cryptographic security enhancement using stopping sets
9. Content based image retrieval system
10. Continuous query processing system for location based services
11. Credit card fraud detection system using genetic algorithm
12. Decision trees for uncertain data
13. Digital image processing filters for image filtering methods
14. Distributed data integration on electricity board
15. Efficient load distribution scheme to avoid congestion in servers
16. Efficient searching technique in xml data
17. Efficient stegnography embedding methodology for secret data preservation
18. FEC based cryptography for secured data communication
19. High efficient location monitoring system
20. Homophonic cryptography technique for data security
21. Impact of denial of service attacks on servers
22. Information leak detection and prevention system
23. Intrusion detection system in wireless sensor networks
24. MOBILE alert based intruder blocking system in cloud computing
25. Mobility management schemes in wireless networks using agent forwarding methods
26. Monitoring cloud resources for better resource utilization
27. Packet monitoring based multicasting system
28. PUBMED: an efficient biomedical based hierarchical search engine
29. Ranking system for web library
30. Recovery from link failure in wireless networks
31. Reducing noises in images
32. Reducing the costly forward using band-based directional broadcast
33. Secure and efficient video distribution scheme using variant bandwidth system
34. Secure and practical outsourcing of linear programming in cloud computing
35. Secure communication by hiding packets in intermediate router system
36. Secured data communication system in wireless mesh networks
37. Self diagnosing with identifying disease treatment with online doctor precautionary
38. Selfish overlay network creation and maintenance
39. Single-source shortest path algorithm with nonnegative edge path
40. Supporting data transfer and movements of mobile terminal between different locations
41. Ticket based secured mobile banking scheme for detecting frauds
42. Traffic flow analysis system based on a novel concept of flow set
43. Video steganography for secure data preservation
44. Virus spread in P2P network
45. Visual cryptography system for secret image sharing
46. Efficient and Dynamic Routing Topology Inference
47. Geometric Routing Protocol in MANET
48. Optimized Software Release Planner
1. An enhanced model for achieving high throughput using variant buffer size methodology
2. Anomaly based intrusion detection system
3. Bandwidth estimation systems in networks
4. Blocking intruders for secured network maintenance
5. Caching techniques in MANET and various routing protocols in MANET.
6. CFR: an efficient congestion free router
7. Channel allocation system in mobile networks
8. Coding for cryptographic security enhancement using stopping sets
9. Content based image retrieval system
10. Continuous query processing system for location based services
11. Credit card fraud detection system using genetic algorithm
12. Decision trees for uncertain data
13. Digital image processing filters for image filtering methods
14. Distributed data integration on electricity board
15. Efficient load distribution scheme to avoid congestion in servers
16. Efficient searching technique in xml data
17. Efficient stegnography embedding methodology for secret data preservation
18. FEC based cryptography for secured data communication
19. High efficient location monitoring system
20. Homophonic cryptography technique for data security
21. Impact of denial of service attacks on servers
22. Information leak detection and prevention system
23. Intrusion detection system in wireless sensor networks
24. MOBILE alert based intruder blocking system in cloud computing
25. Mobility management schemes in wireless networks using agent forwarding methods
26. Monitoring cloud resources for better resource utilization
27. Packet monitoring based multicasting system
28. PUBMED: an efficient biomedical based hierarchical search engine
29. Ranking system for web library
30. Recovery from link failure in wireless networks
31. Reducing noises in images
32. Reducing the costly forward using band-based directional broadcast
33. Secure and efficient video distribution scheme using variant bandwidth system
34. Secure and practical outsourcing of linear programming in cloud computing
35. Secure communication by hiding packets in intermediate router system
36. Secured data communication system in wireless mesh networks
37. Self diagnosing with identifying disease treatment with online doctor precautionary
38. Selfish overlay network creation and maintenance
39. Single-source shortest path algorithm with nonnegative edge path
40. Supporting data transfer and movements of mobile terminal between different locations
41. Ticket based secured mobile banking scheme for detecting frauds
42. Traffic flow analysis system based on a novel concept of flow set
43. Video steganography for secure data preservation
44. Virus spread in P2P network
45. Visual cryptography system for secret image sharing
46. Efficient and Dynamic Routing Topology Inference
47. Geometric Routing Protocol in MANET
48. Optimized Software Release Planner