For Latest Version Of This Blog
Click Below Link
www.finalprojects2030.net

Thursday, April 21, 2011

JAVA IEEE-2009 Project’s

1.Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations.


2.Multipath Dissemination in Regular Mesh Topologies.
 
3.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
 

4.Detecting Malicious Packet Losses.
 

5.Dynamic Routing with Security Considerations.
 
 
6.Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
 

7.Mitigation of Control Channel Jamming under Node Capture Attacks.
 

8.Security Analysis of the SASI(strong authentication and strong integrity) Protocol.
 

9.Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
 

9.Energy-Efficient SINR-Based Routing for Multi-hop Wireless Networks.
 

10.Mitigation of Control Channel Jamming under Node Capture Attacks.
 

11 .Dynamic Routing with Security Considerations.
 
12 .Detecting Malicious Packet Losses.
      

13 .Multipath Dissemination in Regular Mesh Topologies.
    
14 .A Faithful Distributed Mechanism for Sharing theCost of Multicast Transmissions.
    
15 .Movement-Assisted Connectivity Restoration inWireless Sensor and Actor      Networks.
    
16 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing      Analysis.  
    
17 .The Effectiveness of Checksums for Embedded Control Networks.
      

18 .Multiple Routing Configurations for Fast IP Network Recovery.
    
19 .Monitoring the Application-Layer DDoS Attacks for Popular Websites.
 
20 .Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
    
21 .Scalable Routing in Cyclic Mobile Networks.
    
22 .Enforcing Minimum-Cost Multicast Routingagainst Selfish Information       Flows.
   
 
23 .SIMPS: Using Sociology for Personal Mobility.
      

24 .Capturing Router Congestion and Delay.
    
25 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
      
26.Security Analysis of the SASI Protocol.
  
  
27.Continuous Monitoring of Spatial Queries in Wireless Broadcast      Environments.
    
28.Evaluating the Vulnerability of Network Traffic Using Joint Security and      Routing Analysis.
    
29.Congestion Control Algorithm for Tree-based Reliable Multicast Protocols.
 
    
30 .Security Agents for Network Traffic Analysis (SANTA).
          

31 .Capturing Router Congestion and Delay.
    
32 .Detecting Malicious Packet Losses.
 
33 .Dynamic Routing with Security Considerations.
     
34 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
 
35 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks.
     
36 .Joint Task Migration and Power Management in Wireless Computing.
 
37 .Large Connectivity for Dynamic Random Geometric Graphs.

    
38 .Measuring Capacity Bandwidth of Targeted Path Segments .
     
39 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
   
   
40 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
    
41 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
      

42.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
 
43 .SIMPS: Using Sociology for Personal Mobility.
      
44 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .
    
45.Multi-core Supported Network and System Security and Security in Next      Generation Wireless Networks.
 
   
46 .Mobile Agents and Security.
     
  
48 .Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks.
     

49 .Agent Mobility for Large-scale Network Monitoring.
     
50 .Active Distributed Monitoring system based on mobile agents.
     
51 .Network Security using HoneyPot.
    
52 .Multiresolution Data Integration using Mobile Agent in Distributed Sensor      Networks.

 53 .Distributed Algorithm for Source based Energy Efficient Multicasting in       wireless AdHoc Networks.

54.Privacy-Aware Collaborative Spam Filtering.
55.Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks.
56.A Decentralized Method for Scaling Up Genome Similarity Search Services.
57.Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search .
58.Cooperative Secondary Authorization Recycling.
59.Robust Rate Control for Heterogeneous Network Access in Multihomed Environments .
60.Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data .
61.CDNs Content Outsourcing via Generalized Communities .
62.IMine: Index Support for Item Set Mining.
63.Progressive Parametric Query Optimization.
64.Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments.
65.A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks.
67.Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
68.Lightweight Online Performance Monitoring and Tuning with Embedded Gossip.
69.Bi-Criteria Scheduling of Scientific Grid Workflows.
70.TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
71.Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids.

63.Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
 
64 .Capturing Router Congestion and Delay.
 
65 .Detecting Malicious Packet Losses.
 
66 .Dynamic Routing with Security Considerations.
 
67 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
 
68 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks.
 
69 .Joint Task Migration and Power Management in Wireless Computing.
     
70 .Large Connectivity for Dynamic Random Geometric Graphs.
 
71 .Measuring Capacity Bandwidth of Targeted Path Segments .
     
72 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
      
73 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
    
74 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
 

75.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
     
76 .Multipath Dissemination in Regular Mesh Topologies .
  
77 .Performance of VoIP over Multiple Co-Located IEEE 802.11 Wireless LANs .
      
78 .Ranking and Suggesting Popular Items.
      
79 .Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks .
      
80 .SIMPS: Using Sociology for Personal Mobility.
  
81 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .

No comments:

Post a Comment

Show Related Post's

Related Posts Plugin for WordPress, Blogger...