Vous êtes sur la page 1sur 3

J2EE 1) 2) 3) 4) 5) 6)

Company information tracking system Financial Information and Security Online Code Complexity Analysis Tool Mining The E-Commerce Data To Analyze The Target Customer Behavior Online Text Compression Method Project Flow Control System For An Organization

JAVA 1) Auto code Generator 2) Aircraft Simulation 3) Advanced Java Text Editor 4) Bank Management System 5) Company Information Tracking System 6) Cryptography & Steganography 7) Digital Envelope in Java (UDP Networking) 8) Image Processing 9) Java Editor 10) Java Mail 11) Keystroke Dynamics Biometrics 12) Multi Client Screen Capturing 13) NETWORK BANKING IEEE JAVA 1) 2) 3) 4) 5) 6) 7) 8) 9) Experimental Evalution of IRIS Recognization Human Computer interaction SNMP based Lan Management System Visual Cryptography and D-H Key Agreement Scheme The Data Encryption Standard (DES) Algorithm A Location-Based Routing Method for Mobile Ad Hoc Networks A Parallel File Transfer Protocol For Mirror And Grid Systems A Tool for Automated GUI Program Grading An acknowledgment based approach for the detection of routing misbehavior in MANETs 10) An Agent-based Framework for Impulse-induced Mobile Shopping 11) Application of pattern recognition to text compression 12) ARCANUM A SECURE AND EFFICIENT KEY EXCHANGE PROTOCOL FOR THE INTERNET 13) Cryptography 14) Distributed Data Mining On Grids Service Using Sprint Algorithm 15) Distributed cache updating for the Dynamic source routing protocol 16) Mobile Business Engine 17) Secure Group Communications Using Key Graphs 18) Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks

19) Synergistic Text Compression Method-STCM 20) IRIS Recognition

IEEE Projects
1. ANONYMOUS QUERY PROCESSING IN ROAD NETWORKS 2. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes 3. A Modified Model for Private Data Security Facing SC 4. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability 5. MINING THE E-COMMERCE DATA TO ANALYZE THE TARGET CUSTOMER BEHAVIOR 6. Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks 7. Beyond Single Page Web Search Results 8. Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks 9. STATISTICAL PROCESS FLOW CONTROL TO IMPROVE CODING AND CODE REVIEW 10.Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications 11.Layered Approach Using Conditional Random Fields for Intrusion Detection 12.Slow Adaptive OFDMA Systems Through Chance Constrained Programming 13.Toward Optimal Network Fault Correction in Externally Managed Overlay Networks 14.Active Learning Methods for Interactive Image Retrieval 15.WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION BASED TECHNIQUES 16.Secure Client-Side ST-DM Watermark Embedding

Vous aimerez peut-être aussi