Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
java projects
Post: #1

a. Approach to Network Intrusion Detection and Prevention Java
b. A performance study of roaming in wireless local area networks based on
c. IEEE r
d. Analysis and Research on the Traditional Congestion Control Policy and
e. Active Networks Congestion Control Policy
f. On Demand Self-Organized Public Key Management for Mobile Ad Hoc
g. Networks
h. An optimized solution for Hmobile computing environment Java
i. Active Source Routin g Protocol for Mobile AD-HOC Networks Java
j. Adaptive Security and Authentication for DNS System Java
k. Evaluating the Performance of Versatile RMI Approach InJava
l. Dynamic Control for Active Network System Java
m. A new operational transformation framework for real-time group editors
n. Dynamic load balancing in distributed systems in the presence of delays: a regeneration-theory approach
o. Multicast routing with delay and delay variation constraints for collaborative applications on overlay networks
p. OCGRR: A new scheduling algorithm for differentiated services networks
q. A scalable overlay multicast architecture for largescale applications
r. Randomized protocols for duplicate elimination in peer-to-peer storage systems
s. A robust spanning tree topology for data collectionand dissemination in distributed environments
t. An overview of packet reordering in transmission control protocol TCP: problems, solutions, and challenges
u. Distributed cache updating for the dynamic source routing protocol
v. Incremental service deployment using the hop-by-hop multicast routing protocol
w. A new TCP for persistent packet re-ordering
x. TCP-IP: low priority service via end-point congestion
y. On self-fish routing in internet like environments
z. Distributed database architecture for global roaming in next generation mobile networks

aa. Effective Packet Analyzing and Filtering System f or ATM Network Java
bb. Multi Server Communication In Distributed Management System Java
cc. R eduction of Network Density for Wireless Ad-Hoc Networks Java
dd. Multicast Live Video Broadcasting Using Real Time Transmission Protocol Java
ee. Secure Steganography in C ompressed Video Bitstreams Java
ff. A New Route Maintenance Strateg y for Dynamic Source Routing Protocol Java
gg. A Packet Based
hh. Messaging Service over TCP/IP in Local Area Network Java
ii. Secure Data Hiding and Extraction Using BPCS Java
jj. Dynamic Signature Verification Using Pattern Recognition Java
kk. Data Minimization And Storage Using XML Enable SQL Server Java
ll. R etrieving Files Using Content Based Search Java
mm. Distributed Node Migration by Effective Fault Tolerance Java
nn. Embedding in Video Steganograph y
oo. Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java
pp. Location Aided Routing for Mobile Ad-Hoc Networks Java
qq. Image Rendering for Grid Technology
rr. Optimal Multicast Routing in Mobile Ad-Hoc Networks Java
ss. Scalable Wireless Ad-Hoc Network Simulation using XTC Java
tt. Homogenous Network Control and Implementation Java
uu. Network File Sharing System
vv. Mobile Agents In Distributed Multimedia Database Systems Java
ww. Visual Editor with Compiler
xx. ATM Networks for Online Monitoring System Java
yy. Performance Evaluation of RMI

zz. Network Border Patrol Preventing Congestion Collapse Java
aaa. Network Component for XML Migration Java
bbb. Shortest Node Finder In Wireless Ad-Hoc Networks Java
ccc. Preventing Network Data Congestion Collapse Using Mobile AD-HOC
ddd. Networks
eee. Distributed C ache Updating for the Dynamic Source Routing Protocol Java
fff. Multi Router Traffic Monitoring System Java
ggg. Public Key Validation For DNS Security Extensions Java
hhh. A Secure Routin g Protocol for mobile Ad-hoc Network Java
iii. R etrieving Files Using Content Based Searching and presenting it in Carousel
jjj. view
kkk. Distributed Database Architecture for Global Roaming in Next-Generation
lll. Mobile Networks
mmm. E-Mail Server Using Multithreaded Sockets Java
nnn. Productivity Aids
ooo. R outing and Security in Mobile Ad Hoc Networks Java
ppp. Data Security in Ad hoc Networks Using Multi Path Routing Java
qqq. An Agent Based Intrusion Detection, Response and Blocking using signature
rrr. method in Active Networks
sss. Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks Java
ttt. ,

uuu. An Acknowledgment-Based Approach for the Detection of Routing
vvv. Misbehavior in MANETs
www. Wavelet Based Compression and Decompression Using Steganography Java
xxx. Image Stream Transfer Using Real-Time Transmission Protocol Java
yyy. Image Water Marking and Combustion
zzz. Distributed cache updating for the Dynamic source routing protocol Java
aaaa. A Distributed Database Architecture for Global Roaming in Next-Generation
bbbb. Mobile Networks
cccc. Protocol Scrubbing: Network Security Through Transparent Flow
dddd. Modification
eeee. Incremental deplo yment service of Hop by hop multicast routing protocol Java
ffff. Quer y processing in a virtual network computing environment JME
gggg. Quer ying a database through Wireless messaging service Java
a. API-based and information-theoretic metrics for measuring the quality of software modularization
b. A formal framework for automated round-trip software engineering in static aspect weaving and transformations
c. Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval
d. Logarithmic store-carry-forward routing in mobile ad hoc networks
e. An acknowledgment-based approach for thedetection of routing misbehavior in manets
f. Route reservation in ad hoc wireless networks
g. Toward broadcast reliability in mobile ad-hoc networks with double coverage
h. A location based routing method for mobile ad-hocnetworks
i. An efficient fault-tolerant distributed channel allocation algorithm for cellular network
j. Provably secure three-party authenticated quantum key distribution protocols
k. A fully distributed proactively secure threshold multi signature scheme
l. Efficient key agreement for large and dynamic Multicast groups
m. Distributed collaborative key agreement and authentication protocol for dynamic peer groups
n. An adaptive programming model for fault-tolerant distributed computing
o. Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
p. Hiding sensitive association rules with limited side effects
q. Efficient approximate query processing in peer-to peer networks
r. GHIC: A hierarchical pattern-based clustering algorithm for grouping web transactions
s. A grid-powered framework to support courses on distributed programming
t. A hierarchical modeling and analysis for grid service reliability
u. Discriminative learning and recognition
v. Of image set classes using canonical correlations
w. Block-based map disparity estimation under alphachannel constraints
x. Analytical results on style-constrained Bayesian classification of pattern fields
y. Face recognition using laplacian faces
z. Online handwritten script recognition
aa. Noise reduction by fuzzy image filtering
bb. Remote approach for effective task execution and data accessing tool
cc. Active source routing protocol for mobile networks
dd. Excessive data accumulation free routing in enlarge network
ee. Realistic broadcast protocol handler for group communication
ff. Multicast live video broadcasting using real time transmission protocol
gg. Adaptive security and authentication for DNS system
hh. Evaluating the performance of versatile RMI approach in java
ii. Dynamic control for active network system
jj. Effective packet analyzing and filtering system for ATM network
kk. Multi server communication in distributed database management
ll. Messaging service over TCP/ IP in local area network
mm. Explicit allocation of best-effort packet delivery service
nn. Logical group network maintenance and control system
oo. Reduction of network density for wireless ad-hoc network sing XTC algorithm
pp. Distributed node migration by effective fault tolerance
qq. Tool for bug tracking and system analysis
rr. User friendly frame builder environment for java swing
ss. Artificial intelligence browser using java speech API
tt. Hub for java compilation and error checking
uu. Scattered system for aircraft maintenance
vv. Mail-exchanger using multi tasking socket
ww. Data seclusion in audio files
xx. Secure data hiding and extraction using BPCS
yy. Xml based GUI testing tool
zz. Wrong method call identifier
aaa. Java musician using java sound API
bbb. Dynamic signature verification using pattern recognition
ccc. Bulk SMS gateway INTEGRA
ddd. Data minimization and storage using xml enable SQL server
eee. Retrieving files using content based search
Post: #2
Hey can i get the project on "Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups" its urgent....
Post: #3
i want source code for network intrusion detection system. plz reply as soon as possible
Post: #4
Well still I didn't get the theme of your project. I am not able to understand of the main purpose of the project which you have mention here. Well I need one good project of Java that can be easily understand by me.
Post: #5
i want to know more about the project Intelligent network back up tool...
i want the documentation details....
Can you help me...
Post: #6
Provably secure three-party authenticated quantum key distribution protocols


pl send me report and ppt soon.
thank u.
Post: #7
send me the ppt & seminars on network border patrol
Post: #8
please i need a project materials with source code for "an agent based intrusion detection response and blocking using signature method in active networks''
Post: #9
i want a full project source code on intrusion detection and prevention

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ocgrr, be projects on java, wasp java projects, www java projects com, texttile java projects***ct in digital image processing, texttile java projects, projects on java,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Steganography implemented in Java science projects buddy 14 9,913 24-05-2016 10:15 AM
Last Post: dhanyavp
  free vb projects for students project topics 16 19,440 04-02-2016 12:27 PM
Last Post: seminar report asees
  projects on computer networks? shakir_ali 2 651 25-01-2016 02:26 PM
Last Post: seminar report asees
  image processing projects ideas project topics 4 3,827 05-01-2016 02:22 PM
Last Post: seminar report asees
  STUDENT INFORMATION SYSTEM IN JAVA project topics 14 9,006 19-08-2015 11:28 PM
Last Post: Guest
  mini projects in java project topics 7 17,523 01-05-2015 04:18 PM
Last Post: seminar report asees
  projects on data mining? shakir_ali 2 1,063 05-11-2014 09:30 PM
Last Post: jaseela123
  projects on cloud computing? shakir_ali 0 366 30-10-2014 01:12 AM
Last Post: shakir_ali
  3D Bounce Projects in Open GI? shakir_ali 0 370 30-10-2014 01:09 AM
Last Post: shakir_ali
  IEEE Network Simulation Projects on OMNeT++ 3.2 - B.Tech/M.Tech/Research Level victer 1 1,672 04-12-2012 01:31 PM
Last Post: seminar details