IEEE Project List

Java IEEE Projects :-


    1. A Geometric Approach to Improving Active Packet Loss Measurement
    2. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
    3. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
    4. Location Based Spatial Query Processing In Wireless Broadcast Environments
    5. Modeling & Automated Containment of Worms
    6. Benefit Based Data Caching In Ad Hoc Networks
    7. Minimizing File Download Time in Stochastic Peer-to-Peer Networks
    8. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
    9. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
    10. QUIVER Consistent Object Sharing For Edge Services
    11. Two Techniques for Fast Computation of Constrained Shortest Paths
    12. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
    13. An Efficient Association Rule Mining Algorithm In Distributed Databases
    14. BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
    15. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
    16. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Path
    17. Security in large Mediator Protocols
    18. Securing User-Controlled Routing Infrastructures
    19. Controlling IP Spoofing Through Inter Domain Packet Filters
    20. Using the Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems
    21. Two Techniques for Fast Computation of Constrained Shortest Paths
    22. Protection of Database Security via Collaborative Inference Detection
    23. Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net
    24. Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
    25. Incremental deployment service of Hop by hop multicast routing protocol
    26. Noise Reduction by Fuzzy Image Filtering
    27. Novel Secure Communication Protocol for Ad Hoc networks
    28. ODAM An Optimized Distributed Association Rule Mining Algorithm
    29. Peer to Peer Messaging System
    30. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
    31. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compress
    32. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
    33. Personal Authentication Using 3-D Finger Geometry
    34. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
    35. OCGRR - A New Scheduling Algorithm for Differentiated Services Networks
    36. Efficient Packet Marking for Large-Scale IP Trace back
    37. Capturing Router Congestion and Delay
    38. Distributed cache updating for the Dynamic source routing protocol
    39. Network Border Patrol Preventing Congestion Collapse
    40. Application of BPCS Steganography to wavelet compressed video
    41. Image Transformation using Grid
    42. Image Transport Protocol ITP
    43. XTC A Practical Topology Control Algorithm for Ad-Hoc Networks
    44. ATM Networks and Intelligent Packet Filtering
    45. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
    46. Face Recognition Using Laplacianfaces
    47. Online Handwritten Script Recognition
    48. Retrieving Files Using Content Based Searching
    49. Selective Encryption of Still Image
    50. Mobile Agents In a Distributed Multimedia Database System
    51. Virtual force based geometric routing protocol in MANET
    52. ANGEL Enhancing the Utility of Generalization For Privacy Preserving Publication
    53. Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems
    54. One To Many Distribution Using Recursive Unicast Trees
    55. Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System
    58. Dynamic Load Balancing in Distributed Systems in the Presence of Delays : A Regeneration Theory Approach
    59. Face recognition for smart interactions
    60. Spatio Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
    61. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
    62. Dynamic Load Balancing in Distributed Systems in the presence of delays  A regeneration theory Approach
    63.  Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups
    64. Multiple Routing Configurations for Fast IP Network Recovery
    65. SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
    66. Controlling IP Spoofing through Inter domain Packet Filters
    67. Gradient Vector Force - A new External Force for Snakes
    68. Computation Efficient Multicast Key Distribution
    69. A New, Efficiet Coordinated Checkpointing Protocol combined with Selective Sender - Based Message Logging
    70. A wireless Intrusion detection system and a new attack model
    71. Three Party Authentication for key Distributed Protocol using Classical and Quantum Cryptography
    72. Re-Ordering Of Packets Using Retransmission Timer
    74. Mitigating Performance Degradation in Congested Sensor Networks
    75. Truth Discovery with multiple Conflicting Information Providers on web
    76. Constructing Inter-Domain Packet Filters to Control IP
    77. Layered Approach Using Conditional Random Fields for Intrusion Detection (2010) 
    78. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
    79. Service Level Agreement based Grid Scheduling
    80. Detection of Application Layer DDOS Attack using Hidden Semi Markov Model (2009)
    81. Distributed cache updating for the Dynamic source routing protocol
    82. Identification of Humans Using Gait
    83. Continuous Monitoring of Spatial Queries in Wireless Broadcast
    84. Energy-Efficient SINR-Based Routing for Multihop Wireless
    85. EnergyMaps For Mobile Wireless networks coherence Time Versues Spreding Period
    86. Large Connectivity for Dynamic Random Geometric Graphs
    87. Measuring Capacity Bandwidth of Targeted Path Segments
    88. Mitigation OF Controll Channel Jamming Under Node Caputer Attacks
    89. Mobility Management Approaches for Mobile IP Networks
    90. Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
    91. SIMPS Using Sociology for Personal Mobility
    92. Data leakage detection (2010) 
    94. Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure
    96. Locating Friends and Family Using Mobile Phones With GPS
    97. Lord of the Links - A framework for discovering missing links in the internet topology
    98. Optimal Server Bandwidth Allocation Among Multiple P2P Multicast Live Video Streaming Sessions
    99. DCMP - A distributed Cycle Minimization Protocol for Peer to Peer Networks
    100. Dynamic Load Balancing in Distributed Systems in the presence of Delays
    101. Effective Transmission of Data through RBPH for Group Communication
    102. Efficient Key Agreement for Large and Dynamic Multicast Groups
    103. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
    104. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
    105. PAM : An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
    106. Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks
    107. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
    108. Dynamic Routing with Security Considerations
    109. Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs
    110. User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
    111. Distributed cache updating of dynamic source routing protocol
    112. Multiple Sequence alignment using Genetic Algorithm
    114. PEER-TO-PEER (P2P) networks
    115. Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks
    116. Learning in an Ambient Intelligent World Enabling Technologies and Practices
    118. Bounding the Advantage of Multicast Network Coding in General Network Models
    119. A Highly Secure Video Steganography using Hamming Code
    120. Streaming Solutions for Fine-Grained Network Traffic Measurements and Analysis
    121. Exploiting Service Similarity for Privacy in Location Based Search Queries
    122. CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution
    123. Green Networking with Packet Processing Engines: Modeling and Optimization
    124. Automated Graph Regularized Projective Nonnegative Matrix Factorization for Document Clustering
    125. Transformation-Based Monetary Cost Optimizations for Workflows in the Cloud
    126. Behavioral Malware Detection in Delay Tolerant Networks
    127. A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    128. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image In-painting
    129. Hierarchical String Cuts: A Translation, Rotation, Scale, and Mirror Invariant Descriptor for Fast Shape Retrieval
    130. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition
    131. Multi-Focus Image Fusion Based on Spatial Frequency in Discrete Cosine Transform Domain
    132. Iris Image Classification Based on Hierarchical Visual Codebook
    133. Supporting Privacy Protection in Personalized Web Search     
    134. OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
    135. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
    136. User Intention-Based Traffic Dependence Analysis for Anomaly Detection
    137. Packet-Hiding Methods for Preventing Selective Jamming Attacks
    138. Risk Aware Mitigation for Manet Routing Attacks
    139. Automated Two-Level Variable Weighting Clustering Algorithm for Multiview Data


 Dotnet IEEE Projects :-


    1. Fuzzy Control Model Optimization for Behavior-Constant Traffic Routing Under Information Provision
    2. Probabilistic Packet Marking For Large Scale IP Trace Back
    3. Credit Card Fraud Detection Using Hidden Markov Models
    4. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
    5. Temporal Partioning of Communication Resources in an Integrated Architecture
    6. DIP Techniques for the Detection and Removal of Cracks in Digitized Paint
    7. Workflow Mining Discovering Process Models from Event Logs
    9. Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paint
    10. Neural Network for Unicode Optical Character Recognition
    11. Localized Sensor Area Coverage With Low Communication Overhead
    13. Active Learning Methods for Interactive Image Retrieval
    14. Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case
    15. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
    16. Multiple Ant Colonies Optimization for Load Balancing in Distributed Systems
    17. A Gen2-Based RFID Authentication Protocol for Security and Privacy
    18. Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period
    19. Delay Analysis for Maximum Scheduling with flow control in wireless networks with bursty traffic
    20. A Tabu Searching Algorithm For Cluster Building in Wirless Sensor Networks
    21. An Efficient Concept-based Mining Model for Enhancing Text Clustering
    22. Strictly- Localized Construction of Near Optimal Power Spammers for Wireless Ad- Hoc Networks
    23. Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks
    24. Information Content-Based Sensor Selection & Transmission Power Adjustment for Collaborative Target
    25. On the planning of Wireless Sensor Networks  Energy efficient clustering under the joint routing and coverage constraint
    26. Random Cast An Energy efficient communications scheme for Mobile ad hoc networks
    27. Resequencing Analysis of Stop and Wait ARQ for Parallel Multichannel Communications
    28. Route Stability in MANETS under the random direction mobility model
    29. Secure and Policy Complaint Source Routing
    30. Orthogonal Data Embedding for Binary Images in Morphological Transform Domain- A High Capacity Approach
    31. Tabu Searching Algorithm For Cluster Building in Wirless Sensor Networks
    32. Biased Random Walks in Uniform Wirless Networks
    33. On the Planning of Wirless Sensor Networks Energy-Efficient Clustering under the Joint Route
    34. Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On-Board Processing Capabilities
    35. Thresholds for Virus spread on networks
    36. The Effectiveness of Checksums for Embedded Control Networks
    37. Analysis of Shortest Path Routing for Larg Multi-Hop Wirless Networks
    38. Cell Breathing Techniques for Load Balancing in Wirless LANs
    39. Compaction of Schedules and a Two-Stage Approach for Duplication-
    40. Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks
    41. Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise
    42. PRESTO Feedback-Driven Data Management in Sensor Networks
    43. Resource Allocation in OFDMA Wireless Communications Systems
    44. Spread-Spectrum Watermarking Security
    45. Novel secure communication mobile adhoc networks-2005
    46. Unicode Optical Character Recognition using Artificial Neural Networks
    47. Continuous Delivery Message Dissemination Problems under the Multicasting Communication Mode
    48. Watermarking Relational Database Using Optimization Based Techniques
    49. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
    50. Estimation of Defects Based On Defect Decay Model ED3M
    51. Hardware enhanced association rule mining with Hashing and Pipelining
    52. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 
    53. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
    54. Trustworthy Computing Under Resource Constraints With The Down Policy
    55. Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification 
    56. Scalable Delivery of Dynamic Content Using a Cooperative Edge Cache Grid
    57. Analysis and Design of Secure Watermark Based Authentication Systems
    58. Max-Weight Scheduling in Queuing Networks With Heavy-Tailed Traffic – Network and Communication Systems – C#
    59. A Frequent Term Based Text Clustering Approach Using Novel Similarity Measure – Data Mining and Knowledge Discovery – Microsoft.NET
    60. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage – Data Mining and Cloud Computing – Microsoft.NET
    61. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage – Cloud Computing - Microsoft.NET
    62. An Empirical Performance Evaluation of Relational Keyword Search Systems– Data Mining – Microsoft.NET
    63. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage – Cloud Computing - Microsoft.NET
    64. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks – Network and Mobile Computing - Microsoft.NET
    65. Privacy-Preserving Optimal Meeting Location Determination On Mobile Devices – Networking and Mobile Computing - Microsoft.NET
    66. Control Flow-Based Malware Variant Detection – Network Security - Microsoft.NET
    67. Content Based Image Retrieval Systems – Image Processing - Microsoft.NET
    68. Secure Outsourced Attribute Based Signatures – Secure Computing and Cloud Computing - Microsoft.NET
    69. Dealing with Concept Drifts in Process Mining – Process Mining and Data Mining - Microsoft.NET
    70. Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud– Secure Computing and Cloud Computing - Microsoft.NET
    71. A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks– Process Mining and Data Mining - Microsoft.NET
    72. Supporting Privacy Protection in Personalized Web Search– Process Mining and Data Mining - Microsoft.NET
    73. Data Mining With Big Data
    74. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
    75. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
    76. Governing Software Process Improvements in Globally Distributed Product Development
    77. Exploiting Service Similarity for Privacy in Location-Based Search Queries
    78. A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
    79. A Survey on Audio Steganography Approaches
    80. Secure Mining of Association Rules in Horizontally Distributed Databases
    81. Towards Understanding Cyber bullying Behavior in a Semi-Anonymous Social Network