JAVA PROJECT ABSTRACTS

  1. A Novel Current Sensor for Home Energy use

  2. A Similarity Measure for Text Classification and Clustering

  3. A Survey of Group Key Distribution Schemes With Self-Healing Property

  4. A Wearable System of Micro Machined Piezoelectric Cantilevers Coupled to a Rotational Oscillating Mass for on-Body Energy Harvesting

  5. Adaptive Relay Setting for Distribution Systems Considering Operation Scenarios of Wind Generators

  6. An Effective Hybrid Depth-Generation Algorithm for 2D-to-3D Conversion in 3D Displays

  7. An Ontology-Based Mining Method to Cluster Search Results from Web Databases

  8. An Overview of Information Hiding in H.264/AVC Compressed Video

  9. Application-Independent Testing Of 3-D Field Programmable Gate Array Interconnect Faults

  10. ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels

  11. Associated Particle Neutron Imaging for Elemental Analysis in Medical Diagnostics

  12. Bit-Level Optimization of Adder-Trees For Multiple Constant Multiplications for Efficient Fir Filter Implementation

  13. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks

  14. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks

  15. Combined Mining Pattern Based Recommendation for E-Customer

  16. Conditional Privacy Preserving Security Protocol for Nfc Applications

  17. Context-Aware Nanoscale Modeling of Multicast Multihop Cellular Networks

  18. CoRE: A Context-Aware Relation Extraction Method for Relation Completion

  19. Cost-Effective And Real-Time Scada Home Energy Monitoring System

  20. Critical-Path Analysis And Low-Complexity Implementation Of The Lms Adaptive Algorithm

  21. Cross-Domain Sentiment Classification and Emotion Detection from Text Based On Topic Modeling

  22. Data Encoding Techniques for Reducing Energy Consumption In Network-On-Chip

  23. DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory

  24. Dealing With Concept Drifts in Process Mining

  25. Delay Analysis Scheduling Traffic with Flow Control in Networks

  26. Design and Implementation of Malware Target Recognition of Unknown Threats Control Systems under Deception Attacks

  27. Design of Efficient Binary Comparators in Quantum-Dot Cellular Automata

  28. Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.

  29. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

  30. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs

  31. Efficient Computer Network Anomaly Detection by Change point Detection Methods

  32. Efficient Index-Based Approaches for Skyline Queries in Location-Based Applications

  33. Efficient Integer Dct Architectures for HEVC

  34. Efficient Multi-Link Failure Localization Schemes via Monitoring Trails in All-Optical Networks

  35. Eliminating Synchronization Latency Using Sequenced Latching

  36. Exploiting Network Cooperation in Green Wireless Communication

  37. Fast Sign Detection Algorithm for the RNS Module Set {2n+1 − 1, 2n − 1, 2n}

  38. Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection

  39. Gate Mapping Automation for Asynchronous Null Convention Logic Circuits

  40. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes

  41. Harvesting Wireless Power

  42. ICTCP: Incast Congestion Control for TCP in Data-Center Networks

  43. Input Vector Monitoring Concurrent Bist Architecture Using Sram Cells

  44. Intensity Range Based Background Subtraction For Effective Object Detection

  45. Iris Code Decompression Based on the Dependence between Its Bit Pairs

  46. LARS*: An Efficient and Scalable Location-Aware Recommender System

  47. Latent Fingerprint Matching Using Descriptor-Based Hough Transform

  48. Learning Phrase Patterns for Text Classification

  49. Learning Topic Models Using Natural Language Processing

  50. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing

  51. Low-Complexity Low-Latency Architecture For Matching Of Data Encodedwith Hard Systematic Error-Correcting Codes

  52. M-Privacy for Collaborative Data Publishing

  53. Maintaining Data Consistency in a Low-Energy Transparent Optical Wide Area Network with “Multipaths”

  54. Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases

  55. Mining Statistically Significant Co-location and Segregation Patterns

  56. Multifunction Residue Architectures for Cryptography

  57. Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System

  58. Multi-Level Diskless Check pointing

  59. Performance Evaluation Methodology for Historical Document Image Binarization

  60. Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks

  61. Real-Time I/O Management System with COTS Peripherals

  62. Reverse Converter Design Via Parallel-Prefix Adders: Novel Components, Methodology, and Implementations

  63. Reversible Data Hiding With Optimal Value Transfer

  64. Scalable Keyword Search on Large RDF Data

  65. Scalable Scheduling of Updates in Streaming Data Warehouses

  66. Secure Mining of Association Rules in Horizontally Distributed Databases

  67. Similarity Measure Based document Clustering

  68. Successive Interference Cancellation: Carving Out MAC Layer Opportunities

  69. Supporting Privacy Protection in Personalized Web Search

  70. Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint

  71. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

  72. Two-dimensional Maximum Local Variation based on Image Euclidean Distance for Face Recognition

  73. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks

  74. Using Incomplete Information for Complete Weight Annotation of Road Networks

  75. Visual Cryptograms of Random Grids for General Access Structures


    1. Online Contact

      Facebook | Twitter | Linked In | You Tube | Google+

      Our Other Project