Sell Your Projects | My Account | Careers | [email protected] | Call: +91 9573777164

Java Mobile Computing Projects

S.NOPROJECT TITLEYEAR   
J17MC01Searching Trajectories by Regions of Interest2017
J17MC02ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes2017
J17MC03Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy2017
J17MC04Data Quality Guided Incentive Mechanism Design for Crowdsensing2017
J17MC05Temporal Correlation of Interference and Outage in Mobile Networks over One- Dimensional Finite Regions2017
J17MC06Towards Secure Data Distribution Systems in Mobile Cloud Computing2017
J17MC07SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks2017
S.NOPROJECT TITLEYEAR   
J16MC01Energy Efficient Mobile Cloud Computing Powered by Wireless Energy Transfer2016
J16MC02Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging2016
J16MC03A Multilevel Access Control Scheme for Data Security in Transparent Computing2016
J16MC04Social Network De-Anonymization Under Scale-Free User Relations2016
J16MC05Structural Data De-Anonymization: Theory and Practice2016
J16MC06Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks2016
J16MC07ALTERDROID Differential Fault Analysis of Obfuscated Smartphone Malware2016
J16MC08SecureRun Cheat-Proof and Private Summaries for location based activities2016
S.NOPROJECT TITLEYEAR   
J15MC01Friend book A Semantic-Based Friend Recommendation System for Social Networks2015
J15MC02Wormhole Attack Detection Algorithms in Wireless Network Coding Systems2015
J15MC03A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks2015
J15MC04An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization2015
J15MC05CoCoWa A Collaborative Contact-based Watchdog for Detecting Selfish Nodes2015
J15MC06EMC3 Energy-efficient data transfer in mobile crowd sensing under full coverage constraint2015
J15MC07Game-theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks2015
J15MC08Interference-based Topology Control Algorithm for Delay-constrained Mobile Ad hoc Networks2015
J15MC09Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks2015
J15MC10Joint Spectral Efficiency and Power Allocation Optimization in IEEE 802.16m2015
J15MC11MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks Detection and Defense2015
J15MC12Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers2015
J15MC13Optimal Resource Allocation in Random Access Cooperative Cognitive Radio Networks2015
J15MC14Prioritized Optimal Channel Allocation Schemes for Multi-Channel Vehicular Networks2015
J15MC15Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems2015
J15MC16Resource Allocation for Dynamic Intra-Cell Subcarrier Reuse in Cooperative OFDMA Wireless Networks2015
J15MC17Self-Organizing Resource Management Framework in OFDMA Femtocells2015
J15MC18Towards Optimal Broadcast in Wireless Networks2015
J15MC19Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets2015
J15MC20Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding2015
J15MC21Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks2015
J15MC22Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks2015
J15MC23User-Defined Privacy Grid System for Continuous Location-Based Services2015