Java Networking Projects
S.NO | PROJECT TITLE | YEAR | |||
---|---|---|---|---|---|
J17NP01 | High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching | 2017 | |||
J17NP02 | Uncertain Data Clustering in Distributed Peer-to-Peer Networks | 2017 | |||
J17NP03 | A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks | 2017 | |||
J17NP04 | Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs | 2017 | |||
J17NP05 | A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks | 2017 | |||
J17NP06 | Event-based Fault Detection Filtering for Complex Networked Jump Systems | 2017 | |||
J17NP07 | Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN | 2017 | |||
J17NP08 | Analytical Modeling of Multipath TCP Over Last-Mile Wireless | 2017 | |||
J17NP09 | User-Centric Network MIMO With Dynamic Clustering | 2017 | |||
J17NP10 | Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Pre-distribution Scheme With Unreliable Links | 2017 | |||
J17NP11 | Social Norm Incentives for Network Coding in MANETs | 2017 | |||
J17NP12 | An Overlay Architecture for Throughput Optimal Multipath Routing | 2017 | |||
J17NP13 | Routing in Accumulative Multi-Hop Networks | 2017 | |||
J17NP14 | Coding for Improved Throughput Performance in Network Switches | 2017 | |||
J17NP15 | Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol | 2017 | |||
J17NP16 | A Scalable Framework for Wireless Distributed Computing | 2017 | |||
J17NP17 | Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels | 2017 | |||
J17NP18 | Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems | 2017 | |||
J17NP19 | Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks | 2017 | |||
J17NP20 | A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails | 2017 | |||
J17NP21 | On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design | 2017 | |||
J17NP22 | Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks | 2017 | |||
J17NP23 | Security Implications of Permission Models in Smart-Home Application Frameworks | 2017 | |||
J17NP24 | Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks | 2017 | |||
J17NP25 | Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks | 2017 | |||
J17NP26 | Congestion Control for Background Data Transfers With Minimal Delay Impact | 2017 | |||
J17NP27 | Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks | 2017 | |||
J17NP28 | A Statistical Exploration of Protocol Adoption | 2017 | |||
J17NP29 | No Packet Left Behind: Avoiding Starvation in Dynamic Topologies | 2017 | |||
J17NP30 | Green Virtualization for Multiple Collaborative Cellular Operators | 2017 | |||
J17NP31 | DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks | 2017 | |||
J17NP32 | Congestion Control for Web Real-Time Communication | 2017 | |||
J17NP33 | Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexitys | 2017 | |||
J17NP34 | Network-Based Modeling for Characterizing Human Collective Behaviors During Extreme Events | 2017 | |||
J17NP35 | Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches | 2017 | |||
J17NP36 | Someone in Your Contact List: Cued Recall- Based Textual Passwords | 2017 | |||
J17NP37 | A Game-Theoretic Analysis of Adversarial Classification | 2017 | |||
J17NP38 | A New Rule for Cost Reassignment in Adaptive Steganography | 2017 | |||
J17NP39 | On the Maximum Rate of Networked Computation in a Capacitated Network | 2017 | |||
J17NP40 | Towards Optimal Connectivity on Multi- layered Networks | 2017 | |||
J17NP41 | Uncertain Data Clustering in Distributed Peer-to-Peer Networks | 2017 | |||
J17NP42 | A Secure and Practical Authentication Scheme Using Personal Devices | 2017 | |||
J17NP43 | Full Verifiability for Outsourced Decryption in Attribute Based Encryption | 2017 | |||
J17NP44 | LOMCF: Forwarding and Caching in Named Data Networking based MANETs | 2017 | |||
J17NP45 | Probability of Partially Decoding Network- Coded Messages | 2017 | |||
J17NP46 | Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks | 2017 | |||
J17NP47 | Capacitated Next Controller Placement in Software Defined Networks | 2017 | |||
J17NP48 | An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines | 2017 | |||
J17NP49 | An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings | 2017 | |||
J17NP50 | ART An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks | 2017 | |||
J17NP51 | Scene Text Detection and Segmentation based on Cascaded Convolution Neural Networks | 2017 |
S.NO | PROJECT TITLE | YEAR | |||
---|---|---|---|---|---|
J16NP01 | Cost-efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks | 2016 | |||
J16NP02 | An Optimization Framework for Mobile Data Collection in EnergyHarvesting Wireless Sensor Networks | 2016 | |||
J16NP03 | Distributed and Fair Beaconing Rate Adaptation for Congestion Control in Vehicular Networks | 2016 | |||
J16NP04 | Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering | 2016 | |||
J16NP05 | On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment | 2016 | |||
J16NP06 | A Superprocess With Upper Confidence Bounds for Cooperative Spectrum Sharing | 2016 | |||
J16NP07 | Multi-Story Indoor Floor Plan Reconstruction via Mobile Crowd sensing | 2016 | |||
J16NP08 | A Stable Approach for Routing Queries in Unstructured P2P Networks | 2016 | |||
J16NP09 | iPath: Path Inference in Wireless Sensor Networks | 2016 | |||
J16NP10 | Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks | 2016 | |||
J16NP11 | Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks | 2016 | |||
J16NP12 | STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users | 2016 | |||
J16NP13 | Joint Channel Access and Sampling Rate Control in Energy Harvesting Cognitive Radio Sensor Networks | 2016 | |||
J16NP14 | State Estimation Oriented Wireless Transmission for Ubiquitous Monitoring in Industrial Cyber-Physical Systems | 2016 | |||
J16NP15 | Indoor Pedestrian Tracking by On-Body Multiple Receivers | 2016 | |||
J16NP16 | The Role of Information in Distributed Resource Allocation | 2016 | |||
J16NP17 | An Exact Algorithm for the Shortest Path Problem With Position-Based Learning Effects | 2016 | |||
J16NP18 | Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching | 2016 | |||
J16NP19 | A Survey of Man In The Middle Attacks | 2016 | |||
J16NP20 | Risk Assessment in Social Networks based on User Anomalous Behaviour | 2016 | |||
J16NP21 | PROVEST: Provenance-based Trust Model for Delay Tolerant Networks | 2016 | |||
J16NP22 | Botnet Detection based on Anomaly and Community Detection | 2016 | |||
J16NP23 | BCCC: An Expandable Network for Data Centers | 2016 | |||
J16NP24 | Identification of Boolean Networks Using Premined Network Topology Information | 2016 | |||
J16NP25 | An Integrated Systematic Approach to Designing Enterprise Access Control | 2016 | |||
J16NP26 | GreenCoMP: Energy-Aware Cooperation for Green Cellular Networks | 2016 | |||
J16NP27 | Performance Analysis of Mobile Data Offloading in Heterogeneous Networks | 2016 | |||
J16NP28 | QoS-Aware Scheduling of Workflows in Cloud Computing Environments | 2016 | |||
J16NP29 | Optimality of Fast Matching Algorithms for Random Networks with Applications to Structural Controllability | 2016 | |||
J16NP30 | An Optimized Virtual Load Balanced Call Admission Controller for IMS Cloud Computing | 2016 | |||
J16NP31 | CCDN: Content-Centric Data Center Networks | 2016 | |||
J16NP32 | An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path | 2016 | |||
J16NP33 | PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks | 2016 | |||
J16NP34 | Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor | 2016 | |||
J16NP35 | Active Trust: Secure and Trustable Routing in Wireless Sensor Networks | 2016 | |||
J16NP36 | Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks | 2016 | |||
J16NP37 | Secure Communication Scheme for Wireless Sensor Networks to maintain Anonymity | 2016 | |||
J16NP38 | A Dynamic Scheduler for Balancing HPC Applications | 2016 | |||
J16NP39 | A Hop-by-Hop Routing Mechanism for Green Internet | 2016 | |||
J16NP40 | Analysis Of Neighbour And Isolated Node Of Intersection Area Based Geocasting Protocol (Ibgp) In Vanet | 2016 | |||
J16NP41 | Secure Overlay Routing Using Key Pre-Distribution A Linear Distance Optimization Approach | 2016 |
S.NO | PROJECT TITLE | YEAR | |||
---|---|---|---|---|---|
J15NP01 | A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks | 2015 | |||
J15NP02 | A Two-Layer Recurrent Neural Network for Nonsmooth Convex Optimization Problems | 2015 | |||
J15NP03 | A MAC protocol for link maintenance in multichannel cognitive radio ad hoc networks | 2015 | |||
J15NP04 | A Poisson Hidden Markov Model for Multi view Video Traffic | 2015 | |||
J15NP05 | A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks | 2015 | |||
J15NP06 | Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms A Virtual Multichannel Approach | 2015 | |||
J15NP07 | An energy-efficient mobility-supporting MAC protocol in wireless sensor networks | 2015 | |||
J15NP08 | An Enhanced Fuzzy MinÐMax Neural Network for Pattern Classification | 2015 | |||
J15NP09 | Analysis and Experimental Verification of Frequency-Based Interference Avoidance Mechanisms in IEEE 802.15.4 | 2015 | |||
J15NP10 | Analysis of a Ò0Ó Stealth Scan From a Botnet | 2015 | |||
J15NP11 | Bit error rate of underlay decode-and-forward cognitive networks with best relay selection | 2015 | |||
J15NP12 | Capacity Achieving Distributed Scheduling With Finite Buffers | 2015 | |||
J15NP13 | Delay Optimization and Cross-Layer Design in Wireless Multi-Hop Networks with Network Coding and Successive Interference Cancellation | 2015 | |||
J15NP14 | Delay tolerant information dissemination via coded cooperative | 2015 | |||
J15NP15 | Efficient Allocation of Periodic Feedback Channels in Broadband Wireless Networks | 2015 | |||
J15NP16 | Energy Efficient Virtual Network Embedding for Cloud Networks | 2015 | |||
J15NP17 | Energy efficient wireless sensor networks using linear-programming optimization of the communication schedule | 2015 | |||
J15NP18 | Exploiting Asynchronous Amplify-and-Forward Relays to Enhance the Performance of IEEE 802.11 Networks | 2015 | |||
J15NP19 | Extend Your Journey Considering Signal Strength and Fluctuation in Location-Based Applications | 2015 | |||
J15NP20 | Handover authentication for mobile networks security and efficiency aspects | 2015 | |||
J15NP21 | Learning Understandable Neural Networks With Nonnegative Weight Constraints | 2015 | |||
J15NP22 | Maximizing Sub modular Set Function With Connectivity Constraint Theory and Application to Networks | 2015 | |||
J15NP23 | Multi-Node Wireless Energy Charging in Sensor Networks | 2015 | |||
J15NP24 | Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce | 2015 | |||
J15NP25 | Privacy-Preserving Detection of Sensitive Data Exposure | 2015 | |||
J15NP26 | Quality of Information Maximization for Wireless Networks via a Fully Separable Quadratic Policy | 2015 | |||
J15NP27 | Receiver-Based Flow Control for Networks in Overload | 2015 | |||
J15NP28 | Toward Transparent Co existence for Multi hop Secondary Cognitive Radio | 2015 | |||
J15NP29 | Whispers in the Hyper-Space High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud | 2015 | |||
J15NP30 | A Proximity-Aware Interest-Clustered P2P File Sharing System | 2015 | |||
J15NP31 | Detecting Malicious Facebook Applications | 2015 | |||
J15NP32 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | 2015 | |||
J15NP33 | Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks | 2015 | |||
J15NP34 | On the designing of two grains levels network intrusion detection | 2015 | |||
J15NP35 | Towards Optimal Broadcast in Wireless Networks | 2015 |