Sell Your Projects | My Account | Careers | [email protected] | Call: +91 9573777164

Java Networking Projects

S.NOPROJECT TITLEYEAR   
J17NP01High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching2017
J17NP02Uncertain Data Clustering in Distributed Peer-to-Peer Networks2017
J17NP03A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks2017
J17NP04Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs2017
J17NP05A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks2017
J17NP06Event-based Fault Detection Filtering for Complex Networked Jump Systems2017
J17NP07Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN2017
J17NP08Analytical Modeling of Multipath TCP Over Last-Mile Wireless2017
J17NP09User-Centric Network MIMO With Dynamic Clustering2017
J17NP10Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Pre-distribution Scheme With Unreliable Links2017
J17NP11Social Norm Incentives for Network Coding in MANETs2017
J17NP12An Overlay Architecture for Throughput Optimal Multipath Routing2017
J17NP13Routing in Accumulative Multi-Hop Networks2017
J17NP14Coding for Improved Throughput Performance in Network Switches2017
J17NP15Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol2017
J17NP16A Scalable Framework for Wireless Distributed Computing2017
J17NP17Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels2017
J17NP18Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems2017
J17NP19Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks2017
J17NP20A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails2017
J17NP21On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design2017
J17NP22Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks2017
J17NP23Security Implications of Permission Models in Smart-Home Application Frameworks2017
J17NP24Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks2017
J17NP25Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks2017
J17NP26Congestion Control for Background Data Transfers With Minimal Delay Impact2017
J17NP27Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks2017
J17NP28A Statistical Exploration of Protocol Adoption2017
J17NP29No Packet Left Behind: Avoiding Starvation in Dynamic Topologies2017
J17NP30Green Virtualization for Multiple Collaborative Cellular Operators2017
J17NP31DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks2017
J17NP32Congestion Control for Web Real-Time Communication2017
J17NP33Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexitys2017
J17NP34Network-Based Modeling for Characterizing Human Collective Behaviors During Extreme Events2017
J17NP35Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches2017
J17NP36Someone in Your Contact List: Cued Recall- Based Textual Passwords2017
J17NP37A Game-Theoretic Analysis of Adversarial Classification2017
J17NP38A New Rule for Cost Reassignment in Adaptive Steganography2017
J17NP39On the Maximum Rate of Networked Computation in a Capacitated Network2017
J17NP40Towards Optimal Connectivity on Multi- layered Networks2017
J17NP41Uncertain Data Clustering in Distributed Peer-to-Peer Networks2017
J17NP42A Secure and Practical Authentication Scheme Using Personal Devices2017
J17NP43Full Verifiability for Outsourced Decryption in Attribute Based Encryption2017
J17NP44LOMCF: Forwarding and Caching in Named Data Networking based MANETs2017
J17NP45Probability of Partially Decoding Network- Coded Messages2017
J17NP46Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks2017
J17NP47Capacitated Next Controller Placement in Software Defined Networks2017
J17NP48An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines2017
J17NP49An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings2017
J17NP50ART An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks2017
J17NP51Scene Text Detection and Segmentation based on Cascaded Convolution Neural Networks2017
S.NOPROJECT TITLEYEAR   
J16NP01Cost-efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks2016
J16NP02An Optimization Framework for Mobile Data Collection in EnergyHarvesting Wireless Sensor Networks2016
J16NP03Distributed and Fair Beaconing Rate Adaptation for Congestion Control in Vehicular Networks2016
J16NP04Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering2016
J16NP05On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment2016
J16NP06A Superprocess With Upper Confidence Bounds for Cooperative Spectrum Sharing2016
J16NP07Multi-Story Indoor Floor Plan Reconstruction via Mobile Crowd sensing2016
J16NP08A Stable Approach for Routing Queries in Unstructured P2P Networks2016
J16NP09iPath: Path Inference in Wireless Sensor Networks2016
J16NP10Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks2016
J16NP11Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks2016
J16NP12STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users2016
J16NP13Joint Channel Access and Sampling Rate Control in Energy Harvesting Cognitive Radio Sensor Networks2016
J16NP14State Estimation Oriented Wireless Transmission for Ubiquitous Monitoring in Industrial Cyber-Physical Systems2016
J16NP15Indoor Pedestrian Tracking by On-Body Multiple Receivers2016
J16NP16The Role of Information in Distributed Resource Allocation2016
J16NP17An Exact Algorithm for the Shortest Path Problem With Position-Based Learning Effects2016
J16NP18Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching2016
J16NP19A Survey of Man In The Middle Attacks2016
J16NP20Risk Assessment in Social Networks based on User Anomalous Behaviour2016
J16NP21PROVEST: Provenance-based Trust Model for Delay Tolerant Networks2016
J16NP22Botnet Detection based on Anomaly and Community Detection2016
J16NP23BCCC: An Expandable Network for Data Centers2016
J16NP24Identification of Boolean Networks Using Premined Network Topology Information2016
J16NP25An Integrated Systematic Approach to Designing Enterprise Access Control2016
J16NP26GreenCoMP: Energy-Aware Cooperation for Green Cellular Networks2016
J16NP27Performance Analysis of Mobile Data Offloading in Heterogeneous Networks2016
J16NP28QoS-Aware Scheduling of Workflows in Cloud Computing Environments2016
J16NP29Optimality of Fast Matching Algorithms for Random Networks with Applications to Structural Controllability2016
J16NP30An Optimized Virtual Load Balanced Call Admission Controller for IMS Cloud Computing2016
J16NP31CCDN: Content-Centric Data Center Networks2016
J16NP32An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path2016
J16NP33PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks2016
J16NP34Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor2016
J16NP35Active Trust: Secure and Trustable Routing in Wireless Sensor Networks2016
J16NP36Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks2016
J16NP37Secure Communication Scheme for Wireless Sensor Networks to maintain Anonymity2016
J16NP38A Dynamic Scheduler for Balancing HPC Applications2016
J16NP39A Hop-by-Hop Routing Mechanism for Green Internet2016
J16NP40Analysis Of Neighbour And Isolated Node Of Intersection Area Based Geocasting Protocol (Ibgp) In Vanet2016
J16NP41Secure Overlay Routing Using Key Pre-Distribution A Linear Distance Optimization Approach2016
S.NOPROJECT TITLEYEAR   
J15NP01A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks2015
J15NP02A Two-Layer Recurrent Neural Network for Nonsmooth Convex Optimization Problems2015
J15NP03A MAC protocol for link maintenance in multichannel cognitive radio ad hoc networks2015
J15NP04A Poisson Hidden Markov Model for Multi view Video Traffic2015
J15NP05A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks2015
J15NP06Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms A Virtual Multichannel Approach2015
J15NP07An energy-efficient mobility-supporting MAC protocol in wireless sensor networks2015
J15NP08An Enhanced Fuzzy MinÐMax Neural Network for Pattern Classification2015
J15NP09Analysis and Experimental Verification of Frequency-Based Interference Avoidance Mechanisms in IEEE 802.15.42015
J15NP10Analysis of a Ò0Ó Stealth Scan From a Botnet2015
J15NP11Bit error rate of underlay decode-and-forward cognitive networks with best relay selection2015
J15NP12Capacity Achieving Distributed Scheduling With Finite Buffers2015
J15NP13Delay Optimization and Cross-Layer Design in Wireless Multi-Hop Networks with Network Coding and Successive Interference Cancellation2015
J15NP14Delay tolerant information dissemination via coded cooperative2015
J15NP15Efficient Allocation of Periodic Feedback Channels in Broadband Wireless Networks2015
J15NP16Energy Efficient Virtual Network Embedding for Cloud Networks2015
J15NP17Energy efficient wireless sensor networks using linear-programming optimization of the communication schedule2015
J15NP18Exploiting Asynchronous Amplify-and-Forward Relays to Enhance the Performance of IEEE 802.11 Networks2015
J15NP19Extend Your Journey Considering Signal Strength and Fluctuation in Location-Based Applications2015
J15NP20Handover authentication for mobile networks security and efficiency aspects2015
J15NP21Learning Understandable Neural Networks With Nonnegative Weight Constraints2015
J15NP22Maximizing Sub modular Set Function With Connectivity Constraint Theory and Application to Networks2015
J15NP23Multi-Node Wireless Energy Charging in Sensor Networks2015
J15NP24Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce2015
J15NP25Privacy-Preserving Detection of Sensitive Data Exposure2015
J15NP26Quality of Information Maximization for Wireless Networks via a Fully Separable Quadratic Policy2015
J15NP27Receiver-Based Flow Control for Networks in Overload2015
J15NP28Toward Transparent Co existence for Multi hop Secondary Cognitive Radio2015
J15NP29Whispers in the Hyper-Space High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud2015
J15NP30A Proximity-Aware Interest-Clustered P2P File Sharing System2015
J15NP31Detecting Malicious Facebook Applications2015
J15NP32Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing2015
J15NP33Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks2015
J15NP34On the designing of two grains levels network intrusion detection2015
J15NP35Towards Optimal Broadcast in Wireless Networks2015