SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
JAVA 
Contact: 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
1 
CODE 
TITLE 
DESCRIPTION 
IEEE 2013 - NETWORKING 
NW01 
Optimal Client-Server Assignment for Internet Distributed Systems 
Networking, Security, Distributed Systems, Client-Server, Clustering, Load Balancing. 
NW02 
SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems 
Networking, Security, Peer - Peer, Trust Management, Reputation. 
NW03 
Cross-Domain Privacy- Preserving Cooperative Firewall Optimization 
Networking, Security, Firewall Optimization, Privacy-Preserving. 
NW04 
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks 
Networking, Fuzzy Logic Control, Quality Of Service (QOS), Robustness, Traffic Management, University Results Site. 
NW05 
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDOS) Flooding Attacks 
Networking, Security, Distributed Denial of Service (DDOS) Flooding Attack, Intrusion Detection Systems, BOTNET. 
NW06 
SocialTube: P2P-assisted Video Sharing in Online Social Networks 
Networking, Multimedia, Peer-To-Peer, Video-On-Demand (VOD), Video Sharing in Face Book. 
NW07 
Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks 
Networking, Peer-To-Peer, Reputation Systems, Server Selection, Bayesian Networks, Quality Of Service (QOS) 
NW08 
Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks 
Networking, Wireless Sensor Network (WSN), Attribute-Aware Data Aggregation (ADA). 
NW09 
Delay-Tolerant Bulk Data Transfers on the Internet 
Networking, Delay-Tolerant Networks (DTNs), Bulk Data Transfers On The Internet.
JAVA 
Contact: 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
2 
CODE 
TITLE 
DESCRIPTION 
IEEE 2013 - NETWORKING 
NW10 
Range-Based Skyline Queries in Mobile Environments 
Networking, Location-Based Services (LBS), Query Processing, Skyline Queries, Moving Objects 
NW11 
A Symmetric Load Balancing Algorithm with Performance Guarantees for DHT. 
Networking, Distributed Hash Tables (DHT), Load Balance, Virtual Server. 
NW12 
A Distributed Control Law for Load Balancing in Content Delivery Networks 
Networking, Content Delivery Network (CDN), Control Theory, Request Balancing. 
DM01 
Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource 
Data Mining, Fuzzy, Ontology, Ontological and Terminological Resource (OTR) 
IEEE 2013 - DATA MINING 
DM02 
H o w t o U s e S e a r c h E n g i n e Optimization Techniques to Increase Website Visibility 
Data Mining, Organic Search, Search Engine Optimization, Search-Ranking Algorithms, Social Media, Websites. 
DM03 
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 
Data Mining, Adverse Drug Reactions, Medical Centres, Association Rules, Data Mining Algorithms, Healthcare, Decision Model. 
DM04 
Reinforced Similarity Integration in Image-Rich Information Networks 
Data Mining, Networking, Information Retrieval, Image Mining, Information Network, Ranking 
DM05 
Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse 
Data Mining, Ontology, Evidence, Information Fusion, Trust, Data Quality, Web-Enabled Data Warehouse 
DM06 
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data 
Data Mining, Artificial Intelligence, Security, Knowledge Base Management, Knowledge Representation Formalisms and Methods,
JAVA 
Contact: 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
3

Mais conteúdo relacionado

Mais procurados

Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-20141pointer
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014onepointer
 
Ieee 2014 2014 java project titles
Ieee 2014 2014 java  project titlesIeee 2014 2014 java  project titles
Ieee 2014 2014 java project titlesNandha Kumar
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET Journal
 
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...paperpublications3
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computingiosrjce
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsIOSR Journals
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESMusthafa Tema
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryLeMeniz Infotech
 

Mais procurados (16)

Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
Ieee 2014 2014 java project titles
Ieee 2014 2014 java  project titlesIeee 2014 2014 java  project titles
Ieee 2014 2014 java project titles
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
 
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computing
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Sub1522
Sub1522Sub1522
Sub1522
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
54
5454
54
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 

Semelhante a Java projects

Dot net projects
Dot net projectsDot net projects
Dot net projectsshahu2212
 
Java 2014 15
Java 2014 15Java 2014 15
Java 2014 15shahu2212
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvrtechnologies Nellore
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEallmightinfo
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSIJCNCJournal
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsIJCNCJournal
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...IJCNCJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Shakas Technologies
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsLeMeniz Infotech
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryLeMeniz Infotech
 

Semelhante a Java projects (20)

Dot net projects
Dot net projectsDot net projects
Dot net projects
 
Java 2014 15
Java 2014 15Java 2014 15
Java 2014 15
 
IEEE 2011 October titles
IEEE 2011 October titles IEEE 2011 October titles
IEEE 2011 October titles
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Secure final
Secure finalSecure final
Secure final
 
Dotnet ieee 2014 projects
Dotnet ieee 2014 projectsDotnet ieee 2014 projects
Dotnet ieee 2014 projects
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projects
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherry
 

Último

Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 

Último (20)

Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Java projects

  • 1. JAVA Contact: 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 1 CODE TITLE DESCRIPTION IEEE 2013 - NETWORKING NW01 Optimal Client-Server Assignment for Internet Distributed Systems Networking, Security, Distributed Systems, Client-Server, Clustering, Load Balancing. NW02 SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems Networking, Security, Peer - Peer, Trust Management, Reputation. NW03 Cross-Domain Privacy- Preserving Cooperative Firewall Optimization Networking, Security, Firewall Optimization, Privacy-Preserving. NW04 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Networking, Fuzzy Logic Control, Quality Of Service (QOS), Robustness, Traffic Management, University Results Site. NW05 A Survey of Defense Mechanisms Against Distributed Denial of Service (DDOS) Flooding Attacks Networking, Security, Distributed Denial of Service (DDOS) Flooding Attack, Intrusion Detection Systems, BOTNET. NW06 SocialTube: P2P-assisted Video Sharing in Online Social Networks Networking, Multimedia, Peer-To-Peer, Video-On-Demand (VOD), Video Sharing in Face Book. NW07 Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks Networking, Peer-To-Peer, Reputation Systems, Server Selection, Bayesian Networks, Quality Of Service (QOS) NW08 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks Networking, Wireless Sensor Network (WSN), Attribute-Aware Data Aggregation (ADA). NW09 Delay-Tolerant Bulk Data Transfers on the Internet Networking, Delay-Tolerant Networks (DTNs), Bulk Data Transfers On The Internet.
  • 2. JAVA Contact: 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 2 CODE TITLE DESCRIPTION IEEE 2013 - NETWORKING NW10 Range-Based Skyline Queries in Mobile Environments Networking, Location-Based Services (LBS), Query Processing, Skyline Queries, Moving Objects NW11 A Symmetric Load Balancing Algorithm with Performance Guarantees for DHT. Networking, Distributed Hash Tables (DHT), Load Balance, Virtual Server. NW12 A Distributed Control Law for Load Balancing in Content Delivery Networks Networking, Content Delivery Network (CDN), Control Theory, Request Balancing. DM01 Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource Data Mining, Fuzzy, Ontology, Ontological and Terminological Resource (OTR) IEEE 2013 - DATA MINING DM02 H o w t o U s e S e a r c h E n g i n e Optimization Techniques to Increase Website Visibility Data Mining, Organic Search, Search Engine Optimization, Search-Ranking Algorithms, Social Media, Websites. DM03 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs Data Mining, Adverse Drug Reactions, Medical Centres, Association Rules, Data Mining Algorithms, Healthcare, Decision Model. DM04 Reinforced Similarity Integration in Image-Rich Information Networks Data Mining, Networking, Information Retrieval, Image Mining, Information Network, Ranking DM05 Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse Data Mining, Ontology, Evidence, Information Fusion, Trust, Data Quality, Web-Enabled Data Warehouse DM06 Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data Data Mining, Artificial Intelligence, Security, Knowledge Base Management, Knowledge Representation Formalisms and Methods,
  • 3. JAVA Contact: 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 3