JAVA project topics for Computer Science 2013

By | February 10, 2013
  1. A decentralized method for scaling up genome similarity search services.
  2. A distributed csma algorithm for throughput and utility maximization in wireless networks
  3. A distributed database architecture for global roaming in next generation mobile networks
  4. A dynamic en-route filtering scheme for data reporting in wireless sensor networks
  5. A dynamic performance-based flow control method for high-speed data transfer
  6. A framework for learning comprehensible theories in xml document classification
  7. A fully distributed proactively secure threshold multisignature scheme
  8. A hierarchical modeling and analysis for   grid service reliability
  9. A multi channel scheduler for high speed wireless backhaul links with packet concatenation
  10. A novel visual cryptography scheme
  11. A performance aware congestion control algorithm in wireless sensor networks
  12. A priority based mac scheduling algorithm for enhancing qos support in Bluetooth piconet
  13. A reliable communication protocol for multiregion mobile agent environments
  14. A routing driven key management scheme for heterogeneous sensor networks
  15. A secure erasure code-based cloud storage system with secure data forwarding
  16. A secure manet routing protocol for detecting faulty links
  17. A signature based indexing method for efficient content based retrieval of relative data
  18. A wireless actor and sensor networks qos-aware routing protocol for the emergency preparedness class of applications.
  19. An efficient approach of election algorithm in distributed systems
  20. An energy efficient clustering algorithm in large- scale mobile sensor networks
  21. Anonymous query processing in road networks
  22. Antnet: a mobile agents approach to adaptive routing.
  23. Authenticated group key transfer protocol based on secret sharing
  24. Bandwidth estimation for IEEE 802.11-based ad hoc networks.
  25. Becan: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
  26. Binrank: scaling dynamic authority-basedsearch using materialized sub graphs
  27. Bootstrapping ontologies for web services
  28. Bug tracking system.
  29. Cet management system(gsm).
  30. Channel-aware routing in manets with route handoff
  31. Chatting application
  32. Closeness: a new privacy measure for data publishing
  33. Collusive piracy prevention in p2p content delivery networks.
  34. Combinatorial approach for preventing sql injection attacks.
  35. Comparison based system level fault diagnosis: a neural network approach
  36. Controlling ip spoofing through inter domain packet filter.
  37. Cooperative secondary authorization recycling.
  38. Correlation-based traffic analysis attacks on anonymity networks
  39. Cryptographic versus trust based methods for manet routing security
  40. Data replication in data intensive scientific applications with performance guarantee
  41. Data seclusion in image & audio files
  42. design and implementation of tarf: trust-aware routing framework for wsns
  43. Detecting network wide and router specific misconfigurations through data mining
  44. Developing a lan application for group discussion
  45. Distributed algorithms for constructing approximate minimum spanning trees in wireless sensor networks.
  46. Distributed cache architecture with snooping for qos routing in large networks.
  47. Dynamic load balancing in distributed system in presence of delays.
  48. Dynamic routing with security considerations
  49. Dynamic search algorithm in unstructured peer-to-peer networks
  50. Effective packet analyzing & filtering system for atm networks
  51. Efficient and dynamic routing topology inference from end-to-end measurements
  52. Efficient and secure content processing and distribution by cooperative intermediatories
  53. Enabling public auditability and data dynamics for storage                                                                                                                         security in cloud computing
  54. Energy efficient cooperative video distribution with statistical qos provisions over wireless networks
  55. Energy efficient reprogramming of swarm of mobile sensors
  56. Enhancing privacy and authorization control scalability in the grid through ontologies.
  57. Ensuring data storage security in cloud computing
  58. Ensuring distributed accountabilityfor data sharing in the cloud
  59. Evaluation of efficiency of fec coding
  60. Exploiting dynamic resource allocation for efficient parallel data processing in the cloud
  61. Exploring peer-to-peer locality in multiple torrent environment
  62. Finger print voting machine
  63. Flexible determinstic packet marking: an ip traceback system to find real source of attacks
  64. Give2get: forwarding in social mobile wireless networks of selfish individuals
  65. Glip: a concurrency control protocol for clipping indexing
  66. Group based negotiations in p2p systems
  67. Hiding sensitive association rules with limited side effects
  68. Host-to-host congestion control for tcp
  69. Human mouse
  70. Hybrid intrusion detection woth weighted signature generation over anomalous internet episodes
  71. Jamming aware of traffic allocation for multiple path routing using portfolio selection
  72. Load balancing in distributed vod using local proxy server group[lpsg tracker]
  73. Lord of links: a framework for discovering missing links in the internet topology
  74. MABS: multicast authentication based on batch signature
  75. Managing multidimensional historical aggregate data in unstructured p2p networks
  76. Marks and attendance sms system using gsm
  77. Measurement based admission control at edge routers.
  78. Mesh based multicast routing in manet: stable link based approach
  79. Minimizing file download time in stochastic peer-to-peer networks
  80. Mitigating denial-of-service attacks on the chord overlay network: a location hiding approach
  81. Mitigating performance degradation in congested sensor network.
  82. Mobile banking using wml(gprs)
  83. Mobility management approaches for mobile ip networks: performance comparison and use recommendations.
  84. Multiple routing configurations for fast ip network recovery.
  85. On wireless scheduling algorithms for minimizing the queue-overflow probability
  86. Online handwritten script recognition
  87. Online index recommendations for high-dimensional  databases using query workloads
  88. Online shopping site
  89. Optimize storage placement in sensor networks
  90. Packet-hiding methods for preventing selective jamming attacks
  91. Pam: an efficient and privacy-aware monitoring framework for continuously moving objects
  92. Patient management system with sms.
  93. Popi: a user-level tool for inferring router packet forwarding priority
  94. Preventing network data congestion collapse using network border patrol
  95. Privacy- and integrity-preserving range queries in sensor networks
  96. Privacy preserving decentralized key-policy attribute based encryption
  97. Provably secure 3 party authinicated quantum key distribution protocol
  98. Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications
  99. Quiver : consistent  object sharng for edge services
  100. Rate and delay guarantees provided byclos packet switches with load balancing.
  101. Rcda: recoverable concealed data aggregation for data integrity in wireless sensor networks
  102. Replica placement for route diversity in tree-based routing distributed hash tables
  103. Risk aware mitigation for manet routing attacks
  104. Robust correlation of encrypted attack traffic through stepping stones by flow watermarking
  105. Rumor riding: anonymizing unstructured    peer-to-peer                                       systems
  106. Secrity eye for detecting trespasses
  107. Secure failure detection and consensus in trusted pals
  108. Self-protection in a clustered distributed system
  109. Skip: a secure key issuing scheme for peer-to-peer networks.
  110. Speeding up secure web transactions using elliptic curve cryptography.
  111. Stabilization of flood sequencing protocols in sensor networks
  112. Tam: a tiered authentication of multicast protocol for ad-hoc networks
  113. The plagiarism hunter
  114. The three-tier security scheme in wireless sensor networks with    mobile sinks
  115. Themis: a mutually verifyable billing system for cloud computing environment
  116. Topology enhancement in wireless multihop networks: a top down approach
  117. Towards broadcasting reliability in mobile adhoc networks with double coverage
  118. Truth discovery with multiple conflicting information providers on the web
  119. Universal citizen card(rfid).
  120. Update scheduling for improving consistency in distributed virtual environments
  121. Using the conceptual cohesion of classes for fault prediction in object-oriented systems
  122. Video conferencing over wireless adhoc networks
  123. Weak state routing for large-scale dynamic networks
  124. Zonetrust: fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing

Author: Ravi Bandakkanavar

A Techie, Blogger, Web Designer, Programmer by passion who aspires to learn new Technologies every day. It has been 6 years since I have been publishing articles and enjoying every bit of it. I want to share knowledge and build a great community with people like you.

Suggested read for you:

One thought on “JAVA project topics for Computer Science 2013

  1. Lorenza

    This is my first time go too see at here and i am truly impressed to read all at single place.


Did it help? Comment here..