0% found this document useful (0 votes)
116 views4 pages

2011 Ieee Java Project Titles

This document lists 40 potential project titles for IEEE 2011 related to various domains including secure computing, image processing, web services, networking, knowledge and data engineering, and cloud computing. The projects focus on topics such as intrusion detection, data hiding, cryptography, web service composition, clustering, malware spread, and caching strategies. They provide students with technical problems and research areas across multiple fields involving computer science and information technology.

Uploaded by

JAYAPRAKASH
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views4 pages

2011 Ieee Java Project Titles

This document lists 40 potential project titles for IEEE 2011 related to various domains including secure computing, image processing, web services, networking, knowledge and data engineering, and cloud computing. The projects focus on topics such as intrusion detection, data hiding, cryptography, web service composition, clustering, malware spread, and caching strategies. They provide students with technical problems and research areas across multiple fields involving computer science and information technology.

Uploaded by

JAYAPRAKASH
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

www.jpinfotech.blogspot.

com

IEEE 2011 JAVA Project Titles


Sl.No.-Project Code Title CATEGORY 1

1. JPJ1-Online Intrusion Alert Aggregation with Generative Data Stream

Modeling. (Domain: Secure Computing)


2. JPJ 1A- Anomaly Detection in Network Traffic Based on Statistical

Inference and Stable Modeling. (Domain: Secure Computing)


3. JPJ 1B- Self-Organizing Feature Maps for User-to-Root and Remote-

to-Local Network Intrusion Detection on the KDD Cup 1999 Dataset. (Domain: Secure Computing)
4. JPJ2-Embedded Extended Visual Cryptography Schemes. (Domain:

Secure Computing + Image Processing)


5. JPJ3-Architecting a Secure Enterprise Data Sharing. (Domain : Secure

Computing)
6. JPJ3A- Construction P2P firewall HTTP-Botnet defense mechanism.

(Domain: Secure Computing)


7. JPJ3B- A Hierarchical Hybrid Structure for Botnet Control and

Command. (Domain: Secure Computing)


8. JPJ4-ROBUST VIDEO DATA HIDING USING FORBIDDEN

ZONE DATA HIDING AND SELECTIVE EMBEDDING. (Domain: Secure Computing + Image Processing)
9. JPJ4A- An Optimal Data Hiding Scheme With Tree-Based Parity

Check. (Domain: Secure Computing + Image Processing).

Contact: R.JAYAPRAKASH - 9952649690

www.jpinfotech.blogspot.com

10. JPJ4B- Data Hiding in Motion Vectors of Compressed Video Based

on Their Associated Prediction Error. (Domain: Secure Computing + Image Processing).


11. JPJ5- Competitive Study of Cryptography Techniques over Block

Cipher. (Domain: Secure Computing)


12. JPJ6-Analysis on Credit Card Fraud Detection Methods. (Domain:

Secure Computing)
13. JPJ7-Seeking Quality of Web Service Composition in a Semantic

Dimension. (Domain: Web Service)


14. JPJ8-QoS-Aware Web Service Recommendation by Collaborative

Filtering. (Domain: Web Service)


15. JPJ9-Interval ckMeans An Algorithm for Clustering Symbolic Data.

(Domain: Knowledge and Data Engineering)


16. JPJ10- Clustering with Multi-Viewpoint based Similarity Measure.

(Domain: Knowledge and Data Engineering)


17. JPJ11-On Demand Check Pointing for Grid Application Reliability

using Communicating Process Model. (Domain: Networking)


18. JPJ12-Sketch4Match Content-based Image Retrieval System Using

Sketches. (Domain: Image processing & Knowledge and Data Engineering)


19. JPJ12A- Computational Perceptual Features for Texture

Representation and Retrieval. (Domain: Image processing & Knowledge and Data Engineering)
20. JPJ13-Subspace-Based Striping Noise Reduction in Hyperspectral

Images. (Domain: Image processing).


21. JPJ13A- An Efficient Edge-based Bilateral Filter for Restoring Real

Noisy Image. (Domain: Image processing).

Contact: R.JAYAPRAKASH - 9952649690

www.jpinfotech.blogspot.com

22. JPJ14-Ontology

Based Business Process Customization Composite Web Services. (Domain: Web Service) Networks. (Domain: Networking)

for

23. JPJ15- Design of p-Cycles for Full Node Protection in WDM Mesh 24. JPJ16- Dynamics of Malware Spread in Decentralized Peer-to-Peer

Networks. (Domain: Secure Computing).


25. JPJ17- Intrusion detection An Energy efficient approach. (Domain:

Secure Computing).
26. JPJ18- Dynamic Channel Allocation for wireless zone-based

Multicast and Broadcast Service. (Domain: Networking)


27. JPJ18A- Channel Allocation in Wireless Data Center Networks.

(Domain: Networking)
28. JPJ19- A foundation for stochastic bandwidth estimation of networks

with random service. (Domain: Networking)


29. JPJ20- Analysis of quality of object oriented systems using object

oriented metrics. (Domain: Software Engineering)


30. JPJ21- A new approach for FEC decoding based on the BP algorithm

in LTE and Wi-MAX systems. (Domain: Networking)


31. JPJ22- Simplified algorithm on network shortest path problem.

(Domain: Networking)
32. JPJ22A- An Improved Shortest Path Bridging Protocol for Ethernet

Backbone Network. (Domain: Networking)


33. JPJ22B- A Simple and Fast Algorithm for Restricted Shortest Path

Problem. (Domain: Networking)


34. JPJ22C- Load-Balanced Shortest-Path-Based Routing Without Traffic

Splitting in Hose Model. (Domain: Networking)

Contact: R.JAYAPRAKASH - 9952649690

www.jpinfotech.blogspot.com

35. JPJ23- Voronoi-based continuous query processing for mobile users.

(Domain: Networking).

CATEGORY 2
36. JPJCS1- Caching Strategies Based on Information Density. (Domain:

Networking).
37. JPJCS2- Enabling Public Auditability and Data Dynamics for Storage

Security in Cloud Computing (Domain: Cloud Computing)


38. JPJCS3- Effective Navigation of Query Results Based on Concept

Hierarchies. (Domain: Knowledge & Data Engineering).


39. JPJCS4- Nymble- Blocking Misbehaving Users in Anonymizing

Networks. (Domain: Secure Computing).


40. JPJCS5- Modeling and Detection of Camouflaging Worm. (Domain:

Secure Computing).

Contact: R.JAYAPRAKASH - 9952649690

You might also like