No Tags Found!


jpinfotechprojects

JP Infotech IEEE 2011 JAVA Project Titles
Sl.No.-Project Code – Title
1. JPJ1-Online Intrusion Alert Aggregation with Generative Data Stream Modeling. (Domain: Secure Computing)
2. JPJ2-Embedded Extended Visual Cryptography Schemes. (Domain: Secure Computing + Image Processing)
3. JPJ3-Architecting a Secure Enterprise Data Sharing. (Domain : Secure Computing)
4. JPJ3B- A Hierarchical Hybrid Structure for Botnet Control and Command. (Domain: Secure Computing)
5. JPJ3C- Towards Situational Awareness of Large-Scale Botnet Probing Events
6. JPJ4-ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING. (Domain: Secure Computing + Image Processing)
7. JPJ5- Competitive Study of Cryptography Techniques over Block Cipher. (Domain: Secure Computing)
8. JPJ6-Analysis on Credit Card Fraud Detection Methods. (Domain: Secure Computing)
9. JPJ8-QoS-Aware Web Service Recommendation by Collaborative Filtering. (Domain: Web Service)
10. JPJ9-Interval ckMeans

From India, Pondicherry
jpinfotechprojects
IEEE 2011 JAVA Project Titles

Sl.No.-Project Code – Title

1. JPJ1-Online Intrusion Alert Aggregation with Generative Data Stream Modeling. (Domain: Secure Computing)

2. JPJ2-Embedded Extended Visual Cryptography Schemes. (Domain: Secure Computing + Image Processing)

3. JPJ3-Architecting a Secure Enterprise Data Sharing. (Domain : Secure Computing)

4. JPJ3B- A Hierarchical Hybrid Structure for Botnet Control and Command. (Domain: Secure Computing)

5. JPJ3C- Towards Situational Awareness of Large-Scale Botnet Probing Events

6. JPJ4-ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING. (Domain: Secure Computing + Image Processing)

7. JPJ5- Competitive Study of Cryptography Techniques over Block Cipher. (Domain: Secure Computing)

8. JPJ6-Analysis on Credit Card Fraud Detection Methods. (Domain: Secure Computing)

9. JPJ8-QoS-Aware Web Service Recommendation by Collaborative Filtering. (Domain: Web Service)

10. JPJ9-Interval ckMeans An Algorithm for Clustering Symbolic Data. (Domain: Knowledge and Data Engineering)

11. JPJ10- Clustering with Multi-Viewpoint based Similarity Measure. (Domain: Knowledge and Data Engineering)

12. JPJ11-On Demand Check Pointing for Grid Application Reliability using Communicating Process Model. (Domain: Networking)

13. JPJ12-Sketch4Match – Content-based Image Retrieval System Using Sketches. (Domain: Image processing & Knowledge and Data Engineering)

14. JPJ12A- Computational Perceptual Features for Texture Representation and Retrieval. (Domain: Image processing & Knowledge and Data Engineering)

15. JPJ13-Subspace-Based Striping Noise Reduction in Hyperspectral Images. (Domain: Image processing).

16. JPJ14-Ontology Based Business Process Customization for Composite Web Services. (Domain: Web Service)

17. JPJ15A- Model-Based Identification of Dominant Congested Links. (Domain: Networking)

18. JPJ16- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. (Domain: Secure Computing).

19. JPJ17- Intrusion detection An Energy efficient approach. (Domain: Secure Computing).

20. JPJ17A- On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks

21. JPJ18- Dynamic Channel Allocation for wireless zone-based

22. JPJ19- A foundation for stochastic bandwidth estimation of networks with random service. (Domain: Networking)

23. JPJ20- Analysis of quality of object oriented systems using object oriented metrics. (Domain: Software Engineering)

24. JPJ21- A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems. (Domain: Networking)

25. JPJ22- Simplified algorithm on network shortest path problem. (Domain: Networking)

26. JPJ23- Voronoi-based continuous query processing for mobile users. (Domain: Networking).

27. JPJ24A - Interference-Aware Routing in Wireless Multi-hop Networks. (Domain: Networking).

28. JPJ25- Resource management using dynamical load prediction and multiprocessor cooperation. (Domain: Networking).

29. JPJ26- Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes (Domain: Secure Computing & Image Processing).

30. JPJ27- Multiple exposure fusion for high dynamic range image acquisition. (Domain: Image Processing).

31. JPJ28A - On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents.

32. JPJ29A - Mobile Sampling of Sensor Field Data Using Controlled Broadcast

33. JPJ30- Denial of Service Attacks in Wireless Networks: The Case of Jammers

34. JPJ31- Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks

35. JPJ32- Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization

36. JPJ33- A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows

37. JPJ34 - Load Shedding in Mobile Systems with MobiQual

38. JPJ36- Optimal Bandwidth Assignment for Multiple-Description-Coded Video

39. JPJCS1- Caching Strategies Based on Information Density. (Domain: Networking).

40. JPJCS2- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (Domain: Cloud Computing)

41. JPJCS3- Effective Navigation of Query Results Based on Concept Hierarchies. (Domain: Knowledge & Data Engineering).

42. JPJCS4- Nymble- Blocking Misbehaving Users in Anonymizing Networks. (Domain: Secure Computing).

43. JPJCS5- Modeling and Detection of Camouflaging Worm. (Domain: Secure Computing).

44. JPJCS 6- Buffer Sizing for 802.11 Based Networks

45. JPJCS 7- SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

46. JPJCS 8- Discovering Conditional Functional Dependencies

47. JPJCS 9- Ranking Spatial Data by Quality Preferences

48. JPJCS 10- Extended XML Tree Pattern Matching: Theories and Algorithms.

49. JPJCS11 - Cloud Computing for Agent-Based Urban Transportation Systems

50. JPJCS12 - Secure and Practical Outsourcing of Linear Programming in Cloud Computing

51. JPJCS13- Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

52. JPJCS14- ProgME: Towards Programmable Network Measurement

53. JPJCS15- Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks

JP iNFOTeCH,

6A-2, Lane "F" VVP Nagar,

Pondicherry -605009.

www dot jpinfotech dot blogspot dot com

From India, Pondicherry
Community Support and Knowledge-base on business, career and organisational prospects and issues - Register and Log In to CiteHR and post your query, download formats and be part of a fostered community of professionals.





Contact Us Privacy Policy Disclaimer Terms Of Service

All rights reserved @ 2024 CiteHR ®

All Copyright And Trademarks in Posts Held By Respective Owners.