SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
2012012012013333 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH
S.NO Project
Code
IEEE 2013 Project Titles Domain Lang/Year
JAVAJAVAJAVAJAVA
1 JPJ1301 A Stochastic Model to Investigate Data Center Performance and
QoS in IaaS Cloud Computing Systems
CLOUD COMPUTING JAVA/2013
2
JPJ1302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING
JAVA/2013
3 JPJ1303 Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
CLOUD COMPUTING JAVA/2013
4 JPJ1304 Error-Tolerant Resource Allocation and Payment Minimization
for Cloud System
CLOUD COMPUTING JAVA/2013
5 JPJ1305 Harnessing the Cloud for Securely Outsourcing Large-Scale
Systems of Linear Equations
CLOUD COMPUTING JAVA/2013
6 JPJ1306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in
the Cloud
CLOUD COMPUTING JAVA/2013
7 JPJ1307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
CLOUD COMPUTING JAVA/2013
8 JPJ1308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING JAVA/2013
9
JPJ1309 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
CLOUD COMPUTING JAVA/2013
10 JPJ1310 Simple and Effective Dynamic Provisioning for Power-
Proportional Data Centers
CLOUD COMPUTING JAVA/2013
11 JPJ1311 A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
DATA MINING JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
12 JPJ1312 A New Algorithm for Inferring User Search Goals with Feedback
Sessions
DATA MINING JAVA/2013
13 JPJ1313 Annotating Search Results from Web Databases DATA MINING JAVA/2013
14 JPJ1314 Anomaly Detection via Online Over-Sampling Principal
Component Analysis
DATA MINING JAVA/2013
15 JPJ1315 Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
DATA MINING JAVA/2013
16
JPJ1316 m-Privacy for Collaborative Data Publishing DATA MINING JAVA/2013
17 JPJ1317 Protecting Sensitive Labels in Social Network Data
Anonymization
DATA MINING JAVA/2013
18 JPJ1318 Tweet Analysis for Real-Time Event Detection and Earthquake
Reporting System Development
DATA MINING JAVA/2013
19 JPJ1319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING JAVA/2013
20 JPJ1320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING JAVA/2013
21 JPJ1321 Modeling the Pairwise Key Predistribution Scheme in the
Presence of Unreliable Links
SECURE COMPUTING JAVA/2013
22 JPJ1322 NICE: Network Intrusion Detection and Countermeasure
Selection in Virtual Network Systems
SECURE COMPUTING JAVA/2013
23 JPJ1323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING JAVA/2013
24 JPJ1324 Securing Class Initialization in Java-like Languages SECURE COMPUTING JAVA/2013
25 JPJ1325 Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
SECURE COMPUTING JAVA/2013
26 JPJ1326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
27 JPJ1327 WARNINGBIRD: A Near Real-time Detection System for
Suspicious URLs in Twitter Stream
SECURE COMPUTING JAVA/2013
28 JPJ1328 A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
NETWORKING JAVA/2013
29 JPJ1329 Delay-Based Network Utility Maximization NETWORKING JAVA/2013
30
JPJ1330 Dynamic Control of Coding for Progressive Packet Arrivals in
DTNs
NETWORKING JAVA/2013
31 JPJ1331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
32 JPJ1332 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
33 JPJ1333 IP-Geolocation Mapping for Moderately Connected Internet
Regions
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
34 JPJ1334 Optimal Client-Server Assignment for Internet Distributed
Systems
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
35 JPJ1335 Content Sharing over Smartphone-Based Delay-Tolerant
Networks
MOBILE COMPUTING JAVA/2013
36 JPJ1336 DCIM: Distributed Cache Invalidation Method for Maintaining
Cache Consistency in Wireless Mobile Networks
MOBILE COMPUTING JAVA/2013
37 JPJ1337 Discovery and Verification of Neighbor Positions in Mobile Ad
Hoc Networks
MOBILE COMPUTING JAVA/2013
38 JPJ1338 Efficient Rekeying Framework for Secure Multicast with Diverse-
Subscription-Period Mobile Users
MOBILE COMPUTING JAVA/2013
39 JPJ1339 A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data
PATTERN ANALYSIS &
MACHINE
INTELLIGENCE
JAVA/2013
40
JPJ1340
A Decentralized Service Discovery Approach on Peer-to-Peer
SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
Networks
41
JPJ1341 Personalized QoS-Aware Web Service Recommendation and
Visualization
SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
42 JPJ1342 Privacy-Enhanced Web Service Composition SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
43 JPJ1343 Whole Test Suite Generation SOFTWARE
ENGINEERING
JAVA/2013
DOTNETDOTNETDOTNETDOTNET
1
JPD1301 A Privacy Leakage Upper Bound Constraint-Based Approach for
Cost-Effective Privacy Preserving of Intermediate Data Sets in
Cloud
CLOUD COMPUTING
.NET/2013
2 JPD1302 An Adaptive Cloud Downloading Service CLOUD COMPUTING .NET/2013
3 JPD1303 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
CLOUD COMPUTING .NET/2013
4 JPD1304 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in
the Cloud
CLOUD COMPUTING .NET/2013
5 JPD1305 On Data Staging Algorithms for Shared Data Accesses in Clouds CLOUD COMPUTING .NET/2013
6 JPD1306 Optimal Multiserver Configuration for Profit Maximization in
Cloud Computing
CLOUD COMPUTING .NET/2013
7 JPD1307 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING .NET/2013
8 JPD1308 QoS Ranking Prediction for Cloud Services CLOUD COMPUTING .NET/2013
9
JPD1309 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
CLOUD COMPUTING .NET/2013
10 JPD1310 Toward Fine-Grained, Unsupervised, Scalable Performance
Diagnosis for Production Cloud Computing Systems
CLOUD COMPUTING .NET/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
11 JPD1311 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted
Cloud Data
CLOUD COMPUTING .NET/2013
12 JPD1312 A New Algorithm for Inferring User Search Goals with Feedback
Sessions
DATA MINING .NET/2013
13 JPD1313 A Survey of XML Tree Patterns DATA MINING .NET/2013
14 JPD1314 Dynamic Personalized Recommendation on Sparse Data DATA MINING .NET/2013
15 JPD1315 Mining User Queries with Markov Chains: Application to Online
Image Retrieval
DATA MINING .NET/2013
16
JPD1316 TrustedDB: A Trusted Hardware based Database with Privacy and
Data Confidentiality
DATA MINING .NET/2013
17 JPD1317 A Rank Correlation Based Detection against Distributed
Reflection DoS Attacks.
SECURE COMPUTING .NET/2013
18 JPD1318 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING .NET/2013
19 JPD1319 Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
SECURE COMPUTING .NET/2013
20 JPD1320 Modeling the Pairwise Key Predistribution Scheme in the
Presence of Unreliable Links
SECURE COMPUTING .NET/2013
21 JPD1321 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING .NET/2013
22 JPD1322 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING .NET/2013
23 JPD1323 A Distributed Control Law for Load Balancing in Content Delivery
Networks
NETWORKING .NET/2013
24 JPD1324 A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
NETWORKING .NET/2013
25 JPD1325 An Efficient and Robust Addressing Protocol for Node
Autoconfiguration in Ad Hoc Networks
NETWORKING .NET/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
26 JPD1326 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City
Environments
NETWORKING .NET/2013
27 JPD1327 Efficient Algorithms for Neighbor Discovery in Wireless Networks NETWORKING .NET/2013
28 JPD1328 Localization of Wireless Sensor Networks in the Wild: Pursuit of
Ranging Quality
NETWORKING .NET/2013
29 JPD1329 Resource Allocation for QoS Support in Wireless Mesh Networks NETWORKING .NET/2013
30
JPD1330 A Secure Payment Scheme with Low Communication and
Processing Overhead for Multihop Wireless Networks
PARALLEL &
DISTRIBUTED SYSTEMS
.NET/2013
31 JPD1331 Multicast Capacity in MANET with Infrastructure Support PARALLEL &
DISTRIBUTED SYSTEMS
.NET/2013
32 JPD1332 SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
PARALLEL &
DISTRIBUTED SYSTEMS
.NET/2013
33 JPD1333 Adaptive Position Update for Geographic Routing in Mobile Ad
Hoc Networks
MOBILE COMPUTING .NET/2013
34 JPD1334 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks:
A Coalitional Game Approach
MOBILE COMPUTING .NET/2013
35 JPD1335 EMAP: Expedite Message Authentication Protocol for Vehicular
Ad Hoc Networks
MOBILE COMPUTING .NET/2013
36 JPD1336 Optimal Multicast Capacity and Delay Tradeoffs in MANETs MOBILE COMPUTING .NET/2013
37 JPD1337 Relay Selection for Geographical Forwarding in Sleep-Wake
Cycling Wireless Sensor Networks
MOBILE COMPUTING .NET/2013
38 JPD1338 Query-Adaptive Image Search With Hash Codes IMAGE PROCESSING .NET/2013
39 JPD1339 Reversible Data Hiding With Optimal Value Transfer IMAGE PROCESSING .NET/2013
40 JPD1340 Reversible Watermarking Based on Invariant Image Classification IMAGE PROCESSING
.NET/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
PROJECT SUPPORTS FOR STUDENTS:
JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS
REVIEW DOCUMENTS AND PPTS
100% LIVE EXPLANATION
PROJECT ASSIGNMENTS
VIVA-VOCE QUESTIONS & ANSWERS
VALID TRAINEE CERTIFICATION
100% PLACEMENT SUPPORT
Own Projects are also welcomed.
and Dynamic Histogram Shifting
41
JPD1341 Local Directional Number Pattern for Face Analysis: Face and
Expression Recognition
IMAGE PROCESSING .NET/2013
42 JPD1342
Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage IMAGE PROCESSING .NET/2013

Contenu connexe

Tendances

Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecuritySBGC
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...IJERA Editor
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...SBGC
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014sybiantech
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingShakas Technologies
 

Tendances (20)

Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
 

En vedette

Opportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission powerOpportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission powerJPINFOTECH JAYAPRAKASH
 
Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...JPINFOTECH JAYAPRAKASH
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...JPINFOTECH JAYAPRAKASH
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsJPINFOTECH JAYAPRAKASH
 
Crowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphonesCrowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphonesJPINFOTECH JAYAPRAKASH
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesJPINFOTECH JAYAPRAKASH
 
Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsJPINFOTECH JAYAPRAKASH
 
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...JPINFOTECH JAYAPRAKASH
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataJPINFOTECH JAYAPRAKASH
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...JPINFOTECH JAYAPRAKASH
 
Adaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksAdaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsJPINFOTECH JAYAPRAKASH
 
Error tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud systemError tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud systemJPINFOTECH JAYAPRAKASH
 

En vedette (14)

Opportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission powerOpportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission power
 
Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Crowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphonesCrowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphones
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphones
 
Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane ts
 
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...
 
Adaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksAdaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networks
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
Error tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud systemError tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud system
 

Similaire à 2013 IEEE PROJECT TITLES FOR CSE

ieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesJPINFOTECH JAYAPRAKASH
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherryJPINFOTECH JAYAPRAKASH
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mcaJPINFOTECH JAYAPRAKASH
 
2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informaticsPapitha Velumani
 
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
VTU Final Year Engineering Project Title List for Computer Science Engineerin...VTU Final Year Engineering Project Title List for Computer Science Engineerin...
VTU Final Year Engineering Project Title List for Computer Science Engineerin...zettanetworks
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...zettanetworks
 
2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informaticsPapitha Velumani
 
2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotechJPINFOTECH JAYAPRAKASH
 
2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titlesDeenuji Loganathan
 
Java IEEE 2015 titles
Java IEEE 2015 titlesJava IEEE 2015 titles
Java IEEE 2015 titlessmartprotech
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantechSrinivasan Natarajan
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantechPantech ProEd Pvt Ltd
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015kishu0005
 
2014 2015 ieee java projects titles list globalsoft technologies
2014 2015 ieee java projects titles list globalsoft technologies2014 2015 ieee java projects titles list globalsoft technologies
2014 2015 ieee java projects titles list globalsoft technologiesIEEEJAVAPROJECTS
 

Similaire à 2013 IEEE PROJECT TITLES FOR CSE (20)

ieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniques
 
ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherry
 
2013 2014 ieee java project titles
2013 2014 ieee java project titles2013 2014 ieee java project titles
2013 2014 ieee java project titles
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca
 
2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
VTU Final Year Engineering Project Title List for Computer Science Engineerin...VTU Final Year Engineering Project Title List for Computer Science Engineerin...
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
 
2015 2016 ieee java project titles
2015 2016 ieee java project titles2015 2016 ieee java project titles
2015 2016 ieee java project titles
 
2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics
 
2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech
 
2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles
 
IEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for meIEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for me
 
Java IEEE 2015 titles
Java IEEE 2015 titlesJava IEEE 2015 titles
Java IEEE 2015 titles
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
2014 2015 ieee java projects titles list globalsoft technologies
2014 2015 ieee java projects titles list globalsoft technologies2014 2015 ieee java projects titles list globalsoft technologies
2014 2015 ieee java projects titles list globalsoft technologies
 

Dernier

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Dernier (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

2013 IEEE PROJECT TITLES FOR CSE

  • 1. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 2012012012013333 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH S.NO Project Code IEEE 2013 Project Titles Domain Lang/Year JAVAJAVAJAVAJAVA 1 JPJ1301 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CLOUD COMPUTING JAVA/2013 2 JPJ1302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING JAVA/2013 3 JPJ1303 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment CLOUD COMPUTING JAVA/2013 4 JPJ1304 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System CLOUD COMPUTING JAVA/2013 5 JPJ1305 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations CLOUD COMPUTING JAVA/2013 6 JPJ1306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CLOUD COMPUTING JAVA/2013 7 JPJ1307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System CLOUD COMPUTING JAVA/2013 8 JPJ1308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING JAVA/2013 9 JPJ1309 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption CLOUD COMPUTING JAVA/2013 10 JPJ1310 Simple and Effective Dynamic Provisioning for Power- Proportional Data Centers CLOUD COMPUTING JAVA/2013 11 JPJ1311 A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data DATA MINING JAVA/2013
  • 2. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 12 JPJ1312 A New Algorithm for Inferring User Search Goals with Feedback Sessions DATA MINING JAVA/2013 13 JPJ1313 Annotating Search Results from Web Databases DATA MINING JAVA/2013 14 JPJ1314 Anomaly Detection via Online Over-Sampling Principal Component Analysis DATA MINING JAVA/2013 15 JPJ1315 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks DATA MINING JAVA/2013 16 JPJ1316 m-Privacy for Collaborative Data Publishing DATA MINING JAVA/2013 17 JPJ1317 Protecting Sensitive Labels in Social Network Data Anonymization DATA MINING JAVA/2013 18 JPJ1318 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development DATA MINING JAVA/2013 19 JPJ1319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING JAVA/2013 20 JPJ1320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING JAVA/2013 21 JPJ1321 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links SECURE COMPUTING JAVA/2013 22 JPJ1322 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems SECURE COMPUTING JAVA/2013 23 JPJ1323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING JAVA/2013 24 JPJ1324 Securing Class Initialization in Java-like Languages SECURE COMPUTING JAVA/2013 25 JPJ1325 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SECURE COMPUTING JAVA/2013 26 JPJ1326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING JAVA/2013
  • 3. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 27 JPJ1327 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream SECURE COMPUTING JAVA/2013 28 JPJ1328 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks NETWORKING JAVA/2013 29 JPJ1329 Delay-Based Network Utility Maximization NETWORKING JAVA/2013 30 JPJ1330 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs NETWORKING JAVA/2013 31 JPJ1331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 32 JPJ1332 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 33 JPJ1333 IP-Geolocation Mapping for Moderately Connected Internet Regions PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 34 JPJ1334 Optimal Client-Server Assignment for Internet Distributed Systems PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 35 JPJ1335 Content Sharing over Smartphone-Based Delay-Tolerant Networks MOBILE COMPUTING JAVA/2013 36 JPJ1336 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks MOBILE COMPUTING JAVA/2013 37 JPJ1337 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks MOBILE COMPUTING JAVA/2013 38 JPJ1338 Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users MOBILE COMPUTING JAVA/2013 39 JPJ1339 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data PATTERN ANALYSIS & MACHINE INTELLIGENCE JAVA/2013 40 JPJ1340 A Decentralized Service Discovery Approach on Peer-to-Peer SERVICE COMPUTING (WEB SERVICE) JAVA/2013
  • 4. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com Networks 41 JPJ1341 Personalized QoS-Aware Web Service Recommendation and Visualization SERVICE COMPUTING (WEB SERVICE) JAVA/2013 42 JPJ1342 Privacy-Enhanced Web Service Composition SERVICE COMPUTING (WEB SERVICE) JAVA/2013 43 JPJ1343 Whole Test Suite Generation SOFTWARE ENGINEERING JAVA/2013 DOTNETDOTNETDOTNETDOTNET 1 JPD1301 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud CLOUD COMPUTING .NET/2013 2 JPD1302 An Adaptive Cloud Downloading Service CLOUD COMPUTING .NET/2013 3 JPD1303 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems CLOUD COMPUTING .NET/2013 4 JPD1304 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CLOUD COMPUTING .NET/2013 5 JPD1305 On Data Staging Algorithms for Shared Data Accesses in Clouds CLOUD COMPUTING .NET/2013 6 JPD1306 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing CLOUD COMPUTING .NET/2013 7 JPD1307 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING .NET/2013 8 JPD1308 QoS Ranking Prediction for Cloud Services CLOUD COMPUTING .NET/2013 9 JPD1309 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption CLOUD COMPUTING .NET/2013 10 JPD1310 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems CLOUD COMPUTING .NET/2013
  • 5. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 11 JPD1311 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data CLOUD COMPUTING .NET/2013 12 JPD1312 A New Algorithm for Inferring User Search Goals with Feedback Sessions DATA MINING .NET/2013 13 JPD1313 A Survey of XML Tree Patterns DATA MINING .NET/2013 14 JPD1314 Dynamic Personalized Recommendation on Sparse Data DATA MINING .NET/2013 15 JPD1315 Mining User Queries with Markov Chains: Application to Online Image Retrieval DATA MINING .NET/2013 16 JPD1316 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality DATA MINING .NET/2013 17 JPD1317 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. SECURE COMPUTING .NET/2013 18 JPD1318 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING .NET/2013 19 JPD1319 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing SECURE COMPUTING .NET/2013 20 JPD1320 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links SECURE COMPUTING .NET/2013 21 JPD1321 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING .NET/2013 22 JPD1322 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING .NET/2013 23 JPD1323 A Distributed Control Law for Load Balancing in Content Delivery Networks NETWORKING .NET/2013 24 JPD1324 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks NETWORKING .NET/2013 25 JPD1325 An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks NETWORKING .NET/2013
  • 6. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 26 JPD1326 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments NETWORKING .NET/2013 27 JPD1327 Efficient Algorithms for Neighbor Discovery in Wireless Networks NETWORKING .NET/2013 28 JPD1328 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality NETWORKING .NET/2013 29 JPD1329 Resource Allocation for QoS Support in Wireless Mesh Networks NETWORKING .NET/2013 30 JPD1330 A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks PARALLEL & DISTRIBUTED SYSTEMS .NET/2013 31 JPD1331 Multicast Capacity in MANET with Infrastructure Support PARALLEL & DISTRIBUTED SYSTEMS .NET/2013 32 JPD1332 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency PARALLEL & DISTRIBUTED SYSTEMS .NET/2013 33 JPD1333 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks MOBILE COMPUTING .NET/2013 34 JPD1334 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach MOBILE COMPUTING .NET/2013 35 JPD1335 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks MOBILE COMPUTING .NET/2013 36 JPD1336 Optimal Multicast Capacity and Delay Tradeoffs in MANETs MOBILE COMPUTING .NET/2013 37 JPD1337 Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks MOBILE COMPUTING .NET/2013 38 JPD1338 Query-Adaptive Image Search With Hash Codes IMAGE PROCESSING .NET/2013 39 JPD1339 Reversible Data Hiding With Optimal Value Transfer IMAGE PROCESSING .NET/2013 40 JPD1340 Reversible Watermarking Based on Invariant Image Classification IMAGE PROCESSING .NET/2013
  • 7. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com PROJECT SUPPORTS FOR STUDENTS: JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed. and Dynamic Histogram Shifting 41 JPD1341 Local Directional Number Pattern for Face Analysis: Face and Expression Recognition IMAGE PROCESSING .NET/2013 42 JPD1342 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage IMAGE PROCESSING .NET/2013