SlideShare a Scribd company logo
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
2012012012013333 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH
S.NO Project
Code
IEEE 2013 Project Titles Domain Lang/Year
JAVAJAVAJAVAJAVA
1 JPJ1301 A Stochastic Model to Investigate Data Center Performance and
QoS in IaaS Cloud Computing Systems
CLOUD COMPUTING JAVA/2013
2
JPJ1302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING
JAVA/2013
3 JPJ1303 Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
CLOUD COMPUTING JAVA/2013
4 JPJ1304 Error-Tolerant Resource Allocation and Payment Minimization
for Cloud System
CLOUD COMPUTING JAVA/2013
5 JPJ1305 Harnessing the Cloud for Securely Outsourcing Large-Scale
Systems of Linear Equations
CLOUD COMPUTING JAVA/2013
6 JPJ1306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in
the Cloud
CLOUD COMPUTING JAVA/2013
7 JPJ1307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
CLOUD COMPUTING JAVA/2013
8 JPJ1308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING JAVA/2013
9
JPJ1309 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
CLOUD COMPUTING JAVA/2013
10 JPJ1310 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
CLOUD COMPUTING JAVA/2013
11 JPJ1311 A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
DATA MINING JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
12 JPJ1312 A New Algorithm for Inferring User Search Goals with Feedback
Sessions
DATA MINING JAVA/2013
13 JPJ1313 Annotating Search Results from Web Databases DATA MINING JAVA/2013
14 JPJ1314 Anomaly Detection via Online Over-Sampling Principal
Component Analysis
DATA MINING JAVA/2013
15 JPJ1315 Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
DATA MINING JAVA/2013
16
JPJ1316 m-Privacy for Collaborative Data Publishing DATA MINING JAVA/2013
17 JPJ1317 Protecting Sensitive Labels in Social Network Data
Anonymization
DATA MINING JAVA/2013
18 JPJ1318 Tweet Analysis for Real-Time Event Detection and Earthquake
Reporting System Development
DATA MINING JAVA/2013
19 JPJ1319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING JAVA/2013
20 JPJ1320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING JAVA/2013
21 JPJ1321 Modeling the Pairwise Key Predistribution Scheme in the
Presence of Unreliable Links
SECURE COMPUTING JAVA/2013
22 JPJ1322 NICE: Network Intrusion Detection and Countermeasure
Selection in Virtual Network Systems
SECURE COMPUTING JAVA/2013
23 JPJ1323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING JAVA/2013
24 JPJ1324 Securing Class Initialization in Java-like Languages SECURE COMPUTING JAVA/2013
25 JPJ1325 Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
SECURE COMPUTING JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
26 JPJ1326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING JAVA/2013
27 JPJ1327 WARNINGBIRD: A Near Real-time Detection System for
Suspicious URLs in Twitter Stream
SECURE COMPUTING JAVA/2013
28 JPJ1328 A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
NETWORKING JAVA/2013
29 JPJ1329 Delay-Based Network Utility Maximization NETWORKING JAVA/2013
30
JPJ1330 Dynamic Control of Coding for Progressive Packet Arrivals in
DTNs
NETWORKING JAVA/2013
31 JPJ1331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
32 JPJ1332 Security Analysis of a Privacy-Preserving Decentralized Key-Policy
Attribute-Based Encryption Scheme
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
33 JPJ1333 IP-Geolocation Mapping for Moderately Connected Internet
Regions
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
34 JPJ1334 Optimal Client-Server Assignment for Internet Distributed
Systems
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
35 JPJ1335 Content Sharing over Smartphone-Based Delay-Tolerant
Networks
MOBILE COMPUTING JAVA/2013
36 JPJ1336 DCIM: Distributed Cache Invalidation Method for Maintaining
Cache Consistency in Wireless Mobile Networks
MOBILE COMPUTING JAVA/2013
37 JPJ1337 Discovery and Verification of Neighbor Positions in Mobile Ad
Hoc Networks
MOBILE COMPUTING JAVA/2013
38 JPJ1338 Efficient Rekeying Framework for Secure Multicast with Diverse-
Subscription-Period Mobile Users
MOBILE COMPUTING JAVA/2013
39 JPJ1339 A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data
PATTERN ANALYSIS &
MACHINE
JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
INTELLIGENCE
40
JPJ1340
A Decentralized Service Discovery Approach on Peer-to-Peer
Networks
SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
41
JPJ1341 Personalized QoS-Aware Web Service Recommendation and
Visualization
SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
42 JPJ1342 Privacy-Enhanced Web Service Composition SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
43 JPJ1343 Whole Test Suite Generation SOFTWARE
ENGINEERING
JAVA/2013
44
JPJ1344 A Load Balancing Model Based on Cloud Partitioning for the
Public Cloud
CLOUD COMPUTING JAVA/2013
45
JPJ1345 Document Clustering for Forensic Analysis: An Approach for
Improving Computer Inspection
DATA MINING JAVA/2013
46
JPJ1346 A Method for Mining Infrequent Causal Associations and Its
Application in Finding Adverse Drug Reaction Signal Pairs
DATA MINING JAVA/2013
47
JPJ1347 Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
DATA MINING JAVA/2013
48
JPJ1348 Two tales of privacy in online social networks SECURE COMPUTING JAVA/2013
49
JPJ1349 Minimum Cost Blocking Problem in Multi-path Wireless Routing
Protocols
NETWORKING JAVA/2013
50
JPJ1350 On the Node Clone Detection in Wireless Sensor Networks NETWORKING JAVA/2013
51
JPJ1351 Opportunistic MANETs: Mobility Can Make Up for Low
Transmission Power
NETWORKING JAVA/2013
52
JPJ1352 Back-Pressure-Based Packet-by-Packet Adaptive Routing in
Communication Networks
NETWORKING JAVA/2013
53
JPJ1353 Fast Transmission to Remote Cooperative Groups: A New Key
Management Paradigm
NETWORKING JAVA/2013
54
JPJ1354 Load Rebalancing for Distributed File Systems in Clouds CLOUD COMPUTING JAVA/2013
JPJ1355 Toward a Statistical Framework for Source Anonymity in Sensor MOBILE COMPUTING
JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
55 Networks
56
JPJ1356 Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
MOBILE COMPUTING JAVA/2013
57
JPJ1357 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
MOBILE COMPUTING JAVA/2013
58
JPJ1358 Crowdsourcing Predictors of Behavioral Outcomes DATA MINING JAVA/2013
59
JPJ1359 Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
CLOUD COMPUTING JAVA/2013
60
JPJ1360 Participatory Privacy: Enabling Privacy in Participatory Sensing NETWORKING JAVA/2013
61
JPJ1361 Secure Encounter-based Mobile Social Networks: Requirements,
Designs, and Tradeoffs
SECURE COMPUTING JAVA/2013
62
JPJ1362 Facilitating Document Annotation using Content and Querying
Value
DATA MINING JAVA/2013
63
JPJ1363 Privacy Preserving Delegated Access Control in Public Clouds CLOUD COMPUTING JAVA/2013
64
JPJ1364 Twitsper: Tweeting Privately SECURE COMPUTING JAVA/2013
65 JPJ1365 A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
DATA MINING JAVA/2013
66
JPJ1366 A System to Filter Unwanted Messages from OSN User Walls DATA MINING JAVA/2013
67 JPJ1367 Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
DATA MINING JAVA/2013
68
JPJ1368 Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
MOBILE COMPUTING JAVA/2013
69
JPJ1369 Understanding the External Links of Video Sharing Sites:
Measurement and Analysis
MULTIMEDIA JAVA/2013
70
JPJ1370 Intrusion Detection Technique by using K-means, Fuzzy Neural
Network and SVM classifiers.
DATA MINING
(CONFERENCE)
JAVA/2013
71
JPJ1371 Combining Cryptographic Primitives to Prevent Jamming Attacks
in Wireless Networks
SECURE COMPUTING
(CONFERENCE)
JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
PROJECT SUPPORTS FOR STUDENTS:
JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS
REVIEW DOCUMENTS AND PPTS
100% LIVE EXPLANATION
PROJECT ASSIGNMENTS
VIVA-VOCE QUESTIONS & ANSWERS
VALID TRAINEE CERTIFICATION
100% PLACEMENT SUPPORT
Own Projects are also welcomed.

More Related Content

PDF
ieee projects for cse 2013
PDF
2013 ieee java project titles-lans a-informatics
DOC
VTU Computer Science Engineering & Information Science Engineering Project Ti...
PDF
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
PDF
IEEE PROJECTS 2013 for me
PDF
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
PDF
Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
DOCX
SOFTORIX Project TitlesList
ieee projects for cse 2013
2013 ieee java project titles-lans a-informatics
VTU Computer Science Engineering & Information Science Engineering Project Ti...
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
IEEE PROJECTS 2013 for me
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
Be,me ieee 2015 16 computer&inforamation science&bca,diploma,mca titles
SOFTORIX Project TitlesList

What's hot (11)

DOC
Main p roject list for csc it
PDF
Whitepaper - Software Defined Networking for the Telco Industry
PDF
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
PDF
JAVA IEEE -2015
PDF
IRJET- Technical Review of different Methods for Multi Factor Authentication
PDF
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
IEEE 2012 CSE & IT java_2012-13_titles
PDF
IRJET - Image Watermarking using QR Code
PDF
Inside TorrentLocker (Cryptolocker) Malware C&C Server
PDF
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
Main p roject list for csc it
Whitepaper - Software Defined Networking for the Telco Industry
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
JAVA IEEE -2015
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
Stamp enabling privacy preserving location proofs for mobile users
IEEE 2012 CSE & IT java_2012-13_titles
IRJET - Image Watermarking using QR Code
Inside TorrentLocker (Cryptolocker) Malware C&C Server
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
Ad

Viewers also liked (19)

PDF
2015 2016 ieee matlab project titles
DOCX
Cloud ftp a case study of migrating traditional applications to the cloud
DOC
2011 IEEE PROJECT TITLES
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
PDF
2012 13 ieee java titles - jp infotech
DOCX
Collaborative learning assistant for android
DOCX
A system to filter unwanted messages from osn user walls
DOCX
Supporting search as-you-type using sql in databases
PDF
2012 13 ece ieee projects - jp infotech
DOC
Caching strategies based on information density estimation in wireless ad hoc...
PDF
final year ieee projects in pondicherry 2013
DOCX
Tweet analysis for real time event detection and earthquake reporting system ...
DOCX
Resource allocation for qo s support in wireless mesh networks
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
Meet you – social networking on android
DOCX
2013 2014 ieee project titles
DOCX
Dynamic personalized recommendation on sparse data
DOCX
Toward a statistical framework for source anonymity in sensor networks
DOCX
Optimal multiserver configuration for profit maximization in cloud computing
2015 2016 ieee matlab project titles
Cloud ftp a case study of migrating traditional applications to the cloud
2011 IEEE PROJECT TITLES
Reversible watermarking based on invariant image classification and dynamic h...
2012 13 ieee java titles - jp infotech
Collaborative learning assistant for android
A system to filter unwanted messages from osn user walls
Supporting search as-you-type using sql in databases
2012 13 ece ieee projects - jp infotech
Caching strategies based on information density estimation in wireless ad hoc...
final year ieee projects in pondicherry 2013
Tweet analysis for real time event detection and earthquake reporting system ...
Resource allocation for qo s support in wireless mesh networks
Dynamic resource allocation using virtual machines for cloud computing enviro...
Meet you – social networking on android
2013 2014 ieee project titles
Dynamic personalized recommendation on sparse data
Toward a statistical framework for source anonymity in sensor networks
Optimal multiserver configuration for profit maximization in cloud computing
Ad

Similar to ieee projects 2013 for m.tech. (20)

PDF
2013 IEEE PROJECT TITLES FOR CSE
PDF
2013 2014 ieee dotnet project titles
PDF
2015 2016 ieee java project titles
DOC
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
DOCX
Java IEEE 2015 titles
PDF
2013 ieee dotnet project titles - lans a informatics
DOCX
PDF
2013 14-java-project-titles-me-tech-pantech
PDF
2013 14-java-project-titles-me-tech-pantech
PDF
Networking java titles Adrit Solution
PDF
2014 2015 ieee java projects titles list globalsoft technologies
PDF
2014 2015 ieee java projects titles list globalsoft technologies
PDF
Ieee 2014 2015 java projects titles list globalsoft technologies
PDF
Ieee 2014 2015 java projects titles list globalsoft technologies
PDF
2014 2015 ieee java projects titles list globalsoft technologies
PDF
Ieee 2014 2015 java projects titles list globalsoft technologies
PDF
2014 ieee java projects titles globalsoft technologies
PDF
2014 2015 ieee java projects globalsoft technologies
PDF
2014 2015 ieee java projects lists
PDF
2014 ieee java projects titles globalsoft technologies
2013 IEEE PROJECT TITLES FOR CSE
2013 2014 ieee dotnet project titles
2015 2016 ieee java project titles
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
Java IEEE 2015 titles
2013 ieee dotnet project titles - lans a informatics
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
Networking java titles Adrit Solution
2014 2015 ieee java projects titles list globalsoft technologies
2014 2015 ieee java projects titles list globalsoft technologies
Ieee 2014 2015 java projects titles list globalsoft technologies
Ieee 2014 2015 java projects titles list globalsoft technologies
2014 2015 ieee java projects titles list globalsoft technologies
Ieee 2014 2015 java projects titles list globalsoft technologies
2014 ieee java projects titles globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects lists
2014 ieee java projects titles globalsoft technologies

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
01-Introduction-to-Information-Management.pdf
Final Presentation General Medicine 03-08-2024.pptx
GDM (1) (1).pptx small presentation for students
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Insiders guide to clinical Medicine.pdf
Renaissance Architecture: A Journey from Faith to Humanism
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
TR - Agricultural Crops Production NC III.pdf
Computing-Curriculum for Schools in Ghana

ieee projects 2013 for m.tech.

  • 1. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 2012012012013333 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH S.NO Project Code IEEE 2013 Project Titles Domain Lang/Year JAVAJAVAJAVAJAVA 1 JPJ1301 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CLOUD COMPUTING JAVA/2013 2 JPJ1302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING JAVA/2013 3 JPJ1303 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment CLOUD COMPUTING JAVA/2013 4 JPJ1304 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System CLOUD COMPUTING JAVA/2013 5 JPJ1305 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations CLOUD COMPUTING JAVA/2013 6 JPJ1306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CLOUD COMPUTING JAVA/2013 7 JPJ1307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System CLOUD COMPUTING JAVA/2013 8 JPJ1308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING JAVA/2013 9 JPJ1309 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption CLOUD COMPUTING JAVA/2013 10 JPJ1310 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems CLOUD COMPUTING JAVA/2013 11 JPJ1311 A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data DATA MINING JAVA/2013
  • 2. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 12 JPJ1312 A New Algorithm for Inferring User Search Goals with Feedback Sessions DATA MINING JAVA/2013 13 JPJ1313 Annotating Search Results from Web Databases DATA MINING JAVA/2013 14 JPJ1314 Anomaly Detection via Online Over-Sampling Principal Component Analysis DATA MINING JAVA/2013 15 JPJ1315 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks DATA MINING JAVA/2013 16 JPJ1316 m-Privacy for Collaborative Data Publishing DATA MINING JAVA/2013 17 JPJ1317 Protecting Sensitive Labels in Social Network Data Anonymization DATA MINING JAVA/2013 18 JPJ1318 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development DATA MINING JAVA/2013 19 JPJ1319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING JAVA/2013 20 JPJ1320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING JAVA/2013 21 JPJ1321 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links SECURE COMPUTING JAVA/2013 22 JPJ1322 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems SECURE COMPUTING JAVA/2013 23 JPJ1323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING JAVA/2013 24 JPJ1324 Securing Class Initialization in Java-like Languages SECURE COMPUTING JAVA/2013 25 JPJ1325 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SECURE COMPUTING JAVA/2013
  • 3. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 26 JPJ1326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING JAVA/2013 27 JPJ1327 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream SECURE COMPUTING JAVA/2013 28 JPJ1328 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks NETWORKING JAVA/2013 29 JPJ1329 Delay-Based Network Utility Maximization NETWORKING JAVA/2013 30 JPJ1330 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs NETWORKING JAVA/2013 31 JPJ1331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 32 JPJ1332 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 33 JPJ1333 IP-Geolocation Mapping for Moderately Connected Internet Regions PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 34 JPJ1334 Optimal Client-Server Assignment for Internet Distributed Systems PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 35 JPJ1335 Content Sharing over Smartphone-Based Delay-Tolerant Networks MOBILE COMPUTING JAVA/2013 36 JPJ1336 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks MOBILE COMPUTING JAVA/2013 37 JPJ1337 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks MOBILE COMPUTING JAVA/2013 38 JPJ1338 Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users MOBILE COMPUTING JAVA/2013 39 JPJ1339 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data PATTERN ANALYSIS & MACHINE JAVA/2013
  • 4. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com INTELLIGENCE 40 JPJ1340 A Decentralized Service Discovery Approach on Peer-to-Peer Networks SERVICE COMPUTING (WEB SERVICE) JAVA/2013 41 JPJ1341 Personalized QoS-Aware Web Service Recommendation and Visualization SERVICE COMPUTING (WEB SERVICE) JAVA/2013 42 JPJ1342 Privacy-Enhanced Web Service Composition SERVICE COMPUTING (WEB SERVICE) JAVA/2013 43 JPJ1343 Whole Test Suite Generation SOFTWARE ENGINEERING JAVA/2013 44 JPJ1344 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud CLOUD COMPUTING JAVA/2013 45 JPJ1345 Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection DATA MINING JAVA/2013 46 JPJ1346 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs DATA MINING JAVA/2013 47 JPJ1347 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm DATA MINING JAVA/2013 48 JPJ1348 Two tales of privacy in online social networks SECURE COMPUTING JAVA/2013 49 JPJ1349 Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols NETWORKING JAVA/2013 50 JPJ1350 On the Node Clone Detection in Wireless Sensor Networks NETWORKING JAVA/2013 51 JPJ1351 Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power NETWORKING JAVA/2013 52 JPJ1352 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks NETWORKING JAVA/2013 53 JPJ1353 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm NETWORKING JAVA/2013 54 JPJ1354 Load Rebalancing for Distributed File Systems in Clouds CLOUD COMPUTING JAVA/2013 JPJ1355 Toward a Statistical Framework for Source Anonymity in Sensor MOBILE COMPUTING JAVA/2013
  • 5. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com 55 Networks 56 JPJ1356 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks MOBILE COMPUTING JAVA/2013 57 JPJ1357 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks MOBILE COMPUTING JAVA/2013 58 JPJ1358 Crowdsourcing Predictors of Behavioral Outcomes DATA MINING JAVA/2013 59 JPJ1359 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization CLOUD COMPUTING JAVA/2013 60 JPJ1360 Participatory Privacy: Enabling Privacy in Participatory Sensing NETWORKING JAVA/2013 61 JPJ1361 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs SECURE COMPUTING JAVA/2013 62 JPJ1362 Facilitating Document Annotation using Content and Querying Value DATA MINING JAVA/2013 63 JPJ1363 Privacy Preserving Delegated Access Control in Public Clouds CLOUD COMPUTING JAVA/2013 64 JPJ1364 Twitsper: Tweeting Privately SECURE COMPUTING JAVA/2013 65 JPJ1365 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia DATA MINING JAVA/2013 66 JPJ1366 A System to Filter Unwanted Messages from OSN User Walls DATA MINING JAVA/2013 67 JPJ1367 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering DATA MINING JAVA/2013 68 JPJ1368 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System MOBILE COMPUTING JAVA/2013 69 JPJ1369 Understanding the External Links of Video Sharing Sites: Measurement and Analysis MULTIMEDIA JAVA/2013 70 JPJ1370 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. DATA MINING (CONFERENCE) JAVA/2013 71 JPJ1371 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks SECURE COMPUTING (CONFERENCE) JAVA/2013
  • 6. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech.(Ph.D.), Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com PROJECT SUPPORTS FOR STUDENTS: JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed.