Sie sind auf Seite 1von 4

SOFTWARE DEVELOPMENT & RESEARCH DIVISION

20122012-13 IEEE DOTNET PROJECT TITLES @ JP INFOTECH


PROJECT CODE - TITLE CLOUD COMPUTING
1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. 2. Cloud Computing Security From Single to Multi-Clouds. 3. Enhanced Data Security Model for Cloud Computing 4. Ensuring Distributed Accountability for Data Sharing in the Cloud. 5. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. 6. Outsourced Similarity Search on Metric Data Assets. 7. Privacy-Preserving Public Auditing for Secure Cloud Storage 8. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. 9. Toward Secure and Dependable Storage Services in Cloud Computing.

KNOWLEDGE & DATA ENGINEERING


10. A Query Formulation Language for the data web 11. Creating Evolving User Behavior Profiles Automatically 12. D-Cache: Universal Distance Cache for Metric Access Methods 13. DDD: A New Ensemble Approach for Dealing with Concept Drift 14. Efficient Computation of Range Aggregates against Uncertain Location-Based Queries 15. Efficient Fuzzy Type-Ahead Search in XML Data 16. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis 17. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques 18. Measuring the Sky: On Computing Data Cubes via Skylining the Measures Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com

SOFTWARE DEVELOPMENT & RESEARCH DIVISION

19. Mining Web Graphs for Recommendations 20. Organizing User Search Histories 21. Publishing Search LogsA Comparative Study of Privacy Guarantees 22. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 23. ROAD: A New Spatial Object Search Framework for Road Networks 24. Scalable Learning of Collective Behavior 25. Slicing: A New Approach for Privacy Preserving Data Publishing 26. Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings

PARALLEL AND DISTRIBUTED SYSTEMS


27. Bounding the Impact of Unbounded Attacks in Stabilization 28. Catching Packet Droppers and Modifiers in Wireless Sensor Networks 29. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

NETWORKING:
30. A New Cell-Counting-Based Attack Against Tor 31. Optimal Source-Based Filtering of Malicious Traffic 32. TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS 33. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

SECURE COMPUTING:
34. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network 35. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 36. ES-MPICH2: A Message Passing Interface with Enhanced Security Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com

SOFTWARE DEVELOPMENT & RESEARCH DIVISION

37. On the Security and Efficiency of Content Distribution via Network Coding 38. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobileHealthcare Emergency 39. Revisiting Defenses against Large-Scale Online Password Guessing Attacks

IMAGE PROCESSING:
40. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 41. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 42. Active Visual Segmentation 43. Image Segmentation Based on the Poincar Map Method 44. K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER 45. Multiple Exposure Fusion for High Dynamic Range Image Acquisition 46. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 47. Smile Detection by Boosting Pixel Differences 48. View-invariant action recognition based on Artificial Neural Networks 49. A Novel Anti phishing framework based on visual cryptography

MOBILE COMPUTING:
50. Cooperative Download in Vehicular Environments 51. Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 52. Network Assisted Mobile Computing with Optimal Uplink Query Processing 53. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 54. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com

SOFTWARE DEVELOPMENT & RESEARCH DIVISION

PROJECT SUPPORTS FOR STUDENTS:

JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS* REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed.

Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com

Das könnte Ihnen auch gefallen