SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
2012012012013333 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH
S.NO Project
Code
IEEE 2013 Project Titles Domain Lang/Year
JAVAJAVAJAVAJAVA
1 JPJ1301 A Stochastic Model to Investigate Data Center Performance and
QoS in IaaS Cloud Computing Systems
CLOUD COMPUTING JAVA/2013
2
JPJ1302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING
JAVA/2013
3 JPJ1303 Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
CLOUD COMPUTING JAVA/2013
4 JPJ1304 Error-Tolerant Resource Allocation and Payment Minimization
for Cloud System
CLOUD COMPUTING JAVA/2013
5 JPJ1305 Harnessing the Cloud for Securely Outsourcing Large-Scale
Systems of Linear Equations
CLOUD COMPUTING JAVA/2013
6 JPJ1306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in
the Cloud
CLOUD COMPUTING JAVA/2013
7 JPJ1307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
CLOUD COMPUTING JAVA/2013
8 JPJ1308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING JAVA/2013
9
JPJ1309 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
CLOUD COMPUTING JAVA/2013
10 JPJ1310 Simple and Effective Dynamic Provisioning for Power-
Proportional Data Centers
CLOUD COMPUTING JAVA/2013
11 JPJ1311 A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
DATA MINING JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
12 JPJ1312 A New Algorithm for Inferring User Search Goals with Feedback
Sessions
DATA MINING JAVA/2013
13 JPJ1313 Annotating Search Results from Web Databases DATA MINING JAVA/2013
14 JPJ1314 Anomaly Detection via Online Over-Sampling Principal
Component Analysis
DATA MINING JAVA/2013
15 JPJ1315 Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
DATA MINING JAVA/2013
16
JPJ1316 m-Privacy for Collaborative Data Publishing DATA MINING JAVA/2013
17 JPJ1317 Protecting Sensitive Labels in Social Network Data
Anonymization
DATA MINING JAVA/2013
18 JPJ1318 Tweet Analysis for Real-Time Event Detection and Earthquake
Reporting System Development
DATA MINING JAVA/2013
19 JPJ1319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING JAVA/2013
20 JPJ1320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING JAVA/2013
21 JPJ1321 Modeling the Pairwise Key Predistribution Scheme in the
Presence of Unreliable Links
SECURE COMPUTING JAVA/2013
22 JPJ1322 NICE: Network Intrusion Detection and Countermeasure
Selection in Virtual Network Systems
SECURE COMPUTING JAVA/2013
23 JPJ1323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING JAVA/2013
24 JPJ1324 Securing Class Initialization in Java-like Languages SECURE COMPUTING JAVA/2013
25 JPJ1325 Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
SECURE COMPUTING JAVA/2013
26 JPJ1326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
27 JPJ1327 WARNINGBIRD: A Near Real-time Detection System for
Suspicious URLs in Twitter Stream
SECURE COMPUTING JAVA/2013
28 JPJ1328 A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
NETWORKING JAVA/2013
29 JPJ1329 Delay-Based Network Utility Maximization NETWORKING JAVA/2013
30
JPJ1330 Dynamic Control of Coding for Progressive Packet Arrivals in
DTNs
NETWORKING JAVA/2013
31 JPJ1331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
32 JPJ1332 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
33 JPJ1333 IP-Geolocation Mapping for Moderately Connected Internet
Regions
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
34 JPJ1334 Optimal Client-Server Assignment for Internet Distributed
Systems
PARALLEL &
DISTRIBUTED SYSTEMS
JAVA/2013
35 JPJ1335 Content Sharing over Smartphone-Based Delay-Tolerant
Networks
MOBILE COMPUTING JAVA/2013
36 JPJ1336 DCIM: Distributed Cache Invalidation Method for Maintaining
Cache Consistency in Wireless Mobile Networks
MOBILE COMPUTING JAVA/2013
37 JPJ1337 Discovery and Verification of Neighbor Positions in Mobile Ad
Hoc Networks
MOBILE COMPUTING JAVA/2013
38 JPJ1338 Efficient Rekeying Framework for Secure Multicast with Diverse-
Subscription-Period Mobile Users
MOBILE COMPUTING JAVA/2013
39 JPJ1339 A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data
PATTERN ANALYSIS &
MACHINE
INTELLIGENCE
JAVA/2013
40
JPJ1340
A Decentralized Service Discovery Approach on Peer-to-Peer
SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
Networks
41
JPJ1341 Personalized QoS-Aware Web Service Recommendation and
Visualization
SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
42 JPJ1342 Privacy-Enhanced Web Service Composition SERVICE COMPUTING
(WEB SERVICE)
JAVA/2013
43 JPJ1343 Whole Test Suite Generation SOFTWARE
ENGINEERING
JAVA/2013
DOTNETDOTNETDOTNETDOTNET
1
JPD1301 A Privacy Leakage Upper Bound Constraint-Based Approach for
Cost-Effective Privacy Preserving of Intermediate Data Sets in
Cloud
CLOUD COMPUTING
.NET/2013
2 JPD1302 An Adaptive Cloud Downloading Service CLOUD COMPUTING .NET/2013
3 JPD1303 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
CLOUD COMPUTING .NET/2013
4 JPD1304 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in
the Cloud
CLOUD COMPUTING .NET/2013
5 JPD1305 On Data Staging Algorithms for Shared Data Accesses in Clouds CLOUD COMPUTING .NET/2013
6 JPD1306 Optimal Multiserver Configuration for Profit Maximization in
Cloud Computing
CLOUD COMPUTING .NET/2013
7 JPD1307 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING .NET/2013
8 JPD1308 QoS Ranking Prediction for Cloud Services CLOUD COMPUTING .NET/2013
9
JPD1309 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
CLOUD COMPUTING .NET/2013
10 JPD1310 Toward Fine-Grained, Unsupervised, Scalable Performance
Diagnosis for Production Cloud Computing Systems
CLOUD COMPUTING .NET/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
11 JPD1311 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted
Cloud Data
CLOUD COMPUTING .NET/2013
12 JPD1312 A New Algorithm for Inferring User Search Goals with Feedback
Sessions
DATA MINING .NET/2013
13 JPD1313 A Survey of XML Tree Patterns DATA MINING .NET/2013
14 JPD1314 Dynamic Personalized Recommendation on Sparse Data DATA MINING .NET/2013
15 JPD1315 Mining User Queries with Markov Chains: Application to Online
Image Retrieval
DATA MINING .NET/2013
16
JPD1316 TrustedDB: A Trusted Hardware based Database with Privacy and
Data Confidentiality
DATA MINING .NET/2013
17 JPD1317 A Rank Correlation Based Detection against Distributed
Reflection DoS Attacks.
SECURE COMPUTING .NET/2013
18 JPD1318 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING .NET/2013
19 JPD1319 Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
SECURE COMPUTING .NET/2013
20 JPD1320 Modeling the Pairwise Key Predistribution Scheme in the
Presence of Unreliable Links
SECURE COMPUTING .NET/2013
21 JPD1321 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING .NET/2013
22 JPD1322 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING .NET/2013
23 JPD1323 A Distributed Control Law for Load Balancing in Content Delivery
Networks
NETWORKING .NET/2013
24 JPD1324 A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
NETWORKING .NET/2013
25 JPD1325 An Efficient and Robust Addressing Protocol for Node
Autoconfiguration in Ad Hoc Networks
NETWORKING .NET/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
26 JPD1326 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City
Environments
NETWORKING .NET/2013
27 JPD1327 Efficient Algorithms for Neighbor Discovery in Wireless Networks NETWORKING .NET/2013
28 JPD1328 Localization of Wireless Sensor Networks in the Wild: Pursuit of
Ranging Quality
NETWORKING .NET/2013
29 JPD1329 Resource Allocation for QoS Support in Wireless Mesh Networks NETWORKING .NET/2013
30
JPD1330 A Secure Payment Scheme with Low Communication and
Processing Overhead for Multihop Wireless Networks
PARALLEL &
DISTRIBUTED SYSTEMS
.NET/2013
31 JPD1331 Multicast Capacity in MANET with Infrastructure Support PARALLEL &
DISTRIBUTED SYSTEMS
.NET/2013
32 JPD1332 SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
PARALLEL &
DISTRIBUTED SYSTEMS
.NET/2013
33 JPD1333 Adaptive Position Update for Geographic Routing in Mobile Ad
Hoc Networks
MOBILE COMPUTING .NET/2013
34 JPD1334 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks:
A Coalitional Game Approach
MOBILE COMPUTING .NET/2013
35 JPD1335 EMAP: Expedite Message Authentication Protocol for Vehicular
Ad Hoc Networks
MOBILE COMPUTING .NET/2013
36 JPD1336 Optimal Multicast Capacity and Delay Tradeoffs in MANETs MOBILE COMPUTING .NET/2013
37 JPD1337 Relay Selection for Geographical Forwarding in Sleep-Wake
Cycling Wireless Sensor Networks
MOBILE COMPUTING .NET/2013
38 JPD1338 Query-Adaptive Image Search With Hash Codes IMAGE PROCESSING .NET/2013
39 JPD1339 Reversible Data Hiding With Optimal Value Transfer IMAGE PROCESSING .NET/2013
40 JPD1340 Reversible Watermarking Based on Invariant Image Classification IMAGE PROCESSING
.NET/2013
SOFTWARE DEVELOPMENT & RESEARCH DIVISION
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690
Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
PROJECT SUPPORTS FOR STUDENTS:
JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS
REVIEW DOCUMENTS AND PPTS
100% LIVE EXPLANATION
PROJECT ASSIGNMENTS
VIVA-VOCE QUESTIONS & ANSWERS
VALID TRAINEE CERTIFICATION
100% PLACEMENT SUPPORT
Own Projects are also welcomed.
and Dynamic Histogram Shifting
41
JPD1341 Local Directional Number Pattern for Face Analysis: Face and
Expression Recognition
IMAGE PROCESSING .NET/2013
42 JPD1342
Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage IMAGE PROCESSING .NET/2013

More Related Content

PDF
2013 2014 ieee dotnet project titles
PDF
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
PDF
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DOC
Main p roject list for csc it
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
2013 2014 ieee dotnet project titles
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Main p roject list for csc it
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...

What's hot (20)

DOCX
Cost effective authentic and anonymous data sharing with forward security
PDF
IEEE Projects 2012-2013 Network Security
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
Two Aspect Endorsement Access Control for web Based Cloud Computing
PDF
Cost effective authentic and anonymous data sharing with forward security
PDF
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
PDF
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
PDF
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
PDF
5.[40 44]enhancing security in cloud computing
PDF
Combating the enemy within – an elegant mathematical approach to insider thre...
PDF
Final Year Project Titles 2013 2014
PDF
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
Ijsrdv8 i10355
PDF
IRJET- Survey on Blockchain based Digital Certificate System
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Cost effective authentic and anonymous data sharing with forward security
IEEE Projects 2012-2013 Network Security
4.authentication and key agreement based on anonymous identity for peer to-pe...
Two Aspect Endorsement Access Control for web Based Cloud Computing
Cost effective authentic and anonymous data sharing with forward security
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
5.[40 44]enhancing security in cloud computing
Combating the enemy within – an elegant mathematical approach to insider thre...
Final Year Project Titles 2013 2014
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
Two Aspect Validation Control Frameworks for Online Distributed Services
Ijsrdv8 i10355
IRJET- Survey on Blockchain based Digital Certificate System
Flexible and fine grained attribute-based data storage in cloud computing
Ad

Viewers also liked (14)

DOCX
Opportunistic manets mobility can make up for low transmission power
DOCX
Relay selection for geographical forwarding in sleep wake cycling wireless se...
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Moses supporting and enforcing security profiles on smartphones
DOCX
Sort a self o rganizing trust model for peer-to-peer systems
DOCX
Crowdsourced trace similarity with smartphones
DOCX
Face to-face proximity estimation using bluetooth on smartphones
DOCX
Alert an anonymous location based efficient routing protocol in mane ts
DOCX
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
DOCX
Dynamic personalized recommendation on sparse data
DOCX
A proxy based approach to continuous location-based spatial queries in mobile...
DOCX
Adaptive position update for geographic routing in mobile ad hoc networks
DOCX
Eaack—a secure intrusion detection system for manets
DOCX
Error tolerant resource allocation and payment minimization for cloud system
Opportunistic manets mobility can make up for low transmission power
Relay selection for geographical forwarding in sleep wake cycling wireless se...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Moses supporting and enforcing security profiles on smartphones
Sort a self o rganizing trust model for peer-to-peer systems
Crowdsourced trace similarity with smartphones
Face to-face proximity estimation using bluetooth on smartphones
Alert an anonymous location based efficient routing protocol in mane ts
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Dynamic personalized recommendation on sparse data
A proxy based approach to continuous location-based spatial queries in mobile...
Adaptive position update for geographic routing in mobile ad hoc networks
Eaack—a secure intrusion detection system for manets
Error tolerant resource allocation and payment minimization for cloud system
Ad

Similar to 2013 IEEE PROJECT TITLES FOR CSE (20)

PDF
ieee 2013 best project titles with latest techniques
PDF
ieee projects 2013 for m.tech.
PDF
2013 2014 ieee java project titles
PDF
final year ieee projects in pondicherry
PDF
2013 ieee java project titles for cse, it and mca
PDF
2013 ieee java project titles-lans a-informatics
PDF
ieee projects for cse 2013
DOC
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
DOC
VTU Computer Science Engineering & Information Science Engineering Project Ti...
PDF
2015 2016 ieee java project titles
PDF
2013 ieee dotnet project titles - lans a informatics
PDF
2012 13 ieee java titles - jp infotech
DOC
2013 2014 ieee dotnet project titles
PDF
IEEE PROJECTS 2013 for me
DOCX
Java IEEE 2015 titles
PDF
2013 14-java-project-titles-me-tech-pantech
PDF
2013 14-java-project-titles-me-tech-pantech
PDF
Java ieee 2015
PDF
JAVA IEEE -2015
PDF
2014 2015 ieee java projects titles list globalsoft technologies
ieee 2013 best project titles with latest techniques
ieee projects 2013 for m.tech.
2013 2014 ieee java project titles
final year ieee projects in pondicherry
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles-lans a-informatics
ieee projects for cse 2013
VTU Final Year Engineering Project Title List for Computer Science Engineerin...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
2015 2016 ieee java project titles
2013 ieee dotnet project titles - lans a informatics
2012 13 ieee java titles - jp infotech
2013 2014 ieee dotnet project titles
IEEE PROJECTS 2013 for me
Java IEEE 2015 titles
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
Java ieee 2015
JAVA IEEE -2015
2014 2015 ieee java projects titles list globalsoft technologies

Recently uploaded (20)

PPTX
Copy of ARAL Program Primer_071725(1).pptx
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PPTX
operating_systems_presentations_delhi_nc
PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
IT infrastructure and emerging technologies
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
MMW-CHAPTER-1-final.pptx major Elementary Education
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
FAMILY PLANNING (preventative and social medicine pdf)
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PDF
African Communication Research: A review
PDF
GSA-Past-Papers-2010-2024-2.pdf CSS examination
DOCX
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PPTX
Diploma pharmaceutics notes..helps diploma students
Copy of ARAL Program Primer_071725(1).pptx
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
operating_systems_presentations_delhi_nc
Chevening Scholarship Application and Interview Preparation Guide
FYJC - Chemistry textbook - standard 11.
IT infrastructure and emerging technologies
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
MMW-CHAPTER-1-final.pptx major Elementary Education
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
FAMILY PLANNING (preventative and social medicine pdf)
2025 High Blood Pressure Guideline Slide Set.pptx
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
African Communication Research: A review
GSA-Past-Papers-2010-2024-2.pdf CSS examination
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
Diploma pharmaceutics notes..helps diploma students

2013 IEEE PROJECT TITLES FOR CSE

  • 1. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] 2012012012013333 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH S.NO Project Code IEEE 2013 Project Titles Domain Lang/Year JAVAJAVAJAVAJAVA 1 JPJ1301 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CLOUD COMPUTING JAVA/2013 2 JPJ1302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING JAVA/2013 3 JPJ1303 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment CLOUD COMPUTING JAVA/2013 4 JPJ1304 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System CLOUD COMPUTING JAVA/2013 5 JPJ1305 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations CLOUD COMPUTING JAVA/2013 6 JPJ1306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CLOUD COMPUTING JAVA/2013 7 JPJ1307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System CLOUD COMPUTING JAVA/2013 8 JPJ1308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING JAVA/2013 9 JPJ1309 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption CLOUD COMPUTING JAVA/2013 10 JPJ1310 Simple and Effective Dynamic Provisioning for Power- Proportional Data Centers CLOUD COMPUTING JAVA/2013 11 JPJ1311 A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data DATA MINING JAVA/2013
  • 2. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] 12 JPJ1312 A New Algorithm for Inferring User Search Goals with Feedback Sessions DATA MINING JAVA/2013 13 JPJ1313 Annotating Search Results from Web Databases DATA MINING JAVA/2013 14 JPJ1314 Anomaly Detection via Online Over-Sampling Principal Component Analysis DATA MINING JAVA/2013 15 JPJ1315 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks DATA MINING JAVA/2013 16 JPJ1316 m-Privacy for Collaborative Data Publishing DATA MINING JAVA/2013 17 JPJ1317 Protecting Sensitive Labels in Social Network Data Anonymization DATA MINING JAVA/2013 18 JPJ1318 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development DATA MINING JAVA/2013 19 JPJ1319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING JAVA/2013 20 JPJ1320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING JAVA/2013 21 JPJ1321 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links SECURE COMPUTING JAVA/2013 22 JPJ1322 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems SECURE COMPUTING JAVA/2013 23 JPJ1323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING JAVA/2013 24 JPJ1324 Securing Class Initialization in Java-like Languages SECURE COMPUTING JAVA/2013 25 JPJ1325 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SECURE COMPUTING JAVA/2013 26 JPJ1326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING JAVA/2013
  • 3. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] 27 JPJ1327 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream SECURE COMPUTING JAVA/2013 28 JPJ1328 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks NETWORKING JAVA/2013 29 JPJ1329 Delay-Based Network Utility Maximization NETWORKING JAVA/2013 30 JPJ1330 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs NETWORKING JAVA/2013 31 JPJ1331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 32 JPJ1332 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 33 JPJ1333 IP-Geolocation Mapping for Moderately Connected Internet Regions PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 34 JPJ1334 Optimal Client-Server Assignment for Internet Distributed Systems PARALLEL & DISTRIBUTED SYSTEMS JAVA/2013 35 JPJ1335 Content Sharing over Smartphone-Based Delay-Tolerant Networks MOBILE COMPUTING JAVA/2013 36 JPJ1336 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks MOBILE COMPUTING JAVA/2013 37 JPJ1337 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks MOBILE COMPUTING JAVA/2013 38 JPJ1338 Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users MOBILE COMPUTING JAVA/2013 39 JPJ1339 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data PATTERN ANALYSIS & MACHINE INTELLIGENCE JAVA/2013 40 JPJ1340 A Decentralized Service Discovery Approach on Peer-to-Peer SERVICE COMPUTING (WEB SERVICE) JAVA/2013
  • 4. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] Networks 41 JPJ1341 Personalized QoS-Aware Web Service Recommendation and Visualization SERVICE COMPUTING (WEB SERVICE) JAVA/2013 42 JPJ1342 Privacy-Enhanced Web Service Composition SERVICE COMPUTING (WEB SERVICE) JAVA/2013 43 JPJ1343 Whole Test Suite Generation SOFTWARE ENGINEERING JAVA/2013 DOTNETDOTNETDOTNETDOTNET 1 JPD1301 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud CLOUD COMPUTING .NET/2013 2 JPD1302 An Adaptive Cloud Downloading Service CLOUD COMPUTING .NET/2013 3 JPD1303 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems CLOUD COMPUTING .NET/2013 4 JPD1304 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CLOUD COMPUTING .NET/2013 5 JPD1305 On Data Staging Algorithms for Shared Data Accesses in Clouds CLOUD COMPUTING .NET/2013 6 JPD1306 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing CLOUD COMPUTING .NET/2013 7 JPD1307 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING .NET/2013 8 JPD1308 QoS Ranking Prediction for Cloud Services CLOUD COMPUTING .NET/2013 9 JPD1309 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption CLOUD COMPUTING .NET/2013 10 JPD1310 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems CLOUD COMPUTING .NET/2013
  • 5. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] 11 JPD1311 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data CLOUD COMPUTING .NET/2013 12 JPD1312 A New Algorithm for Inferring User Search Goals with Feedback Sessions DATA MINING .NET/2013 13 JPD1313 A Survey of XML Tree Patterns DATA MINING .NET/2013 14 JPD1314 Dynamic Personalized Recommendation on Sparse Data DATA MINING .NET/2013 15 JPD1315 Mining User Queries with Markov Chains: Application to Online Image Retrieval DATA MINING .NET/2013 16 JPD1316 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality DATA MINING .NET/2013 17 JPD1317 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. SECURE COMPUTING .NET/2013 18 JPD1318 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING .NET/2013 19 JPD1319 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing SECURE COMPUTING .NET/2013 20 JPD1320 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links SECURE COMPUTING .NET/2013 21 JPD1321 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING .NET/2013 22 JPD1322 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING .NET/2013 23 JPD1323 A Distributed Control Law for Load Balancing in Content Delivery Networks NETWORKING .NET/2013 24 JPD1324 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks NETWORKING .NET/2013 25 JPD1325 An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks NETWORKING .NET/2013
  • 6. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] 26 JPD1326 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments NETWORKING .NET/2013 27 JPD1327 Efficient Algorithms for Neighbor Discovery in Wireless Networks NETWORKING .NET/2013 28 JPD1328 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality NETWORKING .NET/2013 29 JPD1329 Resource Allocation for QoS Support in Wireless Mesh Networks NETWORKING .NET/2013 30 JPD1330 A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks PARALLEL & DISTRIBUTED SYSTEMS .NET/2013 31 JPD1331 Multicast Capacity in MANET with Infrastructure Support PARALLEL & DISTRIBUTED SYSTEMS .NET/2013 32 JPD1332 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency PARALLEL & DISTRIBUTED SYSTEMS .NET/2013 33 JPD1333 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks MOBILE COMPUTING .NET/2013 34 JPD1334 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach MOBILE COMPUTING .NET/2013 35 JPD1335 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks MOBILE COMPUTING .NET/2013 36 JPD1336 Optimal Multicast Capacity and Delay Tradeoffs in MANETs MOBILE COMPUTING .NET/2013 37 JPD1337 Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks MOBILE COMPUTING .NET/2013 38 JPD1338 Query-Adaptive Image Search With Hash Codes IMAGE PROCESSING .NET/2013 39 JPD1339 Reversible Data Hiding With Optimal Value Transfer IMAGE PROCESSING .NET/2013 40 JPD1340 Reversible Watermarking Based on Invariant Image Classification IMAGE PROCESSING .NET/2013
  • 7. SOFTWARE DEVELOPMENT & RESEARCH DIVISION Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: [email protected] PROJECT SUPPORTS FOR STUDENTS: JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed. and Dynamic Histogram Shifting 41 JPD1341 Local Directional Number Pattern for Face Analysis: Face and Expression Recognition IMAGE PROCESSING .NET/2013 42 JPD1342 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage IMAGE PROCESSING .NET/2013