You are on page 1of 4

2012 IEEE Projects @ JP iNFOTeCH S.

NO Project Code IEEE 2012 Project Titles Domain Lang/Year JAVA 1 JPJ1201 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING 2012/JAVA 2 JPJ1202 Cloud Computing Security: From Single to Multi-Clouds CLOUD COMPUTING 2012/JAVA 3 JPJ1203 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud S torage CLOUD COMPUTING 2012/JAVA

4 JPJ1204 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing CLOUD COMPUTING 2012/JAVA 5 JPJ1205 Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING 2012/JAVA 6 JPJ1206 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING 2012/JAVA 7 JPJ1207 Toward Secure and Dependable Storage Services in Cloud Computing CLOUD COMPUTING 2012/JAVA 8 JPJ1208 Clustering with Multi-viewpoint-Based Similarity Measure KNOWLEDGE AND DATA ENGINEERING 2012/JAVA 9 JPJ1209 Efficient Extended Boolean Retrieval KNOWLEDGE AND DATA ENGINEERING 2012/JAVA 10 JPJ1210 Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/JAVA 11 JPJ1211

Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/JAVA 12 JPJ1212 BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Netwo rks PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA 13 JPJ1213 Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA 14 JPJ1214 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks NETWORKING 2012/JAVA 15 JPJ1215 Design, Implementation, and Performance of a Load Balancer for SIP Server Cluste rs NETWORKING 2012/JAVA 16 JPJ1216 Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING 2012/JAVA 17 JPJ1217 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING 18 JPJ1218 2012/JAVA

Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING 2012/JAVA 19 JPJ1219 RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING 2012/JAVA 20 JPJ1220 Router Support for Fine-Grained Latency Measurements NETWORKING 2012/JAVA 21 JPJ1221 A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING 2012/JAVA 22 JPJ1222 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/JAVA

23 JPJ1223 Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING 2012/JAVA 24 JPJ1224 Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING 2012/JAVA 25 JPJ1225 On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks SECURE COMPUTING 2012/JAVA 26 JPJ1226 Online Modeling of Proactive Moderation System for Auction Fraud Detection SECURE COMPUTING 2012/JAVA 27 JPJ1227 Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING 2012/JAVA 28 JPJ1228 Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING 2012/JAVA 29 JPJ1229 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/JAVA 30 JPJ1230 Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Co vers IMAGE PROCESSING 2012/JAVA 31 JPJ1231 Scalable Coding of Encrypted Images IMAGE PROCESSING 2012/JAVA 32 JPJ1232 Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA 2012/JAVA 33 JPJ1233 Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING 2012/JAVA 34 JPJ1234 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

MOBILE COMPUTING 2012/JAVA 35 JPJ1235 Bootstrapping Ontologies for Web Services SERVICE COMPUTING (WEB SERVICE) 2012/JAVA 36 JPJ1236 Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSING 2012/JAVA 37 JPJ1237 Adaptive Membership Functions for Hand-Written Character Recognition by Voronoibased Image Zoning IMAGE PROCESSING 2012/JAVA 38 JPJ1238 Semantics-Based Automated Service Discovery WEB SERVICE (SOA) 2012/JAVA 39 JPJ1239 Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/JAVA 40 JPJ1240 A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/JAVA

PROJECT SUPPORTS FOR STUDENTS: JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed.

You might also like