2012 – 2013 IEEE JAVA PROJECT TITLES
CLOUD COMPUTING PROJECT TITLES
JPJ1201- A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
JPJ1202- Cloud Computing Security: From Single to Multi-Clouds
JPJ1203- Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
JPJ1205- Outsourced Similarity Search on Metric Data Assets
JPJ1207- Toward Secure and Dependable Storage Services in Cloud Computing
KNOWLEDGE & DATA ENGINEERING PROJECT TITLES
JPJ1208- Clustering with Multi-viewpoint-Based Similarity Measure
JPJ1209- Efficient Extended Boolean Retrieval
JPJ1210- Ranking Model Adaptation for Domain-Specific Search
JPJ1211- Slicing: A New Approach for Privacy Preserving Data Publishing
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
JPJ1212- BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
JPJ1213- Payments for Outsourced Computations
NETWORKING PROJECT TITLES:
JPJ1214- Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
JPJ1215- Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters
JPJ1216- Independent Directed Acyclic Graphs for Resilient Multipath Routing
JPJ1217- MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
JPJ1218- Privacy- and Integrity-Preserving Range Queries in Sensor Networks
JPJ1219- RIHT: A Novel Hybrid IP Traceback Scheme
JPJ1220- Router Support for Fine-Grained Latency Measurements
SECURE COMPUTING PROJECT TITLES:
JPJ1221- A Stochastic Model of Multi-virus Dynamics
JPJ1222- Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
JPJ1223- Detecting and Resolving Firewall Policy Anomalies
JPJ1224- Detecting Spam Zombies by Monitoring Outgoing Messages
JPJ1226- Online Modeling of Proactive Moderation System for Auction Fraud Detection
JPJ1227- Packet-Hiding Methods for Preventing Selective Jamming Attacks
JPJ1228- Risk-Aware Mitigation for MANET Routing Attacks
IMAGE PROCESSING PROJECT TITLES:
JPJ1229- A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
JPJ1230- Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
JPJ1231- Scalable Coding of Encrypted Images
MULTIMEDIA PROJECT TITLES
JPJ1232- Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING PROJECT TITLES:
JPJ1233- Fast Data Collection in Tree-Based Wireless Sensor Networks
JPJ1234- Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
SERVICE COMPUTING SOA (WEB SERVICE) PROJECT TITLES
JPJ1235- Bootstrapping Ontologies for Web Services
JPJ1236 - Handwritten Chinese Text Recognition by Integrating Multiple Contexts
JPJ1237- Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning
JPJ1238- Semantics-Based Automated Service Discovery
LATEST PROJECT TITLES:
Efficient Fuzzy Type-Ahead Search in XML Data
A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course
DoubleGuard: Detecting Intrusions in Multitier Web Applications
Effective Pattern Discovery for Text Mining
A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
Cut Detection in Wireless Sensor Networks
A Trigger Identification Service for Defending Reactive Jammers in WSN
Game-Theoretic Pricing for Video Streaming in Mobile Networks
Packet Loss Control Using Tokens at the Network Edge
Ensuring Distributed Accountability for Data Sharing in the Cloud
SOFTWARE ENGINEERING PROJECT TITLES
JPJ1252- Invariant-Based Automatic Testing of Modern Web Applications
LATEST PROJECT TITLES:
LEARNING TECHNOLOGIES PROJECT TITLES
LATEST PROJECT TITLES:
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
Resilient Identity Crime Detection
ubiSOAP: A Service-Oriented Middleware for Ubiquitous Networking
Portable Cloud Services Using TOSCA
A Genetic Programming Approach to Record De-duplication
On the Security and Efficiency of Content Distribution via Network Coding
Change Detection in Synthetic Aperture Radar Images based on Image Fusion and Fuzzy Clustering
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Cloud Data Protection for the Masses
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
Enabling Multilevel Trust in Privacy Preserving Data Mining
Capacity of Data Collection in Arbitrary Wireless Sensor Networks
Impact Of Storage Acquisition Intervals On The Cost-Efficiency Of The Private As Public Storage