WEB APPLICATION. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Similar documents
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

A Location- and Diversity-aware News Feed System for Mobile Users. JPA1503 Context-Based Access Control Systems for Mobile Devices SECURE COMPUTING

A New Analytical Approach to Evaluate the Critical-Event Probability Due to Wireless Communication Errors in Train Control Systems

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

Void main Technologies

Deep Representation based feature extraction and recovering for Fingervein verification

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

CSE / IT IEEE PROJECT LIST

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

Void main Technologies

Course Curriculum for Master Degree in Network Engineering and Security

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

IEEE networking projects

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

ROUTING PROJECT LIST

NET M.TECH IEEE TITLES

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

IEEE Project Titles

JAVA PROJECTS LIST. S.No Title/Name of the Project Year. Mobile Computing

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

Elysium Technologies Private Limited::IEEE Final year Project

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Service Mesh and Microservices Networking

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Introduction to Distributed Systems

A Secure Routing Protocol for Wireless Adhoc Network Creation

Pseudonym Based Security Architecture for Wireless Mesh Network

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

23 Must-Have WiFi Features

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

Mobile ad hoc networks Various problems and some solutions

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

An Efficient and Secured way of Routing in Hybrid WSN

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

Sl.No Project Title Year

A Study on Issues Associated with Mobile Network

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Sybil Attack Detection in Mobile Adhoc Network

Networking Cyber-physical Applications in a Data-centric World

An Algorithm for Dynamic SDN Controller in Data Centre Networks

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

Lecture 8 Wireless Sensor Networks: Overview

B.TECH/M.TECH MINOR/MAJOR PROJECT

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

PROJECT LIST

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Protection Against DDOS Using Secure Code Propagation In The VANETs

Multimedia Security: So What s the Big Deal?

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

Introduction and Statement of the Problem

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

SriramEngineeringCollege Department of Computer Science and Engineering

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

A Review on Privacy Preserving Data Mining Approaches

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) REQUIREMENTS FOR ALTERNATE ROUTES IN MANET ABSTRACT

Packet Estimation with CBDS Approach to secure MANET

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis

Authentication with Privacy for Connected Cars - A research perspective -

Addressing Unique M2M Challenges with Converged Gateways

A Cloud Based Intrusion Detection System For Android Smartphones

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM

Personal Cybersecurity

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

CS November 2018

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Chapter 7 CONCLUSION

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Transcription:

2016-2017 APPLICATION Projects @ JP infotech S.NO Project Code 2016-2017 APPLICATION PROJECT Titles Type Coding Lang. WEB APPLICATION 1 JPJA1601 Airline Reservation System 2 JPJA1602 Building web applications on top of encrypted data using Mylar 3 JPJA1603 College Management System 4 JPJA1604 Data security model for Cloud Computing using V-GRT methodology 5 JPJA1605 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System 6 JPJA1606 Detecting Malicious Facebook Applications 7 JPJA1607 Discovery of Ranking Fraud for Mobile Apps 8 JPJA1608 Employee Attendance System using QR Code 9 JPJA1609 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval 10 JPJA1610 Encrypted Data Storage Vs Data Against illegal Access 11 JPJA1611 E-TENDER 12 JPJA1612 Face Recognition in Social Networks Using Big Data

13 JPJA1613 Human Resource Management System 14 JPJA1614 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints 15 JPJA1615 Integration of Cloud and Sensor Networks with Novel Authentication 16 JPJA1616 Learning to Rank Image Tags With Limited Training Examples 17 JPJA1617 Location Based Service System with User Ratings and Comments 18 JPJA1618 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation 19 JPJA1619 Mining Online Product Evaluation System based on Ratings and Review Comments 20 JPJA1620 Natural Language Interface to Database 21 JPJA1621 Online Allegation 22 JPJA1622 Online Banking System with Email OTP 23 JPJA1623 Online Bug Tracking System 24 JPJA1624 Online college Counseling system 25 JPJA1625 Online Content Based Image Retrieval System with Ranking Model 26 JPJA1626 Online Crime File Management System 27 JPJA1627 Online Dictionary 28 JPJA1628 Online Employee Tracking System 29 JPJA1629 Online Product Rating System with Dynamic Trust model for User

Authorization 30 JPJA1630 Online Student Attendance Management System (with Parent Notification on Leave) 31 JPJA1631 Personalized Movie Recommendation System 32 JPJA1632 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 33 JPJA1633 Real-Time Detection of Traffic from Twitter Stream Analysis 34 JPJA1634 Resource management system 35 JPJA1635 Resource Monitor 36 JPJA1636 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 37 JPJA1637 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 38 JPJA1638 Secure Online Product Recommendation System 39 JPJA1639 Secure Overlay Cloud Storage with Access Control 40 JPJA1640 Twitter Based Tweet Summarization 41 JPJA1641 Twitter Message Segmentation 42 JPJA1642 User Rating based Location Information System 43 JPJA1643 Using Opinion Mining Techniques in Tourism 44 JPJA1644 Video Fraud Detecting On social Network

45 JPJA1645 WebCrawler: Web Server Performance Testing Tool 46 JPJA1501 A Cocktail Approach for Travel Package Recommendation 47 JPJA1502 A Novel Privacy-Preserving Public Auditing for Group Data in the Cloud 48 JPJA1503 An Efficient Certificateless Encryption for Secure Data Sharing in Public Cloud 49 JPJA1504 An Incentive Framework for Cellular Traffic Offloading 50 JPJA1505 Analyze Drifts in Business 51 JPJA1506 Approximate Distance Finder with Fast nearest Neighbor Search with Keywords 52 JPJA1507 Cloud Data Center Load Balancing Strategy based on QoS 53 JPJA1508 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 54 JPJA1509 Dynamic Query Forms for Database Queries 55 JPJA1510 Efficient Authentication for Mobile and Pervasive Computing 56 JPJA1511 Efficient Information Retrieval Using Ranked Query 57 JPJA1512 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 58 JPJA1513 Enhanced Secure Login System using Captcha as Graphical Passwords 59 JPJA1514 Expressive, Efficient, and Revocable Data Access Control for Multi- Authority Cloud Storage 60 JPJA1515 Facilitating Document Annotation using Content and Querying Value

61 JPJA1516 Friendbook A Semantic-based Friend Recommendation System for Social Networks 62 JPJA1517 Image Search Reranking With Query-Dependent Click-Based Relevance Feedback 63 JPJA1518 K-Anonymity for Crowdsourcing Database 64 JPJA1519 Live Traffic Index based Online Shortest Path Computation 65 JPJA1520 LocaWard A Security and Privacy Aware Location-Based Rewarding System 66 JPJA1521 Malicious Feedback Rating Prevention in e-commerce Sites 67 JPJA1522 Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query 68 JPJA1523 Prediction-Based Cloud Bandwidth and Cost Reduction System 69 JPJA1524 Privacy Preserving Delegated Access Control in Public Clouds 70 JPJA1525 Privacy-Preserving and Content-Protecting Location Based Queries 71 JPJA1526 Privacy-Preserving Mechanism for Secure Medical Data 72 JPJA1527 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 73 JPJA1528 Probabilistic Aspect Mining Model for Drug Reviews 74 JPJA1529 Random space perturbation (RASP) based secure and efficient range query and knn query services for protected data in the cloud 75 JPJA1530 RRE A Game-Theoretic Intrusion Response and Recovery Engine

76 JPJA1531 Scalable Distributed Service Integrity Attestation for Software-as-a- Service Clouds 77 JPJA1532 Secure Out sourced Attribute-based Signatures 78 JPJA1533 Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption 79 JPJA1534 Security in Privacy for Medical Data Health Records 80 JPJA1535 SocialTube P2P-assisted Video Sharing in Online Social Networks 81 JPJA1536 SOS A Distributed Mobile Q&A System Based on Social Networks 82 JPJA1537 Spam Filter based Security Evaluation of Pattern Classifiers under Attack 83 JPJA1538 Supporting Authorized Duplicate Check in a Hybrid Cloud Architecture 84 JPJA1539 Supporting Privacy Protection in Personalized Web Search 85 JPJA1540 Tag Recommendation for Photos on Social Websites 86 JPJA1541 The Client Assignment Problem for Continuous Distributed Interactive Applications 87 JPJA1542 Toward Preserving Privacy and Functionality in Geosocial Networks 88 JPJA1543 User-centric location-based service for Privacy in Queries 89 JPJA1544 Web Service Recommendation via Exploiting Location and QoS Information 90 JPJ001 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

91 JPJ002 A Secure Cloud Server System using Proxy Re-Encryption Model 92 JPJ003 A Secure payment System for banking transactions 93 JPJ004 An efficient Mailing System for Detecting Spam Mails 94 JPJ005 Annotating Search Results from Web Databases 95 JPJ006 Anonymization for Secure Data in Web 96 JPJ007 Attribute-based Encryption System for Secured Data Storage 97 JPJ008 Automatic Testing System for 98 JPJ009 Boolean Retrieval for Medical datas 99 JPJ010 Cloud Data Protection for the Masses 100 JPJ011 CloudMov: Cloud based Video Streaming System 101 JPJ012 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 102 JPJ013 Continuous query processing system for location based services 103 JPJ014 Cooperative Secure Multi-Cloud Verification System 104 JPJ015 Detecting Complaints in Online Product Purchase 105 JPJ016 Detecting false users in Online Rating system & Securing Reputation 106 JPJ017 Distributed data integration on electricity board 107 JPJ018 Dynamic Assignments of Clients to Servers based on Load

108 JPJ019 Dynamic Resource allocation in Cloud 109 JPJ020 Earthquake Reporting System using Social Networking Site 110 JPJ021 Efficient and secure search on encrypted medical data 111 JPJ022 E-Fraud Prevention based on the Self-Authentication of e- Documents 112 JPJ023 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 113 JPJ024 Enhanced Security Scheme in Social Networking using XML 114 JPJ025 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 115 JPJ026 Facilitating Effective User Navigation through backtracking 116 JPJ027 Filtering Unwanted Messages in Online Social Networking User walls 117 JPJ028 Get your Campus 118 JPJ029 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 119 JPJ030 Identity-Based Secure Distributed Data Storage Schemes 120 JPJ031 Information leak detection and prevention system 121 JPJ032 Intrusion Detection and Prevention in Web Servers 122 JPJ033 IPTV Portal System 123 JPJ034 Load balancing model for Cloud Data Center

124 JPJ035 Location Based Search System 125 JPJ036 Multi-Cloud System to avoid server failures 126 JPJ037 Multiparty Access Control for Online Social Networks 127 JPJ038 Personalised Search Engine from user click-through logs 128 JPJ039 Personalized Image Search System 129 JPJ040 Personalized QoS-Aware Web Service Recommendation and Visualization 130 JPJ041 Portable Cloud System 131 JPJ042 Predicting BMI using Behavioral Outcomes 132 JPJ043 Preserving data and identity privacy from an untrusted cloud by Multi- Owner Data Sharing 133 JPJ044 Preventing Intrusion in Web and Database Servers 134 JPJ045 Preventing Private Information Inference Attacks on Social Networks 135 JPJ046 Privacy Preserving Data Sharing With Anonymous ID Assignment 136 JPJ047 Privacy Preserving Delegated Access Control in Cloud Computing 137 JPJ048 Privacy Protection Scheme in Location Information System 138 JPJ049 Privacy-Preserving Public Auditing For Secure Cloud Storage 139 JPJ050 Protecting Sensitive Labels in Social Network Data Anonymization 140 JPJ051 PUBMED: an efficient biomedical based hierarchical search engine

141 JPJ052 Ranking and feedback model in search engines 142 JPJ053 Ranking system for web library 143 JPJ054 Scalable and Secure Sharing of Personal Health Records 144 JPJ055 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 145 JPJ056 Secure Access Control System in Cloud using Attribute based encryption technique 146 JPJ057 Secure and practical outsourcing of linear programming in cloud computing 147 JPJ058 Secure cloud access system using JAR 148 JPJ059 Secure Key based Privacy Preserving Access Control System 149 JPJ060 Secure personal information system in Medical System 150 JPJ061 Security Enhanced Facebook like Social Networking Sites 151 JPJ062 Security key based Video Uploading and viewing System 152 JPJ063 Self diagnosing with identifying disease treatment with online doctor precautionary 153 JPJ064 SocialTube: P2P-assisted Video Sharing in Online Social Networks 154 JPJ065 Spatial Approximate String Search 155 JPJ066 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 156 JPJ067 Twitsper Tweeting Privately

157 JPJ068 Two tales of privacy in online social networks 158 JPJ069 Vertical Search Engine 159 JPJ070 Video Sharing Website DESKTOP APPLICATION 160 JPJ071 A Decentralized Service Discovery Approach on Peer-to-Peer Networks 161 JPJ072 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 162 JPJ073 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 163 JPJ074 A System for Denial-of-Service Attack Detection 164 JPJ075 An enhanced model for achieving high throughput using variant buffer methodology 165 JPJ076 Anomaly based intrusion detection system 166 JPJ077 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 167 168 169 JPJ078 Bandwidth estimation systems in networks JPJ079 Blocking intruders for secured network maintenance JPJ080 Cache based User Location Querying System

170 JPJ081 Caching techniques in MANET and various routing protocols in MANET 171 JPJ082 Capacity of Data Collection in Arbitrary Wireless sensor networks 172 173 174 JPJ083 CFR: an efficient congestion free router JPJ084 Channel allocation system in mobile networks JPJ085 Clone Node Detection in Wireless Sensor Networking 175 JPJ086 Coding for cryptographic security enhancement using stopping sets (Image Processing) 176 177 178 179 180 JPJ087 Content based image retrieval system (Image Processing) JPJ088 Content Sharing in Peer-to-Peer Networks JPJ089 Cut detection in Wireless Sensor Network JPJ090 Data Transmission Using Multi-Tasking-Sockets JPJ091 Delay-Based Network Utility Maximization 181 JPJ092 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 182 JPJ093 Distributed Processing of Probabilistic Top-k Queries in Wireless

Sensor Networks 183 184 185 JPJ094 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs JPJ095 Efficient and Dynamic Routing Topology Inference JPJ096 Efficient load balancing system in SIP Servers 186 JPJ097 Efficient load distribution scheme to avoid congestion in servers 187 JPJ098 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 188 189 190 191 192 193 194 JPJ099 Fault Node Recovery Algorithm for a Wireless Sensor Network JPJ100 FEC based cryptography for secured data communication JPJ101 Finding latency in data transmission JPJ102 Geometric Routing Protocol in MANET JPJ103 Homophonic cryptography technique for data security JPJ104 Hop-by-Hop routing in Wireless Network JPJ105 Impact of denial of service attacks on servers

195 JPJ106 Intrusion detection system in wireless sensor networks 196 JPJ107 Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols 197 JPJ108 Mobility management schemes in wireless networks using agent forwarding methods 198 JPJ109 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links 199 JPJ110 Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power 200 201 202 203 204 205 JPJ111 Optimized Software Release Planner JPJ112 Packet monitoring based multicasting system JPJ113 Preventing attackers in WSN from collecting datas JPJ114 Protecting location information in Wireless Sensor Network JPJ115 Puzzle based secure data transmission scheme to avoid intruders JPJ116 Recovery from link failure in wireless networks 206 JPJ117 Reducing the costly forward using band-based directional broadcast 207 JPJ118 Reducing the number of transmission in Wireless Networks

208 JPJ119 Routing in Wireless Adhoc Network 209 JPJ120 Secure and efficient video distribution scheme using variant bandwidth system 210 JPJ121 Secure communication by hiding packets in intermediate router system 211 212 213 214 JPJ122 Secure Content Distribution using Network Coding Algorithm JPJ123 JPJ124 Secured data communication system in wireless mesh networks JPJ125 Selfish overlay network creation and maintenance 215 JPJ126 Single-source shortest path algorithm with nonnegative edge path 216 JPJ127 Supporting data transfer and movements of mobile terminal between different locations 217 JPJ128 Ticket based secured mobile banking scheme for detecting frauds 218 219 JPJ129 Ticket based security system for banking applications JPJ130 Trace back scheme on finding attackers in Routing

220 221 222 JPJ131 Traffic flow analysis system based on a novel concept of flow set JPJ132 Trust aware routing in MANET JPJ133 Trust based Peer-to-Peer System for Secure Data Transmission 223 JPJ134 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service 224 JPJ135 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 225 226 227 228 229 JPJ136 Virus Spread in Network JPJ137 Virus spread in P2P network JPJ138 Automatic Vehicle Detection in Surveillance Video (Image Processing) JPJ139 Data embedding using Pixel-pair matching technique (Image Processing) JPJ140 Digital image processing filters for image filtering methods (Image Processing) 230 JPJ141 Efficient steganography embedding methodology for secret data preservation (Image Processing) 231 JPJ142 Handwritten Chinese Character Recognition (Image Processing) 232 JPJ143 License Plate Recognition System

(Image Processing) 233 234 235 JPJ144 Reducing noises in images (Image Processing) JPJ145 Video steganography for secure data preservation (Image Processing) JPJ146 Visual cryptography system for secret image sharing (Image Processing) 236 JPJ147 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 237 JPJ148 Credit card fraud detection system using genetic algorithm 238 JPJ149 Crime Detection in Credit Card Fraud 239 JPJ150 Criminal Face Detection 240 JPJ151 Decision trees for uncertain data 241 JPJ152 Document clustering 242 JPJ153 Efficient search on XML data 243 JPJ154 Efficient searching technique in xml data 244 JPJ155 Feature Selection based Fast Clustering Algorithm with Minimum Spanning Tree in Medical Data 245 JPJ156 Finding File Duplication 246 JPJ157 High efficient location monitoring system 247 JPJ158 IP based intruder blocking system in cloud computing

248 JPJ159 Monitoring cloud resources for better resource utilization 249 JPJ160 Project Management System 250 JPJ161 Student Management System 251 JPJ162 Automatic Test Packet Generation 252 JPJ163 Efficient Prediction of Difficult Keyword Queries over IMDB Movie Databases 253 JPJ164 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 254 JPJ165 Top-k Query Result Completeness Verification in Tiered Sensor Networks 255 JPJ166 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 256 JPJ167 Bug Report Analysis 257 JPJ168 CAPTCHA based Secure System 258 JPJ169 Context-Based Diversification for Keyword Queries Over XML Data 259 JPJ170 E-Pharmacy 260 JPJ171 Folder Comparer using MD5 Algorithm 261 JPJ172 Person Authentication Using Face Detection 262 JPJ173 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 263 JPJ174 Puzzle Gaming System

More titles will be updated soon. For updated titles and other details visit: www.jpinfotech.org or www.jpinfotech.blogspot.com PROJECT SUPPORT TO REGISTERED STUDENTS: 1) Confirmation Certificate. 2) Abstract Document. 3) Future Enhancement (based on Requirement). 4) Modified Title / Modified Abstract (based on Requirement). 5) Complete Source Code. 6) Final Report / Document (Document consists of basic contents of about Abstract, Bibilography, Conclusion, Implementation, I/P & O/P Design, Introduction, Literature Survey, Organisation Profile, Screen Shots, Software Environment, System Analysis, System Design, System Specification, System Study, System Testing) (The chapter System Design consists of 5 diagrams: Data Flow, Use Case, Sequence, Class, Activity Diagram) 7) Review PPTs and Documents. 8) How to Run execution help file.

9) Software Package (JDK/Netbeans IDE/Eclipse IDE, How to install help file). 10) Attendance Certificate, Project Completion Certificates etc.. OUR OTHER SALIENT FEATURES: Number 1 Project Master in Pondicherry/Puducherry & Chennai. Successfully conducted more than 15 International Conferences in all over South India in the year 2013 & 2014. For the year 2015-2016, we have Signed MoU with 15 Engineering Colleges in all over South India to Conduct International Conferences in year 2015 2016. Published more than 1000 Research Articles of Our Ph.D./M.Phil/ME/M.Tech./BE/B.Tech. Students in Leading International Conferences and International Journals for the year 2014-2015. For the year 2013-2014 Recognized and Awarded from PONDICHERRY UNIVERSITY, Paavai College of Engg, Arjun College of Technology and many leading institutions. For the year 2014-2015 Recognized and Awarded from the following colleges: V.P.Muthaiah Pillai Meenakshi Ammal Engineering College for Women

Muthayammal Arts and Science College Sri Raaja Raajan College of Engineering and Technology Latha Mathavan Engineering College SKR engineering college Dr Pauls Engineering College Jaya Engineering College Jain College of Engineering Recognized and published article about JP INFOTECH and our director in THE HINDU, DINAKARAN and many more newspapers and Media. Leaders with more than 7+ years of experience Guided more than 15,000 students. We assist and guarantee you to publish a paper on your project in INTERNATIONAL JOURNAL PUBLICATIONS / INTERNATIONAL CONFERENCE PUBLICATIONS. We provide REVIEW DOCUMENTS AND PPTS for each review NO FALSE PROMISES 100% Assurance for Project Execution 100% LIVE EXPLANATION VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION (ISO Certification) 100% PLACEMENT SUPPORT Own Projects are also welcomed.

So don t wait any more!!! Join us and be a part of us. Walk-in to our Office OR E- mail us your requirements and Register your projects. For any queries Contact: R.JAYAPRAKASH BE,MBA,M.Tech., (Ph.D.) Managing Director www.jpinfotech.blogspot.com www.jpinfotech.org FOLLOW US ON FACEBOOK @ https://www.facebook.com/jpinfotechresearch MOBILE: (0)9952649690 Chennai Office: JP INFOTECH, Old No.31, New No.86, 1 st Floor, 1 st Avenue, Ashok Pillar, Chennai 83. Landmark: Next to Kotak Mahendra Bank / Bharath Scans. Landline: (044) - 43012642 / Mobile: (0)9952649690 Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry 9. Landmark: Opp. To Thattanchavady Industrial Estate & Next to VVP Nagar Arch. Landline: (0413) - 4300535 / Mobile: (0)8608600246 / (0)9952649690