• HOME
  • IEEE Projects
    • IEEE Projects 2017 Dot Net Projects
    • IEEE Projects 2017 Java Projects
    • IEEE Projects 2016 Dot Net Projects
    • IEEE Projects 2016 Java Projects
    • IEEE Projects 2015
    • IEEE Projects 2014
      • IEEE 2014 Java Projects
        • IEEE Projects 2014 For Cse in Data Mining Java
        • IEEE Projects 2014 For Cse in cloud computing Java
        • IEEE Projects 2014 For Cse in Image Processing Java
        • IEEE Projects 2014 For Cse in Mobile Computing Java
        • IEEE Projects 2014 For Cse in Networking Java
        • IEEE Projects 2014 For Cse in Network Security Java
        • IEEE Projects 2014 For Cse in Software Engineering Java
      • IEEE 2014 Dotnet Projects
        • IEEE Projects 2014 For Cse in Data Mining Dotnet
        • IEEE Projects 2014 For Cse in Cloud Computing Dotnet
        • IEEE Projects 2014 For Cse in Netwoking Dotnet
        • IEEE Projects 2014 For Cse in Netwok Security Dotnet
    • IEEE Projects 2013
      • IEEE 2013 JAVA Projects
      • IEEE 2013 Dotnet Projects
    • IEEE Projects 2012
      • IEEE 2012 JAVA Projects
      • IEEE 2012 Dotnet Projects
    • IEEE Projects 2011
      • IEEE 2011 JAVA Projects
      • IEEE 2011 Dotnet Projects
    • IEEE Projects 2010
  • Power Electronics Projects
    • IEEE Projects 2015 For Power Electronics
    • IEEE Projects 2014 For Power Electronics
    • IEEE 2013 Power Electronics Projects
  • EMBEDDED Projects
    • IEEE Projects 2015 For Embedded Systems
    • IEEE 2013 Embedded Projects
  • Matlab Projects
    • IEEE 2013 Image Processing Projects
    • IEEE 2013 Power Electronics Projects
    • IEEE 2013 Communication Projects
  • NS2 Projects

Phd Projects | IEEE Project | IEEE Projects 2020-19 in Trichy & Chennai

IEEE Projects Trichy, Best IEEE Project Centre Chennai, Final Year Projects in Trichy - We Provide IEEE projects 2018 - 2019 , IEEE 2018 Java Projects for M.E/M.Tech, IEEE 2018 Dot net Projects for B.E/B.Tech, IEEE 2018 Power electronics Projects Engineering & Diploma Students, Matlab, Embedded, NS2 Projects
  • HOME
  • IEEE 2017 DOT NET PROJECT TITLES
  • IEEE 2017 JAVA PROJECT TITLES
  • CONTACT US

QOD Routing Protocols for hybrid Networks

July 17, 2014 by IeeeAdmin

In this paper, we propose a QoS-Oriented Distributed routing protocol (QOD). Usually, a hybrid network has widespread base stations. The data transmission in hybrid networks has two features. First, an AP can be a source or a destination to any mobile node. Second, the number of transmission hops between a mobile node and an AP […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, ieee projects for mtech cse 2015

PRIVACY IN DATA PUBLICATION OF SOCIAL NETWORKS

July 16, 2014 by IeeeAdmin

The first necessary anonymization technique in both the contexts of micro- and network data consists in removing identification. This nave technique has quickly been recognized as failing to protect privacy. For microdata, Sweeney et al. propose k-anonymity to circumvent possible identity disclosure in naively anonymized microdata. `-diversity is proposed in order to further prevent attribute […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

THE L SENSITIVE LABEL DIVERSITY REQUIREMENT

July 15, 2014 by IeeeAdmin

The publication of social network data entails a privacy threat for their users. Sensitive information about users of the social networks should be protected. The challenge is to devise methods to publish social network data in a form that affords utility without compromising privacy. Previous research has pro- posed various privacy models with the corresponding […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

A secure multiparty protocol for computing the OR of private binary vectors

July 13, 2014 by IeeeAdmin

The problem of secure mining of association rules in horizontally partitioned databases. In that setting, there are several sites (or players) that hold homogeneous databases, i.e., databases that share the same schema but hold information on different entities. The goal is to find all association rules with support at least s and confidence at least […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

A SCALABLE SENTENCE SCORING METHOD

July 7, 2014 by IeeeAdmin

Ranking has abundant applications in information retrieval (IR), data mining, and natural language processing. In many real scenarios, the ranking problem is defined as follows. Given a group of data objects, a ranking model (function) sorts the objects in the group according to their degrees of relevance, importance, or preferences. For example, in IR, the […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

Privacy Preserving Mining of frequent patterns

July 4, 2014 by IeeeAdmin

In this paper, our goal is to devise an encryption scheme which enables formal privacy guarantees to be proved, and to validate this model over large-scale, real-life transaction databases. The client/owner encrypts its data using an encrypt/decrypt (E/D) module, which can be essentially treated as a “black box” from its perspective. While the details of […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

ENCRYPTION/DECRYPTION SCHEME

July 3, 2014 by IeeeAdmin

In this paper, we study the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework. A substantial body of work has been done on privacy-preserving data mining in a variety of contexts. A common characteristic of most of the previously studied frameworks is that the patterns mined from the data (which […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

THE NON COOPERATIVE COMPUTATION (NCC) MODEL

June 27, 2014 by IeeeAdmin

Privacy and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For credit card companies to build […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

A Database Aggregate Privacy Guarantee

June 26, 2014 by IeeeAdmin

It is often the case that the data published by an organization or company are too detailed to expect attackers to have accurate partial knowledge. Still, an attacker might have some aggregate or abstract knowledge of a record. Examples like this often arise in practice. For example IMIS is currently involved in anonymizing tax related […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

A TRADITIONAL NAIVE BAYES CLASSIFIER

June 25, 2014 by IeeeAdmin

In this paper, we touch on many areas of research that have been heavily studied. The area of privacy inside a social network encompasses a large breadth, based on how privacy is defined. In authors consider an attack against an anonymized network. In their model, the network consists of only nodes and edges. Trait details […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, ieee projects for mtech cse 2015

  • « Previous Page
  • 1
  • …
  • 17
  • 18
  • 19
  • 20
  • 21
  • Next Page »

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in