• HOME
  • IEEE Projects
    • IEEE Projects 2017 Dot Net Projects
    • IEEE Projects 2017 Java Projects
    • IEEE Projects 2016 Dot Net Projects
    • IEEE Projects 2016 Java Projects
    • IEEE Projects 2015
    • IEEE Projects 2014
      • IEEE 2014 Java Projects
        • IEEE Projects 2014 For Cse in Data Mining Java
        • IEEE Projects 2014 For Cse in cloud computing Java
        • IEEE Projects 2014 For Cse in Image Processing Java
        • IEEE Projects 2014 For Cse in Mobile Computing Java
        • IEEE Projects 2014 For Cse in Networking Java
        • IEEE Projects 2014 For Cse in Network Security Java
        • IEEE Projects 2014 For Cse in Software Engineering Java
      • IEEE 2014 Dotnet Projects
        • IEEE Projects 2014 For Cse in Data Mining Dotnet
        • IEEE Projects 2014 For Cse in Cloud Computing Dotnet
        • IEEE Projects 2014 For Cse in Netwoking Dotnet
        • IEEE Projects 2014 For Cse in Netwok Security Dotnet
    • IEEE Projects 2013
      • IEEE 2013 JAVA Projects
      • IEEE 2013 Dotnet Projects
    • IEEE Projects 2012
      • IEEE 2012 JAVA Projects
      • IEEE 2012 Dotnet Projects
    • IEEE Projects 2011
      • IEEE 2011 JAVA Projects
      • IEEE 2011 Dotnet Projects
    • IEEE Projects 2010
  • Power Electronics Projects
    • IEEE Projects 2015 For Power Electronics
    • IEEE Projects 2014 For Power Electronics
    • IEEE 2013 Power Electronics Projects
  • EMBEDDED Projects
    • IEEE Projects 2015 For Embedded Systems
    • IEEE 2013 Embedded Projects
  • Matlab Projects
    • IEEE 2013 Image Processing Projects
    • IEEE 2013 Power Electronics Projects
    • IEEE 2013 Communication Projects
  • NS2 Projects

Phd Projects | IEEE Project | IEEE Projects 2020-19 in Trichy & Chennai

IEEE Projects Trichy, Best IEEE Project Centre Chennai, Final Year Projects in Trichy - We Provide IEEE projects 2018 - 2019 , IEEE 2018 Java Projects for M.E/M.Tech, IEEE 2018 Dot net Projects for B.E/B.Tech, IEEE 2018 Power electronics Projects Engineering & Diploma Students, Matlab, Embedded, NS2 Projects
  • HOME
  • IEEE 2017 DOT NET PROJECT TITLES
  • IEEE 2017 JAVA PROJECT TITLES
  • CONTACT US

DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS WITH SECURE DATA RETRIEVAL SCHEME USING CP-ABE

December 9, 2014 by IeeeAdmin

Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow nodes to communicate with each other in these extreme networking environments. Typically, when there is no end-to-end connection between a source and a destination pair, the messages from the source node may need to wait in the intermediate nodes for a substantial amount of time […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

WIRELESS AD HOC NETWORKS WITH A NOVEL NCAC-MAC PROTOCOL

December 8, 2014 by IeeeAdmin

Network coding is an interesting technique which can provide throughput improvements and a high degree of robustness in packet networks. Network coding is a networking technique in which transmitted data is encoded and decoded to increase network throughput, reduce delays and make the network more robust. Cooperative communication, which utilizes neighboring nodes to relay the […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

INCREASE THROUGHPUT AND REDUCE DELAY IN WIRELESS AD HOC NETWORKS USING NCAC-MAC PROTOCOL

December 4, 2014 by IeeeAdmin

The broadcast nature of the wireless medium (the so-called wireless broadcast advantage) is exploited in cooperative fashion. The wireless transmission between a transmitter-receiver pair can be received and processed at neighboring nodes for performance gain, rather than be considered as the interference traditionally. Network coding, which combines several packets together for transmission, is very helpful […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

MEASURING THE RISK OF UNKNOWN VULNERABILITIES USING K-ZERO DAY SAFETY NETWORK SECURITY METRICS

November 25, 2014 by IeeeAdmin

we propose a novel network security metric, k-zero day safety, to address this issue. Roughly speaking, instead of attempting to measure which un-known vulnerabilities are more likely to exist, we start with the worst case assumption that this is not measurable. Our metric then simply counts how many zero-day vulnerabilities are required to compromise a […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in network security, java ieee projects 2015

PREDICTIVE ACK BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM

November 24, 2014 by IeeeAdmin

Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, there-fore, to significantly reduce the network cost. In most common TRE solutions, both the sender […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

MULTILEVEL INTER- RELATIONSHIP GRAPH FOR KEYWORD QUERY ROUTING

November 22, 2014 by IeeeAdmin

Conventional keyword search engines are restricted to a given data model and cannot easily adapt to unstructured, semi-structured or structured data. Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, java ieee projects 2015

KEYWORD QUERY ROUTING FOR KEYWORD SEARCH OVER A LINKED DATA SOURCES

November 20, 2014 by IeeeAdmin

This abstract proposed to identify data sources that contain results to a keyword query. The goal is to produce routing plans, which can be used to compute results from multiple sources. Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, java ieee projects 2015

DEFENSE AND DETECTION OF BWDDOS ATTACK

November 18, 2014 by IeeeAdmin

A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in network security, java ieee projects 2015

LOCATION-BASED SEARCH QUERIES USING EXPLOITING SERVICE SIMILARITY FOR PRIVACY PRESERVING

November 17, 2014 by IeeeAdmin

LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine (a.k.a. ATM) or the whereabouts of a friend or employee. LBS include parcel tracking and vehicle tracking services. LBS can include mobile commerce when taking the form of coupons or advertising directed at customers based […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

SERVICE SIMILARITY EXPLOITING IN LBS QUERIES FOR PRIVACY

November 15, 2014 by IeeeAdmin

Location-based services (LBS) are a general class of computer program-level services that use location data to control features. As such LBS is an information service and has a number of uses in social networking today as an entertainment service, which is accessible with mobile devices through the mobile network and which uses information on the […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

  • « Previous Page
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 17
  • Next Page »

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in