• HOME
  • IEEE Projects
    • IEEE Projects 2017 Dot Net Projects
    • IEEE Projects 2017 Java Projects
    • IEEE Projects 2016 Dot Net Projects
    • IEEE Projects 2016 Java Projects
    • IEEE Projects 2015
    • IEEE Projects 2014
      • IEEE 2014 Java Projects
        • IEEE Projects 2014 For Cse in Data Mining Java
        • IEEE Projects 2014 For Cse in cloud computing Java
        • IEEE Projects 2014 For Cse in Image Processing Java
        • IEEE Projects 2014 For Cse in Mobile Computing Java
        • IEEE Projects 2014 For Cse in Networking Java
        • IEEE Projects 2014 For Cse in Network Security Java
        • IEEE Projects 2014 For Cse in Software Engineering Java
      • IEEE 2014 Dotnet Projects
        • IEEE Projects 2014 For Cse in Data Mining Dotnet
        • IEEE Projects 2014 For Cse in Cloud Computing Dotnet
        • IEEE Projects 2014 For Cse in Netwoking Dotnet
        • IEEE Projects 2014 For Cse in Netwok Security Dotnet
    • IEEE Projects 2013
      • IEEE 2013 JAVA Projects
      • IEEE 2013 Dotnet Projects
    • IEEE Projects 2012
      • IEEE 2012 JAVA Projects
      • IEEE 2012 Dotnet Projects
    • IEEE Projects 2011
      • IEEE 2011 JAVA Projects
      • IEEE 2011 Dotnet Projects
    • IEEE Projects 2010
  • Power Electronics Projects
    • IEEE Projects 2015 For Power Electronics
    • IEEE Projects 2014 For Power Electronics
    • IEEE 2013 Power Electronics Projects
  • EMBEDDED Projects
    • IEEE Projects 2015 For Embedded Systems
    • IEEE 2013 Embedded Projects
  • Matlab Projects
    • IEEE 2013 Image Processing Projects
    • IEEE 2013 Power Electronics Projects
    • IEEE 2013 Communication Projects
  • NS2 Projects

Phd Projects | IEEE Project | IEEE Projects 2020-19 in Trichy & Chennai

IEEE Projects Trichy, Best IEEE Project Centre Chennai, Final Year Projects in Trichy - We Provide IEEE projects 2018 - 2019 , IEEE 2018 Java Projects for M.E/M.Tech, IEEE 2018 Dot net Projects for B.E/B.Tech, IEEE 2018 Power electronics Projects Engineering & Diploma Students, Matlab, Embedded, NS2 Projects
  • HOME
  • IEEE 2017 DOT NET PROJECT TITLES
  • IEEE 2017 JAVA PROJECT TITLES
  • CONTACT US

TWO-PHASE VALIDATION COMMIT PROTOCOL BASED SECURE CLOUD TRANSACTIONS

November 13, 2014 by IeeeAdmin

Formalize the concept of trusted transactions. Trusted transactions are those transactions that do not violate credential or policy inconsistencies over the lifetime of the transaction. We then present a more general term, safe transactions, that identifies transactions that are both trusted and conform to the ACID properties of distributed database systems. We define several different […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in cloud computing, java ieee projects 2015

SYBIL-RESISTED TRUSTWORTHY SERVICE EVALUATION IN SERVICE-ORIENTED MOBILE SOCIAL NETWORKS

November 13, 2014 by IeeeAdmin

Trustworthy service evaluation (TSE) systems enable service providers or any third trusted authority to receive user feedback, known as service reviews or simply reviews, such as compliments and complaints about their services or products. In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

CONTENT AND QUERYING VALUE BASED DOCUMENT ANNOTATION

November 12, 2014 by IeeeAdmin

Annotations are comments, notes, explanations, or other types of external remarks that can be attached to a Web document or to a selected part of a document. As they are external, it is possible to annotate any Web document independently, without needing to edit the document itself. From a technical point of view, annotations are […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, java ieee projects 2015

SECURE DATA STORAGE USING DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION IN CLOUD

November 10, 2014 by IeeeAdmin

In this proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in cloud computing, java ieee projects 2015

DEFENSE AND DETECTION OF BWDDOS ATTACK

November 8, 2014 by IeeeAdmin

A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in network security, java ieee projects 2015

Detection of Bandwidth Distributed Denial of Service Attacks

November 8, 2014 by IeeeAdmin

BW-DDoS attacks are usually generated from a large  number of compromised computers (zombies or pup-pets).  BW-DDoS attackers use different techniques and  different types of attacking agents. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in network security, java ieee projects 2015

RUNTIME PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUE

November 6, 2014 by IeeeAdmin

Keyword search on semi structured data (e.g., XML) and relational data differs considerably from traditional IR. A discrepancy exists between the data’s physical storage and a logical view of the information. Relational databases are normalized to eliminate redundancy, and foreign keys identify related information. Extending the keyword search paradigm to relational data has been an […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, java ieee projects 2015

BEHAVIORAL MALWARE DETECTION SCHEME TOWARDS GENERAL BEHAVIORAL CHARACTERIZATION IN DELAY TOLERANT NETWORK

November 6, 2014 by IeeeAdmin

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile or intrusive […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in networking, java ieee projects 2015

BALANCING PERFORMANCE, ACCURACY AND PRECISION BASED ON TWO PHASE VALIDATION COMMIT PROTOCOL FOR SECURE CLOUD TRANSACTIONS

November 5, 2014 by IeeeAdmin

Recently the cloud computing paradigm has been receiving significant excitement and attention in the media and blogosphere. To some, cloud computing seems to be little more than a marketing umbrella, encompassing topics such as distributed computing, grid computing, utility computing, and software-as-a-service, that have already received significant research focus and commercial implementation. In this paper, […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in cloud computing, java ieee projects 2015

RUNTIME PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUE

November 4, 2014 by IeeeAdmin

Keyword search on semi structured data (e.g., XML) and relational data differs considerably from traditional IR. A discrepancy exists between the data’s physical storage and a logical view of the information. Relational databases are normalized to eliminate redundancy, and foreign keys identify related information. Extending the keyword search paradigm to relational data has been an […]

Filed Under: ieee projects 2014 Tagged With: Bulk IEEE Projects 2015, IEEE Projects 2015, IEEE Projects 2015 For BE Cse, IEEE Projects 2015 For Cse, ieee projects 2015 for it, IEEE Projects 2015 For MCA, IEEE Projects 2015 For ME Cse, ieee projects 2015 in data mining, java ieee projects 2015

  • « Previous Page
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • Next Page »

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in