IEEE projects 2014 – 2015, IEEE 2014 – 2013 projects, IEEE Software, java IEEE 2014, 2014 Dot net, Matlab, Embedded, Power electronics, NS2 Projects and Final year Projects.

Bulk ieee projects 2014 – 2015 ieee projects, ieee 2014 – 2013, ieee Projects 2014 for CSE, IT, MCA, EEE, ECE, NS2, java, dot net, Matlab, ieee 2014 Power Electronics, ieee 2014 Embedded Projects, Latest ieee Projects Titles, IEEE 2014 project title list in trichy, chennai, madurai

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter

Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “”.  [ Read More ]

Categories: ieee projects 2013

ONLINE Social Networks (OSNs) are today one of the most popular interactive medium to communicate, share, and disseminate a considerable amount of human life information. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. According to Facebook statistics1 average user creates 90 pieces of  [ Read More ]

This paper proposes a DPMFP method for document clustering. This paper attempt to group documents into an optimal number of clusters while the number of clusters K is discovered automatically. Develop a Dirichlet Process Mixture (DPM) model to partition documents. There are two algorithms to infer DPM parameters, in particular, the variational inference algorithm and  [ Read More ]

THE processing and storage capabilities of mobile consumer devices are becoming increasingly powerful. A gamut of new mobile applications has thus emerged for providing a better quality of experience for the end users. A class of such applications commonly referred to as mobile augmented reality includes ones that enable delivery of content in response to  [ Read More ]

Categories: ieee projects 2013

The rapid development of the software industry, software companies are now facing a highly competitive market. To succeed, companies have to make efficient project plans to reduce the cost of software construction It is in medium to large-scale projects, the problem of project planning is very complex and challenging. For scheduling and staffing management, similarly  [ Read More ]

This paper considers the notion of identifying subsets of critical data instances in data sets. Critical nuggets of information can take the following form during classification tasks: small subsets of data instances that lie very close to the class boundary and are sensitive to small changes in attribute values, such that these small changes result  [ Read More ]

In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and  [ Read More ]

Categories: ieee projects 2013

We proposed, in this work, a scalable key management scheme which ensures a good secure coverage of large scale WSN with a low key storage overhead and a good network resiliency.One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes  [ Read More ]

Categories: ieee projects 2013

In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in  [ Read More ]

Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees. In this paper, we address the problem of private data publishing, where different attributes for the same set of individuals are held by two parties. In  [ Read More ]

Categories: ieee projects 2013

Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related  [ Read More ]

In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality  [ Read More ]

Popular Posts

Analysis and Impleme

This paper describes the conception and analysis of a unidirectional ...


We proposed, in this work, a scalable key management scheme ...

Sequential Clusterin

We presented sequential clustering algorithms for anonymizing social networks. Those ...

Optimal Multiserver

As cloud computing becomes more and more popular, understanding the ...


In this paper, we address the problem of private data ...