IEEE PROJECTS

CloudTPS: Scalable Transactions for Web Applications in the Cloud

CloudTPS: Scalable Transactions for Web Applications in the Cloud Technology Used: Dot Net NoSQL Cloud data stores...

Toward Privacy-Assured and Searchable Cloud Data Storage Services

Toward Privacy-Assured and Searchable Cloud Data Storage Services  Technology Used: Java Cloud computing is envisioned as the...

Security and Privacy-Enhancing Multicloud Architectures

Security and Privacy-Enhancing Multicloud Architectures DEPENDABLE AND SECURE COMPUTING, JULY/AUGUST 2013 Technology Used: Java/J2EE Security challenges are...

CloudMOV: Cloud-based mobile social TV

CloudMOV: cloud-based mobile social TV Technology Used: Java/J2EE The rapidly increasing power of personal mobile devices is...

ieee projects

ieee projects 2014-2015,ieee projects 2013-2014,ieee projects,ieee projects 2013,ieee projects 2014,ieee project,ns2 projects,ieee projects in chennai,ieee projects at chennai,ieee projects titles,ns2 project,ieee projects demo,ieee projects,ieee projects 2013,ieee projects 2014,ieee project 2014,ieee project 2013,ieee project in chennai,ieee projects at chennai,ieee projects titles,ns2 ieee projects,ns2 projects,ns2 project,ieee projects demo

ieee projects contact us

ieee projects contact us

ieee projects,ieee projects 2013,ieee project 2013,ieee project in chennai,ieee projects titles,ns2 ieee projects,ns2 projects,ns2 project,ieee projects demo
 

We are offering final year projects in java, dotnet, Ns2

ADDRESS

Data Alcott Systems

Old No.13/1, New No.27, Second Floor

Brindavan Street

West Mambalam

Chennai -600033
contact Email: ieeedata@gmail.com
Mobile No: (0)96000 95046/47
 

 

 

Name
Email
Mobile
Technology
College Name
Department
Degree
Comments
January 3, 2014 | No comment | Read More »

CloudTPS: Scalable Transactions for Web Applications in the Cloud

CloudTPS: Scalable Transactions for Web Applications in the Cloud

CloudTPS: Scalable Transactions for Web Applications in the Cloud

Technology Used: Dot Net

NoSQL Cloud data stores provide scalability and high availability properties for web applications, but at the same time they sacrifice data consistency. However, many applications cannot afford any data inconsistency. CloudTPS is a scalable transaction manager which guarantees full ACID properties for multi-item transactions issued by Web applications, even in the presence of server failures and network partitions. We implement this approach on top of the two main families of scalable

December 17, 2013 | 1 comment | Read More »

Toward Privacy-Assured and Searchable Cloud Data Storage Services

Toward Privacy-Assured and Searchable Cloud Data Storage Services

Toward Privacy-Assured and Searchable Cloud Data Storage Services

 Technology Used: Java

Cloud computing is envisioned as the next generation architecture of IT enterprises, providing convenient remote access to massively scalable data storage and application services. While this outsourced storage and computing paradigm can potentially bring great economical savings for data owners and users, its benefits may not be fully realized due to wide concerns of data owners that their private data may be involuntarily exposed or handled by cloud providers. Although end-to-end encryption techniques have been proposed as promising …

November 12, 2013 | No comment | Read More »

Security and Privacy-Enhancing Multicloud Architectures

Security and Privacy-Enhancing Multicloud Architectures

Security and Privacy-Enhancing Multicloud Architectures

DEPENDABLE AND SECURE COMPUTING, JULY/AUGUST 2013

Technology Used: Java/J2EE

Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures. This paper provides a survey on the

October 26, 2013 | No comment | Read More »

CloudMOV: Cloud-based mobile social TV

CloudMOV: Cloud-based mobile social TV

CloudMOV: cloud-based mobile social TV

Technology Used: Java/J2EE

The rapidly increasing power of personal mobile devices is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by mobile users not feasible. The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal

October 26, 2013 | No comment | Read More »

An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks

An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks

Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure. Autonomous addressing protocols require a distributed and self-managed mechanism to avoid address collisions in a dynamic network with fading channels, frequent partitions, and joining/leaving nodes. The proposed work analyze a lightweight protocol that configures mobile ad hoc nodes based on a distributed address database stored in filters that reduces the control load and makes the proposal robust to packet losses and network partitions. The performance of protocol is evaluated

March 12, 2014 | No comment | Read More »

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

IEEE 2013 Transaction, Parallel and Distributed Systems, Jan 2013

Technology Used: Java/J2EE

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as

August 8, 2013 | 1 comment | Read More »

sdp

sdp

sdp

 

May 4, 2013 | No comment | Read More »

A Trust-Based Geographical Routing Scheme in WSN

A Trust-Based Geographical Routing Scheme in WSN

A Trust-Based Geographical Routing Scheme in WSN

 

May 1, 2013 | No comment | Read More »

sdp

sdp

sdp

 

May 4, 2013 | No comment | Read More »

Integration of Sound Signature in Graphical Password Authentication System

Integration of Sound Signature in Graphical Password Authentication System

Integration of Sound Signature in Graphical Password Authentication System

 

May 4, 2013 | 2 comments | Read More »

A Trust-Based Geographical Routing Scheme in WSN

A Trust-Based Geographical Routing Scheme in WSN

A Trust-Based Geographical Routing Scheme in WSN

 

May 1, 2013 | No comment | Read More »

Cooperative Download in Vehicular Environments

Cooperative Download in Vehicular Environments

Cooperative Download in Vehicular Environments

 

April 26, 2013 | No comment | Read More »

IEEE PROJECTS 2013

Bandwidth Distributed Denial of Service: Attacks and Defenses

Bandwidth Distributed Denial of Service: Attacks and Defenses

Bandwidth Distributed Denial of Service: Attacks and Defenses Technology Used : Java Distributed denial of service (DDoS) attacks pose a serious...

Jan 4, 2014 | No comment | Read More »
Toward trustworthy coordination of web services business activities

Toward trustworthy coordination of web services business activities

Toward trustworthy coordination of web services business activities To present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used...

Dec 12, 2013 | No comment | Read More »
Bandwidth distributed denial of service: attacks and defenses

Bandwidth distributed denial of service: attacks and defenses

Bandwidth distributed denial of service: attacks and defenses Distributed denial of service (DDoS) attacks pose a serious threat to the Internet....

Dec 12, 2013 | No comment | Read More »
Privacy Preserving Data Sharing With Anonymous ID Assignment

Privacy Preserving Data Sharing With Anonymous ID Assignment

Privacy Preserving Data Sharing With Anonymous ID Assignment INFORMATION FORENSICS AND SECURITY, FEBRUARY 2013 An algorithm for anonymous sharing of private...

Nov 22, 2013 | No comment | Read More »
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Technology Used: Dot Net Given the sensitivity of the potential WSN...

Nov 21, 2013 | No comment | Read More »
Cross-domain privacy-preserving cooperative firewall optimization

Cross-domain privacy-preserving cooperative firewall optimization

Cross-domain privacy-preserving cooperative firewall optimization Technology Used: Java Firewalls have been widely deployed on the Internet for securing private networks. A...

Oct 26, 2013 | 3 comments | Read More »
Bidirectional Multi-Constrained Routing Algorithms

Bidirectional Multi-Constrained Routing Algorithms

Bidirectional Multi-Constrained Routing Algorithms Technology Used: Java QoS routing plays a critical role in providing QoS support in the Internet. Most...

Oct 26, 2013 | No comment | Read More »
Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes INFORMATION FORENSICS AND SECURITY, JANUARY 2013 Technology Used:...

Oct 26, 2013 | No comment | Read More »
Extracting spread-spectrum hidden data from digital media

Extracting spread-spectrum hidden data from digital media

Extracting spread-spectrum hidden data from digital media Technology Used: Dot Net The problem of extracting blindly data embedded over a wide...

Oct 26, 2013 | No comment | Read More »
A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search

A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search

A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search Technology Used: Java/J2EE Location-based service (LBS) is...

Oct 26, 2013 | No comment | Read More »
Redundancy Management of Multipath Routing forIntrusion Tolerance in Heterogeneous Wireless Sensor Networks

Redundancy Management of Multipath Routing forIntrusion Tolerance in Heterogeneous Wireless Sensor Networks

In this paper we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in...

Oct 26, 2013 | No comment | Read More »
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Jul/Aug 2013 Cloud security is one of most important issues...

Aug 8, 2013 | No comment | Read More »
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data Jul / Aug 2013 Cloud computing has emerging as a promising pattern...

Aug 8, 2013 | No comment | Read More »
Design and Implementation of TARF_ A Trust-Aware Routing Framework for WSNs-java

Design and Implementation of TARF_ A Trust-Aware Routing Framework for WSNs-java

Design and Implementation of TARF_ A Trust-Aware Routing Framework for WSNs-java  ...

Mar 16, 2013 | No comment | Read More »
Expert Discovery and Interactions in Mixed Service Oriented Systems

Expert Discovery and Interactions in Mixed Service Oriented Systems

Expert Discovery and Interactions in Mixed Service Oriented Systems   ...

Feb 20, 2013 | No comment | Read More »

MOBILE COMPUTING

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks MOBILE COMPUTING, FEBRUARY 2013...

Nov 16, 2013 | 3 comments | Read More »

Distributed resource allocation for multi-cell relay-aided OFDMA systems

Distributed resource allocation for multi-cell relay-aided OFDMA systems Technology Used: Java An efficient resource allocation...

Oct 26, 2013 | No comment | Read More »

Optimal content downloading in vehicular networks

Optimal content downloading in vehicular networks Consider a system where users aboard communication-enabled vehicles are...

Oct 24, 2013 | No comment | Read More »

Optimal Multicast Capacity and Delay Tradeoffs in MANETs

Optimal Multicast Capacity and Delay Tradeoffs in MANETs Feb 2013 IEEE 2013, Transaction, Mobile Computing...

Aug 8, 2013 | No comment | Read More »

Network-Assisted Mobile Computing with Optimal Uplink Query Processing

Network-Assisted Mobile Computing with Optimal Uplink Query Processing June 2013 Many mobile applications retrieve content...

Aug 8, 2013 | No comment | Read More »

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper  ...

Mar 16, 2013 | No comment | Read More »

Network Assisted Mobile Computing with Optimal Uplink Query Processing

Network Assisted Mobile Computing with Optimal Uplink Query Processing  ...

Mar 15, 2013 | No comment | Read More »

Towards Accurate Mobile Sensor Network Localization in Noisy Environments

Towards Accurate Mobile Sensor Network Localization in Noisy Environments  ...

Mar 4, 2013 | 1 comment | Read More »

A Trigger Identification Service for Defending Reactive Jammers in WSN

A Trigger Identification Service for Defending Reactive Jammers in WSN...

Feb 20, 2013 | No comment | Read More »

Low Power Consumption Solutions for Mobile Instant Messaging

Low Power Consumption Solutions for Mobile Instant Messaging...

Feb 20, 2013 | No comment | Read More »

Avoiding the rush hours wifi energy management via traffic isolation

Avoiding the rush hours wifi energy management via traffic isolation  ...

Feb 20, 2013 | No comment | Read More »

Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

Joint Relay and Jammer Selection for Secure  Two-Way Relay Networks  ...

Feb 20, 2013 | No comment | Read More »

Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms

Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms  ...

Feb 20, 2013 | 1 comment | Read More »

Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video Streaming

Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video...

Feb 20, 2013 | 1 comment | Read More »

Fast Data Collection in Tree-Based Wireless Sensor Networks

Fast Data Collection in Tree-Based Wireless Sensor Networks...

Feb 20, 2013 | 1 comment | Read More »