amazon

Sunday, November 30, 2014

IEEEE 2014 VLSI COMPLETED PROJECTS-

IEEEE 2014 VLSI COMPLETED PROJECTS-

1              A Super regenerative QPSK Receiver
2              Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced
Encryption Standard
3              Analysis and Design of a Low-Voltage Low-Power Double-Tail Comparator (micro wind)
4           Efficient VLSI Implementation of Neural Networks With HyperbolicTangent Activation
Function
5              Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained
Secure Applications
6              A Method to Extend Orthogonal Latin Square Codes
7              Increase in Read Noise Margin of Single-Bit-Line SRAM Using A diabatic Change of Word Line
Voltage
8              Efficient Integer Dct Architectures For Hevc
9              Precise VLSI Architecture for AI Based 1-D/ 2-D Daub-6 Wavelet Filter Banks With Low Adder-
Count
10           Simplifying Clock Gating Logic by Matching Factored Forms
11           Sensitization Input Vector Impact on Propagation Delay for Nanometer
CMOS ICs: Analysis and Solutions
12           Non binary LDPC Decoder Based on Simplified Enhanced Generalized      Bit-Flipping
Algorithm
13           An Optimized Modified Booth  Recorder for Efficient Design of the Add- Multiply Operator
14           Eliminating Synchronization Latency Using Sequenced Latching
15           Efficient Implementation of Reconfigurable Warped Digital Filters With Variable Low-Pass, High-
Pass, Band pass, and Band stop Responses
16           Novel Circuit-Level Model for Gate Oxide Short and its Testing Method in SRAMs(micro wind)

17           High-Throughput Multi standard Transform Core Supporting MPEG/H.264/VC-1 Using Common
Sharing Distributed Arithmetic
18           Software/Hardware Parallel Long-Period Random Number Generation Framework Based on the
WELL Method
19           Recursive Approach to the Design of a Parallel Self-Timed Adder.
20           Multi-Zone Digital Crosstalk Reduction by Image Processing in 3D Display
21           A Multichannel Oscillator for a Resonant Chemical Sensor System
22           A 5.8-GHz Wideband TSPC Divide-by-16/17. Dual Modulus Prescaler.
23           Fast Sign Detection Algorithm for the RNS Moduli Set {2n+1 − 1, 2n − 1, 2n}
24           Multifunction Residue Architecture for Cryptography
25           Design of Efficient Binary Comparators in Quantum-Dot Cellular Automata
26           Aging-Aware Reliable Multiplier Design With Adaptive Hold Logic
27           Area-Delay Efficient Binary Adders in QCA
28           Area–Delay–Power Efficient Carry Select Adder
29           Low-Complexity Hardware Design for Fast Solving LSPs with Coordinated Polynomial Solution
30           Fast Design Optimization Through Simple Kriging Metamodeling: A Sense Amplifier Case Study
31           Fully Reused VLSI Architecture of. FM0/Manchester Encoding Using SOLS.Technique for DSRC
Applications.
32.         Input Vector Monitoring Concurrent BIST Architecture Using SRAM Cells

IEEE 2014 Power System Completed Projects

IEEE 2014 Power System Completed  Projects 

1. Voltage support control strategies for static synchronous compensators under unbalanced voltage  sags
2. Adaptive pi control for voltage regulation
3. Aiding Power System Support by Means of Voltage Control With Intelligent Distribution Substation
4. Stability Enhancement of DFIG-Based OffshoreWind Farm Fed to a Multi-Machine SystemUsing a STATCOM
5. Transient stability enhancement of power system equippedwith Power System Stabilizer by Static VAR Compensator
6. Power Quality Improvement Using DVR in Power System
7. Comparative Stability Enhancement of PMSG-Based Offshore Wind Farm Fed to an SG-Based Power System Using an SSSC and an SVeC
8. Performance Improvement of Dynamic VoltageRestorer using Proportional - Resonant Controller
9. A New Control Method of Cascaded Brushless Doubly Fed Induction Generators Using Direct Power Control
10. Determination of available transfer capability withimplication of cascading collapse uncertainty
11. DQ-Frame Modeling of an Active Power Filter Integrated with a Grid-Connected, Multifunctional Electric Vehicle Charging Station
12. Residential Distribution System HarmonicCompensation Using PV Interfacing Inverter 


IEEE 2014 POWER ELECTRONICS PROJECTS

1. ANFIS-Based Control of a Grid-Connected Hybrid System Integrating Renewable Energies,
Hydrogen and Batteries
2.An LED Driver with Dynamic High-Frequency Sinusoidal Bus Voltage Regulation for Multistring Applications
3.Aiding Power System Support by Means of Voltage Control With Intelligent Distribution Substation
4.ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based On Li-ion Battery and Solar
Energy Supply
5.A Novel Reduced Switching Loss Bidirectional AC/DC Converter PWM Strategy With Feedforward
Control for Grid-Tied Microgrid Systems
6.Sliding Mode control of DC/DC switching converters for photovoltaic  applications 





IEEE 2014 NS2 COMPLETED PROJECT LIST-

IEEE 2014 NS2 COMPLETED PROJECT  LIST-
1.Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access On the Go
2. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
3. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
4. An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks
5. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
6. Efficient Data Collection for Large-Scale Mobile Monitoring Applications
7. An Alternative Perspective on Utility Maximization in Energy-Harvesting Wireless Sensor Networks
8. Real-Time Implementation of a Harmony Search Algorithm-Based Clustering Protocol for Energy-Efficient Wireless Sensor Networks
9. Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs
10 An Energy-Efficient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks
11 Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks
12 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
13 The Impact of Rate Adaptation on Capacity-Delay Tradeoffs in Mobile Ad Hoc
Networks
14 AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
15 Mobile-Projected Trajectory Algorithm with Velocity-Change Detection for Predicting Residual Link Lifetime in MANET
16 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks

17 STARS: A Statistical Traffic Pattern Discovery System for MANETs

18 Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks

19 Energy-efficient cooperative spectrum sensing schemes for cognitive radio networks

20 Green Cognitive Mobile Networks With Small Cells for Multimedia Communications in the Smart Grid Environment

21 Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
22 NETWRAP: An NDN Based Real-Time Wireless Recharging Framework for Wireless Sensor Networks
23 Scalable and Reconfigurable All-Optical VPN for OFDM-Based Metro-Access Integrated Network
24 Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
25 A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
26 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using
Compressive Sensing
27 Optimal Wavebanding in WDM Ring Networks
28 Maximizing Reliability in WDM Networks Through Lightpath Routing
29 Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks
30 Reliable Cooperative Communications Based on Random Network Coding in
Multi-Hop Relay WSNs
31 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
32 An Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh Networks
33 Green Cognitive Mobile Networks With Small Cells for Multimedia Communications in the Smart Grid Environment

34 TCP CRAHN: A Transport Control Protocol for Cognitive Radio Ad Hoc Networks

Completed IEEE 2014 – 2015 IMAGE PROCESSING PROJECTS




COMPLETED IEEE 2014 – 2015 IMAGE PROCESSING PROJECTS



1. Self-Learning Based Image Decomposition With Applications to Single Image Denoising
2. Categorizing Extent of Tumor Cell Death Response to Cancer Therapy Using Quantitative Ultrasound Spectroscopy and Maximum Mean Discrepancy
3. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
4. LineCast: Line-Based Distributed Coding and Transmission for Broadcasting Satellite Images
5. Segmentation of Skin Lesions From Digital Images Using Joint Statistical Texture Distinctiveness
6. Noise Reduction in Hyperspectral Images through Spectral Unmixing
7. Mining Weakly Labeled Web Facial Images for Search Based Face Annotation
8. An Efficient Hardware Implementation of HOG Feature Extraction for Human Detection
9. Analysis of data hiding using Digital Image Signal Processing
10. Data Hiding in Encrypted H.264AVC Video Streams by Codeword Substitution
11. image tansmissision using wielesss
12. Model-Based Classification Methods Of Global Patterns In Dermoscopic Images
13. On the Choice of the Pair Conjunction-Implication into the Fuzzy Morphological Edge Detector
14. Robust Object Tracking via Sparse Collaborative Appearance Model
15. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
16. Localization Of License Plate Number Using Dynamic Image Processing

17. Low-Order Dominant Harmonic Estimation Using Adaptive Wavelet Neural Network.
18. Robust Text Detection in Natural Scene Images
19. Near-duplicate video retrieval by using pattern-based Prefix tree and temporal relation forest
20. Speech Enhancement for Listeners With Hearing Loss Based on a Model for Vowel Coding in the Auditory Midbrain
21. Neuromorphic Pitch Based Noise Reduction for  Monosyllable Hearing Aid System Application
22. A Rain Pixel Recovery Algorithm for Videos With Highly Dynamic Scenes



Saturday, November 29, 2014

IEEE PROJECT TITLES

IEEE PROJECT ALL DOMAIN

Friday, November 28, 2014

Web Service Recommendation via Exploiting Location and QoS Information

Web Service Recommendation via Exploiting Location and QoS Information

ABSTRACT:
Web services are integrated software components for the support of interoperable machine to machine interaction over a network. Web services have been widely employed for building service-oriented applications in both industry and academia in recent years. The number of publicly available Web services is steadily increasing on the Internet. However, this proliferation makes it hard for a user to select a proper Web service among a large amount of service candidates. An inappropriate service selection may cause many problems (e.g., ill-suited performance) to the resulting applications. In this paper, we propose a novel collaborative filtering-based Web service recommender system to help users select services with optimal Quality-of-Service (QoS) performance. Our recommender system employs the location information and QoS values to cluster users and services, and makes personalized service recommendation for users based on the clustering results. Compared with existing service recommendation methods, our approach achieves considerable improvement on the recommendation accuracy. Comprehensive experiments are conducted involving more than 1.5 million QoS records of real-world Web services to demonstrate the effectiveness of our approach.

EXISTING SYSTEM:
When developing service-oriented applications, developers first design the business process according to requirements, and then try to find and reuse existing services to build the process. Currently, many developers search services through public sites like Google Developers (developers.google.com), Yahoo! Pipes (pipes.yahoo. com), programmable Web (programmableweb.com), etc. However, none of them provide location-based QoS information for users. Such information is quite important for software deployment especially when trade compliance is concerned. Some Web services are only available in EU, thus software employing these services cannot be shipped to other countries. Without knowledge of these things, deployment of service-oriented software can be at great risk.




DISADVANTAGES OF EXISTING SYSTEM:
1. Some developers choose to implement their own services instead of using publicly available ones, which incurs additional overhead in both time and resource.
2. Effective approaches to service selection and recommendation are in an urgent need.

PROPOSED SYSTEM:
This paper investigates personalized QoS value prediction for service users by employing the available past user experiences of Web services from different users. Our approach requires no additional Web service invocations. Based on the predicted QoS values of Web services, personalized QoS-aware Web service recommendations can be produced to help users select the optimal service among the functionally equivalent ones. From a large number of real-world service QoS data collected from different locations, we find that the user-observed Web service QoS performance has strong correlation to the locations of users. Google Transparency Report1 has similar observation on Google services. To enhance the prediction accuracy, we propose a location-aware Web service recommender system (named LoRec), which employs both Web service QoS values and user locations for making personalized QoS prediction.

ADVANTAGES OF PROPOSED SYSTEM:
1.     Improves the recommendation accuracy and time complexity compared with existing service recommendation algorithms.
2.     Comprehensive analysis on the impact of the algorithm parameters is also provided.



SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

Ø System                          :         Pentium IV 2.4 GHz.
Ø Hard Disk                      :         40 GB.
Ø Floppy Drive                 :         1.44 Mb.
Ø Monitor                         :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.


SOFTWARE REQUIREMENTS:

Ø Operating system           :         Windows XP/7.
Ø Coding Language :         JAVA/J2EE
Ø IDE                      :         Netbeans 7.4
Ø Database              :         MYSQL

REFERENCE:

Xi Chen, Zibin Zheng, Qi Yu, and Michael R. Lyu, Web Service Recommendation via Exploiting Location and QoS Information” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 7, JULY 2014

Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks


Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks

ABSTRACT:
Due to the increasing popularity of multimedia streaming applications and services in recent years, the issue of trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. While preserving user privacy, conventional systems have addressed this issue by proposing methods based on the observation of streamed traffic throughout the network. These conventional systems maintain a high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), however, their detection performance substantially degrades owing to the significant variation of video lengths.In this paper, we focus on overcoming this issue by proposing a novel content-leakage detection scheme that is robust to the variation of the video length. By comparing videos of different lengths, we determine a relation between the length of videos to be compared and the similarity between the compared videos. Therefore, we enhance the detection performance of the proposed scheme even in an environment subjected to variation in length of video. Through a testbed experiment, the effectiveness of our proposed scheme is evaluated in terms of variation of video length, delay variation, and packet loss.

EXISTING SYSTEM:
A crucial concern in video streaming services is the protection of the bit stream from unauthorized use, duplica-tion and distribution. One of the most popular approaches to prevent undesirable contents distribution to unauthorized users and/or to protect authors’ copyrights is the digital rights management (DRM) technology. Most DRM techni-ques employ cryptographic or digital watermark techniques.However, this kind of approaches have no significant effect on redistribution of contents, decrypted or restored at the user-side by authorized yet malicious users.

DISADVANTAGES OF EXISTING SYSTEM:
Moreover, redistribution is technically no longer difficult by using peer-to-peer (P2P) streaming software . Hence,streaming traffic may be leaked to P2P networks.

PROPOSED SYSTEM:
In this paper, we focus on the illegal redistribution of streaming content by an authorized user to external networks.The existing proposals monitor information obtained at different nodes in the middle of the streaming path. The retrieved information are used to generate traffic patterns which appear as unique waveform per content, just like a fingerprint.

ADVANTAGES OF PROPOSED SYSTEM:
ü  These technologies enhance the distribution of any type of information over the Internet .
ü  The traffic pattern generation process performed in conventional methods.


SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

Ø System                          :         Pentium IV 2.4 GHz.
Ø Hard Disk                      :         40 GB.
Ø Floppy Drive                 :         1.44 Mb.
Ø Monitor                         :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.


SOFTWARE REQUIREMENTS:

Ø Operating system           :         Windows XP/7.
Ø Coding Language :         JAVA/J2EE
Ø IDE                      :         Netbeans 7.4
Ø Database              :         MYSQL

REFERENCE:

Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, and Nei Kato “Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 2,FEBRUARY 2014.