ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM ...
SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity
On the Real-Time Hardware Implementation Fe...
Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks
Fast Transmission to Remote Cooper...
Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
The Generalization Abili...
Encryption
Adaptive Network Coding for Broadband Wireless Access Networks
Detection and Localization of Multiple Spoofing ...
Upcoming SlideShare
Loading in …5
×

2013 ieee .net project titles

332 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
332
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

2013 ieee .net project titles

  1. 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111 Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com 2013 IEEE PROJECT .NET TITLES DOMAIN: MOBILE COMPUTING Distributed Cooperative Caching in Social Wireless Networks Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Dynamic Coverage of Mobile Sensor Networks NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Quality-Differentiated Video Multicast in Multirate Wireless Networks SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks Evaluating Temporal Robustness of Mobile Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
  2. 2. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks Model-Based Analysis of Wireless System Architectures for Real-Time Applications Network Assisted Mobile Computing with Optimal Uplink Query Processing Capacity of Hybrid Wireless Mesh Networks with Random APs Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation Optimal Content Downloading in Vehicular Networks Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Group-Based Medium Access Control for IEEE 802.11n Wireless LANs Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Analysis of Distance-Based Location Management in Wireless Communication Networks Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery Dynamic Coverage of Mobile Sensor Networks In-Network Estimation with Delay Constraints in Wireless Sensor Networks Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks DOMAIN: WIRELESS NETWORK PROJECTS A Data Fusion Technique for Wireless Ranging Performance Improvement
  3. 3. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks Fast Transmission to Remote Cooperative Groups a New Key Management Paradigm Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling Importance of Coherence Protocols with Network Applications on Multicore Processors Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks Efficient Two-Server Password-Only Authenticated Key Exchange DOMAIN: NETWORK SECURITY PROJECTS Extracting Spread-Spectrum Hidden Data From Digital Media EAACK—A Secure Intrusion-Detection System for MANETs Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing DOMAIN: DATA MINING (Data Engineering) PMSE A Personalized Mobile Search Engine A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Distributed Web Systems Performance Forecasting Using Turning Bands Method Ranking on Data Manifold with Sink Points Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures
  4. 4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse The Generalization Ability of Online Algorithms for Dependent Data AML: Efficient Approximate Membership Localization within a Web-Based Join Framework Finding Rare Classes: Active Learning with Generative and Discriminative Models Optimizing Multi-Top-k Queries over Uncertain Data Streams A System to Filter Unwanted Messages from OSN User Walls Ranking on Data Manifold with Sink Points Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks DOMAIN: CLOUD COMPUTING Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Security and Privacy-Enhancing Multi-cloud Architectures Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds DOMAIN: PARALLEL & DISTRIBUTED COMPUTING Network Traffic Classification Using Correlation Information SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based
  5. 5. Encryption Adaptive Network Coding for Broadband Wireless Access Networks Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision High Performance Resource Allocation Strategies for Computational Economies

×