SlideShare a Scribd company logo
1 of 11
2013 IEEE JAVA DOTNET PROJECT
TITLES
DOMAIN: WIRELESS NETWORK PROJECTS
1. A Data Fusion Technique for Wireless Ranging Performance
Improvement
2. Harvesting-Aware Energy Management for Time-Critical Wireless
Sensor Networks With Joint Voltage and Modulation Scaling
3. Importance of Coherence Protocols with Network Applications on
Multicore Processors
4. Jamming Games in the MIMO Wiretap Channel With an Active
Eavesdropper
5. Channel Allocation and Routing in Hybrid Multichannel Multiradio
Wireless Mesh Networks
6. Modeling and Optimizing the Performance- Security Tradeoff on D-
NCS Using the Coevolutionary Paradigm
7. Localization-Based Radio Model Calibration for Fault-Tolerant
Wireless Mesh Networks
DOMAIN: MOBILE COMPUTING
1. Capacity of Hybrid Wireless Mesh Networks with Random APs
2. Power Allocation for Statistical QoS Provisioning in Opportunistic
Multi-Relay DF Cognitive Networks
3. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-
Interference Cancellation
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
4. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event
Sensing
5. Quality-Differentiated Video Multicast in Multirate Wireless
Networks
6. Evaluating Temporal Robustness of Mobile Networks Rs.4000/-
7. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor
Networks
8. Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
9. A Resource Allocation Scheme for Scalable Video Multicast in
WiMAX Relay Networks
10.Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
11.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’
Heterogeneity
12.An Investigation on LTE Mobility Management
13.On Exploiting Transient Social Contact Patterns for Data
Forwarding in Delay-Tolerant Networks
14.On the Real-Time Hardware Implementation Feasibility of Joint
Radio Resource Management Policies for Heterogeneous Wireless
Networks
15.Simple Hybrid and Incremental Postpruning Techniques for Rule
Induction Supporting Search-As-You-Type Using SQL in Databases
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
16.Reinforced Similarity Integration in Image-Rich Information
Networks
17.Autonomous Sensing Order Selection Strategies Exploiting Channel
Access Information
18.Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
19.Toward a Statistical Framework for Source Anonymity in Sensor
Networks
20.On Centralized and Localized Approximation Algorithms for
Interference-Aware Broadcast Scheduling
21.Model-Based Analysis of Wireless System Architectures for Real-
Time Applications
22.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
23.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
24.Group-Based Medium Access Control for IEEE 802.11n Wireless
LANs
25.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
26.A Secure Payment Scheme with Low Communication and Processing
overhead for Multihop Wireless Networks
27.A Scalable Server Architecture for Mobile Presence Services in Social
Network Applications
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
28.Secure Communication Based on Ambient Audio
29.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
30.Cross-Layer Design of Congestion Control and Power Control in
Fast-Fading Wireless Networks
31.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body
Area Networks
32.Cluster-Based Certificate Revocation with Vindication Capability for
Mobile Ad Hoc Networks
33.Analysis of Distance-Based Location Management in Wireless
Communication Networks
34.Gaussian versus Uniform Distribution for Intrusion Detection in
Wireless Sensor Networks
35.Fast Channel Zapping with Destination-Oriented Multicast for IP
Video Delivery
36.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
37.Dynamic Coverage of Mobile Sensor Networks
38.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks
39.Microarchitecture of a Coarse-Grain Out-of-Order Superscalar
Processor
40.Jamming Games in the MIMO Wiretap Channel With an Active
Eaves dropper
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
41.IDM: An Indirect Dissemination Mechanism for Spatial Voice
Interaction in Networked Virtual Environments
42.EMAP Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
43.Channel Assignment for Throughput Optimization in Multichannel
Multiradio Wireless Mesh Networks Using Network Coding
44.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm
for Scalable Video Transmission Over Link-adaptive Networks
DOMAIN: NETWORK SECURITY PROJECTS
1. Distance Bounding A Practical Security Solution for Real-Time
Location Systems
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
DOMAIN: DATA MINING (Data Engineering)
1. Ontology Matching: State of the Art and Future Challenges
2. A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
3. A System to Filter Unwanted Messages from OSN User Walls
4. A Survey of XML Tree Patterns
5. Automatic Semantic Content Extraction in Videos Using a Fuzzy
Ontology and Rule-Based Model
6. Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
7. Distributed Web Systems Performance Forecasting Using Turning
Bands Method
8. Evaluating Data Reliability An Evidential Answer with Application to
a Web-Enabled Data Warehouse
9. Maximum Likelihood Estimation from Uncertain Data in the Belief
Function Framework
10.Ranking on Data Manifold with Sink Points
11.Region-Based Foldings in Process Discovery
12.Relationships between Diversity of Classification Ensembles and
Single-Class Performance Measures
13.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence
14.The Generalization Ability of Online Algorithms for Dependent Data
15.Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
16.A Graph-Based Consensus Maximization Approach for Combining
Multiple Supervised and Unsupervised Models
17.Large Graph Analysis in the GMine System
18.Nonadaptive Mastermind Algorithms for String and Vector
Databases, with Case Studies
19.A Rough-Set-Based Incremental Approach for Updating
Approximations under Dynamic Maintenance Environments
20.A Proxy-Based Approach to Continuous Location-Based Spatial
Queries in Mobile Environments
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
21.A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
22.AML: Efficient Approximate Membership Localization within a
Web-Based Join Framework
23.Event Tracking for Real-Time Unaware Sensitivity Analysis
24.Detecting Intrinsic Loops Underlying Data Manifold
25.Clustering Large Probabilistic Graphs
26.Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
27.Minimally Supervised Novel Relation Extraction Using a Latent
Relational Mapping
28.Finding Rare Classes: Active Learning with Generative and
Discriminative Models
29.Fast Activity Detection: Indexing for Temporal Stochastic
Automaton-Based Activity Models
DOMAIN: CLOUD COMPUTING
1. QoS Ranking Prediction for Cloud Services
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute- Based Encryption
3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud On Data Staging Algorithms for Shared Data Accesses in
Clouds
4. Optimal Multiserver Configuration for Profit Maximization in Cloud
Computing
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
DOMAIN: PARALLEL & DISTRIBUTED COMPUTING
1. Network Traffic Classification Using Correlation Information
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute- Based Encryption
3. Adaptive Network Coding for Broadband Wireless Access Networks
4. Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks
5. Online Real-Time Task Scheduling in Heterogeneous Multicore
System-on-a-Chip
6. MIN-MAX: A Counter-Based Algorithm for Regular Expression
Matching
7. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
8. Covering Points of Interest with Mobile Sensors
9. Topology Abstraction Service for IP-VPNs
10.Thermal and Energy Management of High-Performance Multicores:
Distributed and Self-Calibrating Model-Predictive Controller
11.High Performance Resource Allocation Strategies for Computational
Economies
12.Strategies for Energy-Efficient Resource Management of Hybrid
Programming Models
DOMAIN: MULTIMEDIA & IMAGE PROCESSING
1. Mining Semantic Context Information for Intelligent Video
Surveillance of Traffic Scenes
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
2. An Access Point-Based FEC Mechanism for Video Transmission
Over Wireless LANs
3. Interactive Segmentation for Change Detection in Multispectral
Remote-Sensing Images
4. Reversible Data Hiding With Optimal Value Transfer
5. Query-Adaptive Image Search With Hash Codes
6. Reversible Watermarking Based on Invariant Image Classification
and Dynamic Histogram Shifting
7. Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage
8. LDFT-Based Watermarking Resilient to Local Desynchronization
Attacks
9. Image Size Invariant Visual Cryptography for General Access
Structures Subject to Display Quality Constraints
10.Secure Watermarking for Multimedia Content Protection: A Review
of its Benefits and Open Issues
11.Robust Face Recognition for Uncontrolled Pose and Illumination
Changes
FOR MORE IEEE 2012-13 PROJECTS
CONTACT
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
Ambitlick@gmail.com, Phone: 8940956123
PROJECT SUPPORTS £ DELIVERABLES
1.Project Abstract
2.IEEE Paper
3.PPT / Review Details
4.Project Report
5.Working Procedure
6.Screen Shots
7.Video Files
8.Materials & Books
9.Project Certification
---------------------Contact ------------------
Available Bulk Old & New Projects In Low Cost
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
New Projects Are Welcome To
Implementation with Us
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

More Related Content

More from ambitlick

Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...ambitlick
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locationsambitlick
 

More from ambitlick (20)

Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Low cost Dotnet IEEE 2013 projects

  • 1. 2013 IEEE JAVA DOTNET PROJECT TITLES DOMAIN: WIRELESS NETWORK PROJECTS 1. A Data Fusion Technique for Wireless Ranging Performance Improvement 2. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling 3. Importance of Coherence Protocols with Network Applications on Multicore Processors 4. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper 5. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks 6. Modeling and Optimizing the Performance- Security Tradeoff on D- NCS Using the Coevolutionary Paradigm 7. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks DOMAIN: MOBILE COMPUTING 1. Capacity of Hybrid Wireless Mesh Networks with Random APs 2. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 3. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self- Interference Cancellation Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 2. 4. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing 5. Quality-Differentiated Video Multicast in Multirate Wireless Networks 6. Evaluating Temporal Robustness of Mobile Networks Rs.4000/- 7. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks 8. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 9. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 10.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 11.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity 12.An Investigation on LTE Mobility Management 13.On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 14.On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks 15.Simple Hybrid and Incremental Postpruning Techniques for Rule Induction Supporting Search-As-You-Type Using SQL in Databases Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 3. 16.Reinforced Similarity Integration in Image-Rich Information Networks 17.Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information 18.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 19.Toward a Statistical Framework for Source Anonymity in Sensor Networks 20.On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling 21.Model-Based Analysis of Wireless System Architectures for Real- Time Applications 22.Successive Interference Cancellation: Carving Out MAC Layer Opportunities 23.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 24.Group-Based Medium Access Control for IEEE 802.11n Wireless LANs 25.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 26.A Secure Payment Scheme with Low Communication and Processing overhead for Multihop Wireless Networks 27.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 4. 28.Secure Communication Based on Ambient Audio 29.Successive Interference Cancellation: Carving Out MAC Layer Opportunities 30.Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 31.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 32.Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 33.Analysis of Distance-Based Location Management in Wireless Communication Networks 34.Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks 35.Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery 36.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 37.Dynamic Coverage of Mobile Sensor Networks 38.In-Network Estimation with Delay Constraints in Wireless Sensor Networks 39.Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor 40.Jamming Games in the MIMO Wiretap Channel With an Active Eaves dropper Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 5. 41.IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments 42.EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 43.Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding 44.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks DOMAIN: NETWORK SECURITY PROJECTS 1. Distance Bounding A Practical Security Solution for Real-Time Location Systems 2. EAACK—A Secure Intrusion-Detection System for MANETs 3. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks DOMAIN: DATA MINING (Data Engineering) 1. Ontology Matching: State of the Art and Future Challenges 2. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data 3. A System to Filter Unwanted Messages from OSN User Walls 4. A Survey of XML Tree Patterns 5. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model 6. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 6. 7. Distributed Web Systems Performance Forecasting Using Turning Bands Method 8. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse 9. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework 10.Ranking on Data Manifold with Sink Points 11.Region-Based Foldings in Process Discovery 12.Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures 13.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence 14.The Generalization Ability of Online Algorithms for Dependent Data 15.Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 16.A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models 17.Large Graph Analysis in the GMine System 18.Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies 19.A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments 20.A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 7. 21.A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 22.AML: Efficient Approximate Membership Localization within a Web-Based Join Framework 23.Event Tracking for Real-Time Unaware Sensitivity Analysis 24.Detecting Intrinsic Loops Underlying Data Manifold 25.Clustering Large Probabilistic Graphs 26.Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 27.Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping 28.Finding Rare Classes: Active Learning with Generative and Discriminative Models 29.Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models DOMAIN: CLOUD COMPUTING 1. QoS Ranking Prediction for Cloud Services 2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds 4. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 8. DOMAIN: PARALLEL & DISTRIBUTED COMPUTING 1. Network Traffic Classification Using Correlation Information 2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 3. Adaptive Network Coding for Broadband Wireless Access Networks 4. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 5. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip 6. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching 7. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision 8. Covering Points of Interest with Mobile Sensors 9. Topology Abstraction Service for IP-VPNs 10.Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller 11.High Performance Resource Allocation Strategies for Computational Economies 12.Strategies for Energy-Efficient Resource Management of Hybrid Programming Models DOMAIN: MULTIMEDIA & IMAGE PROCESSING 1. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 9. 2. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 3. Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images 4. Reversible Data Hiding With Optimal Value Transfer 5. Query-Adaptive Image Search With Hash Codes 6. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting 7. Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage 8. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks 9. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 10.Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues 11.Robust Face Recognition for Uncontrolled Pose and Illumination Changes FOR MORE IEEE 2012-13 PROJECTS CONTACT Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 10. Ambitlick@gmail.com, Phone: 8940956123 PROJECT SUPPORTS £ DELIVERABLES 1.Project Abstract 2.IEEE Paper 3.PPT / Review Details 4.Project Report 5.Working Procedure 6.Screen Shots 7.Video Files 8.Materials & Books 9.Project Certification ---------------------Contact ------------------ Available Bulk Old & New Projects In Low Cost Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 11. New Projects Are Welcome To Implementation with Us Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com