SlideShare a Scribd company logo
1 of 4
Download to read offline
Mobile: (0) 9849539085 Web: www.finalyearprojects.org
IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 NS2 PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085/9849557908
Contact Email: ieeefinalsemprojects@gmail.com
IMAGE PROCESSING
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof
Updating System
2. Model-Based Analysis of Wireless System Architectures for Real-Time
Applications
3. Toward a Statistical Framework for Source Anonymity in Sensor Networks
4. On Exploiting Transient Social Contact Patterns for Data Forwarding in
Delay-Tolerant Networks
5. Strategies for Energy-Efficient Resource Management of Hybrid
Programming Models.
6. Capacity of Hybrid Wireless Mesh Networks with Random APs.
7. EAACK A Secure Intrusion-Detection System for MANETs.
8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-
Interference Cancellation.
9. Distance Bounding A Practical Security Solution for Real-Time Location
Systems.
10.Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks.
11.Cross-Layer Design of Congestion Control and Power Control in Fast-
Fading Wireless Networks.
12.Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor
Networks.
Mobile: (0) 9849539085 Web: www.finalyearprojects.org
IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 NS2 PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085/9849557908
Contact Email: ieeefinalsemprojects@gmail.com
IMAGE PROCESSING
13.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks.
14.Mobile Relay Configuration in Data-Intensive Wireless Sensor Network.
15.In-Network Estimation with Delay Constraints in Wireless Sensor Network
16.Harvesting-Aware Energy Management for Time-Critical Wireless Sensor
Networks With Joint Voltage and Modulation Scaling.
17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
18.Network Traffic Classification Using Correlation Information.
19. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-
Relay DF Cognitive Networks.
20. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area
Networks
21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area
Networks.
22. Cross-Layer Design of Congestion Control and Power Control in Fast-
Fading Wireless Networks.
23. Analysis of Distance-Based Location Management in Wireless
Communication Networks.
24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX
Relay Networks.
25. Quality-Differentiated Video Multicast in Multirate Wireless Networks
Mobile: (0) 9849539085 Web: www.finalyearprojects.org
IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 NS2 PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085/9849557908
Contact Email: ieeefinalsemprojects@gmail.com
MOBILE COMPUTING
1. Capacity of Hybrid Wireless Mesh Networks with Random APs
2. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-
Interference Cancellation
3. Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks
4. Distance Bounding A Practical Security Solution for Real-Time Location
Systems
5. EAACK—A Secure Intrusion-Detection System for MANETs
6. Harvesting-Aware Energy Management for Time-Critical Wireless
Sensor Networks With Joint Voltage and Modulation Scaling
7. Network Traffic Classification Using Correlation Information
8. Power Allocation for Statistical QoS Provisioning in Opportunistic
Multi-Relay DF Cognitive Networks
9. Quality-Differentiated Video Multicast in Multirate Wireless Networks
10.Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
11.A Resource Allocation Scheme for Scalable Video Multicast in WiMAX
Relay Networks
12.Toward Privacy Preserving and Collusion Resistance in a Location Proof
Updating System
13.On Exploiting Transient Social Contact Patterns for Data Forwarding in
Delay-Tolerant Networks
14.Strategies for Energy-Efficient Resource Management of Hybrid
Programming Models
Mobile: (0) 9849539085 Web: www.finalyearprojects.org
IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 NS2 PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085/9849557908
Contact Email: ieeefinalsemprojects@gmail.com
MOBILE COMPUTING
15.Channel Allocation and Routing in Hybrid Multichannel Multiradio
Wireless Mesh Networks
16.Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
17.Toward a Statistical Framework for Source Anonymity in Sensor
Networks
18.Model-Based Analysis of Wireless System Architectures for Real-Time
Applications
19.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
20.Cross-Layer Design of Congestion Control and Power Control in Fast-
Fading Wireless Networks
21.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area
Networks
22.Analysis of Distance-Based Location Management in Wireless
Communication Networks
23.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
24.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks

More Related Content

More from IEEEGLOBALSOFTTECHNOLOGIES

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 

Ieee 2013 ns2 projects globalsoft technologies

  • 1. Mobile: (0) 9849539085 Web: www.finalyearprojects.org IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2013-14 NS2 PROJECTS IEEE Final Year Projects 2013 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085/9849557908 Contact Email: ieeefinalsemprojects@gmail.com IMAGE PROCESSING 1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications 3. Toward a Statistical Framework for Source Anonymity in Sensor Networks 4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. 6. Capacity of Hybrid Wireless Mesh Networks with Random APs. 7. EAACK A Secure Intrusion-Detection System for MANETs. 8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self- Interference Cancellation. 9. Distance Bounding A Practical Security Solution for Real-Time Location Systems. 10.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. 11.Cross-Layer Design of Congestion Control and Power Control in Fast- Fading Wireless Networks. 12.Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks.
  • 2. Mobile: (0) 9849539085 Web: www.finalyearprojects.org IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2013-14 NS2 PROJECTS IEEE Final Year Projects 2013 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085/9849557908 Contact Email: ieeefinalsemprojects@gmail.com IMAGE PROCESSING 13.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. 14.Mobile Relay Configuration in Data-Intensive Wireless Sensor Network. 15.In-Network Estimation with Delay Constraints in Wireless Sensor Network 16.Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling. 17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 18.Network Traffic Classification Using Correlation Information. 19. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi- Relay DF Cognitive Networks. 20. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. 22. Cross-Layer Design of Congestion Control and Power Control in Fast- Fading Wireless Networks. 23. Analysis of Distance-Based Location Management in Wireless Communication Networks. 24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. 25. Quality-Differentiated Video Multicast in Multirate Wireless Networks
  • 3. Mobile: (0) 9849539085 Web: www.finalyearprojects.org IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2013-14 NS2 PROJECTS IEEE Final Year Projects 2013 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085/9849557908 Contact Email: ieeefinalsemprojects@gmail.com MOBILE COMPUTING 1. Capacity of Hybrid Wireless Mesh Networks with Random APs 2. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self- Interference Cancellation 3. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 4. Distance Bounding A Practical Security Solution for Real-Time Location Systems 5. EAACK—A Secure Intrusion-Detection System for MANETs 6. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling 7. Network Traffic Classification Using Correlation Information 8. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 9. Quality-Differentiated Video Multicast in Multirate Wireless Networks 10.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 11.A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 12.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 13.On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 14.Strategies for Energy-Efficient Resource Management of Hybrid Programming Models
  • 4. Mobile: (0) 9849539085 Web: www.finalyearprojects.org IEEE 2013-2014 PROJECTS@ GLOBALSOFTTECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2013-2014 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2013-14 NS2 PROJECTS IEEE Final Year Projects 2013 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085/9849557908 Contact Email: ieeefinalsemprojects@gmail.com MOBILE COMPUTING 15.Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks 16.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 17.Toward a Statistical Framework for Source Anonymity in Sensor Networks 18.Model-Based Analysis of Wireless System Architectures for Real-Time Applications 19.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 20.Cross-Layer Design of Congestion Control and Power Control in Fast- Fading Wireless Networks 21.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 22.Analysis of Distance-Based Location Management in Wireless Communication Networks 23.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 24.In-Network Estimation with Delay Constraints in Wireless Sensor Networks