This document provides a summary of IEEE projects and software developments from ECWAY Technologies, an Indian technology company with offices in multiple cities. It lists project titles from 2014 in several domains, including mobile computing, wireless communication, network security, data mining, neural networks, cloud computing, parallel and distributed computing, software engineering, and image processing. The document provides contact information for ECWAY Technologies and a high level overview of the types of projects they undertake without providing many details about the projects themselves.
RedTacton is a Human Area Networking technology/Wireless Network, which is developed by Robin Gaur Jind, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body
« Market Perspectives » est notre revue mensuelle des marchés. Elle présente de la façon la plus synthétique possible :
- notre analyse des principaux faits marquants et indicateurs macro susceptibles de dessiner les marchés sur le mois.
- notre vision sur les différentes classes d’actifs
Cette revue sera continument enrichie avec nos indicateurs quantitatifs.
La plupart de nos analyses sont disponibles sur www.finlightresearch.com
Our monthly publication “Market Perspectives” presents a synthetic view of all the asset classes we cover.
The report is composed of six sections covering Macro, Equities, FI & credit, FX, Commodities and Alternatives.
Each section is preceded by a summary of our views on the related asset class.
Most of our publications are available on our web site www.finlightresearch.com
RedTacton is a Human Area Networking technology/Wireless Network, which is developed by Robin Gaur Jind, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body
« Market Perspectives » est notre revue mensuelle des marchés. Elle présente de la façon la plus synthétique possible :
- notre analyse des principaux faits marquants et indicateurs macro susceptibles de dessiner les marchés sur le mois.
- notre vision sur les différentes classes d’actifs
Cette revue sera continument enrichie avec nos indicateurs quantitatifs.
La plupart de nos analyses sont disponibles sur www.finlightresearch.com
Our monthly publication “Market Perspectives” presents a synthetic view of all the asset classes we cover.
The report is composed of six sections covering Macro, Equities, FI & credit, FX, Commodities and Alternatives.
Each section is preceded by a summary of our views on the related asset class.
Most of our publications are available on our web site www.finlightresearch.com
WHEELZ TRACKER is a provider of GPS based vehicle tracking system for transportation, Utility vehicles, Public transit, Logistics and delivery. Our GPS technology solution designed for vehicle owners and managers with a personalized digital dashboard with live-tracking, Fuel monitoring and alert features.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
1. ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: 9894917187, 875487 1111/2222/3333/8754872111 / 3111 / 4111 / 5111 / 6111 / 8111
Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com
2014 IEEE PROJECT TITLES
DOMAIN: MOBILE COMPUTING
Language
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms
Large-Scale Synthetic Social Mobile Networks with SWIM
Designing Truthful Spectrum Double Auctions with Local Markets
Interference and Outage in Mobile Random Networks: Expectation, Distribution, and
Correlation
Preserving Location Privacy in Geosocial Applications
Rate Adaptation for 802.11 Multiuser MIMO Networks
Class-Based Shared Resource Allocation for Cell-Edge Users in OFDMA Networks
TurfCast A Service for Controlling Information Dissemination in Wireless Networks
Novel Channel-Hopping Schemes for Cognitive Radio Networks
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
Energy-Efficient Relaying via Store-Carry and Forward within the Cell
Evaluation of a Multihop Airborne IP Backbone with Heterogeneous Radio Technologies
.NET
2. Energy-Aware Resource Allocation Strategies for LTE Uplink with
Synchronous HARQ
.NET
Constraints
Bounds on the Benefit of Network Coding for Wireless Multicast and Unicast
.NET
Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks
.NET
Multiuser Scheduling in the 3GPP LTE Cellular Uplink
Cooperative Spectrum Sharing: A Contract-Based Approach
Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical
JAVA
Approach
Harnessing the High Bandwidth of Multiradio Multichannel 802.11n Mesh Networks
JAVA
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
JAVA
Video Dissemination over Hybrid Cellular and Ad Hoc Networks
JAVA
Fast Spectrum Shaping for Next-Generation Wireless Networks
From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System
DOMAIN: WIRELESS COMMUNICATION
GreenDCN A General Framework for Achieving Energy Efficiency in Data Center Networks
Datacenter Applications in Virtualized Networks A Cross-Layer Performance Study
TCP PLATO Packet Labelling to Alleviate Time-Out
Distributed Adaptive Routing Convergence to Non-Blocking DCN Routing Assignments
Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile
Sensors
Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative
Control Concept
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
Real-Time Implementation of a Harmony Search Algorithm-Based Clustering Protocol for
3. Energy-Efficient Wireless Sensor Networks
Wireless Tomography in Noisy Environments Using Machine Learning
Semantic Context-Aware Service Composition for Building Automation System
Design and Implementation of a Service-Oriented Architecture for the Optimization of
Industrial Applications
DOMAIN: NETWORK SECURITY PROJECTS
Security Analysis of Handover Key Management in 4G LTE/SAE Networks
Building a Scalable System for Stealthy P2P-Botnet Detection
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs
DOMAIN: DATA MINING (Data Engineering)
Privacy-Preserving Enhanced Collaborative Tagging
Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
Data Mining with Big Data
Supporting Privacy Protection in Personalized Web Search
Facilitating Document Annotation Using Content and Querying Value
A Comparative Study of Implementation Techniques for Query Processing in Multicore Systems
Discovering via Link-Anomaly Detection Emerging Topics in Social Streams
Uncertain One-Class Learning and Concept Summarization Learning on Uncertain Data Streams
A Cocktail Approach for Travel Package Recommendation
Learning Conditional Preference Networks from Inconsistent Examples
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
Active Learning of Constraints for Semi-Supervised Clustering
4. Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count Approach
Event Characterization and Prediction Based on Temporal Patterns in Dynamic Data System
A Rough Hypercuboid Approach for Feature Selection in Approximation Spaces
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
Data Mining in Bone Marrow Transplant Records to Identify Patients with High Odds of Survival
DOMAIN: NEURAL NETWORK
Learning in the Model Space for Cognitive Fault Diagnosis
Privacy Preserving Back-Propagation Neural Network Learning Made
Practical with Cloud
Computing
DOMAIN: CLOUD COMPUTING
A Mechanism Design Approach to Resource Procurement in Cloud Computing
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud
Computing
Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Data Similarity-Aware Computation Infrastructure for the Cloud
NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multicore Server
Processors across Clouds and Data Centers
A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers
DOMAIN: PARALLEL & DISTRIBUTED COMPUTING
Modeling of Distributed File Systems for Practical Performance Analysis
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
5. Internet Traffic Privacy Enhancement with Masking: Optimization and Tradeoffs
DOMAIN: SOFTWARE ENGINEERING
DOMAIN: IMAGE PROCESSING