This document provides information about IEEE final year projects available through Richbrain Technologies. It lists over 100 potential project titles across several topics including mobile computing, cloud computing, data mining, wireless sensor networks, and more. Contact information is provided to inquire further about specific projects.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Ieee 2013 2014 final year me,mtech students for cse,it dotnet project titles
1. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
PARLLEL DISTRIBUTION
1. Lightweight Location Verification Algorithms for Wireless Sensor
Networks
2. Heterogeneous Resource Allocation under Degree Constraints
3. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems
of Linear Equations
4. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor
Networks
5. Error-Tolerant Resource Allocation and Payment Minimization for
Cloud System
6. Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
7. Dynamic Optimization of Multiattribute Resource Allocation in Self-
Organizing Clouds
8. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City
Environments
9. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor
Networks
10.A New Progressive Algorithm for a Multiple Longest Common
Subsequences Problem and Its Efficient Parallelization
11.A General Framework for Efficient Continuous Multidimensional
Top-k Query Processing in Sensor Networks
2. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
PARLLEL DISTRIBUTION
12.A Secure Payment Scheme with Low Communication and
Processing Overhead for Multihop Wireless Networks
13.Multicast Capacity in MANET with Infrastructure Support
14.SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
15.Enabling Data Dynamic and Indirect Mutual Trust for Cloud
Computing Storage Systems.
16.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
17.IP-Geolocation Mapping for Moderately Connected Internet Regions
18.Optimal Client-Server Assignment for Internet Distributed Systems
3. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUITNG
1. A Load Balancing Model Based on Cloud Partitioning for the Public
Cloud
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
5. CloudMoV: Cloud-based Mobile Social TV
6. Privacy Preserving Delegated Access Control in Public Clouds.
7. Attribute-based Access to Scalable Media in Cloud-assisted Content
Sharing Networks.
8. A Privacy Leakage Upper Bound Constraint-Based Approach for
Cost-Effective Privacy Preserving of Intermediate Data Sets in
Cloud
9. An Adaptive Cloud Downloading Service
10.Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
11.Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud
12.On Data Staging Algorithms for Shared Data Accesses in Clouds
4. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUITNG
13. Optimal Multiserver Configuration for Profit Maximization in Cloud
Computing
14.Privacy-Preserving Public Auditing for Secure Cloud Storage
15.QoS Ranking Prediction for Cloud Services
16.Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
17.Toward Fine-Grained, Unsupervised, Scalable Performance
Diagnosis for Production Cloud Computing Systems
18.Towards Secure Multi-Keyword Top-k Retrieval over Encrypted
Cloud Data
19.A Hierarchical Approach for the Resource Management of Very
Large Cloud Platforms
20.Using Cloud Computing to Implement a Security Overlay Network
21.okeanos: Building a Cloud, Cluster by Cluster
22.Design and Evaluation of a Virtual Experimental Environment for
Distributed Systems
23.Priority based dynamic resource allocation in Cloud computing with
modified waiting queue
24.SeDas: A Self-Destructing Data System Based on Active Storage
Framework
25.A Stochastic Model to Investigate Data Center Performance and
QoS in IaaS Cloud Computing Systems
5. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for
High Dimensional Data
2. Secure Mining of Association Rules in Horizontally Distributed
Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification
Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML Data.
5. Change Detection in Streaming Multivariate Data Using Likelihood
Detectors
6. Evaluating Data Reliability An Evidential Answer with Application to
a Web-Enabled Data Warehouse
7. Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. A New Algorithm for Inferring User Search Goals with Feedback
Sessions
11.A Survey of XML Tree Patterns
12.Dynamic Personalized Recommendation on Sparse Data
13.Mining User Queries with Markov Chains: Application to Online
Image Retrieval
14.TrustedDB: A Trusted Hardware based Database with Privacy and
Data Confidentiality
6. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
15.Automatic Semantic Content Extraction in Videos Using a Fuzzy
Ontology and Rule-Based Model
16.Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
17.Evaluating Data Reliability An Evidential Answer with Application to
a Web-Enabled Data Warehouse
18.Maximum Likelihood Estimation from Uncertain Data in the Belief
Function Framework
19.Ranking on Data Manifold with Sink Points
20.Region-Based Foldings in Process Discovery
21.Relationships between Diversity of Classification Ensembles and
Single-Class Performance Measures
22.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence
23.The Generalization Ability of Online Algorithms for Dependent Data
24.Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
25.Automatic Semantic Content Extraction in Videos Using a Fuzzy
Ontology and Rule-Based Model
26.A Graph-Based Consensus Maximization Approach for Combining
Multiple Supervised and Unsupervised Models
27.Ontology Matching: State of the Art and Future Challenges
28.Large Graph Analysis in the GMine System
7. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
29.Nonadaptive Mastermind Algorithms for String and Vector
Databases, with Case Studies
30.A System to Filter Unwanted Messages from OSN User Walls
31.A Rough-Set-Based Incremental Approach for Updating
Approximations under Dynamic Maintenance Environments
32.A Proxy-Based Approach to Continuous Location-Based Spatial
Queries in Mobile Environments
33.A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
34.AML: Efficient Approximate Membership Localization within a Web-
Based Join Framework
35.Event Tracking for Real-Time Unaware Sensitivity Analysis
36.Detecting Intrinsic Loops Underlying Data Manifold
37.Clustering Large Probabilistic Graphs
38.Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
39.Minimally Supervised Novel Relation Extraction Using a Latent
Relational Mapping
40.Finding Rare Classes: Active Learning with Generative and
Discriminative Models
41.Fast Activity Detection: Indexing for Temporal Stochastic
Automaton-Based Activity Models
8. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
1. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing
Routing Overhead in Mobile Ad Hoc Networks
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Efficient Rekeying Framework for Secure Multicast with Diverse-
Subscription-Period Mobile Users
4. Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
5. Passive Duplicate Address-Detection Schemes for On-Demand
Routing Protocols in Mobile Ad Hoc Networks
6. On Quality of Monitoring for Multi-channel Wireless Infrastructure
Networks
7. Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
8. IP-Geolocation Mapping for Moderately Connected Internet Regions
9. Efficient Rekeying Framework for Secure Multicast with Diverse-
Subscription-Period Mobile Users
10.EMAP: Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
11.Adaptive Position Update for Geographic Routing in Mobile Ad Hoc
Networks
12.Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A
Coalitional Game Approach
13.EMAP: Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
9. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
14.Optimal Multicast Capacity and Delay Tradeoffs in MANETs
15.Analysis of Distance-Based Location Management in Wireless
Communication Networks
16.Gaussian versus Uniform Distribution for Intrusion Detection in
Wireless Sensor Networks
17.Fast Channel Zapping with Destination-Oriented Multicast for IP
Video Delivery
18.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
19.Dynamic Coverage of Mobile Sensor Networks
20.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks
21.Cross-Layer Design of Congestion Control and Power Control in
Fast-Fading Wireless Networks
22.Micro architecture of a Coarse-Grain Out-of-Order Superscalar
Processor
23.Jamming Games in the MIMO Wiretap Channel With an Active
Eavesdropper
24.IDM: An Indirect Dissemination Mechanism for Spatial Voice
Interaction in Networked Virtual Environments
10. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
25.Delay-Optimal Broadcast for Multihop Wireless Networks Using
Self-Interference Cancellation
26.EMAP Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
27.Power Allocation for Statistical QoS Provisioning in Opportunistic
Multi-Relay DF Cognitive Networks
28.Pulse Switching Toward a Packet-Less Protocol Paradigm for Event
Sensing
29.Quality-Differentiated Video Multicast in Multirate Wireless
Networks
30.Sink Trail A Proactive Data Reporting Protocol for Wireless Sensor
Networks
31.Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
32.Evaluating Temporal Robustness of Mobile Networks
33.A Resource Allocation Scheme for Scalable Video Multicast in
WiMAX Relay Networks
34.Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
35.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’
Heterogeneity
36.An Investigation on LTE Mobility Management
11. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
37.On Exploiting Transient Social Contact Patterns for Data Forwarding
in Delay-Tolerant Networks
38.Channel Allocation and Routing in Hybrid Multichannel Multiradio
Wireless Mesh Networks
39.On the Real-Time Hardware Implementation Feasibility of Joint
Radio Resource Management Policies for Heterogeneous Wireless
Networks
40.Simple Hybrid and Incremental Postpruning Techniques for Rule
Induction
41.Supporting Search-As-You-Type Using SQL in Databases
42.Reinforced Similarity Integration in Image-Rich Information
Networks
43.Autonomous Sensing Order Selection Strategies Exploiting Channel
Access Information
44.Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
45.Toward a Statistical Framework for Source Anonymity in Sensor
Networks
46.On Centralized and Localized Approximation Algorithms for
Interference-Aware Broadcast Scheduling
47.Model-Based Analysis of Wireless System Architectures for Real-
Time Applications
48.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
12. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
49.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
50.Group-Based Medium Access Control for IEEE 802.11n Wireless
LANs
51.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
52.A Secure Payment Scheme with Low Communication and
Processing Overhead for Multihop Wireless Networks
53.A Scalable Server Architecture for Mobile Presence Services in
Social Network Applications
54.Secure Communication Based on Ambient Audio
55.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
56.Cross-Layer Design of Congestion Control and Power Control in
Fast-Fading Wireless Networks
57.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body
Area Networks
58.Cluster-Based Certificate Revocation with Vindication Capability for
Mobile Ad Hoc Networks
59.Analysis of Distance-Based Location Management in Wireless
Communication Networks
13. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
60.Gaussian versus Uniform Distribution for Intrusion Detection in
Wireless Sensor Networks
61.Fast Channel Zapping with Destination-Oriented Multicast for IP
Video Delivery
62.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
63.Dynamic Coverage of Mobile Sensor Networks
64.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks
65.Cross-Layer Design of Congestion Control and Power Control in
Fast-Fading Wireless Networks
66.Micro architecture of a Coarse-Grain Out-of-Order Superscalar
Processor
67.Jamming Games in the MIMO Wiretap Channel With an Active
Eavesdropper
68.IDM: An Indirect Dissemination Mechanism for Spatial Voice
Interaction in Networked Virtual Environments
14. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
1. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
2. Novel Packet-Level Resource Allocation with Effective QoS
Provisioning for Wireless Mesh Networks
3. Exploring the Design Space of Multichannel Peer-to-Peer Live Video
Streaming Systems
4. Diffusion Dynamics of Network Technologies With Bounded
Rational Users: Aspiration-Based Learning
5. Delay-Based Network Utility Maximization
6. Answering “What-If” Deployment and Configuration Questions With
WISE: Techniques and Deployment Experience
7. An Empirical Interference Modeling for Link Reliability Assessment
in Wireless Networks
8. A Rank Correlation Based Detection against Distributed Reflection
DoS Attacks
9. A Distributed Control Law for Load Balancing in Content Delivery
Networks
10.A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor
Networks
11.An Efficient and Robust Addressing Protocol for Node Auto
configuration in Ad Hoc Networks
15. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
12.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City
Environments
13.Efficient Algorithms for Neighbor Discovery in Wireless Networks
14. Localization of Wireless Sensor Networks in the Wild: Pursuit of
Ranging Quality
15.Resource Allocation for QoS Support in Wireless Mesh Networks
16.On the Delivery Probability of Two-Hop Relay MANETs with Erasure
Coding
17.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks
18.A Data Fusion Technique for Wireless Ranging Performance
Improvement
19.Harvesting-Aware Energy Management for Time-Critical Wireless
Sensor Networks With Joint Voltage and Modulation Scaling
20.Importance of Coherence Protocols with Network Applications on
Multicore Processors
21.Jamming Games in the MIMO Wiretap Channel With an Active
Eavesdropper
22.Modeling and Optimizing the Performance- Security Tradeoff on D-
NCS Using the Coevolutionary Paradigm
23.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm
for Scalable Video Transmission Over Link-adaptive Networks
16. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SERVICE COMPUTING
1. Privacy-Enhanced Web Service Composition
2. Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
3. NICE: Network Intrusion Detection and Countermeasure Selection in
Virtual Network Systems
4. Document Clustering for Forensic Analysis: An Approach for Improving
Computer Inspection
5. A Decentralized Service Discovery Approach on Peer-to-Peer Networks
6. Personalized QoS-Aware Web Service Recommendation and Visualization
17. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
1. Query-Adaptive Image Search With Hash Codes
2. Reversible Data Hiding With Optimal Value Transfer
3. Reversible Watermarking Based on Invariant Image Classification and
Dynamic Histogram Shifting
4. Local Directional Number Pattern for Face Analysis: Face and
Expression Recognition
5. Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage
18. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2013-2014 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2013-2014 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2013-14 DOTNET PROJECTS
IEEE Final Year Projects 2013 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SECURE COMPUTING
1. A Rank Correlation Based Detection against Distributed Reflection
DoS Attacks.
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
4. Modeling the Pairwise Key Predistribution Scheme in the Presence
of Unreliable Links
5. Privacy Preserving Data Sharing With Anonymous ID Assignment
6. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
7. Modeling the Pairwise Key Predistribution Scheme in the Presence
of Unreliable Links
8. Securing Class Initialization in Java-like Languages
9. Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
10.WARNINGBIRD: A Near Real-time Detection System for Suspicious
URLs in Twitter Stream