SlideShare una empresa de Scribd logo
1 de 5
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111
Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com

2013 IEEE PROJECT .NET TITLES
DOMAIN: MOBILE COMPUTING
Distributed Cooperative Caching in Social Wireless Networks
Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks
Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Dynamic Coverage of Mobile Sensor Networks
NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
Quality-Differentiated Video Multicast in Multirate Wireless Networks
SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks
Evaluating Temporal Robustness of Mobile Networks
Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity
On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for
Heterogeneous Wireless Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
Toward a Statistical Framework for Source Anonymity in Sensor Networks
Model-Based Analysis of Wireless System Architectures for Real-Time Applications
Network Assisted Mobile Computing with Optimal Uplink Query Processing
Capacity of Hybrid Wireless Mesh Networks with Random APs
Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
Optimal Content Downloading in Vehicular Networks
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Group-Based Medium Access Control for IEEE 802.11n Wireless LANs
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
Analysis of Distance-Based Location Management in Wireless Communication Networks
Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery
Dynamic Coverage of Mobile Sensor Networks
In-Network Estimation with Delay Constraints in Wireless Sensor Networks
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using
Network Coding
Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks

DOMAIN: WIRELESS NETWORK PROJECTS
A Data Fusion Technique for Wireless Ranging Performance Improvement
Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks
Fast Transmission to Remote Cooperative Groups a New Key Management Paradigm
Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks
Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and
Modulation Scaling
Importance of Coherence Protocols with Network Applications on Multicore Processors
Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm
Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks
Efficient Two-Server Password-Only Authenticated Key Exchange

DOMAIN: NETWORK SECURITY PROJECTS
Extracting Spread-Spectrum Hidden Data From Digital Media
EAACK—A Secure Intrusion-Detection System for MANETs
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

DOMAIN: DATA MINING (Data Engineering)
PMSE A Personalized Mobile Search Engine
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
Distributed Web Systems Performance Forecasting Using Turning Bands Method
Ranking on Data Manifold with Sink Points
Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures
Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
The Generalization Ability of Online Algorithms for Dependent Data
AML: Efficient Approximate Membership Localization within a Web-Based Join Framework
Finding Rare Classes: Active Learning with Generative and Discriminative Models
Optimizing Multi-Top-k Queries over Uncertain Data Streams
A System to Filter Unwanted Messages from OSN User Walls
Ranking on Data Manifold with Sink Points
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

DOMAIN: CLOUD COMPUTING
Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Security and Privacy-Enhancing Multi-cloud Architectures
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based
Encryption
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the
Clouds

DOMAIN: PARALLEL & DISTRIBUTED COMPUTING
Network Traffic Classification Using Correlation Information
SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based
Encryption
Adaptive Network Coding for Broadband Wireless Access Networks
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip
Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
High Performance Resource Allocation Strategies for Computational Economies

Más contenido relacionado

Similar a 2013 ieee .net project titles

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcwaytechnoz
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcway2004
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcway2004
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwaytechnoz
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcway2004
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcway2004
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytech
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytech
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcway2004
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcway2004
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 

Similar a 2013 ieee .net project titles (20)

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 

Más de Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 

Más de Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

2013 ieee .net project titles

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111 Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com 2013 IEEE PROJECT .NET TITLES DOMAIN: MOBILE COMPUTING Distributed Cooperative Caching in Social Wireless Networks Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Dynamic Coverage of Mobile Sensor Networks NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Quality-Differentiated Video Multicast in Multirate Wireless Networks SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks Evaluating Temporal Robustness of Mobile Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
  • 2. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks Model-Based Analysis of Wireless System Architectures for Real-Time Applications Network Assisted Mobile Computing with Optimal Uplink Query Processing Capacity of Hybrid Wireless Mesh Networks with Random APs Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation Optimal Content Downloading in Vehicular Networks Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Group-Based Medium Access Control for IEEE 802.11n Wireless LANs Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Analysis of Distance-Based Location Management in Wireless Communication Networks Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery Dynamic Coverage of Mobile Sensor Networks In-Network Estimation with Delay Constraints in Wireless Sensor Networks Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks DOMAIN: WIRELESS NETWORK PROJECTS A Data Fusion Technique for Wireless Ranging Performance Improvement
  • 3. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks Fast Transmission to Remote Cooperative Groups a New Key Management Paradigm Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling Importance of Coherence Protocols with Network Applications on Multicore Processors Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks Efficient Two-Server Password-Only Authenticated Key Exchange DOMAIN: NETWORK SECURITY PROJECTS Extracting Spread-Spectrum Hidden Data From Digital Media EAACK—A Secure Intrusion-Detection System for MANETs Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing DOMAIN: DATA MINING (Data Engineering) PMSE A Personalized Mobile Search Engine A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Distributed Web Systems Performance Forecasting Using Turning Bands Method Ranking on Data Manifold with Sink Points Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures
  • 4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse The Generalization Ability of Online Algorithms for Dependent Data AML: Efficient Approximate Membership Localization within a Web-Based Join Framework Finding Rare Classes: Active Learning with Generative and Discriminative Models Optimizing Multi-Top-k Queries over Uncertain Data Streams A System to Filter Unwanted Messages from OSN User Walls Ranking on Data Manifold with Sink Points Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks DOMAIN: CLOUD COMPUTING Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Security and Privacy-Enhancing Multi-cloud Architectures Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds DOMAIN: PARALLEL & DISTRIBUTED COMPUTING Network Traffic Classification Using Correlation Information SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based
  • 5. Encryption Adaptive Network Coding for Broadband Wireless Access Networks Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision High Performance Resource Allocation Strategies for Computational Economies