SlideShare une entreprise Scribd logo
1  sur  11
2013 IEEE JAVA DOTNET PROJECT
TITLES
DOMAIN: WIRELESS NETWORK PROJECTS
1. A Data Fusion Technique for Wireless Ranging Performance
Improvement
2. Harvesting-Aware Energy Management for Time-Critical Wireless
Sensor Networks With Joint Voltage and Modulation Scaling
3. Importance of Coherence Protocols with Network Applications on
Multicore Processors
4. Jamming Games in the MIMO Wiretap Channel With an Active
Eavesdropper
5. Channel Allocation and Routing in Hybrid Multichannel Multiradio
Wireless Mesh Networks
6. Modeling and Optimizing the Performance- Security Tradeoff on D-
NCS Using the Coevolutionary Paradigm
7. Localization-Based Radio Model Calibration for Fault-Tolerant
Wireless Mesh Networks
DOMAIN: MOBILE COMPUTING
1. Capacity of Hybrid Wireless Mesh Networks with Random APs
2. Power Allocation for Statistical QoS Provisioning in Opportunistic
Multi-Relay DF Cognitive Networks
3. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-
Interference Cancellation
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
4. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event
Sensing
5. Quality-Differentiated Video Multicast in Multirate Wireless
Networks
6. Evaluating Temporal Robustness of Mobile Networks Rs.4000/-
7. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor
Networks
8. Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
9. A Resource Allocation Scheme for Scalable Video Multicast in
WiMAX Relay Networks
10.Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
11.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’
Heterogeneity
12.An Investigation on LTE Mobility Management
13.On Exploiting Transient Social Contact Patterns for Data
Forwarding in Delay-Tolerant Networks
14.On the Real-Time Hardware Implementation Feasibility of Joint
Radio Resource Management Policies for Heterogeneous Wireless
Networks
15.Simple Hybrid and Incremental Postpruning Techniques for Rule
Induction Supporting Search-As-You-Type Using SQL in Databases
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
16.Reinforced Similarity Integration in Image-Rich Information
Networks
17.Autonomous Sensing Order Selection Strategies Exploiting Channel
Access Information
18.Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
19.Toward a Statistical Framework for Source Anonymity in Sensor
Networks
20.On Centralized and Localized Approximation Algorithms for
Interference-Aware Broadcast Scheduling
21.Model-Based Analysis of Wireless System Architectures for Real-
Time Applications
22.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
23.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
24.Group-Based Medium Access Control for IEEE 802.11n Wireless
LANs
25.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
26.A Secure Payment Scheme with Low Communication and Processing
overhead for Multihop Wireless Networks
27.A Scalable Server Architecture for Mobile Presence Services in Social
Network Applications
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
28.Secure Communication Based on Ambient Audio
29.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
30.Cross-Layer Design of Congestion Control and Power Control in
Fast-Fading Wireless Networks
31.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body
Area Networks
32.Cluster-Based Certificate Revocation with Vindication Capability for
Mobile Ad Hoc Networks
33.Analysis of Distance-Based Location Management in Wireless
Communication Networks
34.Gaussian versus Uniform Distribution for Intrusion Detection in
Wireless Sensor Networks
35.Fast Channel Zapping with Destination-Oriented Multicast for IP
Video Delivery
36.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
37.Dynamic Coverage of Mobile Sensor Networks
38.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks
39.Microarchitecture of a Coarse-Grain Out-of-Order Superscalar
Processor
40.Jamming Games in the MIMO Wiretap Channel With an Active
Eaves dropper
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
41.IDM: An Indirect Dissemination Mechanism for Spatial Voice
Interaction in Networked Virtual Environments
42.EMAP Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
43.Channel Assignment for Throughput Optimization in Multichannel
Multiradio Wireless Mesh Networks Using Network Coding
44.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm
for Scalable Video Transmission Over Link-adaptive Networks
DOMAIN: NETWORK SECURITY PROJECTS
1. Distance Bounding A Practical Security Solution for Real-Time
Location Systems
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
DOMAIN: DATA MINING (Data Engineering)
1. Ontology Matching: State of the Art and Future Challenges
2. A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
3. A System to Filter Unwanted Messages from OSN User Walls
4. A Survey of XML Tree Patterns
5. Automatic Semantic Content Extraction in Videos Using a Fuzzy
Ontology and Rule-Based Model
6. Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
7. Distributed Web Systems Performance Forecasting Using Turning
Bands Method
8. Evaluating Data Reliability An Evidential Answer with Application to
a Web-Enabled Data Warehouse
9. Maximum Likelihood Estimation from Uncertain Data in the Belief
Function Framework
10.Ranking on Data Manifold with Sink Points
11.Region-Based Foldings in Process Discovery
12.Relationships between Diversity of Classification Ensembles and
Single-Class Performance Measures
13.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence
14.The Generalization Ability of Online Algorithms for Dependent Data
15.Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
16.A Graph-Based Consensus Maximization Approach for Combining
Multiple Supervised and Unsupervised Models
17.Large Graph Analysis in the GMine System
18.Nonadaptive Mastermind Algorithms for String and Vector
Databases, with Case Studies
19.A Rough-Set-Based Incremental Approach for Updating
Approximations under Dynamic Maintenance Environments
20.A Proxy-Based Approach to Continuous Location-Based Spatial
Queries in Mobile Environments
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
21.A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
22.AML: Efficient Approximate Membership Localization within a
Web-Based Join Framework
23.Event Tracking for Real-Time Unaware Sensitivity Analysis
24.Detecting Intrinsic Loops Underlying Data Manifold
25.Clustering Large Probabilistic Graphs
26.Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
27.Minimally Supervised Novel Relation Extraction Using a Latent
Relational Mapping
28.Finding Rare Classes: Active Learning with Generative and
Discriminative Models
29.Fast Activity Detection: Indexing for Temporal Stochastic
Automaton-Based Activity Models
DOMAIN: CLOUD COMPUTING
1. QoS Ranking Prediction for Cloud Services
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute- Based Encryption
3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud On Data Staging Algorithms for Shared Data Accesses in
Clouds
4. Optimal Multiserver Configuration for Profit Maximization in Cloud
Computing
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
DOMAIN: PARALLEL & DISTRIBUTED COMPUTING
1. Network Traffic Classification Using Correlation Information
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute- Based Encryption
3. Adaptive Network Coding for Broadband Wireless Access Networks
4. Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks
5. Online Real-Time Task Scheduling in Heterogeneous Multicore
System-on-a-Chip
6. MIN-MAX: A Counter-Based Algorithm for Regular Expression
Matching
7. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
8. Covering Points of Interest with Mobile Sensors
9. Topology Abstraction Service for IP-VPNs
10.Thermal and Energy Management of High-Performance Multicores:
Distributed and Self-Calibrating Model-Predictive Controller
11.High Performance Resource Allocation Strategies for Computational
Economies
12.Strategies for Energy-Efficient Resource Management of Hybrid
Programming Models
DOMAIN: MULTIMEDIA & IMAGE PROCESSING
1. Mining Semantic Context Information for Intelligent Video
Surveillance of Traffic Scenes
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
2. An Access Point-Based FEC Mechanism for Video Transmission
Over Wireless LANs
3. Interactive Segmentation for Change Detection in Multispectral
Remote-Sensing Images
4. Reversible Data Hiding With Optimal Value Transfer
5. Query-Adaptive Image Search With Hash Codes
6. Reversible Watermarking Based on Invariant Image Classification
and Dynamic Histogram Shifting
7. Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage
8. LDFT-Based Watermarking Resilient to Local Desynchronization
Attacks
9. Image Size Invariant Visual Cryptography for General Access
Structures Subject to Display Quality Constraints
10.Secure Watermarking for Multimedia Content Protection: A Review
of its Benefits and Open Issues
11.Robust Face Recognition for Uncontrolled Pose and Illumination
Changes
FOR MORE IEEE 2012-13 PROJECTS
CONTACT
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
Ambitlick@gmail.com, Phone: 8940956123
PROJECT SUPPORTS £ DELIVERABLES
1.Project Abstract
2.IEEE Paper
3.PPT / Review Details
4.Project Report
5.Working Procedure
6.Screen Shots
7.Video Files
8.Materials & Books
9.Project Certification
---------------------Contact ------------------
Available Bulk Old & New Projects In Low Cost
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
New Projects Are Welcome To
Implementation with Us
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

Contenu connexe

Plus de ambitlick

Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
ambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 

Plus de ambitlick (20)

Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 

Low cost Dotnet IEEE 2013 projects

  • 1. 2013 IEEE JAVA DOTNET PROJECT TITLES DOMAIN: WIRELESS NETWORK PROJECTS 1. A Data Fusion Technique for Wireless Ranging Performance Improvement 2. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling 3. Importance of Coherence Protocols with Network Applications on Multicore Processors 4. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper 5. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks 6. Modeling and Optimizing the Performance- Security Tradeoff on D- NCS Using the Coevolutionary Paradigm 7. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks DOMAIN: MOBILE COMPUTING 1. Capacity of Hybrid Wireless Mesh Networks with Random APs 2. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 3. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self- Interference Cancellation Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 2. 4. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing 5. Quality-Differentiated Video Multicast in Multirate Wireless Networks 6. Evaluating Temporal Robustness of Mobile Networks Rs.4000/- 7. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks 8. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 9. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 10.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 11.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity 12.An Investigation on LTE Mobility Management 13.On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 14.On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks 15.Simple Hybrid and Incremental Postpruning Techniques for Rule Induction Supporting Search-As-You-Type Using SQL in Databases Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 3. 16.Reinforced Similarity Integration in Image-Rich Information Networks 17.Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information 18.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 19.Toward a Statistical Framework for Source Anonymity in Sensor Networks 20.On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling 21.Model-Based Analysis of Wireless System Architectures for Real- Time Applications 22.Successive Interference Cancellation: Carving Out MAC Layer Opportunities 23.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 24.Group-Based Medium Access Control for IEEE 802.11n Wireless LANs 25.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 26.A Secure Payment Scheme with Low Communication and Processing overhead for Multihop Wireless Networks 27.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 4. 28.Secure Communication Based on Ambient Audio 29.Successive Interference Cancellation: Carving Out MAC Layer Opportunities 30.Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 31.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 32.Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 33.Analysis of Distance-Based Location Management in Wireless Communication Networks 34.Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks 35.Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery 36.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 37.Dynamic Coverage of Mobile Sensor Networks 38.In-Network Estimation with Delay Constraints in Wireless Sensor Networks 39.Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor 40.Jamming Games in the MIMO Wiretap Channel With an Active Eaves dropper Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 5. 41.IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments 42.EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 43.Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding 44.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks DOMAIN: NETWORK SECURITY PROJECTS 1. Distance Bounding A Practical Security Solution for Real-Time Location Systems 2. EAACK—A Secure Intrusion-Detection System for MANETs 3. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks DOMAIN: DATA MINING (Data Engineering) 1. Ontology Matching: State of the Art and Future Challenges 2. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data 3. A System to Filter Unwanted Messages from OSN User Walls 4. A Survey of XML Tree Patterns 5. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model 6. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 6. 7. Distributed Web Systems Performance Forecasting Using Turning Bands Method 8. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse 9. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework 10.Ranking on Data Manifold with Sink Points 11.Region-Based Foldings in Process Discovery 12.Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures 13.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence 14.The Generalization Ability of Online Algorithms for Dependent Data 15.Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 16.A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models 17.Large Graph Analysis in the GMine System 18.Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies 19.A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments 20.A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 7. 21.A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 22.AML: Efficient Approximate Membership Localization within a Web-Based Join Framework 23.Event Tracking for Real-Time Unaware Sensitivity Analysis 24.Detecting Intrinsic Loops Underlying Data Manifold 25.Clustering Large Probabilistic Graphs 26.Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 27.Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping 28.Finding Rare Classes: Active Learning with Generative and Discriminative Models 29.Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models DOMAIN: CLOUD COMPUTING 1. QoS Ranking Prediction for Cloud Services 2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds 4. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 8. DOMAIN: PARALLEL & DISTRIBUTED COMPUTING 1. Network Traffic Classification Using Correlation Information 2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 3. Adaptive Network Coding for Broadband Wireless Access Networks 4. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 5. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip 6. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching 7. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision 8. Covering Points of Interest with Mobile Sensors 9. Topology Abstraction Service for IP-VPNs 10.Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller 11.High Performance Resource Allocation Strategies for Computational Economies 12.Strategies for Energy-Efficient Resource Management of Hybrid Programming Models DOMAIN: MULTIMEDIA & IMAGE PROCESSING 1. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 9. 2. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 3. Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images 4. Reversible Data Hiding With Optimal Value Transfer 5. Query-Adaptive Image Search With Hash Codes 6. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting 7. Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage 8. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks 9. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 10.Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues 11.Robust Face Recognition for Uncontrolled Pose and Illumination Changes FOR MORE IEEE 2012-13 PROJECTS CONTACT Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 10. Ambitlick@gmail.com, Phone: 8940956123 PROJECT SUPPORTS £ DELIVERABLES 1.Project Abstract 2.IEEE Paper 3.PPT / Review Details 4.Project Report 5.Working Procedure 6.Screen Shots 7.Video Files 8.Materials & Books 9.Project Certification ---------------------Contact ------------------ Available Bulk Old & New Projects In Low Cost Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 11. New Projects Are Welcome To Implementation with Us Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com