SlideShare une entreprise Scribd logo
1  sur  6
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111
Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com

2013 IEEE PROJECT JAVA TITLES
DOMAIN: WIRELESS NETWORK PROJECTS
A Data Fusion Technique for Wireless Ranging Performance Improvement
Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and
Modulation Scaling
Importance of Coherence Protocols with Network Applications on Multicore Processors
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks
Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm
Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks

DOMAIN: MOBILE COMPUTING
Capacity of Hybrid Wireless Mesh Networks with Random APs
Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks
Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing
Quality-Differentiated Video Multicast in Multirate Wireless Networks
Evaluating Temporal Robustness of Mobile Networks
SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks
Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity
An Investigation on LTE Mobility Management
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks
On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for
Heterogeneous Wireless Networks
Simple Hybrid and Incremental Postpruning Techniques for Rule Induction
Supporting Search-As-You-Type Using SQL in Databases
Reinforced Similarity Integration in Image-Rich Information Networks
Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
Toward a Statistical Framework for Source Anonymity in Sensor Networks
On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling
Model-Based Analysis of Wireless System Architectures for Real-Time Applications
Successive Interference Cancellation: Carving Out MAC Layer Opportunities
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Group-Based Medium Access Control for IEEE 802.11n Wireless LANs
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless
Networks
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
Secure Communication Based on Ambient Audio
Successive Interference Cancellation: Carving Out MAC Layer Opportunities
Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks
Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
Analysis of Distance-Based Location Management in Wireless Communication Networks
Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks
Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery
Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
Dynamic Coverage of Mobile Sensor Networks
In-Network Estimation with Delay Constraints in Wireless Sensor Networks
Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using
Network Coding
Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over
Link-adaptive Networks

DOMAIN: NETWORK SECURITY PROJECTS
Distance Bounding A Practical Security Solution for Real-Time Location Systems
EAACK—A Secure Intrusion-Detection System for MANETs
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

DOMAIN: DATA MINING (Data Engineering)
Ontology Matching: State of the Art and Future Challenges
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A System to Filter Unwanted Messages from OSN User Walls
A Survey of XML Tree Patterns
Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
Distributed Web Systems Performance Forecasting Using Turning Bands Method
Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework
Ranking on Data Manifold with Sink Points
Region-Based Foldings in Process Discovery
Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures
T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence
The Generalization Ability of Online Algorithms for Dependent Data
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised
Models
Large Graph Analysis in the GMine System
Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies
A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance
Environments
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
AML: Efficient Approximate Membership Localization within a Web-Based Join Framework
Event Tracking for Real-Time Unaware Sensitivity Analysis
Detecting Intrinsic Loops Underlying Data Manifold
Clustering Large Probabilistic Graphs
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping
Finding Rare Classes: Active Learning with Generative and Discriminative Models
Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models

DOMAIN: CLOUD COMPUTING
QoS Ranking Prediction for Cloud Services
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based
Encryption
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
On Data Staging Algorithms for Shared Data Accesses in Clouds
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

DOMAIN: PARALLEL & DISTRIBUTED COMPUTING
Network Traffic Classification Using Correlation Information
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based
Encryption
Adaptive Network Coding for Broadband Wireless Access Networks
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip
MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching
Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
Covering Points of Interest with Mobile Sensors
Topology Abstraction Service for IP-VPNs
Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating ModelPredictive Controller
High Performance Resource Allocation Strategies for Computational Economies
Strategies for Energy-Efficient Resource Management of Hybrid Programming Models

DOMAIN: MULTIMEDIA & IMAGE PROCESSING
Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes
An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs
Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images
Reversible Data Hiding With Optimal Value Transfer
Query-Adaptive Image Search With Hash Codes
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage
LDFT-Based Watermarking Resilient to Local Desynchronization Attacks
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality
Constraints
Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues
Robust Face Recognition for Uncontrolled Pose and Illumination Changes

Contenu connexe

En vedette

Probality as the area under the normal curve
Probality as the area under the normal curveProbality as the area under the normal curve
Probality as the area under the normal curveLutvi Tjia
 
Play Group English Learning “W,w” With Two Words
Play Group English Learning  “W,w” With  Two Words �Play Group English Learning  “W,w” With  Two Words �
Play Group English Learning “W,w” With Two Words Cambriannews
 
Medicina general
Medicina generalMedicina general
Medicina generalkevinslin
 
Pretérito indefinido
Pretérito indefinidoPretérito indefinido
Pretérito indefinidoLelitic
 
Historia de la anatomía / planos, ejes y cortes anatómicos
Historia de la anatomía / planos, ejes y cortes anatómicos Historia de la anatomía / planos, ejes y cortes anatómicos
Historia de la anatomía / planos, ejes y cortes anatómicos Daniel Galarza
 

En vedette (8)

Comcepto de algoritmos
Comcepto de algoritmosComcepto de algoritmos
Comcepto de algoritmos
 
Solar power
Solar powerSolar power
Solar power
 
Probality as the area under the normal curve
Probality as the area under the normal curveProbality as the area under the normal curve
Probality as the area under the normal curve
 
Play Group English Learning “W,w” With Two Words
Play Group English Learning  “W,w” With  Two Words �Play Group English Learning  “W,w” With  Two Words �
Play Group English Learning “W,w” With Two Words
 
La web 2.0
La web 2.0La web 2.0
La web 2.0
 
Medicina general
Medicina generalMedicina general
Medicina general
 
Pretérito indefinido
Pretérito indefinidoPretérito indefinido
Pretérito indefinido
 
Historia de la anatomía / planos, ejes y cortes anatómicos
Historia de la anatomía / planos, ejes y cortes anatómicos Historia de la anatomía / planos, ejes y cortes anatómicos
Historia de la anatomía / planos, ejes y cortes anatómicos
 

Similaire à 2014 ieee project java titles

2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titlesEcway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titlesEcwaytechnoz
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcway2004
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwaytechnoz
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titlesEcway2004
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titlesEcwaytechnoz
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcwaytechnoz
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcway2004
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcwayt
 
Generic technology ieee projects titles,ieee projects 2011, final year projec...
Generic technology ieee projects titles,ieee projects 2011, final year projec...Generic technology ieee projects titles,ieee projects 2011, final year projec...
Generic technology ieee projects titles,ieee projects 2011, final year projec...Senthilkumar Kumar
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application ProjectsHari Krishnan
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEallmightinfo
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titlesGeneric Technology
 
IEEE JAVA 2013 Titles
IEEE JAVA 2013 TitlesIEEE JAVA 2013 Titles
IEEE JAVA 2013 Titlessaranya G
 

Similaire à 2014 ieee project java titles (17)

2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titles
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
Generic technology ieee projects titles,ieee projects 2011, final year projec...
Generic technology ieee projects titles,ieee projects 2011, final year projec...Generic technology ieee projects titles,ieee projects 2011, final year projec...
Generic technology ieee projects titles,ieee projects 2011, final year projec...
 
IEEE 2011 October titles
IEEE 2011 October titles IEEE 2011 October titles
IEEE 2011 October titles
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titles
 
IEEE JAVA 2013 Titles
IEEE JAVA 2013 TitlesIEEE JAVA 2013 Titles
IEEE JAVA 2013 Titles
 

Plus de Ecwaytechnoz

Wheelztracker.pptx
Wheelztracker.pptxWheelztracker.pptx
Wheelztracker.pptxEcwaytechnoz
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwaytechnoz
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwaytechnoz
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwaytechnoz
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwaytechnoz
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwaytechnoz
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwaytechnoz
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwaytechnoz
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwaytechnoz
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwaytechnoz
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwaytechnoz
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwaytechnoz
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwaytechnoz
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwaytechnoz
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwaytechnoz
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwaytechnoz
 

Plus de Ecwaytechnoz (20)

Wheelztracker.pptx
Wheelztracker.pptxWheelztracker.pptx
Wheelztracker.pptx
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Dernier

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

2014 ieee project java titles

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111 Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com 2013 IEEE PROJECT JAVA TITLES DOMAIN: WIRELESS NETWORK PROJECTS A Data Fusion Technique for Wireless Ranging Performance Improvement Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling Importance of Coherence Protocols with Network Applications on Multicore Processors Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks DOMAIN: MOBILE COMPUTING Capacity of Hybrid Wireless Mesh Networks with Random APs Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing Quality-Differentiated Video Multicast in Multirate Wireless Networks
  • 2. Evaluating Temporal Robustness of Mobile Networks SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity An Investigation on LTE Mobility Management On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks Simple Hybrid and Incremental Postpruning Techniques for Rule Induction Supporting Search-As-You-Type Using SQL in Databases Reinforced Similarity Integration in Image-Rich Information Networks Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling Model-Based Analysis of Wireless System Architectures for Real-Time Applications Successive Interference Cancellation: Carving Out MAC Layer Opportunities Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Group-Based Medium Access Control for IEEE 802.11n Wireless LANs Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
  • 3. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Secure Communication Based on Ambient Audio Successive Interference Cancellation: Carving Out MAC Layer Opportunities Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks Analysis of Distance-Based Location Management in Wireless Communication Networks Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks Dynamic Coverage of Mobile Sensor Networks In-Network Estimation with Delay Constraints in Wireless Sensor Networks Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks DOMAIN: NETWORK SECURITY PROJECTS Distance Bounding A Practical Security Solution for Real-Time Location Systems EAACK—A Secure Intrusion-Detection System for MANETs
  • 4. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks DOMAIN: DATA MINING (Data Engineering) Ontology Matching: State of the Art and Future Challenges A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A System to Filter Unwanted Messages from OSN User Walls A Survey of XML Tree Patterns Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Distributed Web Systems Performance Forecasting Using Turning Bands Method Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework Ranking on Data Manifold with Sink Points Region-Based Foldings in Process Discovery Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence The Generalization Ability of Online Algorithms for Dependent Data Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models Large Graph Analysis in the GMine System Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments
  • 5. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia AML: Efficient Approximate Membership Localization within a Web-Based Join Framework Event Tracking for Real-Time Unaware Sensitivity Analysis Detecting Intrinsic Loops Underlying Data Manifold Clustering Large Probabilistic Graphs Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping Finding Rare Classes: Active Learning with Generative and Discriminative Models Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models DOMAIN: CLOUD COMPUTING QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds Optimal Multiserver Configuration for Profit Maximization in Cloud Computing DOMAIN: PARALLEL & DISTRIBUTED COMPUTING Network Traffic Classification Using Correlation Information Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Adaptive Network Coding for Broadband Wireless Access Networks Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
  • 6. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision Covering Points of Interest with Mobile Sensors Topology Abstraction Service for IP-VPNs Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating ModelPredictive Controller High Performance Resource Allocation Strategies for Computational Economies Strategies for Energy-Efficient Resource Management of Hybrid Programming Models DOMAIN: MULTIMEDIA & IMAGE PROCESSING Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images Reversible Data Hiding With Optimal Value Transfer Query-Adaptive Image Search With Hash Codes Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage LDFT-Based Watermarking Resilient to Local Desynchronization Attacks Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues Robust Face Recognition for Uncontrolled Pose and Illumination Changes