Sei sulla pagina 1di 16

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101

#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS DOTNET DATA MINING 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2. Secure Mining of Association Rules in Horizontally Distributed Databases. 3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models 4. ELCA: Evaluation for Keyword Search on Probabilistic XML a Data 5. Dynamic Query Forms for Database Queries 6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors 7. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse 8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 9. Optimal Route Queries with Arbitrary Order Constraints 10. Failure-Aware Cascaded Suppression in Wireless Sensor Networks 11. A Probabilistic Approach to String Transformation 12. Protecting Sensitive Labels in Social Network Data Anonymization 13. Mining Contracts for Business Events And Temporal Constraints in Service Engagements 14. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 15. Mining Interaction Patterns among Brain Regions by Clustering 16. Equality to Equals and Unequals*: A Revisit of the Equivalence and Nonequivalence Criteria in Class-Level Testing of Object-Oriented Software

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
NETWORKING AND NETWORK SECURITY

17. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 18. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network 19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems 20. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning Delay-Based Network Utility Maximization 21. Answering What-If Deployment and Configuration Questions With WISE: Techniques and Deployment Experience 22. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks 23. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks

CLOUD COMPUTING
24. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 25. Privacy-Preserving Public Auditing for Secure Cloud Storage 26. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based

Encryption
27. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 28. CloudMoV: Cloud-based Mobile Social TV 29. Privacy Preserving Delegated Access Control in Public Clouds 30. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.

31. Security and Privacy in Cloud Computing

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
32. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds 33. Privacy-Preserving Public Auditing for Secure Cloud Storage 34. Fault Node Recovery Algorithm for a Wireless Sensor Network

MOBILE COMPUTING 35. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 36. EAACKA Secure Intrusion-Detection System for MANETs 37. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users 38. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 39. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks 40. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 41. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 42. IP-Geolocation Mapping for Moderately Connected Internet Regions 43. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users 44. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks PARALLEL DISTRIBUTED SYSTEMS

45. A Model Approach to the Estimation of Peer-to-Peer Traf?c Matrices 46. Exploiting Service Similarity for Privacy in Location Based Search Queries 47. IP-Geolocation Mapping for Moderately Connected Internet Regions

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
48. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks

49. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 50. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds 51. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments 52. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks 53. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization 54. A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks

SERVICE COMPUTING 55. Privacy-Enhanced Web Service Composition 56. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 57. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 58. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 59. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 60. Commitments to Regulate Social Web Services Operation IMAGE PROCESSING

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
61. Face Recognition and Verication Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation 62. Automatic Dynamic Texture Segmentation Using Local Descriptors and Optical Flow

BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS

JAVA
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data 3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models 4. A Survey of XML Tree Patterns 5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors 6. Dynamic Personalized Recommendation on Sparse Data 7. Mining User Queries with Markov Chains: Application to Online Image Retrieval 8. Optimal Route Queries with Arbitrary Order Constraints 9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks 10. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model 11. A System to Filter Unwanted Messages from OSN User Walls 12. M-Privacy for Collaborative Data Publishing
13. Comparable Entity Mining from Comparative Questions

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
14. Spatial Approximate String Search

15. Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse -

NETWORKING AND NETWORK SECURITY


16. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 17. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks 18. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems 20. Efficient Algorithms for Neighbor Discovery in Wireless Networks 21. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning 22. Answering What-If Deployment and Configuration Questions With WISE: Techniques and Deployment Experience 23. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks 24. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks 25. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks 26. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 27. Participatory Privacy Enabling Privacy in Participatory Sensing

CLOUD COMPUTING
28. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 29. Privacy-Preserving Public Auditing for Secure Cloud Storage 30. Winds of Change From Vendor Lock-In to the Meta Cloud.

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
31. Cloud computing for mobile users can offloading compution save energy. 32. On Data Staging Algorithms for Shared Data Accesses in Clouds 33. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
34. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds. 35. CloudMoV: Cloud-based Mobile Social TV 36. QoS Ranking Prediction for Cloud Services

37. Privacy-Preserving Public Auditing for Secure Cloud Storage


38. Collaboration in Multicloud Computing Environments: Framework and Security Issues 39. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 40. Towards Differential Query Services in Cost-Efficient Clouds

MOBILE COMPUTING
41. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 42. EAACK :A Secure Intrusion-Detection System for MANETs 43. Vampire attacks:Draining life from wireless ad-hoc sensor networks. 44. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks 45. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks 46. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 48. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications 49. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
50. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 51. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 52. Community-Aware Opportunistic Routing in Mobile Social Networks 53. Distributed Cooperative Caching in Social Wireless Networks 54. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation 55. Toward a Statistical Framework for Source Anonymity in Sensor Networks

PARALLEL DISTRIBUTED SYSTEMS


56. Covering Points of Interest with Mobile Sensors 57. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 58. Analysis of Distance-Based Location Management in Wireless Communication Networks 59. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 60. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 61. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
62. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 63. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds

64. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments 65. Towards Differential Query Services in Cost-Efficient Clouds 66. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud 67. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
68. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks. 69. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks .

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com SERVICE COMPUTING


70. Privacy-Enhanced Web Service Composition 71. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 72. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 73. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 74. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

SECURE COMPUTING
75. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. 76. Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs. 77. Two tales of privacy in online social networks.

BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS

ANDROID

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com DATA MINING


1. Finding Rare Classes Active Learning with Generative and Discriminative Models 2. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 3. A Survey of XML Tree Patterns 4. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 5. T-Drive Enhancing Driving Directions with Taxi Driversc Intelligence 6. Region-Based Foldings in Process Discovery 7. Ranking on Data Manifold with Sink Points 8. Evaluating Data Reliability An Evidential Answer with Application to a WebEnabled Data Warehouse

CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage 10. Scalable and Secure Sharing of Personal Computing Using Attribute-Based Encryption Health Records in Cloud

11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 12. CloudMoV: Cloud-based Mobile Social TV

MOBILE COMPUTING

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 14. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 15. SSD A Robust RF Location Fingerprint Addressing Mobile Devices Heterogeneity 16. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications 17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

PARALLEL DISTRIBUTED SYSTEMS


18. Distributed Web Systems Performance Forecasting Using Turning Bands Method 19. Scalable and Secure Sharing of Personal Computing Using Attribute-Based Encryption Health Records in Cloud

20. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 21. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 22. Analysis of Distance-Based Communication Networks Location Management in Wireless

SERVICE COMPUTING
23. Enforcing Secure and Privacy-Preserving Distributed Information Sharing Information Brokering in

24. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
25. Enforcing Secure and Privacy-Preserving Distributed Information Sharing Information Brokering in

IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS MATLAB


1. A robust digital watermarking scheme for video copyright protection in the wavelet domain MECS1301 2. Active Contour-Based Visual Tracking by Integrating Colors, Shapes, and Motions MECS1302 3. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1303 4. An Analog Sub-Miliwatt CMOS Image Sensor With Pixel-Level Convolution Processing MECS1304 5. An automated supervised method for the diagnosis of Alzheimer disease based on FMRI MECS1305 6. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism MECS1306 7. Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images MECS1307 8. Canny Edge Detection MECS1308 9. Efcient Method for Content Reconstruction With Self-Embedding. MECS1309 10. Enhancement of Angiogram Images Using Pseudo Color Processing MECS1310 11. Exploring Whole Brain fMRI Data with Unsupervised Artificial Neural Network MECS1311 12. Hyperspectral Image Representation and Processing With Binary Partition Trees. MECS1312 13. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. MECS1313 14. Image Enhancement Using the Hypothesis Selection Filter: Theory and Application to JPEG Decoding MECS1314 15. Image Processing Using Smooth Ordering of its Patches MECS1315

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
16. Image Noise Level Estimation by Principal Component Analysis MECS1316 17. locally adaptive bilateral clustering for image deblurring and sharpness enhancement MECS1317 18. Mining Semantic Context Information for Intelligent Video Surveillance of Trafc Scenes MECS1318 19. What Are We Tracking: A Unied Approach of Tracking and Recognition MECS1320 20. Separable Markov Random Field Model and Its Applications in Low Level Vision MECS1321 21. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1322 22. A Modied Model of the Just Noticeable Depth Difference and its Application to Depth Sensation Enhancemen MECS1323 23. Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation MECS1324 24. A hybrid multiview stereo algorithm for modeling urban scenes MECS1325 25. Parallel Sparse Spectral Clustering for SAR Image Segmentation MECS1326 26. Noise Cancellation on ECG and Heart Rate Signals Using the Undecimated Wavelet Transform MECS1327 27. Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes MECS1328 28. Underwater Image Enhancement by Wavelength Compensation and Dehazing MECS1329 29. Reversible Watermarking Based on Invariant Image Classication and Dynamic Histogram Shifting MECS1330 30. Multichannel Non-Local Means Fusion for Color Image Denoising MECS1331 31. Nonlocal Image Restoration With Bilateral Variance Estimation: A Low-Rank Approach MECS1332 32. Image and Video Restorations via Nonlocal Kernel Regression MECS133 33. A Self-Learning Approach to Single Image Super-Resolution MECS1334 34. Object-level Image Segmentation Using Low Level Cues MECS1335

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
35. Sparse Representation Based Image Interpolation With Nonlocal Autoregressive Modeling MECS1336 36. Modeling Natural Images Using Gated MRFs MECS1337 37. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1338 38. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1339 39. Casual stereoscopic Photo Athoring MECS1340 40. Recognition of Human Iris Patterns for Biometric Identification MECS1341 41. Analysis Operator Learning and its Application to Image Reconstruction MECS1342 42. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1343 43. Spatially Varying Color Distributions for Interactive Multilabel Segmentation MECS1344 44. Exemplar-Based Image Inpainting Using Multiscale Graph Cuts MECS1345 45. Nonlocally Centralized Sparse Representation for Image Restoration MECS1346 46. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1347 47. Signal Processing Of Heart Rate Variability Using Wavelet Transform For Mental Stress Measurement MECS1348 48. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting MECS1349 49. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes MECS1350 50. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks MECS1351 51. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints MECS1352

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com

IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS

NS2
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. NECS1301 2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications NECS1302 3. Toward a Statistical Framework for Source Anonymity in Sensor Networks NECS1303
4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks NECS1304

5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. NECS1305 6. Capacity of Hybrid Wireless Mesh Networks with Random APs. NECS1306 7. EAACK A Secure Intrusion-Detection System for MANETs. NECS1307 8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation NECS1308 9. Distance Bounding A Practical Security Solution for Real-Time Location Systems. NECS1309 10. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks NECS1310 11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1311 12. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks NECS1312 13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. NECS1313 14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network. NECS1314 15. In-Network Estimation with Delay Constraints in Wireless Sensor Network. NECS1315

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS (0)9751442511, 9750610101


#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011. tech@ecruitments.com

www.ecruitments.com
16. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling. NECS1316 17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. NECS1317 18. Network Traffic Classification Using Correlation Information NECS1318 19. Quality-Differentiated Video Multicast in Multirate Wireless Networks NECS1319 20. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks NECS1320 21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. NECS1321 22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1322 23. Analysis of Distance-Based Location Management in Wireless Communication Networks. NECS1323
24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. NECS1324

ECRUITMENT SOLUTIONS tech@ecruitments.com

(0)9751442511

Potrebbero piacerti anche