2013 IEEE JAVA DOTNET PROJECT
TITLES
DOMAIN: WIRELESS NETWORK PROJECTS
1. A Data Fusion Technique for Wireless Ranging Performance
Improvement
2. Harvesting-Aware Energy Management for Time-Critical Wireless
Sensor Networks With Joint Voltage and Modulation Scaling
3. Importance of Coherence Protocols with Network Applications on
Multicore Processors
4. Jamming Games in the MIMO Wiretap Channel With an Active
Eavesdropper
5. Channel Allocation and Routing in Hybrid Multichannel Multiradio
Wireless Mesh Networks
6. Modeling and Optimizing the Performance- Security Tradeoff on D-
NCS Using the Coevolutionary Paradigm
7. Localization-Based Radio Model Calibration for Fault-Tolerant
Wireless Mesh Networks
DOMAIN: MOBILE COMPUTING
1. Capacity of Hybrid Wireless Mesh Networks with Random APs
2. Power Allocation for Statistical QoS Provisioning in Opportunistic
Multi-Relay DF Cognitive Networks
3. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-
Interference Cancellation
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
4. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event
Sensing
5. Quality-Differentiated Video Multicast in Multirate Wireless
Networks
6. Evaluating Temporal Robustness of Mobile Networks Rs.4000/-
7. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor
Networks
8. Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
9. A Resource Allocation Scheme for Scalable Video Multicast in
WiMAX Relay Networks
10.Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
11.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’
Heterogeneity
12.An Investigation on LTE Mobility Management
13.On Exploiting Transient Social Contact Patterns for Data
Forwarding in Delay-Tolerant Networks
14.On the Real-Time Hardware Implementation Feasibility of Joint
Radio Resource Management Policies for Heterogeneous Wireless
Networks
15.Simple Hybrid and Incremental Postpruning Techniques for Rule
Induction Supporting Search-As-You-Type Using SQL in Databases
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
16.Reinforced Similarity Integration in Image-Rich Information
Networks
17.Autonomous Sensing Order Selection Strategies Exploiting Channel
Access Information
18.Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
19.Toward a Statistical Framework for Source Anonymity in Sensor
Networks
20.On Centralized and Localized Approximation Algorithms for
Interference-Aware Broadcast Scheduling
21.Model-Based Analysis of Wireless System Architectures for Real-
Time Applications
22.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
23.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
24.Group-Based Medium Access Control for IEEE 802.11n Wireless
LANs
25.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
26.A Secure Payment Scheme with Low Communication and Processing
overhead for Multihop Wireless Networks
27.A Scalable Server Architecture for Mobile Presence Services in Social
Network Applications
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
28.Secure Communication Based on Ambient Audio
29.Successive Interference Cancellation: Carving Out MAC Layer
Opportunities
30.Cross-Layer Design of Congestion Control and Power Control in
Fast-Fading Wireless Networks
31.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body
Area Networks
32.Cluster-Based Certificate Revocation with Vindication Capability for
Mobile Ad Hoc Networks
33.Analysis of Distance-Based Location Management in Wireless
Communication Networks
34.Gaussian versus Uniform Distribution for Intrusion Detection in
Wireless Sensor Networks
35.Fast Channel Zapping with Destination-Oriented Multicast for IP
Video Delivery
36.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
37.Dynamic Coverage of Mobile Sensor Networks
38.In-Network Estimation with Delay Constraints in Wireless Sensor
Networks
39.Microarchitecture of a Coarse-Grain Out-of-Order Superscalar
Processor
40.Jamming Games in the MIMO Wiretap Channel With an Active
Eaves dropper
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
41.IDM: An Indirect Dissemination Mechanism for Spatial Voice
Interaction in Networked Virtual Environments
42.EMAP Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
43.Channel Assignment for Throughput Optimization in Multichannel
Multiradio Wireless Mesh Networks Using Network Coding
44.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm
for Scalable Video Transmission Over Link-adaptive Networks
DOMAIN: NETWORK SECURITY PROJECTS
1. Distance Bounding A Practical Security Solution for Real-Time
Location Systems
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
DOMAIN: DATA MINING (Data Engineering)
1. Ontology Matching: State of the Art and Future Challenges
2. A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
3. A System to Filter Unwanted Messages from OSN User Walls
4. A Survey of XML Tree Patterns
5. Automatic Semantic Content Extraction in Videos Using a Fuzzy
Ontology and Rule-Based Model
6. Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
7. Distributed Web Systems Performance Forecasting Using Turning
Bands Method
8. Evaluating Data Reliability An Evidential Answer with Application to
a Web-Enabled Data Warehouse
9. Maximum Likelihood Estimation from Uncertain Data in the Belief
Function Framework
10.Ranking on Data Manifold with Sink Points
11.Region-Based Foldings in Process Discovery
12.Relationships between Diversity of Classification Ensembles and
Single-Class Performance Measures
13.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence
14.The Generalization Ability of Online Algorithms for Dependent Data
15.Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
16.A Graph-Based Consensus Maximization Approach for Combining
Multiple Supervised and Unsupervised Models
17.Large Graph Analysis in the GMine System
18.Nonadaptive Mastermind Algorithms for String and Vector
Databases, with Case Studies
19.A Rough-Set-Based Incremental Approach for Updating
Approximations under Dynamic Maintenance Environments
20.A Proxy-Based Approach to Continuous Location-Based Spatial
Queries in Mobile Environments
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
21.A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
22.AML: Efficient Approximate Membership Localization within a
Web-Based Join Framework
23.Event Tracking for Real-Time Unaware Sensitivity Analysis
24.Detecting Intrinsic Loops Underlying Data Manifold
25.Clustering Large Probabilistic Graphs
26.Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
27.Minimally Supervised Novel Relation Extraction Using a Latent
Relational Mapping
28.Finding Rare Classes: Active Learning with Generative and
Discriminative Models
29.Fast Activity Detection: Indexing for Temporal Stochastic
Automaton-Based Activity Models
DOMAIN: CLOUD COMPUTING
1. QoS Ranking Prediction for Cloud Services
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute- Based Encryption
3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud On Data Staging Algorithms for Shared Data Accesses in
Clouds
4. Optimal Multiserver Configuration for Profit Maximization in Cloud
Computing
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
DOMAIN: PARALLEL & DISTRIBUTED COMPUTING
1. Network Traffic Classification Using Correlation Information
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute- Based Encryption
3. Adaptive Network Coding for Broadband Wireless Access Networks
4. Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks
5. Online Real-Time Task Scheduling in Heterogeneous Multicore
System-on-a-Chip
6. MIN-MAX: A Counter-Based Algorithm for Regular Expression
Matching
7. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
8. Covering Points of Interest with Mobile Sensors
9. Topology Abstraction Service for IP-VPNs
10.Thermal and Energy Management of High-Performance Multicores:
Distributed and Self-Calibrating Model-Predictive Controller
11.High Performance Resource Allocation Strategies for Computational
Economies
12.Strategies for Energy-Efficient Resource Management of Hybrid
Programming Models
DOMAIN: MULTIMEDIA & IMAGE PROCESSING
1. Mining Semantic Context Information for Intelligent Video
Surveillance of Traffic Scenes
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
2. An Access Point-Based FEC Mechanism for Video Transmission
Over Wireless LANs
3. Interactive Segmentation for Change Detection in Multispectral
Remote-Sensing Images
4. Reversible Data Hiding With Optimal Value Transfer
5. Query-Adaptive Image Search With Hash Codes
6. Reversible Watermarking Based on Invariant Image Classification
and Dynamic Histogram Shifting
7. Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage
8. LDFT-Based Watermarking Resilient to Local Desynchronization
Attacks
9. Image Size Invariant Visual Cryptography for General Access
Structures Subject to Display Quality Constraints
10.Secure Watermarking for Multimedia Content Protection: A Review
of its Benefits and Open Issues
11.Robust Face Recognition for Uncontrolled Pose and Illumination
Changes
FOR MORE IEEE 2012-13 PROJECTS
CONTACT
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
Ambitlick@gmail.com, Phone: 8940956123
PROJECT SUPPORTS £ DELIVERABLES
1.Project Abstract
2.IEEE Paper
3.PPT / Review Details
4.Project Report
5.Working Procedure
6.Screen Shots
7.Video Files
8.Materials & Books
9.Project Certification
---------------------Contact ------------------
Available Bulk Old & New Projects In Low Cost
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
New Projects Are Welcome To
Implementation with Us
Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

More Related Content

DOCX
Java project 2013
DOCX
2013 ieee .net project titles
DOCX
2013 ieee project dotnet titles
DOCX
2013 ieee project java titles
DOC
Java non ieee project titles 2013-2014
DOC
Ieee 2014 java projects list
DOC
Ieee 2013 dot net projects list
DOC
Projecttitles 2013
Java project 2013
2013 ieee .net project titles
2013 ieee project dotnet titles
2013 ieee project java titles
Java non ieee project titles 2013-2014
Ieee 2014 java projects list
Ieee 2013 dot net projects list
Projecttitles 2013

Similar to Low cost Java IEEE Projects 2013 (20)

DOCX
2013 ieee .net project titles
DOCX
2013 ieee .net project titles
PDF
2013 ieee ns2 project titles
DOCX
2013 ieee project ns2 titles
DOCX
2014 ieee project ns2 titles
DOCX
2013 ieee ns2 project titles
DOCX
2014 ieee project ns2 titles
DOCX
2013 ieee project ns2 titles
DOCX
2014 ieee project ns2 titles
DOCX
2013 ieee project ns2 titles
DOCX
2013 ieee project ns2 titles
DOCX
2014 ieee project ns2 titles
DOCX
2013 ieee project ns2 titles
DOCX
2014 ieee java project titles
DOCX
2014 ieee java project titles
DOCX
2014 ieee java project titles
DOCX
2014 ieee project dotnet titles
DOCX
2013 ieee project dotnet titles
DOCX
2014 ieee project dotnet titles
DOCX
2014 ieee project dotnet titles
2013 ieee .net project titles
2013 ieee .net project titles
2013 ieee ns2 project titles
2013 ieee project ns2 titles
2014 ieee project ns2 titles
2013 ieee ns2 project titles
2014 ieee project ns2 titles
2013 ieee project ns2 titles
2014 ieee project ns2 titles
2013 ieee project ns2 titles
2013 ieee project ns2 titles
2014 ieee project ns2 titles
2013 ieee project ns2 titles
2014 ieee java project titles
2014 ieee java project titles
2014 ieee java project titles
2014 ieee project dotnet titles
2013 ieee project dotnet titles
2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ad

More from ambitlick (20)

PPTX
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DOCX
Low cost Java 2013 IEEE projects
DOC
Ambitlick ns2 2013
DOCX
Handling selfishness in replica allocation
DOCX
Mutual distance bounding protocols
DOCX
Moderated group authoring system for campus wide workgroups
DOCX
Efficient spread spectrum communication without pre shared secrets
DOC
IEEE -2012-13 Projects IN NS2
PPTX
Adaptive weight factor estimation from user review 1
DOC
Integrated institutional portal
DOC
Embassy
DOC
Crm
DOCX
Mutual distance bounding protocols
DOCX
Moderated group authoring system for campus wide workgroups
DOCX
Efficient spread spectrum communication without pre shared secrets
DOCX
Comments on “mabs multicast authentication based on batch signature”
DOC
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
PDF
Energy efficient protocol for deterministic
PDF
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
PDF
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
Low cost Java 2013 IEEE projects
Ambitlick ns2 2013
Handling selfishness in replica allocation
Mutual distance bounding protocols
Moderated group authoring system for campus wide workgroups
Efficient spread spectrum communication without pre shared secrets
IEEE -2012-13 Projects IN NS2
Adaptive weight factor estimation from user review 1
Integrated institutional portal
Embassy
Crm
Mutual distance bounding protocols
Moderated group authoring system for campus wide workgroups
Efficient spread spectrum communication without pre shared secrets
Comments on “mabs multicast authentication based on batch signature”
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy efficient protocol for deterministic
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Ad

Recently uploaded (20)

PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
anganwadi services for the b.sc nursing and GNM
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Compact First Student's Book Cambridge Official
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Reproductive system-Human anatomy and physiology
PPTX
Macbeth play - analysis .pptx english lit
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
African Communication Research: A review
PDF
Health aspects of bilberry: A review on its general benefits
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
anganwadi services for the b.sc nursing and GNM
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Compact First Student's Book Cambridge Official
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Climate Change and Its Global Impact.pptx
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
UNIT_2-__LIPIDS[1].pptx.................
Reproductive system-Human anatomy and physiology
Macbeth play - analysis .pptx english lit
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
African Communication Research: A review
Health aspects of bilberry: A review on its general benefits

Low cost Java IEEE Projects 2013

  • 1. 2013 IEEE JAVA DOTNET PROJECT TITLES DOMAIN: WIRELESS NETWORK PROJECTS 1. A Data Fusion Technique for Wireless Ranging Performance Improvement 2. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling 3. Importance of Coherence Protocols with Network Applications on Multicore Processors 4. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper 5. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks 6. Modeling and Optimizing the Performance- Security Tradeoff on D- NCS Using the Coevolutionary Paradigm 7. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks DOMAIN: MOBILE COMPUTING 1. Capacity of Hybrid Wireless Mesh Networks with Random APs 2. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 3. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self- Interference Cancellation Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 2. 4. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing 5. Quality-Differentiated Video Multicast in Multirate Wireless Networks 6. Evaluating Temporal Robustness of Mobile Networks Rs.4000/- 7. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks 8. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 9. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 10.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 11.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity 12.An Investigation on LTE Mobility Management 13.On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 14.On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks 15.Simple Hybrid and Incremental Postpruning Techniques for Rule Induction Supporting Search-As-You-Type Using SQL in Databases Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 3. 16.Reinforced Similarity Integration in Image-Rich Information Networks 17.Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information 18.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 19.Toward a Statistical Framework for Source Anonymity in Sensor Networks 20.On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling 21.Model-Based Analysis of Wireless System Architectures for Real- Time Applications 22.Successive Interference Cancellation: Carving Out MAC Layer Opportunities 23.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 24.Group-Based Medium Access Control for IEEE 802.11n Wireless LANs 25.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 26.A Secure Payment Scheme with Low Communication and Processing overhead for Multihop Wireless Networks 27.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 4. 28.Secure Communication Based on Ambient Audio 29.Successive Interference Cancellation: Carving Out MAC Layer Opportunities 30.Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 31.Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 32.Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 33.Analysis of Distance-Based Location Management in Wireless Communication Networks 34.Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks 35.Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery 36.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 37.Dynamic Coverage of Mobile Sensor Networks 38.In-Network Estimation with Delay Constraints in Wireless Sensor Networks 39.Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor 40.Jamming Games in the MIMO Wiretap Channel With an Active Eaves dropper Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 5. 41.IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments 42.EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 43.Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding 44.Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks DOMAIN: NETWORK SECURITY PROJECTS 1. Distance Bounding A Practical Security Solution for Real-Time Location Systems 2. EAACK—A Secure Intrusion-Detection System for MANETs 3. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks DOMAIN: DATA MINING (Data Engineering) 1. Ontology Matching: State of the Art and Future Challenges 2. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data 3. A System to Filter Unwanted Messages from OSN User Walls 4. A Survey of XML Tree Patterns 5. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model 6. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 6. 7. Distributed Web Systems Performance Forecasting Using Turning Bands Method 8. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse 9. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework 10.Ranking on Data Manifold with Sink Points 11.Region-Based Foldings in Process Discovery 12.Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures 13.T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence 14.The Generalization Ability of Online Algorithms for Dependent Data 15.Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 16.A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models 17.Large Graph Analysis in the GMine System 18.Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies 19.A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments 20.A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 7. 21.A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 22.AML: Efficient Approximate Membership Localization within a Web-Based Join Framework 23.Event Tracking for Real-Time Unaware Sensitivity Analysis 24.Detecting Intrinsic Loops Underlying Data Manifold 25.Clustering Large Probabilistic Graphs 26.Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 27.Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping 28.Finding Rare Classes: Active Learning with Generative and Discriminative Models 29.Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models DOMAIN: CLOUD COMPUTING 1. QoS Ranking Prediction for Cloud Services 2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds 4. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 8. DOMAIN: PARALLEL & DISTRIBUTED COMPUTING 1. Network Traffic Classification Using Correlation Information 2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 3. Adaptive Network Coding for Broadband Wireless Access Networks 4. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 5. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip 6. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching 7. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision 8. Covering Points of Interest with Mobile Sensors 9. Topology Abstraction Service for IP-VPNs 10.Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller 11.High Performance Resource Allocation Strategies for Computational Economies 12.Strategies for Energy-Efficient Resource Management of Hybrid Programming Models DOMAIN: MULTIMEDIA & IMAGE PROCESSING 1. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 9. 2. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 3. Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images 4. Reversible Data Hiding With Optimal Value Transfer 5. Query-Adaptive Image Search With Hash Codes 6. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting 7. Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage 8. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks 9. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 10.Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues 11.Robust Face Recognition for Uncontrolled Pose and Illumination Changes FOR MORE IEEE 2012-13 PROJECTS CONTACT Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 10. [email protected], Phone: 8940956123 PROJECT SUPPORTS £ DELIVERABLES 1.Project Abstract 2.IEEE Paper 3.PPT / Review Details 4.Project Report 5.Working Procedure 6.Screen Shots 7.Video Files 8.Materials & Books 9.Project Certification ---------------------Contact ------------------ Available Bulk Old & New Projects In Low Cost Ambit lick Solutions Mail Id: [email protected] , [email protected]
  • 11. New Projects Are Welcome To Implementation with Us Ambit lick Solutions Mail Id: [email protected] , [email protected]