Вы находитесь на странице: 1из 16

ECRUITMENT SOLUTIONS

(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
gmail IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS

DOTNET
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn
Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML a Data
5. Dynamic Query Forms for Database Queries
6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
7. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data
Warehouse
8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
9. Optimal Route Queries with Arbitrary Order Constraints
10. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
11. A Probabilistic Approach to String Transformation
12. Protecting Sensitive Labels in Social Network Data Anonymization
13. Mining Contracts for Business Events And Temporal Constraints in Service Engagements
14. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
15. Mining Interaction Patterns among Brain Regions by Clustering
16. Equality to Equals and Unequals*: A Revisit of the Equivalence and Nonequivalence Criteria in
Class-Level Testing of Object-Oriented Software

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
NETWORKING AND NETWORK SECURITY

17. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System


18. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network
19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
20. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based
Learning Delay-Based Network Utility Maximization
21. Answering What-If Deployment and Configuration Questions With WISE: Techniques and
Deployment Experience
22. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
23. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks

CLOUD COMPUTING
24. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
25. Privacy-Preserving Public Auditing for Secure Cloud Storage
26. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based

Encryption
27. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
28. CloudMoV: Cloud-based Mobile Social TV
29. Privacy Preserving Delegated Access Control in Public Clouds
30. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.

31. Security and Privacy in Cloud Computing

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
32. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
33. Privacy-Preserving Public Auditing for Secure Cloud Storage
34. Fault Node Recovery Algorithm for a Wireless Sensor Network

MOBILE COMPUTING
35. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad
Hoc Networks
36. EAACKA Secure Intrusion-Detection System for MANETs
37. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
38. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
39. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc
Networks
40. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
41. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
42. IP-Geolocation Mapping for Moderately Connected Internet Regions
43. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
44. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
PARALLEL DISTRIBUTED SYSTEMS

45. A Model Approach to the Estimation of Peer-to-Peer Traf?c Matrices


46. Exploiting Service Similarity for Privacy in Location Based Search Queries
47. IP-Geolocation Mapping for Moderately Connected Internet Regions

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
48. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks

49. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
50. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
51. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments
52. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
53. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its
Efficient Parallelization
54. A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor
Networks

SERVICE COMPUTING
55. Privacy-Enhanced Web Service Composition
56. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
57. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
58. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
59. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
60. Commitments to Regulate Social Web Services Operation
IMAGE PROCESSING

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
61. Face Recognition and Verication Using Photometric Stereo: The Photo face Database and a
Comprehensive Evaluation
62. Automatic Dynamic Texture Segmentation Using Local Descriptors and Optical Flow

BULK IEEE 2013 PROJECTS TITLES IN


ECRUITMENT SOLUTIONS

JAVA
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn
Prediction Models
4. A Survey of XML Tree Patterns
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Dynamic Personalized Recommendation on Sparse Data
7. Mining User Queries with Markov Chains: Application to Online Image Retrieval
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
11. A System to Filter Unwanted Messages from OSN User Walls
12. M-Privacy for Collaborative Data Publishing
13. Comparable Entity Mining from Comparative Questions

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
14. Spatial Approximate String Search

15. Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse
-

NETWORKING AND NETWORK SECURITY


16. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
17. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
18. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
20. Efficient Algorithms for Neighbor Discovery in Wireless Networks
21. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
22. Answering What-If Deployment and Configuration Questions With WISE: Techniques and
Deployment Experience
23. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
24. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
25. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
26. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
27. Participatory Privacy Enabling Privacy in Participatory Sensing

CLOUD COMPUTING
28. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
29. Privacy-Preserving Public Auditing for Secure Cloud Storage
30. Winds of Change From Vendor Lock-In to the Meta Cloud.

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
31. Cloud computing for mobile users can offloading compution save energy.
32. On Data Staging Algorithms for Shared Data Accesses in Clouds
33. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
34. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in
the Clouds.
35. CloudMoV: Cloud-based Mobile Social TV
36. QoS Ranking Prediction for Cloud Services

37. Privacy-Preserving Public Auditing for Secure Cloud Storage


38. Collaboration in Multicloud Computing Environments: Framework and Security Issues
39. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
40. Towards Differential Query Services in Cost-Efficient Clouds

MOBILE COMPUTING
41. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad
Hoc Networks
42. EAACK :A Secure Intrusion-Detection System for MANETs
43. Vampire attacks:Draining life from wireless ad-hoc sensor networks.
44. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
45. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc
Networks
46. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
48. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
49. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
50. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
51. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
52. Community-Aware Opportunistic Routing in Mobile Social Networks
53. Distributed Cooperative Caching in Social Wireless Networks
54. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
55. Toward a Statistical Framework for Source Anonymity in Sensor Networks

PARALLEL DISTRIBUTED SYSTEMS


56. Covering Points of Interest with Mobile Sensors
57. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
58. Analysis of Distance-Based Location Management in Wireless Communication Networks
59. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
60. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
61. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
62. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
63. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds

64. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments
65. Towards Differential Query Services in Cost-Efficient Clouds
66. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of
Intermediate Datasets in Cloud
67. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
68. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.
69. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks .

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
SERVICE COMPUTING
70. Privacy-Enhanced Web Service Composition
71. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
72. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
73. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
74. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

SECURE COMPUTING
75. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
76. Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
77. Two tales of privacy in online social networks.

BULK IEEE 2013 PROJECTS TITLES IN


ECRUITMENT SOLUTIONS

ANDROID

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
DATA MINING
1. Finding Rare Classes Active Learning with Generative and Discriminative
Models
2. A Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia
3. A Survey of XML Tree Patterns
4. Anonymization of Centralized and Distributed Social Networks by Sequential
Clustering
5. T-Drive Enhancing Driving Directions with Taxi Driversc Intelligence
6. Region-Based Foldings in Process Discovery
7. Ranking on Data Manifold with Sink Points
8. Evaluating Data Reliability An Evidential Answer with Application to a WebEnabled Data Warehouse

CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage
10.
Scalable and Secure Sharing of Personal
Computing Using Attribute-Based Encryption

Health

Records

in

Cloud

11.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing
Storage Systems
12.

CloudMoV: Cloud-based Mobile Social TV

MOBILE COMPUTING

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
13.
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
14.
Toward Privacy Preserving and Collusion Resistance in a Location Proof
Updating System
15.
SSD A Robust RF Location Fingerprint Addressing Mobile Devices
Heterogeneity
16.
A Scalable Server Architecture for Mobile Presence Services in Social
Network Applications
17.

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

PARALLEL DISTRIBUTED SYSTEMS


18.
Distributed Web Systems Performance Forecasting Using Turning Bands
Method
19.
Scalable and Secure Sharing of Personal
Computing Using Attribute-Based Encryption

Health

Records

in

Cloud

20.
Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks
21.
Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks
22.
Analysis
of
Distance-Based
Communication Networks

Location

Management

in

Wireless

SERVICE COMPUTING
23.
Enforcing Secure and Privacy-Preserving
Distributed Information Sharing

Information

Brokering

in

24.
Document Clustering for Forensic Analysis: An Approach for Improving
Computer Inspection

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
25.
Enforcing Secure and Privacy-Preserving
Distributed Information Sharing

Information

Brokering

in

IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS


MATLAB
1. A robust digital watermarking scheme for video copyright protection in the wavelet domain
MECS1301
2. Active Contour-Based Visual Tracking by Integrating Colors, Shapes, and Motions MECS1302
3. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1303
4. An Analog Sub-Miliwatt CMOS Image Sensor With Pixel-Level Convolution Processing MECS1304
5. An automated supervised method for the diagnosis of Alzheimer disease based on FMRI MECS1305
6. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism
MECS1306
7. Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR
Images MECS1307
8. Canny Edge Detection MECS1308
9. Efcient Method for Content Reconstruction With Self-Embedding. MECS1309
10.Enhancement of Angiogram Images Using Pseudo Color Processing MECS1310
11.Exploring Whole Brain fMRI Data with Unsupervised Artificial Neural Network MECS1311
12.Hyperspectral Image Representation and Processing With Binary Partition Trees. MECS1312
13.Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting. MECS1313
14.Image Enhancement Using the Hypothesis Selection Filter: Theory and Application to JPEG
Decoding MECS1314
15.Image Processing Using Smooth Ordering of its Patches MECS1315

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
16.Image Noise Level Estimation by Principal Component Analysis MECS1316
17.locally adaptive bilateral clustering for image deblurring and sharpness enhancement MECS1317
18.Mining Semantic Context Information for Intelligent Video Surveillance of Trafc Scenes
MECS1318
19.What Are We Tracking: A Unied Approach of Tracking and Recognition MECS1320
20.Separable Markov Random Field Model and Its Applications in Low Level Vision MECS1321
21.Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures
MECS1322
22.A Modied Model of the Just Noticeable Depth Difference and its Application to Depth Sensation
Enhancemen MECS1323
23.Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation
MECS1324
24.A hybrid multiview stereo algorithm for modeling urban scenes MECS1325
25.Parallel Sparse Spectral Clustering for SAR Image Segmentation MECS1326
26. Noise Cancellation on ECG and Heart Rate Signals Using the Undecimated Wavelet Transform
MECS1327
27.Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes
MECS1328
28.Underwater Image Enhancement by Wavelength Compensation and Dehazing MECS1329
29.Reversible Watermarking Based on Invariant Image Classication and Dynamic Histogram
Shifting MECS1330
30.Multichannel Non-Local Means Fusion for Color Image Denoising MECS1331
31.Nonlocal Image Restoration With Bilateral Variance Estimation: A Low-Rank Approach
MECS1332
32.Image and Video Restorations via Nonlocal Kernel Regression MECS133
33.A Self-Learning Approach to Single Image Super-Resolution MECS1334
34.Object-level Image Segmentation Using Low Level Cues MECS1335

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
35.Sparse Representation Based Image Interpolation With Nonlocal Autoregressive Modeling
MECS1336
36.Modeling Natural Images Using Gated MRFs MECS1337
37.Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1338
38.Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1339
39.Casual stereoscopic Photo Athoring MECS1340
40.Recognition of Human Iris Patterns for Biometric Identification MECS1341
41.Analysis Operator Learning and its Application to Image Reconstruction MECS1342
42.Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1343
43.Spatially Varying Color Distributions for Interactive Multilabel Segmentation MECS1344
44.Exemplar-Based Image Inpainting Using Multiscale Graph Cuts MECS1345
45.Nonlocally Centralized Sparse Representation for Image Restoration MECS1346
46.Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures
MECS1347
47.Signal Processing Of Heart Rate Variability Using Wavelet Transform For Mental Stress
Measurement MECS1348
48.A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
MECS1349
49.General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes MECS1350
50.LDFT-Based Watermarking Resilient to Local Desynchronization Attacks MECS1351
51.Image Size Invariant Visual Cryptography for General Access Structures Subject to Display
Quality Constraints MECS1352

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com

IEEE 2013 PROJECTS TITLES IN ECRUITMENT


SOLUTIONS

NS2
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. NECS1301
2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications NECS1302
3. Toward a Statistical Framework for Source Anonymity in Sensor Networks NECS1303
4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant
Networks NECS1304

5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. Strategies for
Energy-Efficient Resource Management of Hybrid Programming Models. NECS1305
6. Capacity of Hybrid Wireless Mesh Networks with Random APs. NECS1306
7. EAACK A Secure Intrusion-Detection System for MANETs. NECS1307
8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
NECS1308
9. Distance Bounding A Practical Security Solution for Real-Time Location Systems. NECS1309
10. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks NECS1310
11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
NECS1311
12. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks NECS1312
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. NECS1313
14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network. NECS1314
15. In-Network Estimation with Delay Constraints in Wireless Sensor Network. NECS1315

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

ECRUITMENT SOLUTIONS
(0)9751442511, 9750610101
#1, Ist Cross, Ist Main Road, Elango Nagar,Pondicherry-605 011.

tech@ecruitments.com

www.ecruitments.com
16. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage
and Modulation Scaling. NECS1316
17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. NECS1317
18. Network Traffic Classification Using Correlation Information NECS1318
19. Quality-Differentiated Video Multicast in Multirate Wireless Networks NECS1319
20. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks
NECS1320
21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. NECS1321
22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
NECS1322
23. Analysis of Distance-Based Location Management in Wireless Communication Networks. NECS1323
24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. NECS1324

ECRUITMENT SOLUTIONS
tech@ecruitments.com

(0)9751442511

Вам также может понравиться