Solutions @ tmksinfotech


More

Current and Futured Services

Achieving the Goals: Successfully Finishing the 2012 and 2013 Academic IEEE Projects with 300 to 400 BE,B.Tech,Mtech,BCA,MCA,B.Sc(Cs) and M.Sc(cs) Student Batches.


2013 and 2014 Academic Batches Started
!!!


ANDROID Applications

Android is open source and Google releases the code under the License. This open source code and permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers.

Details

Cloud Computing

Cloud computing is the delivery of computing as a service rather than a product,whereby shared resources,software,and information...

Details

 

Adhoc Networks and MANET

It generally signifies a solution designed for a specific problem or task, non-generalizable, and not intended to be able to be adapted to other purposes (compare a priori). Common examples are organizations, committees, and commissions created at the national or international level for a specific task.

Details

 



Wireless Communication

Wireless network is a network set up by using radio signal frequency to communicate among computers and other network..

Details
 

Image Processing

The Digital image processing is the use of computer algorithms to perform image processing on digital images.As a subcategory(or)field digital image processing...

Details
   

 

Data Mining


Data mining is the process of extracting hidden patterns from large amounts of data. As more data is gathered,with the amount of data...

Details

 
Network Security

 


In the field of networking,the area of network security consists of the provisions and policies adopted by the network administrator to prevent Mis behaving Users in the network...

Details

 
Digital Signal Processing


Digital signal processing (DSP) is the mathematical manipulation of an information signal to modify or improve it in some way.It is characterized by the frequencies assigned by the admin..
.
Details
 

Mobile Computing

 


Mobile computing is the discipline for creating an information management platform,which is free from spatial and temporal constraints..

Details
 
Multimedia

Multimedia is media and content that uses a combination of different content forms.The term can be used as a noun (a medium)...

Details
   
 

 

 

 

 

   
   

2013 IEEE Projects -- View Demo

SlNo
Project Title
Year
 
Cloud Computing
 
1 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013
2 A Privacy Leakage Upper Bound constraint Based Approach for Cost Effective 2013
3 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013
4 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 2013
5 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 2013
6 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
7 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
8 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013
9 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013
10 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 2013
11 Privacy Preserving Delegated Access Control in Public Clouds 2013
12 Privacy Preserving Public Auditing for Secure Cloud Storage 2013
13 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud Computing Systems 2013
14 Dynamic Audit Services for Outsourced Storages in Clouds 2013
15 Toward Secure Multi keyword Top-k Retrieval Over Encrypted Cloud 2013
16 Towards Differential Query Services in Cost Efficient Cloud 2013
17 Winds of Change From Vendor Lock In to the Meta Cloud 2013
18 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2013
19 Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks 2013
20 Collaboration in Multi cloud Environments Framework and Security Issues 2013
21 CLOUD COMPUTING FOR MOBILE USERS CAN OFF LOADING COMPUTATION 2013
22 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 2013
23 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 2013
24 Cloud MoV Cloud-based Mobile Social TV 2013
25 QoS Ranking Prediction for Cloud Services 2013
26 Load Rebalancing for Distributed File Systems in Clouds 2013
27
  • Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis
2013
28
  • Cloud-assisted adaptive video streaming and social-aware video prefetching for mobile users
2013
29
  • Challenges on wireless heterogeneous networks for mobile cloud computing
2013
30
  • Dynamic Audit Services for Outsourced Storages in Clouds
2013
31
  • Toward Blind Scheduling in Mobile Media Cloud: Fairness, Simplicity, and Asymptotic Optimality
2013
32
  • Cloud computing-based forensic analysis for collaborative network security management system
2013
33
  • TST: Threshold based similarity transitivity method in collaborative filtering with cloud computing
2013
34
  • QoS Guarantees and Service Differentiation for Dynamic Cloud Applications
2013
35
  • Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering
2013
36
  • Meridian: an SDN platform for cloud network services
2013
37
  • CloudAC: A cloud-oriented multilayer access control system for logic virtual domain
2013
38
  • Riding the data tsunami in the cloud: myths and challenges in future wireless access
2013
39
  • Fast Filtering of LiDAR Point Cloud in Urban Areas Based on Scan Line Segmentation and GPU Acceleration
2013
40
  • Intelligent server management framework over extensible messaging and presence protocol
2013
41
  • Exploring blind online scheduling for mobile cloud multimedia services
2013
42
  • Enabling infrastructure as a service (IaaS) on IP networks: from distributed to virtualized control plane
2013
43
  • Privacy Preserving Data Sharing With Anonymous ID Assignment
2013
44
  • Complex and Concurrent Negotiations for Multiple Interrelated e-Markets
2013
45
  • Multi-Session Function Computation and Multicasting in Undirected Graphs
2013
46
  • Towards Trustworthy Resource Scheduling in Clouds
2013
47
  • DifferCloudStor: Differentiated Quality of Service for Cloud Storage
2013
48
  • A Network and Device Aware QoS Approach for Cloud-Based Mobile Streaming
2013
49
  • Security and Privacy-Enhancing Multicloud Architectures
2013
50
  • Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services
2013
51
  • Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud
2013
52
  • Optimal Multi server Configuration for Profit Maximization in Cloud Computing
2013
53
  • Visualization framework for inter-domain access control policy integration
2013
54
  • A survey of mobile cloud computing for rich media applications
2013
55
  • On Data Staging Algorithms for Shared Data Accesses in Clouds
2013
56
  • Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
2013
57
  • Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
2013
58 Cloud-Based Networked Visual Servo Control 2013
59 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 2013
60 A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms 2013
61 A Log-based Approach to Make Digital Forensics Easier on Cloud Computing 2013
62 Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications 2013
63 On Data Staging Algorithms for Shared Data Accesses in Clouds 2013
64 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013
65 SeDas A Self Destructing Data System Based on Active Storage Framework 2013
66 Collaboration in Multi cloud Environments Framework and Security Issues 2013
67 Load Rebalancing for Distributed File Systems in Clouds 2013
68 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud Computing Systems 2013
69 Towards Differential Query Services in Cost Efficient Cloud 2013
70 Toward Secure Multi keyword Top-k Retrieval Over Encrypted Cloud 2013
71 Cloud Computing Security From Single to Multi-Clouds 2012
72 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 2012
73 Efficient audit service outsourcing for data integrity in clouds 2012
74 Enabling Secure and Efficient Ranked Keyword Search Over Out Sourced Cloud Data 2012
75 Ensuring Distributed Accountability for Data Sharing in the Cloud 2012
76 IDSaaS Intrusion Detection System as a Service in Public Clouds 2012
77 Privacy Preserving Public Auditing for Secure Cloud Storage 2012
78 Towards Secure and Dependable Cloud Storage Server 2012
79 Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012
80 A Refined RBAC Model for Cloud Computing 2012
81 Cloud Computing Services A Total Cost of Ownership Approach 2012
82 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing 2012
83 Secure and Erasure Coding Based cloud storage system with Secure Data Forwarding 2012
84 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2012
Network Security & Mobile Computing
1 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013
2 EAACK¡ªA Secure Intrusion-Detection System for MANETs 2013
3 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 2013
4 Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links 2013
5 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013
6 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 2013
7 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
8 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013
9 Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks 2013
10 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013
11 Identity-Based Secure Distributed Data Storage Schemes 2013
12 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
13 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
14
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks.
2013
15 Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Co evolutionary Paradigm 2013
16 Distance Bounding: A Practical Security Solution for Real-Time Location Systems 2013
17 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 2013
18 SORT A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013
19 Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users 2013
20 A Decentralized Service Discovery Approach on Peer-to-Peer Networks 2013
21 A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 2013
22 A Rank Correlation Based Detection against Distributed Reflection DOS Attacks 2013
23 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc networks 2013
24 An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks 2013
25 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2013
26 Detecting and Resolving Firewall Policy Anomalies 2013
27 Performance of PCN-Based Admission Control Under Challenging Conditions 2013
28 Load-Balancing Multipath Switching System with Flow Slice 2013
29 A Framework for Routing Performance Analysis in delay tolerant Networks 2013
30 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc networks 2013
31 Efficient Rekeying Framework for Secure Multicast with Diverse Subscription Period Mobile Users 2013
32 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013
33 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks 2013
34 Minimum Cost Blocking Problem in Multi path Wireless Routing Protocols 2013
Adhoc Networks
1 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 2013
2 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 2013
3 Efficient Algorithms for Neighbor Discovery in Wireless Networks 2013
4 Multicast Capacity in MANET with Infrastructure 2013
5 Optimal Multicast capacity and delay tradeoff in manet 2013
6 Scalable Routing Modeling for Wireless Ad Hoc Networks 2013
7 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks 2013
8 Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks 2013
9 Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks 2013
10 Content Sharing over Smartphone Based Delay Tolerant Networks 2013
11 Efficient Rekeying Framework for Secure Multicast with DiverseSubscription-Period Mobile Users 2013
12 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 2013
13 Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks 2013
14 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks 2013
15 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks 2013
16 Network Assisted Mobile Computing with Optimal Uplink Query Processing 2013
17 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc networks 2013
18 Efficient Rekeying Framework for Secure Multicast with Diverse Subscription Period Mobile Users 2013
19 Risk Aware mitigation of MANET Attacks 2013
20 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks 2013
21 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks 2013
22 Throughput and Energy Efficiency in wireless ad hoc network with caussian channels 2013
     
     
 
Sensor Networks
 
1 Secure and Efficient Data Transmission for Cluster based WSN 2013
2 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013
3 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 2013
4 Mobile Relay Configuration in Data Intensive WSN 2013
5 Localization in Wireless Sensor Networks Byzantines and Mitigation Techniques 2013
6 Harvesting Aware Energy Management? for Time Critical WSN with Joint Voltage 2013
7 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013
8 Adaptive Network Coding for Broadband Wireless Access Networks 2013
9 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. 2013
10 Optimization in Multichannel Multi radio Wireless Mesh Networks Using Network Coding  
11 Target Tracking and Mobile Sensor Navigation in wireless Sensor Networks  
12 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation  
13 Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling  
     
 
Data Mining
 
1 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2013
2 m-Privacy for Collaborative Data Publishing 2013
3 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2013
4 Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse 2013
5 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013
6 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013
7 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 2013
8 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013
9 Ranking on Data Manifold with Sink Points 2013
10 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013
11 Dynamic Personalized Recommendation on Sparse Data 2013
12 Mining User Queries with Markov Chains: Application to Online Image Retrieval 2013
13 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality 2013
14 Secure Mining of Association Rules in Horizontally Distributed Databases 2013
15 Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework 2013
16 AML Efficient Approximate Membership Localization within a Web-Based Join Framework 2013
17
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
2013
18 Optimal Route Queries with Arbitrary Order Constraints 2013
19 Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures 2013
20 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 2013
     
 
Android
 
1 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 2013
2 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013
3 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
4 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs 2013
5 CloudMoV Cloud-based Mobile Social TV 2013
6 Dynamic Personalized Recommendation on Sparse Data 2013
7 Spatial Query Integrity with Voronoi Neighbors 2013
8 Research in Progress - Defending Android Smartphones from Malware Attacks 2013
9 CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 2013
10 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 2013
11 Collaborative Learning Assistant for Android 2013
12 Review of Behavior Malware Analysis for Android 2013
     
 
J2ME Mobile Based Projects
 
1 Adaptation of a virtual campus for mobile learning devices 2013
2 Blutooth Mobile Based College Campus 2013
3 ECops 2013
4 Efficient Computation of Range Aggregates Against Uncertain Location Based Queries 2013
5 Privacy-Conscious Location-Based Queries in Mobile Environments 2013
6 Ranking Model Adaptation for Domain-Specific Search 2013
7 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2013
8 The World in a nutshell the concious range queries 2013
9 IPTV Optimizing cloud resources through virtualization 2013
10 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013
     
 
IMage Processing
 
1
Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
 
2 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords. 2013
3 A Novel Video Stegonography based on Non Uniform Rectangular Partition 2013
4 Robust Face-Name Graph Matching for Movie Character Identify 2013
5 Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013
6 Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting 2013
7 Local Directional Number Pattern for Face Analysis: Face and Expression Recognition 2013
8 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage 2013
9 Query-Adaptive Image Search With Hash Codes 2013
10 Design and implementation of a long range iris recognition system 2013
     
 
NS2 & NS3 Projects
 
1 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks 2013
2 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013
3 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013
4 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 2013
5 Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power 2013
6 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2013
7 Target Tracking and Mobile Sensor Navigation in Wireless Sensor 2013
8 Back-Pressure-Based Packet-by-Packet Adaptive Routing in
Communication Networks
2013
9 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET¡¯s City Environments 2013
10 Efficient Algorithms for Neighbor Discovery in Wireless Networks 2013
11 A Secure Payment Scheme with Low Communication and Processing Overhead for Multi hop Wireless Networks 2013
12 Distributed Multiple Constraints Generalized Side lobe Canceler for Fully Connected Wireless Acoustic Sensor Networks 2013
13 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013
14 Distance Bounding: A Practical Security Solution for Real-Time Location Systems 2013
15 Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling 2013
16 Channel Assignment for Throughput Optimization in Multichannel Multi radio Wireless 2013
17 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013
18 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013
19 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 2013
20 Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network 2013
21 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
22 DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless Sensor Networks 2013
23 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013
24 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 2013
25 Least-Latency Routing over Time-Dependent Wireless Sensor Networks 2013
26 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 2013
27 Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks 2013
28 Distributed Multiple Constraints Generalized Side lobe Canceller for Fully Connected Wireless Acoustic Sensor Networks 2013
29 High Stable Power Aware Multicast Algorithm for Mobile Ad Hoc Networks 2013
30 Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks 2013
31 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Network 2013
32 Path Planning Algorithm for Mobile Anchor-Based Localization in Wireless Sensor Networks 2013
33 Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks 2013
34 EEHRP: Energy Efficient Hybrid Routing Protocol for Wireless Sensor Networks 2013
35 Cluster-Based Certificate Revocation With Vindication Capability for Mobile Ad Hoc Networks 2013
36 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013
37 EAACK¡ªA Secure Intrusion-Detection System for MANETs 2013
38 EMD: Energy-Efficient P2P Message Dissemination in Delay-Tolerant Wireless Sensor and Actor Networks 2013
39 Energy-efficient network design via modeling: optimal designing point for energy, reliability, coverage and end-to-end delay. 2013
40 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2013
41 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 2013
42 Efficient Algorithms for Neighbor Discovery In Wireless Networks 2013
43 Fault Node Recovery Algorithm for a Wireless Sensor Network 2013
44 On the Use of Cooperative Physical Layer Network Coding for Energy Efficient Routing 2013
45 On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio 2013
46 Privacy-Preserving and Content-Protecting Location Based Queries 2013
47 Sliding-Mode-Based Congestion Control and Scheduling for Multiclass Traffic Over Per-Link Queueing Wireless Networks 2013
48 On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio 2013
49 Low-Latency Video Streaming With Congestion Control in Mobile Ad-Hoc Networks 2013
     
     
     
ECE & Embedded Systems
1 An Embedded Systems Laboratory to Support Rapid Prototyping of Robotics and the Internet of Things 2013
2 An Enhanced Reservation Based Medium Access Control for Voice over Wireless Mesh Networks 2013
3 Autonomous Management of Everyday Places for a personalized location provider 2013
4 Distributed Compression for Condition Monitoring of Wind Farms 2013
5 LOBOT: Low-Cost, Self-Contained Localization of Small-Sized 2013
6 Online Monitoring of Geological CO2 Storage and Leakage Based on Wireless Sensor Networks 2013
7 Remote-Control System of High Efficiency and Intelligent Street Lighting Using a ZigBee Network of Devices and Sensors 2013
8 Triaxial Accelerometer-Based Fall Detection Method Using a Self- Constructing Cascade-AdaBoost-SVM Classifier 2013
9 Security of Autonomous Systems Employing Embedded Computing and Sensors 2013
10 Building a Smart Home System with WSN and Service Robot 2013
     
 
EEE Projects- Power Electronics
 
1 Adaptive MPPT Applied to Variable-Speed Micro hydro power Plant 2013
2 An Energy-Efficient Motor Drive With Autonomous Power Regenerative Control System Based on Cascaded Multilevel Inverters and Segmented Energy Storage 2013
3 Control Structure for Single-Phase Stand-Alone Wind-Based Energy Sources 2013
4 DC-Bus Design and Control for a Single-Phase Grid-Connected Renewable Converter with a Small Energy Storage Component 2013
5 Differential Power Processing for Increased Energy Production and Reliability of Photovoltaic Systems 2013
6 Digital-Controlled Single-Phase Transformer-Based Inverter for Non-Linear Load Applications 2013
7 Dual Transformer less Single-Stage Current Source Inverter With Energy Management Control Strategy 2013
8 Half-Wave Cyclo converter-Based Photovoltaic Microinverter Topology with Phase-Shift Power Modulation 2013
9 Instantaneous Current-Sharing Control Strategy for Parallel Operation of UPS Modules Using Virtual Impedance 2013
10 One-Cycle-Controlled Single-Stage Single-Phase Voltage- Sensorless Grid-Connected PV System 2013

 

Why Choose Us?

Effective Query Solving by well trained MNC's Technical Professionals

 

Client Quote

But I must explain to you how all this mistaken idea of denouncing pleasure praising pain complete account of the system.