2014 IEEE Project Titles with full papers

April 27, 2017 | Author: Rupam Das | Category: N/A
Share Embed Donate


Short Description

"IEEE Projects" has been a misleading term for final year project selection with many people offering titles. ...

Description

Final Year Projects for 2014 Integrated Ideas, 2nd Floor Zam Zam Tower, PDA College Road, Opp-Goodluck Driving School, Gulbarga, Karnataka-585102 Ph:9845048861 www.integratedideas.co.in Final Year project is a stepping stone for your future. Don't just blindly select a topic because name looks fancy. This document provides you an opportunity to look into research are and dig deep into subjects before choosing your projects. The papers are mainly from year 2014, few from 2013 and very few from 2012. As not all students have access to IEEE, we discovered papers from Manuscript versions, University sites, Author's CV. More than mere 'Topics', we wanted to expose most research areas in most of the popular domains. Hope this helps you in finding the right 'WORK' that suits your interest and Skills. Rupam

[Project Titles and Abstract] [2014] Know Your Guide Rupam Das (Ph.D) in Robotics with Perceptual Computing from VTU, Belgaum Achievements              

Guided over 30,000 students in various courses in their projects in last 12 years. Helped publishing over 500 papers in good international journal Managed over 5000 projects in various domains. Intel Brown Belt Awarded Programmer Three Second Prize Winners in Intel Perceptual Computing Challenge. Second Prize Winner, codeproject.com Ultrabook Article Competition. Intel Perceptual Computing Pioneer Award Winner (2) Top 50, Intel-Codeproject Ultrabook App Innovation Contest. Intel App Innovation Contest 2 Finalist in Both Categories Intel App Innovation Contest 2 Early Submission Best Idea Winner Written hundreds of articles and blogs online. Published several research work in reputed International Journals and Conferences. Published several Real time commercial Profit making Apps in several App stores. Conducted 3 day Workshop as Key Resource person in SSIT, Tumkur in Arduino, Biomedical Signal Processing

Language and Technology Technology/Language

Experience in years

C#.net ( WPF, Windows Forms, MVVM, Interfacing, LinQ, ADO.Net, SAP CR, WinRT, XNA) Java( Swings, Netbeans, JDBC) Android ( UI, Sensors, Imaging, Web Services, SqlLite) Matlab ( Image Processing, GUIDE, DSP, Simulink, AI) Database ( Sql Server, My Sql, SQL Lite, SQL CE, XML) Web Technology ( Wordpress, Drupal, MyBB, ASP.Net) Omnet ++( 802.11,802.15.4, MANET, WiMax, Handover, VANET) Arduino ( Robotics, Sensors, Relays, GSM, GPRS, Biometric) Other Significant Domains: Wireless Protocols, Robotics, Industrial Automation, Perceptual Computing, Leap Motion Technology, Artificial Intelligence, Machine Learning, Embedded Systems, Image Processing

9+ 5+ 4+ 7+ 9+ 6+ 5+ 2+ --

Publications Title Lossless Medical Image Compression Techniques And Their Performance Analysis Enhanced Packet Scheduling Using Cross Layer Design In Manet For Service Differentiation Cross layer fair scheduling for MANET with 802.11 CDMA channels A cross layer approach for controlling jitter in MANET based on bandwidth estimation Cross layer AODV with Position based forwarding routing for mobile Adhoc

Integrated Ideas

9845048861

Year 2008 2008

Publisher IEEE Student Chair, UVCE NCA

2009 2009

IEEE IEEE

2010

IEEE

[email protected]

[Project Titles and Abstract] [2014] network Offline signature verification and skilled forgery detection using HMM and sum graph features with ANN and knowledge based classifier A Unique Intrusion Detection System for Wireless Networks By Combining Proactive Technique with Data Mining based Intrusion Detection Systems Design and Simulation of MANET Architecture over ZigBee Protocol Suite with Cross Layer Energy aware design for Performance Optimization Opinion Polarity Detection in Blog Comments from Blog Rss Feed by Modified TF-IDF Algorithm Offline Signature Verification with Random and Skilled Forgery Detection Using Polar Domain Features and Multi Stage Classification-Regression Model A Fuzzy Logic based Human Behavioural Analysis model using Facial Feature Extraction with Perceptual Computing

2010

SPIE

2011

ICICI

2011

GECT

2012

IJERA

2013

IJAST

2014

IJETTCS

Integrated Ideas Advantage: * * * * * * * * * * *

Video recording of every class Explanation of entire theory of paper with Mathematics Guidance in the software domain Module by release of code Modifications as par guide's suggestion Altering and improving results of your base paper Help in publishing your own paper Documentation support For Students unable to visit personally, support through Team Viewer Complete mail based Support till project completion Demo EXE for Guide's approval before finalizing project

We make you feel good about your knowledge and skills.

Connect With Us

Integrated Ideas

9845048861

[email protected]

[Project Titles and Abstract] [2014]

Title

Base Paper

Data Mining Anonymization technique through record elimination to preserve privacy of published data

http://ijircce.com/upload/201 4/march/27_Proposing.pdf

A neural network approach for disease forecasting in grapes using weather parameters An approach to automatic text summarization using WordNet

http://www.ssca.org.in/20 11/4Amrender.pdf

Proposed Methodology of Text Summarization for Novel Text using Outlier Detection Using Lexical Chains for Text Summarization A Semantic Approach to Summarization A Novel Technique for Efficient Text Document Summarization as a Service Context-Based Similarity Analysis for Document Summarization Ranking Through Clustering: An Integrated Approach to Multi-Document Summarization AN IMPROVED APRIORI ALGORITHM FOR ASSOCIATION RULES Optimization of Distributed Association Rule Mining Based Partial Vertical Partitioning An Overlay-Based Data Mining Architecture Tolerant to Physical Network Disruptions A Novel Approach for Data Mining Clustering Technique Using NeuralGas Algorithm Black hole: A new heuristic optimization approach for data clustering Abdolreza Hatamlou Mining Sensor Data in Cyber-Physical Systems Software Effort Estimation Using Data Mining Techniques Feature Selection for Ordinal Text Classification Information Gain Feature Selection for OrdinalText Classification using ProbabilityRe-distribution CrowdPlanner: A Crowd-Based Route Recommendation System

Integrated Ideas

9845048861

IEEE Abstract Reference Paper IJSRD Paper Microsoft Research Arxiv Paper IEEE Abstract IJERT IEEE Abstract Axxiv Abstract IJCSMC IEEE Paper IEEE Abstract

Elsevier Paper IEEE Paper Springer IJARE Reference IEEE Abstract IEEE Paper Reference Paper IEEE Paper

[email protected]

[Project Titles and Abstract] [2014] Motif-based Hyponym Relation Extraction from Wikipedia Hyperlinks MapReduce Join Strategies for Key-Value Storage Text Categorization based on Boosting Association Rules Forecast System for Offshore Water Surface Elevation With Inundation Map Integrated for Tsunami Early Warning Impact of Journals and Academic Reputations of Authors: A Structured Bibliometric Survey of the IEEE Publication Galaxy Empirical Patterns in Google Scholar Citation Counts Parallel Health Tourism Information Extraction and Ontology Storage Examining the relationship between topic model similarity and software maintenance SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITY Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming Efficient clustering-based source code plagiarism detection using PIY

Transaction 2014 Abstract IEEE Paper Paper IEEE Transaction Paper IEEE Transaction Paper IEEE Abstract Reference Paper IEEE Paper IEEE Paper Arxiv Paper JITE

Springer Abstract

Wireless Network Security A Tamper Proof Noise Resilient End to End Image based Authentication System over Wireless Transmission with AWGN Channel using Wavelet based Templates and AES A Real Time Intrusion Aggregation And Prevention Technique

http://paper.ijcsns. org/07_book/2013 05/20130508.pdf

Efficient wireless security through jamming, coding and routing A novel security method in wireless network based on percolation Toward Wireless Security without Computational Assumptions—Oblivious Transfer Based on Wireless Channel Characteristics Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks Beamforming with Opportunistic Relaying for Wireless Security Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR based Dynamic Clustering Mechanisms Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes Low cost ultrasonic wireless distributed security system for intrusion detection Establishing Secure Measurement Matrix

Integrated Ideas

9845048861

http://www.ijana.i n/papers/V4I54.pdf IEEE Paper IEEE Abstract Reference Paper IEEE Transaction IEEE Transaction IEEE Transaction Arxiv Research Gate IEEE Abstract IEEE Paper

[email protected]

[Project Titles and Abstract] [2014] For Compressed Sensing Using Wireless Physical Layer Security Risk-Aware Mitigation for MANET Routing Attacks Eavesdropping security in wireless ad hoc networks with directional antennas On the Physical Layer Security of Backscatter Wireless Systems Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error Secure Diffusion for Wireless Sensor Networks Identity based Secured Algorithm for VANET An Improved Privacy-Preserving Navigation Protocol in VANETs VSPN: VANET-based Secure and Privacy-preserving Navigation A vote based system to detect misbehaving nodes in MANETs Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks Design of Detection Engine for Wormhole Attack in Adhoc Network Environment BHAPSC: A New Black Hole Attack Prevention System in Clustered MANET An Alternative Approach to Detect Presence of Black Hole Nodes in Mobile Ad-Hoc Network Using Artificial Neural Network Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network IDENTIFICATION OF MALICIOUS VEHICLE IN VANET ENVIRONMENT FROM DDOS ATTACK A Host Based Intrusion Detection System Using Semantic Approach To Sytem Call Patterns Power Proximity Based Key Management for Secure Multicast in Ad Hoc Networks Dempster-Shafer Evidence Theory Based Trust Management Strategy against Cooperative Black Hole Attacks and Gray Hole Attacks in MANETs

Integrated Ideas

9845048861

Transaction paper Hindwai, IEEE IEEE Euroship

UCLA Elsevier Paper Url IEEE IEEE Abstract IEEE Transaction IJET IJARCSE IJAECSE

IJCNS JGRCS IEEE/IJCITB IEEE IEEE

[email protected]

[Project Titles and Abstract] [2014]

Biometric Performance Analysis of Gray Scale and Color Iris with Multidomain Feature Normalization and Dimensionality Reduction

IRIS Recognition based on Non Linear Dimensionality Reduction of IRIS Code with KPCA and SVM based Classification Palmprint Recognition Using Adaptive Histogram Equalization and Discrete Curvelet Transform Palm Print Feature Extraction and Recognition Based on BEMD-ICAII and LS-SVM

Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are Multitouch Gesture-Based Authentication Dual watermarking technique with multiple biometric watermarks Beyond parametric score normalisation in biometric verification systems A Unique Document Security Technique using Face Biometric Template A Unique Wavelet Steganography Based Voice Biometric Protection Scheme Automated human identification using ear imaging The Human Identification System Using Multiple Geometrical Feature Extraction of Ear –An Innovative Approach Analysis of Local Binary Patterns in different color models for person independent facial expression recognition Online Signature Verification Using Geometrical Features over Portable Devices A Simple and Effective Method for Online Signature Verification RECOGNITION OF FACE EXPRESSIONS USING LOCAL PRINCIPAL TEXTURE PATTERN Kinship Verification through Transfer Learning Neighborhood Repulsed Metric Learning

Integrated Ideas

9845048861

https://globaljourn als.org/GJCST_Volu me13/4PerformanceAnalysis-of-GrayScale-and-Color.pdf http://research.ijca online.org/volume 44/number13/pxc3 878681.pdf http://ijircce.com/ upload/2014/icgict 14/19_19.pdf http://link.springer .com/chapter/10.1 007%2F978-3-64239479-9_44#page1 IEEE Reference Paper IEEE Abstract Sadhaana-Springer IEEE IJAST IJIGSP Elsevier IJETA IEEE Abstract JOICS Poly Edu Academia

AI IEEE Transaction [email protected]

[Project Titles and Abstract] [2014] for Kinship Verification Learning Multi-Boosted HMMs for Lip-Password Based Speaker Verification QUALITY BASED SPEAKER VERIFICATION SYSTEMS USING FUZZY INFERENCE FUSION SCHEME Speech Recognition and Verification Using MFCC & VQ Signature Searching in a Networked Collection of Files Face Recognition: A Convolutional Neural Network Approach

IEEE Abstract Paper Researchgate IJESE IEEE Transaction IEEE

Image processing and Pattern Recognition Efficient Kernel-Based Fuzzy C-Means Clustering for Pest Detection and Classification Text Detection and Recognition on Traffic Panels From Street-Level Imagery Using Visual Appearance Histograms of Oriented Gradients for Landmine Detection in Ground-Penetrating Radar Data A Framework for Land Cover Classification Using Discrete Return LiDAR Data: Adopting Pseudo-waveform and Hierarchical Segmentation Kernel-optimized Based Fisher Classification of Hyperspectral Imagery Spectral-Spatial Classification of Hyperspectral Image Based on Kernel Extreme Learning Machine A Content-based Image Retrieval System Based on Polar Raster Edge Sampling Signature CBIR By Integration of Color and Texture Features Local Mesh Patterns Versus Local Binary Patterns: Biomedical Image Indexing and Retrieval Trace Transform Based Method for Color Image Domain Identification Image Retrieval Using Interactive Genetic Algorithm Fractal-wavelet image denoising Fractal properties of forest fires in Amazonia as a basis for modelling pan-tropical burnt area Wavelet Based Authentication/Secret Transmission Through Image Resizing( WASTIR) Image Fusion With No Gamut Problem by Improved Nonlinear IHS Transforms for Remote Sensing Edge-Preserving Decompositions for Multi-Scale Tone and Detail Manipulation MRI and PET Image Fusion Using Fuzzy Logic and Image Local Features Multi-layer Group Sparse Coding – for Concurrent Image Classification and Annotation Image Annotation by Multiple-Instance Learning With Discriminative Feature Mapping and Selection

Integrated Ideas

9845048861

IEEE IEEE IEEE IEEE Reference Paper Remote Sense APH Journal IJRDET IEEE Paper IEEE IEEE Abstract Reference Paper IEEE Abstract Reference Paper Biogeoscience SPIE Reference Paper ( researchgate) Reference Paper Hindawai. Paper IEEE Abstract Reference Paper 1

[email protected]

[Project Titles and Abstract] [2014] Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation Identification of Annotations for Circuit Symbols in Electrical Diagrams of Document Images A Cross-Modal Approach for Extracting Semantic Relationships Between Concepts Using Tagged Images Retrieval-Based Face Annotation by Weak Label Regularized Local Coordinate Coding Wavelet inpainting by nonlocal total variation A Non-Local Structure Tensor Based Approach for Multicomponent Image Recovery Problems Image Restoration Using Joint Statistical Modeling in a Space-Transform Domain A robust multiple watermarking technique for information recovery Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images + pdf A robust video watermarking based on imagemosacing and multifrequential embedding Image Encryption Based on Jacobi Function IMAGE ENCRYPTION BASED ON SINGULAR VALUE DECOMPOSITION Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map A Chaos-based Color Image Encryption Algorithm A Fast Compressive Sensing Based Digital Image Encryption Technique using Structurally Random Matrices and Arnold Transform Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography SECURED STEGANOGRAPHY APPROACH USING AES Adaptive steganography scheme based on LDPC codes An adaptive steganography technique for videos using Steganoflage Robust image steganography with pixel factor mapping (PFM) technique

Reference Paper 2 IEEE Paper IEEE Abstract Reference Paper Reference Paper IEEE Abstract Reference 2 IEEE Paper Researchgate IEEE IEEE IEEE IEEE Transaction Academia IEEE Abstract IJA Paper IEEE

IEEE Abstract Reference 1 Reference 2 Arxiv Paper

Elsevier IJCSE IEEE Abstract Ref. Paper IEEE Abstrac Ref Paper IEEE Abstract Ref Paper

Cloud Computing Real Time Game Theoretic Load Balancing With Cluster Based Load Classification for Private and Public Virtual Cloud

Integrated Ideas

9845048861

http://www.ijsr.net /archive/v3i6/MDI wMTQ0NzM=.pdf

[email protected]

[Project Titles and Abstract] [2014] Cost Efficient Datacenter Selection for Cloud Services Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Security attack mitigation framework for the cloud

Reference paper IJCCSA

Paper

An efficient and secured data storage scheme in cloud computing using ECC-based PKI Towards a Cloud Service Broker for the Meta-Cloud DR-Cloud: Multi-Cloud Based Disaster Recovery Service Semantic Search for Cloud Providers with Security Conformance to Cloud Controls Matrix Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions Distributed Energy Efficient Clouds Over Core Networks A security management for Cloud based applications and services with Diameter-AAA Multi-keyword Ranked Search Supporting Synonym Query over Encrypted Data in Cloud Computing Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds An approach towards digital forensic framework for cloud PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Mobile Media: Reflections and Outlook Classifying Cloud Provider Security Conformance to Cloud Controls Matrix An enhanced QoS Architecture based Framework for Ranking of Cloud Services Secure Virtualization for Cloud Environment Using Hypervisor-based Technology Sensor Cloud: A Cloud of Virtual Sensors EXECUTION ANALYSIS OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING ENVIRONMENT Energy Efficient Geographical Load Balancing via Dynamic Deferral of Workload

Integrated Ideas

9845048861

IEEE Abstract Reference 1 Reference 2 IEEE Paper IEEE IEEE Cloudbus IEEE Internet Draft IEEE Abstract IEEE IEEE Transaction IEEE Ref Paper Ref Paper1 ACM Abstract IEEE IEEE IJET IJMLC IEEE Abstract Ref1 Ref2 IJCCSA

Arxiv

[email protected]

[Project Titles and Abstract] [2014] Gamelets - Multiplayer Mobile Games with Distributed Micro-Clouds AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment Mobile Cloud-Computing-Based Healthcare Service by Noncontact ECG Monitoring Self-Tuning Transactional Data Grids: The Cloud-TM Approach Cloud-Based Augmentation for Mobile Devices:Motivation, Taxonomies, and Open Challenges Inter-cloud Data Transfer Security Privacy Preserving Access Control with Authentication for Securing Data in Clouds A Multi-tenant Architecture for Business Process Executions Real Time Services for Cloud Computing Enabled VehicleNetworks PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications SCORE BASED DEADLINE CONSTRAINED WORKFLOW SCHEDULING ALGORITHM FOR CLOUD SYSTEMS Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud Cost-effective Resource Provisioning for MapReduce in a Cloud An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)

IEEE IEEE Transaction

Sensors IEEE IEEE Transaction Reference1 Reference2 IEEE IEEE IOSR IEEE Journal Elsevier IJCCSA IEEE IEEE Ref1 Ref2 IEEE Abstract

VANET Adaptive Probablistic Broadcasting in Vanet

Road traffic notification in VANET with selective flooding

Congestion-Controlled-Coordinator-Based MAC for Safety-Critical Message Transmission in VANETs Vertical Handoff in Heterogeneous Wireless Networks Probabilistic Breadth-First Search – A Method for Evaluation of Network-Wide Broadcast Protocols

Integrated Ideas

9845048861

http://www.ijese.o rg/attachments/Fil e/v1i11/K0455091 1113.pdf http://www.ijert.or g/view.php?id=521 4&title=roadtraffic-notificationin-vanet-withselective-flooding http://ieeexplore.ie ee.org/xpl/articleD etails.jsp?arnumbe r=6542679 Paper Url IEEE

[email protected]

[Project Titles and Abstract] [2014] Application of mobile agent in VANET for measuring environmental data DOVE: Data Dissemination to a Desired Number of Receivers in VANET Protocol Independent Adaptive Route Update for VANET Congestion Control Algorithm for Event-Driven SafetyMessages in Vehicular Networks A Grid-Based On-Road Localization System in VANET with Linear Error Propagation Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation PROPAGATION MODELS FOR V2V COMMUNICATION IN VEHICULAR AD-HOC NETWORKS Adaptive delay-based geocast protocol for data dissemination in urban VANET Binary-Partition-Assisted MAC-Layer Broadcast for Emergency Message Dissemination in VANETs. Network Parameters Impact on Dynamic Transmission Power Control in Vehicular Ad hoc Networks Performance of a Cooperative-Bloom Filter-Assisted Query Protocol for Data Access in Bangkok Scenario SECURITY IN VEHICULAR AD HOC NETWORK BASED ON INTRUSION DETECTION SYSTEM Cognitive radio for vehicular ad hoc networks (CR-VANETs): approaches and challenges A novel multi-hop broadcasting method for VANETs based on autonomic computing paradigm ADM : A Density And Priority Levels Aware Protocol For Broadcasting In Vehicular Ad-Hoc Networks AUTO-SENSING AND DISTRIBUTION OF TRAFFIC INFORMATION IN VEHICULAR AD HOC NETWORKS Efficient Inter-Vehicle Data Dissemination Performance Analysis of Broadcast Messages in VANETs Safety Applications Performance Evaluation of IEEE 802.11p MAC Protocol for VANETs CoRoute: A New Cognitive Anypath Vehicular Routing Protocol

Integrated Ideas

9845048861

IEEE Abstract Author's Thesis Ref IEEE Abstract Hindwai Academia IEEE Abstract Ref Paper Ref Paper Ref Thesis Paper Ref Paper Research gate IJNGN IEEE Paper Euroship IEEE HAL Paper Washington Edu IEEE IEEE IEEE

[email protected]

[Project Titles and Abstract] [2014]

4G and

Mesh Network A Novel Spectrum Assignment Technique for Interference Mitigation in 4G Heterogeneous Networks Downlink soft handover using multi-cell MIMO for 4G-LTE smart-phones An Optimal Resource Allocation with Joint Carrier Aggregation in 4G-LTE An Optimal Application-Aware Resource Block Scheduling in LTE Optimal Downlink Power Allocation in Cellular Networks A Utility Proportional Fairness Resource Allocation in Spectrally Radar-Coexistent Cellular Networks Cooperative Positioning Techniques for Mobile Localization in 4G Cellular Networks Learning-Based Uplink Interference Management in 4G LTE Cellular Systems Backhaul Rate Allocation in Uplink SC-FDMA Systems with Multicell Processing Uplink scheduling solution for enhancing throughput and fairness in relayed long-term evolution networks An Intercell Interference Coordination Scheme in LTE Downlink Networks based on User Priority and Fuzzy Logic System Performance of low-complexity greedy scheduling policies in multichannel wireless networks: Optimal throughput and near-optimal delay Uplink scheduling solution for enhancing throughput and fairness in relayed long-term evolution networks MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh Network Hierarchical and QoS-aware routing in multi-hop wireless Network On the Capacity of Hybrid FSO/RF Links ROUTING WITH LOAD BALANCING IN WIRELESS MESH NETWORKS Node Load Balance Multi-flow Opportunistic Routing in Wireless Mesh Networks MAC Layer Channel Access and Forwarding in a Directional Multi-

Integrated Ideas

9845048861

World Congress

IEEE Abstract IEEE/Axriv Axriv IEEE Arxiv Researchgate IEEE Ref Paper IEEE IJWMN

Ref Paper IEEE http://link.springer .com/chapter/10.1 007/978-3-64254525-2_6#page-1 Paper IEEE IJCR Sensors and Transducers IEEE Transaction

[email protected]

[Project Titles and Abstract] [2014] Interface Mesh Network Harnessing the High Bandwidth of Multiradio Multichannel 802.11n Mesh Networks Energy Efficient Wireless Mesh Network Energy savings in Wireless Mesh Networks in a time-variable context Self-Reconfigurable Wireless Mesh Networks Coding Opportunity Aware Backbone Metrics for Broadcast in Wireless Networks TCP Performance in Coded Wireless Mesh Networks Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks Centralized Channel Assignment and Routing Algorithms for Multi-Channel Wireless Mesh Networks

IEEE Ref Paper Paper IEEE IEEE Transaction Paper Ref Paper Illionis

Cognitive Radio and Spectrum Sensing Selfish attacks and detection in cognitive radio Ad-Hoc networks Software Defined Radio Implementation of SMSE Based Overlay Cognitive Radio Spectrum sensing improvement in cognitive radio networks for real-time patients monitoring Wideband Spectrum Sensing and Non-Parametric Signal Classification for Autonomous Self-Learning Cognitive Radios Improving the Performance of Cognitive Radios through Classification, Learning, and Predictive Channel Selection Novel Channel-Hopping Schemes for Cognitive Radio Networks An Encapsulation for Reasoning, Learning, Knowledge Representation, and Reconfiguration Cognitive Radio Elements Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks SVM-Based Spectrum Mobility Prediction Scheme in Mobile Cognitive Radio Networks Leader election algorithm for distributed ad-hoc cognitive radio networks A Cluster Formation Protocol for Cognitive Radio Ad hoc Networks Spectrum-aware dynamic channel assignment in cognitive radio networks FMAC: A fair MAC protocol for coexisting cognitive radio networks Cognitive radio antennas that learn and adapt using Neural Networks

Integrated Ideas

9845048861

IEEE IEEE HAL Paper/IEE IEEE Transaction

Paper

IEEE Transaction IEEE IEEE Transactions Hindwai Reference Paper Paper IEEE Ref Paper IEEE Abstract IEEE Abstract

[email protected]

[Project Titles and Abstract] [2014] DDH-MAC: A novel Dynamic De-Centralized Hybrid MAC protocol for Cognitive Radio Networks Anti-jamming performance of cognitive radio networks Reconfigurable Antennas in Cognitive Radio that can Think for Themselves? Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks INTELLIGENT WIRELESS COMMUNICATION SYSTEM USING COGNITIVE RADIO

Ref Paper IEEE IEEE Paper Paper Paper

Biomedical Signal Processing ECG Analysis and R Peak Detection Using Filters and Wavelet Transform

http://ijircce.com/ upload/2014/febru ary/6_ECG.pdf http://airccse.org/j ournal/ijcsea/pape rs/2112ijcsea01.pdf

CLASSIFICATION OF ECG ARRHYTHMIAS USING DISCRETE WAVELET TRANSFORM AND NEURAL NETWORKS ECG arrhythmia classification based on logistic model tree

ARRHYTHMIA DETECTION USING ECG FEATURE EXTRACTION AND WAVELET TRANSFORM DENOISING OF ECG SIGNAL USING UNDECIMATED WAVELET TRANSFORM PERFORMANCE ANALYSIS OF BRAIN TUMOR DIAGNOSIS BASED ON SOFT COMPUTING TECHNIQUES DETECTION AND CLASSIFICATION OF BRAIN TUMORS IN MRI IMAGES

Unsupervised Identification of Malaria Parasites using Computer Vision Performance Analysis of Fuzzy C Means Algorithm in Automated Detection of Brain Tumor

Integrated Ideas

9845048861

http://www.scirp.o rg/journal/PaperInf ormation.aspx?pap erID=794#.U61Dgf mSzp0 Paper Url

http://www.ijareei e.com/upload/201 4/january/35_DEN OISING.pdf Paper URL http://www.acade mia.edu/6946014/ DETECTION_AND_C LASSIFICATION_OF _BRAIN_TUMORS_I N_MRI_IMAGES IEEE IJCA

[email protected]

[Project Titles and Abstract] [2014] Brain Tumor Extraction in MRI images using Clustering and Morphological Operations Techniques Shearwave Dispersion Ultrasound Vibrometry Applied to In Vivo Myocardium Shear Wave Dispersion Ultrasound Vibrometry Based on a Different Mechanical Model for Soft Tissue Characterization

Researchgate

Classification of Mass in Breast Ultrasound Images using Image Processing Techniques A Novel Method for Automatic Segmentation of Brain Tumors in MRI Images Mammographic images segmentation based on chaotic map clustering algorithm Breast Cancer Mass Detection in Mammograms using K-means and Fuzzy C-means Clustering “Gabor Wavelet analysis for mammogram in Breast Cancer Detection Classification of Mammograms Tumors Using Fourier Analysis Empirical evaluation of bias field correction algorithms for computer-aided detection of prostate cancer on T2w MRI Bias Field Correction for MRI Images. Edge Detection of Medical Image Processing using Vector Field Analysis Using The BioTac as a Tumor Localization Tool Lesion Detection and Characterization with Context Driven Approximation in Thoracic FDG PET-CT Images of NSCLC Studies Fast and Accurate Border Detection in Dermoscopy Images Using Statistical Region Merging Border detection in dermoscopy images using statistical region merging. Learning Features for Streak Detection in Dermoscopic Color Images using Localized Radial Flux of Principal Intensity Curvature GlandVision: A Novel Polar Space Random Field Model for Glandular Biological Structure Detection A Novel Approach for Content Based Microscopic Image Retrieval System Using Decision Tree Algorithm A methodological approach to the classification of dermoscopy images. Hybrid Discrete Wavelet Transform and Gabor Filter Banks Processing for Features Extraction from Biomedical Images Detection of Leukocoria using a Soft Fusion of Expert Classifiers under Non-clinical

IJCA

Integrated Ideas

9845048861

IEEE 09 Technical Innovation

Arxiv BMC Medical Imaging IJCA IJRITCC IJCSNS IEEE Researchgate IEEE IEEE IEEE

SPIE Researchgate IEEE IEEE

IJSR

Elsevier Hindwai Baylor

[email protected]

[Project Titles and Abstract] [2014] Settings Colorimetric and Longitudinal Analysis of Leukocoria in Recreational Photographs of Children with Retinoblastoma

Harvard

Antennas A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas

A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas HEURISTIC BASED ADAPTIVE STEP SIZE CLMS ALGORITHMS FOR SMART ANTENNAS Robust interference suppression using a new LMS-based adaptive beamforming algorithm Adaptive Beamforming Algorithms for Smart Antenna Systems

Performance Analysis of Blind Beamforming Algorithms in Adaptive Antenna Array in Rayleigh Fading Channel Model

ANALYSIS OF ARRAY STEERING ALGORITHMS FOR DIELECTRIC LENS - ARRAY ANTENNAS Minimum Variance Distortionless Response Beamformer with Enhanced Nulling Level Control via Dynamic Mutated Artificial Immune System Reconfigurable Antennas, Preemptive Switching and Virtual Channel Management MULTIFUNCTIONAL RECONFIGURABLE MEMS INTEGRATED ANTENNAS FOR ADAPTIVE MIMO SYSTEMS Fractal dimension and frequency response of fractal shaped antennas Miniaturized inverted multiband stacked triangular fractal patch antenna for wireless communication

http://link.springer .com/chapter/10.1 007%2F978-14614-61548_10#page-1 http://airccj.org/CS CP/vol2/csit2402.p df http://airccj.org/CS CP/vol3/csit3532.p df http://www.hrpub. org/download/201 307/ujcn.2013.010 103.pdf http://www.wseas. org/multimedia/jo urnals/communicat ions/2014/b105704 -189.pdf http://iopscience.io p.org/1757899X/51/1/012028 /pdf/1757899X_51_1_01202 8.pdf http://www.irdindi a.in/journal_ijraet/ pdf/vol2_iss2/4.pdf Paper Url

IEEE Paper Url IEEE Abstract Reference Paper IEEE Abstract Reference Paper

Wireless Sensor Network Distributed Clustering With Directional Antennas for Wireless Sensor

Integrated Ideas

9845048861

IEEE Abstract

[email protected]

[Project Titles and Abstract] [2014] Networks Object Tracking Using Wireless Sensor Network

A Study on Vehicle Detection and Tracking Using Wireless Sensor Networks Fuzzy Association Rule Mining for Wireless Sensor Network Data

Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks RAHTAP Algorithm for Congestion Control in Wireless Sensor Network

A Task Execution Framework for Cloud-Assisted Sensor Networks Balanced Energy Consumption Adaptive Sensing Algorithm for Multi-layer Wireless Sensor Network

Energy Efficient Hierarchical Routing Protocol (EEHRP) for Wireless Sensor Network A Mobility Enabled Inpatient Monitoring System Using a ZigBee Medical Sensor Network Mobility Aware Energy Efficient Congestion Control in Mobile Wireless Sensor Network

Integrated Ideas

9845048861

IEEE Abstract http://www.ijarcce .com/upload/2014/ april/IJARCCE3B%2 0%20%20a%20%20 ashish%20RAHTAP %20Algorithm.pdf Paper URL http://www.jofcis.c om/publishedpape rs/2014_10_10_44 51_4458.pdf Paper Url

Energy-Efficient Sensing in Wireless Sensor Networks Using Compressed Sensing ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK

Cluster Head Location based Base Station Mobility in Wireless Sensor Network

http://ijritcc.org/IJ RITCC%20Vol_2%2 0Issue_1/Object%2 0Tracking%20Using %20Wireless%20Se nsor%20Network.p df http://file.scirp.org /Html/1385.html http://brisjast.com /wpcontent/uploads/2 014/06/July-1614.pdf http://arxiv.org/pd f/1405.4463.pdf IEEE Abstract

http://airccse.org/j ournal/ijcsa/papers /4114ijcsa15.pdf http://research.ijca online.org/volume 90/number9/pxc38 94272.pdf Paper Url http://www.hinda wi.com/journals/ijd sn/2014/530416/ http://research.ijca online.org/volume

[email protected]

[Project Titles and Abstract] [2014]

A Clustering Routing Protocol for Energy Balance of Wireless Sensor Network based on Simulated Annealing and Genetic Algorithm Energy Efficient Clustering using Jumper Firefly Algorithm in Wireless Sensor Networks Clustering Based Energy Efficient Protocols For Wireless Sensor Networks Improved Accuracy Distribution Localization in Wireless Sensor Networks

Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks

Smart antenna based location estimation for wireless sensor networks Energy-Efficient K-Cover Problem in Hybrid Sensor Networks

67/number17/pxc3 887198.pdf http://www.sersc.o rg/journals/IJHIT/v ol7_no2_2014/8.p df http://arxiv.org/ftp /arxiv/papers/1405 /1405.1818.pdf http://ijecs.in/issue /v3i3/51%20ijecs.pdf http://www.acade mia.edu/7382995/I mproved_Accuracy _Distribution_Local ization_in_Wireless _Sensor_Networks _ http://www.acade mia.edu/5533183/ Directional_Antenn a_Assisted_Scheme _to_Reduce_Locali zation_Error_in_Wi reless_Sensor_Net works IEEE Abstract Oxford

Forensic Curvelet Transform and Local Texture Based Image Forgery Detection

New Approach of Hand writing Recognition using Curvelet Transform and Invariant Statistical Features Offline Signature Verification with Random and Skilled Forgery Detection Using Polar Domain Features and Multi Stage Classification-Regression Model Hyperspectral Imaging for Ink Mismatch Detection A New Vein Pattern-based Verification System Image processing for the positive identification of forensic ballistics specimens

Integrated Ideas

9845048861

http://link.springer .com/chapter/10.1 007/978-3-64241939-3_49#page1 http://research.ijca online.org/volume 61/number18/pxc3 885012.pdf http://www.sersc.o rg/journals/IJAST/v ol59/3.pdf CSSE IJCSIS IEEE

[email protected]

[Project Titles and Abstract] [2014] Ballistics Image Processing and Analysis for Firearm Identification Forensic Dentistry: 2. Bitemarks and Bite Injuries Bite Marks as Physical Evidence from the Crime Scene-An Overview Analysis of Gunshot Residue Deposited on Cotton Cloth Target atClose Range Shooting Distances Gender Classification Method Based on Gait Energy Motion Derived from Silhouette Through Wavelet Analysis of Human Gait Moving Pictures

Intech Paper Scientific Report Malaysian Journal MECS

Social Networking EFFECT OF USING FACEBOOK TO ASSIST ENGLISH FOR BUSINESS COMMUNICATION COURSE INSTRUCTION Quantitative effects of using facebook as a learning tool on students' performance Analysis of Factors which Impact Facebook Users’ Attitudes and Behaviours using Decision Tree Techniques The lexicon-based sentiment analysis for fan page ranking in Facebook Improving the prediction of users’ disclosure behavior… by making them disclose more predictably? Classification of university students' behaviors in sharing information on Facebook Social Media and Emergency Management: Exploring State and Local Tweets An Integrated Approach of Sensing Tobacco-Oriented Activities in Online Participatory Media Region sampling and estimation of geosocial data with dynamic range calibration

http://www.tojet.n et/articles/v12i1/1 216.pdf IEEE Abstract IEEE Paper

IEEE Abstract http://www.ics.uci. edu/~kobsa/papers /2014-SOUPS-PPSKobsa.pdf IEEE Paper IEEE Paper IEEE Abstract IEEE Abstract Reference Paper

Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks Generating representative images for landmark by discovering high frequency shooting locations from community-contributed photos Sentiment Analysis of Equities using Data Mining Techniques and Visualizing the Trends Examining the role of “Place” in Twitter Networks through the Lens of Contentious Politics Learning Sequential Summarization: A Full View of Twitter Trending Topics

Integrated Ideas

9845048861

IEEE Abstract IJCSI Paper IEEE Paper IEEE Abstract IEEE Paper IEEE Abstract

[email protected]

[Project Titles and Abstract] [2014]

User profile extraction from Twitter for personalized news recommendation Automatic identification of alcohol-related promotions on Twitter and prediction of promotion spread Interpreting the Public Sentiment Variations on Twitter Destination prediction considering both tweet contents and location transition hitstory

Reference Thesis IEEE Abstract Paper IEEE Abstract IEEE Transaction Reference Paper IEEE Abstract IEEE Abstract

Political interest and tendency prediction from microblog data Real-Time Crisis Mapping of Natural Disasters Using Social Media We Can Learn Your #Hashtags: Connecting Tweets to Explicit Topics Using Large Scale Aggregated Knowledge for Social Media Location Discovery Temporal Workload-Aware Replicated Partitioning for Social Networks Mercury: A memory-constrained spatio-temporal real-time search on microblogs Online statistics of keyword-indexed Youtube videos

Reference Paper IEEE Abstract IEEE Paper IEEE Paper IEEE Paper IEEE Paper Reference Slides IEEE Abstract

Video Signal Processing Video Text Detection and Recognition: Dataset and Benchmark Audio-Video based Classification using SVM and AANN Video scene classification using spatial pyramid based features Dynamic Scene Classification using Spatial and Temporal Cues Event Detection and Summarization in Soccer Videos Using Bayesian Network and Copula Ensemble of Exemplar-SVMs for Object Detection and Beyond Facial expression recognition with regional hidden Markov models Retrieval of movie character using semantic graph matching techniques Gaze-driven Object Tracking for Real Time Rendering The Faces of Engagement: Automatic Recognition of Student Engagement from Facial Expressions Density estimation in crowd videos

IEEE Paper IJCA IEEE Paper IEEE Paper IEEE Paper Paper IEEE Abstract IEEE Abstract Reference Paper Paper Url IEEE Paper

IEEE Abstract Reference Paper

Integrated Ideas

9845048861

[email protected]

[Project Titles and Abstract] [2014] Audio-based Age and Gender Identification to Enhance the Recommendation of TV Content Shadow detection based on combinations of HSV color space and orthogonal transformation in surveillance videos Machine learning model for sign language interpretation using webcam images

IEEE Paper Reference Paper IEEE Abstract IEEE Abstract Reference Paper

Android and Mobile Computing Smart Elderly Home Monitoring System with an Android Phone HC2D Barcode Reader using Embedded Camera in Android Phone Android based Object Detection and Classification: Modeling a Child’s learning of what’s Hot/Cold FACE RECOGNITION SYSTEM ON ANDROID USING EIGENFACE METHOD PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM I am a Smartphone and I Know My User is Driving DecaFriend: Serverless Indoor Localization System on Mobile Phone Platform How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing Identifying Roadway Surface Disruptions Based on Accelerometer Patterns A location-based personal task reminder for mobile users Shared note-taking: A Smartphone-based approach to increased student engagement in lectures Mobile Healthcare System using NFC Technology Using NFC-enabled Mobile Phones for Public Health in Developing Countries Mobile Habits: Inferring and predicting user activities with a location-aware smartphone Robust Location-Aware Activity Recognition Using Wireless Sensor Network in an Attentive Home Sleep eDiary: A mobile health application for insomnia assessment Development of a Highly Flexible Mobile GIS-Based System for Collecting Arable Land Quality Data

Integrated Ideas

9845048861

IJSH IEEE IOWA JTA Arxiv IEEE IEEE IEEE IEEE Springer Paper Paper IJCSI MIT Research Gate IEEE Transaction Ref Paper IEEE

[email protected]

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF