Warning: Missing argument 2 for has_shortcode(), called in /home/content/41/8117841/html/ieeefinalyearprojects/wp-content/themes/coworker/functions.php on line 520 and defined in /home/content/41/8117841/html/ieeefinalyearprojects/wp-includes/shortcodes.php on line 166

IEEE 2012 Projects | Mobile Computing

IEEE 2012 Projects :: Mobile Computing – Titles & Abstracts

[download file=”http://elysiumtechnologies.com/IEEE2012-2013/IEEE Projects 2012-2013 – MobComp.pdf” title=”Get IEEE Abstract 2012 :: Mobile Computing”] [download file=”http://elysiumtechnologies.info/pdf2011-2012/Data%20Mining.pdf” title=”Get IEEE Abstract 2011 :: Mobile Computing”] [do action=”cus_hr3″/]

IEEE Titles 2012 :: Mobile Computing

1

A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access

2

A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks

3

Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks

4

Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays

5

An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA+ Systems

6

A Trigger Identification Service for Defending Reactive Jammers in WSN

7

A Cost Analysis Framework for NEMO Prefix Delegation-Based Schemes

8

A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks

9

Approximation Algorithms for Data Broadcast in Wireless Networks

10

Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation

11

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

12

Chip Error Pattern Analysis in IEEE 802.15.4

13

Converge Cast: On the Capacity and Delay Tradeoffs

14

Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services

15

Coverage Verification without Location Information

16

Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video Streaming

17

Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobile WiMAX Networks

18

Cooperative Download in Vehicular Environments

19

Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks

20

Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks

21

Efficient Virtual Backbone Constructionwith Routing Cost Constraint in WirelessNetworks Using Directional Antennas

22

Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals

23

Incentive Compatible Privacy-Preserving Distributed Classification

24

Iterative Trust and Reputation Management Using Belief Propagation

25

JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks

26

Large Margin Gaussian Mixture Models with Differential Privacy

27

Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes

28

Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

29

M-Score: A Misuseability Weight Measure

30

On Privacy of Encrypted Speech Communications

31

On the Security and Efficiency of Content Distribution via Network Coding

32

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks

33

Packet-Hiding Methods for Preventing Selective Jamming Attacks

34

pCloud: A Distributed System for Practical PIR

35

Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism

36

Quantitative Analysis of Consensus Algorithms

37

Recommendation Models for Open Authorization

38

Remote Attestation with Domain-Based Integrity Model and Policy Analysis

39

Resilient Authenticated Execution of Critical Applications in Untrusted Environments

40

Revisiting Defenses against Large-Scale Online Password Guessing Attacks

41

Risk-Aware Mitigation for MANET Routing Attacks

42

Secure Failure Detection and Consensus in Trusted Pals

43

Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems

44

Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

45

Improving QoS in High-Speed Mobility Using Bandwidth Mapsy

46

Jointly Optimal Source-Flow, Transmit-Power, and Sending-Rate Control for Maximum-Throughput Delivery of VBR Traffic over Faded Links

47

Low Power Consumption Solutions for Mobile Instant Messaging

48

Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 802.16 OFDMA Systems

49

Measurement-Based Bandwidth Scavenging in Wireless Networks

50

Mobile Ad Hoc Nanonetworks with Collision-Based Molecular Communication

51

Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC

52

Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Studys

53

Maximum Entropy Principle-Based Algorithm for Simultaneous Resource Location and Multihop Routing in Multiagent Networks

54

MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet

55

Mobile Data Offloading through Opportunistic Communications and Social Participation

56

Moderated Group Authoring System for Campus-Wide Workgroups

57

On the Cost of Knowledge of Mobility in Dynamic Networks:An Information-Theoretic Approach

58

On Reliable Broadcast in Low Duty-Cycle Wireless Sensor Networks

59

Network Connectivity with a Family of Group Mobility Models

60

OMAN: A Mobile Ad Hoc Network Design System

61

OLM: Opportunistic Layered Multicasting for Scalable IPTV over Mobile WiMAX

62

Nature-Inspired Self-Organization, Control, and Optimization in Heterogeneous Wireless Networks

63

On the Origins of Heavy-Tailed Delay in Dynamic Spectrum Access Networks

64

Network Coding in Cooperative Communications: Friend or Foe?

65

Positional Accuracy Measurement and Error Modeling for Mobile Tracking

66

Radio Resource Management of Composite Wireless Networks: Predictive and Reactive Approaches

67

Risk-Aware Distributed Beacon Scheduling for Tree-Based ZigBee Wireless Networks

68

Resource-Optimized Quality-Assured Ambiguous Context Mediation Framework in Pervasive Environments

70

Relay-Assisted Transmission with Fairness Constraint for Cellular Networks

71

RAM: Rate Adaptation in Mobile Environments

72

ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel

73

Principal Component Localization in Indoor WLAN Environments

74

Soft-TDMAC: A Software-Based802.11 Overlay TDMA MAC with Microsecond Synchronization

75

Robust Relative Location Estimation in Wireless Sensor Networks with Inexact Position Problems

76

Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks

77

Scalable Activity-Travel Pattern Monitoring Framework for Large-Scale City Environment

78

Shaping Throughput Profiles in Multihop Wireless Networks:A Resource-Biasing Approach

79

Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

80

Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks

81

SenseLess: A Database-Driven White Spaces Network

82

Robust Topology Engineering in Multiradio Multichannel Wireless Networks

83

Stateless Multicast Protocol for Ad Hoc Networks

84

Understanding the Interaction between Packet Forwarding and Channel Access in Multihop Wireless Networks

85

Who, When, Where: Timeslot Assignment to Mobile Clients

86

TV White Space in Europe

87

Target Tracking in Wireless Sensor Networks Based on the Combination of KF and MLE Using Distance Measurements

88

Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

89

The Digital Marauder’s Map:A WiFi Forensic Positioning Tool

90

The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks

.

Copyright 2013 IEEE Final Year Projects| All Rights Reserved
LiveZilla Live Chat Software