DOTNET IEEE PROJECT'S


WIRELESS NETWORK TOPOLOGY

1. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation

2. Power Control and Soft Topology Adaptations in Multihop Cellular Networks With Multi-Point Connectivity

3. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

4. Dynamic Openflow-Controlled Optical Packet Switching Network

5. Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks

NETWORK SECURITY

1. Privacy-Preserving Detection of Sensitive Data Exposure

2. Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking

3. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

4. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

5. Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

6. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing

7. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

8. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter

9. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

10. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

MOBILE COMPUTING

1. Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks

2. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks

3. Self-Organizing Resource Management Framework in OFDMA Femtocells

4. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics

5. Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks

6. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks

7. Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks

8. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics

9. Friend book A Semantic-Based Friend Recommendation System for Social Networks

10. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

11. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks

12. A Hierarchical Account-Aided Reputation Management System for MANETs

13. Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach

14. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications

15. Multipath TCP: Analysis, Design, and Implementation

16. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems

17. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks

18. Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications

19. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks

20. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

21. Authenticated Key Exchange Protocols for Parallel Network File Systems

22. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks

23. Decentralized Computation Offloading Game for Mobile Cloud Computing

24. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

25. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

26. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm

27. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

28. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

PARALLEL & DISTRIBUTED

1. A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks

2. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks

3. Authenticated Key Exchange Protocols for Parallel Network File Systems

4. Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs

5. Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks

6. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

7. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks

8. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs

9. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

10. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

CLOUD COMPUTING

1. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

2. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

3. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

4. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

5. Identity-Based Encryption with Outsourced Revocation in Cloud Computing

6. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud

7. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing

8. Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming

9. T-broker A Trust-aware Service Brokering Scheme for Multiple Cloud Collaborative Services

10. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

11. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

12. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

13. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

14. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

15. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks

16. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

17. Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency

18. Identity-Based Encryption with Outsourced Revocation in Cloud Computing

19. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers

20. Proof of ownership in deduplicated cloud storage with mobile device efficiency

21. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

WEB SERVICES

1. Automatic Web Service Composition Based on Uncertainty Execution Effects

2. Constructing a Global Social Service Network for Better Quality of Web Service Discovery

3. Data-Driven Composition for Service-Oriented Situational Web Applications

4. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

5. Diversifying Web Service Recommendation Results via Exploring Service Usage History

WEB MINING

1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction

2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

4. Quality of Experience User’s Perception about Web Services

5. Real-Time Detection of Traffic From Twitter Stream Analysis

6. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction

7. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

8. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

9. Quality of Experience User’s Perception about Web Services

10. Real-Time Detection of Traffic From Twitter Stream Analysis

DATA MINING OR DATA ENGINEERING

1. Active Learning for Ranking through Expected Loss Optimization

2. Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets

3. Efficient Motif Discovery for Large-scale Time Series in Healthcare

4. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

5. Relational Collaborative Topic Regression for Recommender Systems

IMAGE PROCESSING

1. Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling

2. Exemplar-Based Inpainting Technical Review and New Heuristics for Better Geometric Reconstructions

3. Multi-task Pose-Invariant Face Recognition

4. Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix

5. Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classification

6. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features

7. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval

8. Query Specific Rank Fusion for Image Retrieval

9. An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation

10. Face Spoof Detection With Image Distortion Analysis

11. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT

NEURAL NETWORK

1. A Two-Layer Recurrent Neural Network for Nonsmooth Convex Optimization Problems

2. Self-Organizing Neural Networks Integrating Domain Knowledge and Reinforcement Learning

3. Neural Network-Based Model Predictive Control: Fault Tolerance and Stability

4. Learning Understandable Neural Networks With Nonnegative Weight Constraints

5. Multitask Learning of Deep Neural Networks for Low-Resource Speech Recognition

6. A Regression Approach to Speech Enhancement Based on Deep Neural Networks

7. An Enhanced Fuzzy Min–Max Neural Network for Pattern Classification

8. Neural Network-Based Model Design for Short-Term Load Forecast in Distribution Systems

9. Ensemble of Adaptive Rule-Based Granular Neural Network Classifiers for Multispectral Remote Sensing Images

10. State-Clustering Based Multiple Deep Neural Networks Modeling Approach for Speech Recognition

DATA MINING

1. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

2. RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data

3. i2MapReduce: Incremental MapReduce for Mining Evolving Big Data

4. A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information

5. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

6. A decision-theoretic rough set approach for dynamic data mining

7. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support

8. Data mining challenges and knowledge discovery in real life applications

9. Efficient Motif Discovery for Large-scale Time Series in Healthcare

BIG DATA

1. Real-Time Big Data Analytical Architecture for Remote Sensing Application

2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

3. Research Directions for Engineering Big Data Analytics Software

4. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors

5. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks

6. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage

7. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications

8. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms

WIRLESS NETWORKING

1. Multi-Node Wireless Energy Charging in Sensor Networks

2. Mobile application security: malware threats and defenses

3. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks

4. Massive hybrid antenna array for millimeter-wave cellular communications

5. Communication challenges in high-density deployments of wearable wireless devices

6. AIWAC: affective interaction through wearable computing and cloud technology

7. Social on the road: enabling secure and efficient social networking on highways

8. Wireless communications for vehicular safety

9. Opportunistic communications in interference alignment networks with wireless power transfer

OUR BENEFITS:

- Real Time Industry Experts

- Live Application Environment

- Real time Hands-on Training

- 24x7 Service

- Skilled candidates will get the opportunity to work with our Development team.