1. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
2. Power Control and Soft Topology Adaptations in Multihop Cellular Networks With Multi-Point Connectivity
3. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
4. Dynamic Openflow-Controlled Optical Packet Switching Network
5. Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
1. Privacy-Preserving Detection of Sensitive Data Exposure
2. Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking
3. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
4. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
5. Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques
6. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
7. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
8. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
9. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
10. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
1. Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks
2. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks
3. Self-Organizing Resource Management Framework in OFDMA Femtocells
4. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
5. Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks
6. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
7. Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks
8. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
9. Friend book A Semantic-Based Friend Recommendation System for Social Networks
10. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
11. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
12. A Hierarchical Account-Aided Reputation Management System for MANETs
13. Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach
14. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
15. Multipath TCP: Analysis, Design, and Implementation
16. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
17. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
18. Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications
19. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
20. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
21. Authenticated Key Exchange Protocols for Parallel Network File Systems
22. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
23. Decentralized Computation Offloading Game for Mobile Cloud Computing
24. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
25. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
26. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm
27. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
28. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
1. A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks
2. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
3. Authenticated Key Exchange Protocols for Parallel Network File Systems
4. Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs
5. Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks
6. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
7. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks
8. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs
9. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
10. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
1. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
2. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
3. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
4. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
5. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
6. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
7. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
8. Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming
9. T-broker A Trust-aware Service Brokering Scheme for Multiple Cloud Collaborative Services
10. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
11. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
12. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
13. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
14. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
15. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
16. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
17. Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency
18. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
19. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers
20. Proof of ownership in deduplicated cloud storage with mobile device efficiency
21. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1. Automatic Web Service Composition Based on Uncertainty Execution Effects
2. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
3. Data-Driven Composition for Service-Oriented Situational Web Applications
4. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
5. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
4. Quality of Experience User’s Perception about Web Services
5. Real-Time Detection of Traffic From Twitter Stream Analysis
6. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
7. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
8. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
9. Quality of Experience User’s Perception about Web Services
10. Real-Time Detection of Traffic From Twitter Stream Analysis
1. Active Learning for Ranking through Expected Loss Optimization
2. Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets
3. Efficient Motif Discovery for Large-scale Time Series in Healthcare
4. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
5. Relational Collaborative Topic Regression for Recommender Systems
1. Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling
2. Exemplar-Based Inpainting Technical Review and New Heuristics for Better Geometric Reconstructions
3. Multi-task Pose-Invariant Face Recognition
4. Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix
5. Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classification
6. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
7. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
8. Query Specific Rank Fusion for Image Retrieval
9. An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation
10. Face Spoof Detection With Image Distortion Analysis
11. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
1. A Two-Layer Recurrent Neural Network for Nonsmooth Convex Optimization Problems
2. Self-Organizing Neural Networks Integrating Domain Knowledge and Reinforcement Learning
3. Neural Network-Based Model Predictive Control: Fault Tolerance and Stability
4. Learning Understandable Neural Networks With Nonnegative Weight Constraints
5. Multitask Learning of Deep Neural Networks for Low-Resource Speech Recognition
6. A Regression Approach to Speech Enhancement Based on Deep Neural Networks
7. An Enhanced Fuzzy Min–Max Neural Network for Pattern Classification
8. Neural Network-Based Model Design for Short-Term Load Forecast in Distribution Systems
9. Ensemble of Adaptive Rule-Based Granular Neural Network Classifiers for Multispectral Remote Sensing Images
10. State-Clustering Based Multiple Deep Neural Networks Modeling Approach for Speech Recognition
1. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
2. RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data
3. i2MapReduce: Incremental MapReduce for Mining Evolving Big Data
4. A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information
5. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
6. A decision-theoretic rough set approach for dynamic data mining
7. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support
8. Data mining challenges and knowledge discovery in real life applications
9. Efficient Motif Discovery for Large-scale Time Series in Healthcare
1. Real-Time Big Data Analytical Architecture for Remote Sensing Application
2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
3. Research Directions for Engineering Big Data Analytics Software
4. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors
5. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks
6. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage
7. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
8. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms
1. Multi-Node Wireless Energy Charging in Sensor Networks
2. Mobile application security: malware threats and defenses
3. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks
4. Massive hybrid antenna array for millimeter-wave cellular communications
5. Communication challenges in high-density deployments of wearable wireless devices
6. AIWAC: affective interaction through wearable computing and cloud technology
7. Social on the road: enabling secure and efficient social networking on highways
8. Wireless communications for vehicular safety
9. Opportunistic communications in interference alignment networks with wireless power transfer
- Real Time Industry Experts
- Live Application Environment
- Real time Hands-on Training
- 24x7 Service
- Skilled candidates will get the opportunity to work with our Development team.