1. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
2. Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks
3. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
4. Friendbook A Semantic-Based Friend Recommendation System for Social Networks
5. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
6. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
7. Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks
8. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
9. Friend book A Semantic-Based Friend Recommendation System for Social Networks
10. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
11. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
12. A Hierarchical Account-Aided Reputation Management System for MANETs
13. Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach
14. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
15. Multipath TCP: Analysis, Design, and Implementation
16. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
17. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
18. Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications
19. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
20. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
21. Authenticated Key Exchange Protocols for Parallel Network File Systems
22. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
23. Decentralized Computation Offloading Game for Mobile Cloud Computing
24. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
25. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
26. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm
27. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
28. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
1. A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks
2. Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks
3. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
4. Energy Efficient Virtual Network Embedding for Cloud Networks
5. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
6. Multi-Node Wireless Energy Charging in Sensor Networks
7. Mobile application security: malware threats and defenses
8. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks
9. Massive hybrid antenna array for millimeter-wave cellular communications
10. Communication challenges in high-density deployments of wearable wireless devices
11. AIWAC: affective interaction through wearable computing and cloud technology
12. Social on the road: enabling secure and efficient social networking on highways
13. Wireless communications for vehicular safety
14. Opportunistic communications in interference alignment networks with wireless power transfer
1. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
2. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
3. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
4. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
5. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
6. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
7. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
8. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
9. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
10. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
1. Multi-Node Wireless Energy Charging in Sensor Networks
2. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
3. FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol
4. Backpressure Delay Enhancement for Encounter-Based Mobile Networks While Sustaining Throughput Optimality
5. A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks
6. Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks
7. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
8. Energy Efficient Virtual Network Embedding for Cloud Networks
9. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
1. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
3. Authenticated Key Exchange Protocols for Parallel Network File Systems
4. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
5. Decentralized Computation Offloading Game for Mobile Cloud Computing
6. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
7. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
8. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm
9. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
10. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
1. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
2. A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems
3. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
4. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
5. Governance Model for Cloud Computing in Building Information Management
6. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
7. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
8. Proof of ownership in deduplicated cloud storage with mobile device efficiency
9. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
10. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
11. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
12. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
13. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
14. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
15. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
16. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
17. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
18. Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency
19. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
20. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers
21. Proof of ownership in deduplicated cloud storage with mobile device efficiency
22. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
4. Quality of Experience User's Perception about Web Services
5. Real-Time Detection of Traffic From Twitter Stream Analysis
6. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
7. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
8. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
9. Quality of Experience User's Perception about Web Services
10. Real-Time Detection of Traffic From Twitter Stream Analysis
1. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
2. RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data
3. i2MapReduce: Incremental MapReduce for Mining Evolving Big Data
4. A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information
5. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
6. A decision-theoretic rough set approach for dynamic data mining
7. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support
8. Data mining challenges and knowledge discovery in real life applications
9. Efficient Motif Discovery for Large-scale Time Series in Healthcare
1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
4. Quality of Experience User's Perception about Web Services
5. Real-Time Detection of Traffic From Twitter Stream Analysis
1. Combining Left and Right Palmprint Images for More Accurate Personal Identification
2. Learning Compact Binary Face Descriptor for Face Recognition
3. Localized Multi-Feature Metric Learning for Image Set Based Face Recognition
4. Multiscale Logarithm Difference Edgemaps for Face Recognition Against Varying Lighting Conditions
5. Iterative Vessel Segmentation of Fundus Images
6. Content Based Image Retrieval by Metric Learning from Radiology Reports Application to Interstitial Lung Diseases
7. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
8. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
9. Local Diagonal Extrema Pattern A New and Efficient Feature Descriptor for CT Image Retrieval
10. An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation
11. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
12. Towards Practical Self-Embedding for JPEG-Compressed Digital Images
1. Real-Time Big Data Analytical Architecture for Remote Sensing Application
2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
3. Research Directions for Engineering Big Data Analytics Software
4. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors
5. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks
6. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage
7. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
8. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms
9. Predicting Asthma-Related Emergency Department Visits Using Big Data
10. Real-Time Big Data Analytical Architecture for Remote Sensing Application
11. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
12. Research Directions for Engineering Big Data Analytics Software
13. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors
14. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks
15. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage
16. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
17. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms
1. Automatic Web Service Composition Based on Uncertainty Execution Effects
2. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
3. Data-Driven Composition for Service-Oriented Situational Web Applications
4. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
5. Diversifying Web Service Recommendation Results via Exploring Service Usage History
51. A fast clustering algorithm in image segmentation
52. Customer relationship management using data mining algorithm predict in insurance trade
53. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
54. Face recognition using Eigen faces algorithm
55. Congestion avoidance over local area network using leaky bucket algorithm.
56. Duplicate file deletion in peer to peer storage systems using randomized algorithm
57. Optical character recognition based similarity measure for an editable machine readable digital text format
58. Iris authentication based application using entropy measure
59. Motion Detection Process using Web Cam
60. Files hiding on image based on stegno analysis format using least significant method
61. Edge detection using canny, Sobel, Robertson algorithm
62. Image compression and viewing based on visible watermarking
63. Intrusion Detection system using Data Mining Concepts
64. GPSR algorithms for different network topology
65. Barcode generator process for user inputs
66. Stenography using audio and video file hiding
67. Ant algorithm based start and ending system
68. Password Generation using Hash Message Authentication
69. Multiple Client Chatting Based On GUI Format in Windows Application
70. Distribute network Chat application for a client/server process
71. Travelling Salesman Problem Using Genetic Algorithm
72. Location Based Services Use Of Accidents Reporting
73. Remote Method Invocation using Monitoring System Process
74. Mobile Snake Game Using Java Swing
75. Wordix game in Mobile Application
76. Pay Roll Management System Using Windows Application
77. Budget Analysis System for Industries
78. Faculty Resource Management System
79. Crime File System
80. Resource Management system for travelers
81. Bus Scheduling and Management system
82. Online Address Book Maintenance system
83. University Management System
84. Vehicle management system using Java Server Page
85. HRMS for Consultancy
86. Mail Application Using Simple Mail Transfer Protocol In Intranet
87. Supply chain management in web application.
88. Online examination using J2EE
89. Campus Interview Management System
90. Airlines reservation using windows application
91. Advocate Management System using Windows application
92. Mobile Shop Billing Application System
93. Online Ad Server Website Management System
94. Online Advertising Agency Management System
95. Quiz Competition in windows application
96. Hospital Management System
97. Hotel Management System
98. Library management System
99. Entire Banking system in windows application.
- Real Time Industry Experts
- Live Application Environment
- Real time Hands-on Training
- 24x7 Service
- Skilled candidates will get the opportunity to work with our Development team.