Contact: +91 9791938249, 0413-2211159 Mail: praveen@nexgenproject.com

IEEE DOTNET 2018-19 PROJECTS

1. Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment 
2. Aggregation-Based Co- location Datacenter Energy Management in Wholesale Markets
3. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
4. Secured outsourcing towards a cloud computing environment based on DNA cryptography
5. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
6. Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
7. Data security in cloud computing using AES
8. Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
9. An Efficient Multi-User Searchable Encryption Scheme without Query Transformation Over Outsourced
10. Efficient Traceable Authorization Search system cloud storage
11. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
12. Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
13. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
14. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
15. SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
16. Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
17. Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets
18. Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment
19. Disaggregated Cloud Memory with Elastic Block Management
20. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
21. Efficient Traceable Authorization Search System for Secure Cloud Storage
22. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
23. Hierarchical Cloud Computing Architecture for Context-Aware IoT Services
24. Data security in cloud computing using AES under HEROKU cloud
25. Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
26. Ensemble learning methods for power system cyber-attack detection
28. Secure and Efficient Privacy-Preserving Cipher text Retrieval in Connected Vehicular Cloud Computing
29. Security and QoS guarantee-based resource allocation within cloud computing environment
30. Designing and evaluating hybrid storage for high performance cloud computing
31. Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
32. Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory
33. A VHO scheme for supporting healthcare services in 5G vehicular cloud computing systems
34. TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone
35. An Efficient Parallel Implicit Solver for LOD-FDTD Algorithm in Cloud Computing Environment
36. Design and implementation of vsStor: A large-scale video surveillance storage system/a>
37. DwarfGC: A Space-Efficient and Crash-Consistent Garbage Collector in NVM for Cloud Computing
38. A Novel Forwarding Policy under Cloud Radio Access Network with Mobile Edge Computing Architecture
39. Prediction Based Mobile Data Offloading in Mobile Cloud Computing
40. Transparency service model for data security in cloud computing
41. Secured outsourcing towards a cloud computing environment based on DNA cryptography
42. Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
43. Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing
44. Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service
45. Reducing Energy Consumption With Cost Budget Using Available Budget Preassignment in Heterogeneous Cloud Computing Systems
46. Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
47. Competitions Among Service Providers in Cloud Computing: A New Economic Model
48. Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
49. Context-aware reinforcement learning-based mobile cloud computing for Telemonitoring
50. Scene text detection based on enhanced multi-channels MSER and a fast text grouping process
51. A new multi-resource allocation mechanism: A tradeoff between fairness and efficiency in cloud computing
52. Power Factor Correction In Modified SEPIC Converter Fed Switched Reluctance Motor Drive
53. SMDP-Based Coordinated Virtual Machine Allocations in Cloud-Fog Computing Systems
54. Component Importance Analysis of Mobile Cloud Computing System in the Presence of Common-Cause Failures
55. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
56. Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
57. System design for predictive road-traffic information delivery using edge-cloud computing
58. Secure and Efficient Product Information Retrieval in Cloud Computing
59. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
60. Semantic-Aware Searching Over Encrypted Data for Cloud Computing
61. Hybrid cloud computing for user location-aware augmented reality construction
62. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
63. An Offloading Strategy in Mobile Cloud Computing Considering Energy and Delay Constraints
64. Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack
65. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service
66. Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing
67. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing
68. Scheduling for Time-Constrained Big-File Transfer Over Multiple Paths in Cloud Computing
69. Empirical analysis on key influential factors on cultural hegemony construction based on big data
70. Energy optimization protocol of heterogeneous WSN based on node energy
71. Box office forecasting for a cinema with movie and cinema attributes
72. Student source differences study and computer cartography representation of normal universities in recent 15 years — Take Sichuan Normal University as an example
73. Text sentiment analysis based on multi-granularity joint solution
74. Study on information recommendation of scientific and technological achievements based on user behavior modeling and big data mining
75. Community detection based on unified Bayesian nonnegative matrix factorization
76. Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
77. Locality-aware Scheduling for Containers in Cloud Computing
78. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
79. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
80. Fair Resource Allocation for Data-Intensive Computing in the Cloud
81. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing
82. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
83. MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems
84. Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems
85. Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
86. Privacy-Preserving Image Processing in the Cloud
87. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
88. Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment
89. Secure Data Collection, Storage and Access in Cloud-Assisted IoT
90. Incorporating label and attribute information for enhanced network representation learning
91. Message integration and optimization based on substation monitoring information source-side maintenance
92. Big data analysis technology application in agricultural intelligence decision system
93. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
94. Automatic Segmentation of Dynamic Network Sequences with Node Labels
95. Cleaning Antipatterns in an SQL Query Log
96. Complementary Aspect-Based Opinion Mining
97. Frog Asynchronous Graph Processing on GPU with Hybrid Coloring Model
98. Local and Global Structure Preservation for Robust Unsupervised Spectral Feature Selection
99. Mining Precise Positioning Episode Rules from Event Sequences
100. THINKER Entity Linking System for the Turkish Language
101. Topic Models for Unsupervised Cluster Matching
102. UniWalk Unidirectional Random Walk Based Scalable SimRank Computation over Large Graph
103. Weakly Supervised Deep Embedding for Product Review Sentiment Analysis
104. Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment
105.
Combining web data extraction and data mining techniques to discover knowledge
106.
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms
107. A brief analysis of the key technologies and applications of educational data mining on online learning platform
108.
Association rules mining analysis of app usage based on mobile traffic flow data
109. Using data mining technique to improve billing system performance in semiconductor industry
110. A technique to aggregate classes of analog fault diagnostic data based on association rule mining
111. Data mining technique with cluster anaysis use K-means algorithm for LQ45 index on Indonesia stock exchange
112. Text mining based on tax comments as big data analysis using SVM and feature selection
113. Using data mining approaches to build credit scoring model: Case study — Implementation of credit scoring model in microfinance institution
114.
Algorithm Optimization of Anomaly Detection Based on Data Mining
115. Corporate Communication Network and Stock Price Movements: Insights From Data Mining
116. Detailed Investigation And Performance Improvement Of The Dynamic Behavior Of Grid-Connected DFIG Based Wind Turbines Under LVRT Conditions
117. Evaluation of predictive data mining algorithms in soil data classification for optimized crop recommendation
118. Using Data Mining to Predict Hospital Admissions From the Emergency Department
119. Privacy preserving big data mining: association rule hiding using fuzzy logic approach
120. Event detection and identification of influential spreaders in social media data streams
121. Online Internet traffic monitoring system using spark streaming
122. Location prediction on trajectory data: A review
123. Get To The Point: Summarization with Pointer-Generator Networks
124. Security Using Image Processing And Deep Convolutional Neural Networks
125. Research of Image Processing Methods in Publishing Output Systems
126. Privacy-preserving Image Processing in the Cloud
127. Measuring Scour Level using Image Processing
128. Image Processing Based Proposed Drone for Detecting and Controlling Street Crimes
129. Efficient image steganography using graph signal processing
130. A Design Tool for High Performance Image Processing on Multi core Platforms
131. Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling
132. Spatial and Motion Saliency Prediction Method Using Eye Tracker Data for Video Summarization
133. Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling
134. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification
135. Robust and Fast Decoding of High Capacity Color QR Codes for Mobile Applications
136. RA Probabilistic Framework For Structural Analysis and Community Detection in Directed Networks
137. Anomaly Detection and Attribution in Networks with Temporally Correlated Traffic
138. Caching Encrypted Content Via Stochastic Cache Partitioning
139. Fast Rerouting Against Muti-Link Failures Without Topology Constrained
140. Joint Optimization of Multicast Energy in Delay – Constrained Mobile Wireless Networks
141. Loop Free Route Updates for Software Defined Networks
142. Not All VANET Broadcasts Are the Same Context Aware Class Based Broadcast
143. On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks
144. Priority Queuing for Packets With Two Characteristics
145. SSD Servers Under Software Defined Network Architectures to Eliminate Discovery Messages
146. Using Adaptive HeartBeat Rate on Long Lived TCP Connections
147. Secure Range Search over Encrypted Uncertain IoT Outsourced Data
148. A secure client-side framework for protecting the privacy of health data stored on the cloud
149. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
150. A fast and resource efficient FPGA implementation of secret sharing for storage applications
151. Research on Key Combination Management System Based on Identity Authentication
152. Efficient Traceable Authorization Search System for Secure Cloud Storage
153. Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
154. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
155. Anonymous and Traceable Group Data Sharing in Cloud Computing
156. SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks
157. Network-based detection of mobile malware exhibiting obfuscated or silent network behavior
158. Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks
159. Energy storage options for environment monitoring Wireless Sensor Networks in rural Africa
160. Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor Networks: Working with What the Node Can Do
161. Optimal weighted K-nearest neighbour algorithm for wireless sensor network fingerprint localisation in noisy environment
162. Mobile Data Gathering with Bounded Relay in Wireless Sensor Networks
163. A new autonomous data transmission reduction method for wireless sensors networks
164. Novel order preserving encryption scheme for wireless sensor networks
165. Time slotted channel hopping scheduling based on the energy consumption of wireless sensor networks
166. A K-medoids based clustering algorithm for wireless sensor networks
167. Exploring the Efficiency of Data Collection Schemes in Wireless Sensor Networks
168. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
169. Data security in cloud computing using AES under HEROKU cloud
170. Enabling Efficient User Revocation in Identity Based Cloud Stoarge Auditng for Shared Big Data
171. Secure Range Search over Encrypted Uncertain IoT Outsourced Data
172. A secure client-side framework for protecting the privacy of health data stored on the cloud
173. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
174. A fast and resource efficient FPGA implementation of secret sharing for storage applications
175. Research on Key Combination Management System Based on Identity Authentication
176. Efficient Traceable Authorization Search System for Secure Cloud Storage
177. Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
178. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
179. Anonymous and Traceable Group Data Sharing in Cloud Computing
180. Network-based detection of mobile malware exhibiting obfuscated or silent network behavior
181. Scheduling Inter-DataCenter- Video Flows For Cost Efficiency –Service Computing
182. Semantic – Based Compound Keyword Search Over Encrypted Cloud Data
183. BlockChain For Large –Scale Internet of Things Data Storage Storage and Protection Service
184. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions
185. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
186. SEPDP Secure and Efficiency Privacy Preserving Provable Data Possession in Cloud Storage
187. Achieving Fairness-aware Two Level Scheduling for Heterogeneous Distributed Systems
188. A service migration strategy based on multiple attribute decision in mobile edge computing
189. SaW: Video Analysis in Social Media with Web-Based Mobile Grid Computing
190. Exploring the Efficiency of Data Collection Schemes in Wireless Sensor Networks
191. MAGA: A Mobility-Aware Computation Offloading Decision for Distributed Mobile Cloud Computing
192. Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing
193. Classification and Mapping of Adaptive Security for Mobile Computing
194. COAST: A Cooperative Storage Framework for Mobile Transparent Computing Using Device-to-Device Data Sharing
195. Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
196. A framework for efficient and secured mobility of IoT devices in mobile edge computing
197. Task offloading and resource allocation in mobile-edge computing system
198. Decentralized and Optimal Resource Cooperation in Geo-Distributed Mobile Cloud Computing
199. Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing
200. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
201. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
202. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
203. Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology
204. Efficiency network construction of advanced metering infrastructure using Zigbee
205. Differentially Private Mechanisms for Budget Limited Mobile Crowdsourcing
206. Reward or Penalty: Aligning Incentives of Stakeholders in Crowdsourcing
207. Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features
208. Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing
209. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
210. Joint latent dirichlet allocation for social tags
211. Mobile multimedia health applications and their potential impacton the human population
212. Understanding Multi-Stage, Multi-Modal, Multimedia Events inSocial Media
213. Using Software Engineering Metrics to Evaluate the Quality of Static Code Analysis Tools
214. A Didactical Concept for Supporting Reflection in Software Engineering Education
215. Open Innovation in Software Requirements Engineering A Mapping Study
216. Leveraging Avid Use of Technology in Software Engineering Education
217. Software Engineering for Computational Science
218. Towards supporting Software Engineering using Deep Learning A case of Software Requirements Classification
219. Achieving Load Balance for Parallel Data Access on Distributed File Systems
220. SMGuard: A Flexible and fine-grained resource management framework for GPUs
221. Profit-Driven Dynamic Cloud Pricing for Multiserver Systems Considering User Perceived Value
222. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers
223. Dynamic Resource Scheduling in Mobile Edge Cloud with Cloud Radio Access Network
224. Online Auction for IaaS Clouds: towards Elastic User Demands and Weighted Heterogeneous VMs
225. A VHO scheme for supporting healthcare services in 5G vehicular cloud computing systems
226. Transparency service model for data security in cloud computing
227. Learning analytics and evaluative mentoring to increase the students’ performance in computer science
228. IoT-Enabled Adaptive Context-Aware and Playful Cyber-Physical System for Everyday Energy Savings
229. A Novel Secure and Efficient Data Aggregation Scheme for IoT
230. Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques
231. BeeKeeper: A Blockchain-based IoT System with Secure Storage and Homomorphic Computation
232. Location Privacy in Usage-based Automotive Insurance: Attacks and Countermeasures
233. Toward Shared Ownership in the Cloud
234. Sensor-based Mobile Web Cross-site Input Inference Attacks and Defenses
235. Authentication by Encrypted Negative Password
236. Secure Distributed Computing with Straggling Servers Using Polynomial Codes
237. A Coding Approach with Key-Channel Randomization for Physical-Layer Authentication
238. Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
239. Privacy Preserving Indexing and Query Processing for Secure Dynamic Cloud
240. Semantic Aware Searching over Encrypted Data for Cloud Computing
241. Towards More Accurate Matching of Contactless Palmprint Images Under Less Constrained Environments
242. Towards Shared Ownership in the Cloud
243. TEDP: An enhanced topology discovery service for SoftwareDefined Networking
244. Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks
245. Fair Optimal Resource Allocation in Cognitive Radio Networks With Co-channel Interference Mitigation
246. Energy-to-Peak State Estimation for Static Neural Networks With Interval Time-Varying Delays
247. Low-Latency Heterogeneous Networks with Millimeter-Wave Communications
248. Secure and Efficient Product Information Retrieval in Cloud Computing
249. Preserving Reliability of Heterogeneous Ultra-Dense Distributed Networks in Unlicensed Spectrum
250. Medium Access Control in Wireless Network-on-Chip: A Context Analysis
251. Network service chaining using segment routing in multilayer networks
252. Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
253. Distributed Channel Access, Relay Selection and Time Assignment for QoE-Aware Relay Networks
254. Robust resource allocation for heterogeneous wireless network: a worst-case optimization
255. Influence Propagation Model for Clique-Based Community Detection in Social Networks
256. Security Analysis of Intelligent Transportation Systems Based on Simulation Data
257. Big Data Analytics in Intelligent Transportation Systems: A Survey
258. Server-Based Intelligent Public Transportation System with NFC
259. Fast Location Algorithm Based on an Extended Symmetry Nested Sensor Model in an Intelligent Transportation System
260. Low-Latency Heterogeneous Networks with Millimeter-Wave Communications
261. Guest Editorial Introduction to the Special Issue on Dependable Wireless Vehicular Communications for Intelligent Transportation Systems (ITS)
262. Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing
263. Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment
264. Enabling Sustainable Cyber Physical Security Systems through Neuromorphic Computing
265. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
266. Exploring the Dynamic Mutual Influence for Predicting Social Event Participation
268. A New Robust Approach for Reversible Database Watermarking With Distortion Control
269. Modelling and Predicting Community Structure Changes in Time Evolving Social Networks
270. Semantic Aware Searching over Encrypted Data for Cloud Computing
271. Location Inference for Non –geotagged Tweets in User Timelines
272. DeepClue: Visual Interpretation of Text Based deep Stock Prediction Knowledge
273. Secure and Efficient Skyline Queries on Encrypted Data Knowledge
274. Private Graph : Privacy Preserving Spectral Analysis of Encrypted Graphs in the Cloud