editor@iaset.us
Login
|
Register
|
Subscription
Toggle navigation
Home
About Us
Services
Journals
International Journals
National Journals
Manuscript Preparation
Review
Article Writing Services
PhD Thesis Service
Final Year Projects
IEEE/Non IEEE Projects
IEEE DotNet
IEEE Java
IEEE NS2
CFD
IEEE Android
IEEE Matlab
IEEE Embedded
IEEE VLSI
IEEE PowerElec
IEEE Civil
Diploma Projects
Dotnet Projects
ECE Projects
EEE Projects
Java Projects
Mechanical Projects
Training
Embedded System Trainning
Mechantronics Training
Power System Training
Power Electronics Training
Internship & Implant Training
Research
Electronics & Communication Engineering
Electrical & Electronics Engineering
Computer Science & Engineering and IT
Civil Engineering
Submit Manuscript
Post Articles
Make Payment
Conference
Proposal for Conference
Conference Events
Conference Archives
Archives
Author
Author Guidelines
CRT Form
Editorial Process
Contact us
IEEE DotNet
WIRELESS NETWORK TOPOLOGY
Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
Power Control and Soft Topology Adaptations in Multihop Cellular Networks With Multi-Point Connectivity
Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
Dynamic Openflow-Controlled Optical Packet Switching Network
Toward Transparent Coexistence for Multihaop Secondary Cognitive Radio Networks
NETWORK SECURITY
Privacy-Preserving Detection of Sensitive Data Exposure
Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques
Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
MOBILE COMPUTING
Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks
Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks
Self-Organizing Resource Management Framework in OFDMA Femtocells
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
Friend book A Semantic-Based Friend Recommendation System for Social Networks
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
A Hierarchical Account-Aided Reputation Management System for MANETs
Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach
On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
Multipath TCP: Analysis, Design, and Implementation
Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications
Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
Authenticated Key Exchange Protocols for Parallel Network File Systems
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
Decentralized Computation Offloading Game for Mobile Cloud Computing
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
PARALLEL & DISTRIBUTED
A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks
Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
Authenticated Key Exchange Protocols for Parallel Network File Systems
Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs
Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
CLOUD COMPUTING
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming
T-broker A Trust-aware Service Brokering Scheme for Multiple Cloud Collaborative Services
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers
Proof of ownership in deduplicated cloud storage with mobile device efficiency
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
WEB SERVICES
Automatic Web Service Composition Based on Uncertainty Execution Effects
Constructing a Global Social Service Network for Better Quality of Web Service Discovery
Data-Driven Composition for Service-Oriented Situational Web Applications
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Diversifying Web Service Recommendation Results via Exploring Service Usage History
WEB MINING
Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
Quality of Experience User’s Perception about Web Services
Real-Time Detection of Traffic From Twitter Stream Analysis
Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
Quality of Experience User’s Perception about Web Services
Real-Time Detection of Traffic From Twitter Stream Analysis
DATA MINING OR DATA ENGINEERING
Active Learning for Ranking through Expected Loss Optimization
Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets
Efficient Motif Discovery for Large-scale Time Series in Healthcare
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
Relational Collaborative Topic Regression for Recommender Systems
IMAGE PROCESSING
Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling
Exemplar-Based Inpainting Technical Review and New Heuristics for Better Geometric Reconstructions
Multi-task Pose-Invariant Face Recognition
Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix
Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classification
Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
Query Specific Rank Fusion for Image Retrieval
An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation
Face Spoof Detection With Image Distortion Analysis
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
NEURAL NETWORK
A Two-Layer Recurrent Neural Network for Nonsmooth Convex Optimization Problems
Self-Organizing Neural Networks Integrating Domain Knowledge and Reinforcement Learning
Neural Network-Based Model Predictive Control: Fault Tolerance and Stability
Learning Understandable Neural Networks With Nonnegative Weight Constraints
Multitask Learning of Deep Neural Networks for Low-Resource Speech Recognition
A Regression Approach to Speech Enhancement Based on Deep Neural Networks
An Enhanced Fuzzy Min–Max Neural Network for Pattern Classification
Neural Network-Based Model Design for Short-Term Load Forecast in Distribution Systems
Ensemble of Adaptive Rule-Based Granular Neural Network Classifiers for Multispectral Remote Sensing Images
State-Clustering Based Multiple Deep Neural Networks Modeling Approach for Speech Recognition
DATA MINING
K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data
i2MapReduce: Incremental MapReduce for Mining Evolving Big Data
A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
A decision-theoretic rough set approach for dynamic data mining
Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support
Data mining challenges and knowledge discovery in real life applications
Efficient Motif Discovery for Large-scale Time Series in Healthcare
BIG DATA
Real-Time Big Data Analytical Architecture for Remote Sensing Application
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
Research Directions for Engineering Big Data Analytics Software
Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors
Multilayer Big Data Architecture for Remote Sensing in Eolic Parks
Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms
WIRLESS NETWORKING
Multi-Node Wireless Energy Charging in Sensor Networks
Mobile application security: malware threats and defenses
VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks
Massive hybrid antenna array for millimeter-wave cellular communications
Communication challenges in high-density deployments of wearable wireless devices
AIWAC: affective interaction through wearable computing and cloud technology
Social on the road: enabling secure and efficient social networking on highways
Wireless communications for vehicular safety
Opportunistic communications in interference alignment networks with wireless power transfer
About Us
International Journals
National Journals
Privacy Policy
Subscription
Call for Papers
Copyright © 2018 All rights reserved.
↑