Call For Papers
IASET Solicits Research Papers.
Last date for manuscript submission is Oct 26, 2017.
Send your papers to editor@iaset.us

International and National Journals (with ISSN, HIGH IMPACT Factor values, NAAS rating values, InfoBase Index - 3.68, SJIF 2016 = 5.978) - Oct 2017 issue.

IEEE Java

MOBILE COMPUTING

1. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks

2. Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks

3. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics

4. Friendbook A Semantic-Based Friend Recommendation System for Social Networks

5. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

6. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks

7. Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks

8. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics

9. Friend book A Semantic-Based Friend Recommendation System for Social Networks

10. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

11. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks

12. A Hierarchical Account-Aided Reputation Management System for MANETs

13. Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach

14. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications

15. Multipath TCP: Analysis, Design, and Implementation

16. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems

17. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks

18. Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications

19. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks

20. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

21. Authenticated Key Exchange Protocols for Parallel Network File Systems

22. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks

23. Decentralized Computation Offloading Game for Mobile Cloud Computing

24. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

25. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

26. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm

27. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

28. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

WIRELESS NETWORK TOPOLOGY

1. A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks

2. Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks

3. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation

4. Energy Efficient Virtual Network Embedding for Cloud Networks

5. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

6. Multi-Node Wireless Energy Charging in Sensor Networks

7. Mobile application security: malware threats and defenses

8. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks

9. Massive hybrid antenna array for millimeter-wave cellular communications

10. Communication challenges in high-density deployments of wearable wireless devices

11. AIWAC: affective interaction through wearable computing and cloud technology

12. Social on the road: enabling secure and efficient social networking on highways

13. Wireless communications for vehicular safety

14. Opportunistic communications in interference alignment networks with wireless power transfer

NETWORK SECURITY

1. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing

2. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

3. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter

4. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

5. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

6. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing

7. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

8. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter

9. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

10. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

NETWORKING

1. Multi-Node Wireless Energy Charging in Sensor Networks

2. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems

3. FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol

4. Backpressure Delay Enhancement for Encounter-Based Mobile Networks While Sustaining Throughput Optimality

5. A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks

6. Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks

7. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation

8. Energy Efficient Virtual Network Embedding for Cloud Networks

9. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

PARALLEL & DISTRIBUTED

1. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks

2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

3. Authenticated Key Exchange Protocols for Parallel Network File Systems

4. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

5. Decentralized Computation Offloading Game for Mobile Cloud Computing

6. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

7. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

8. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm

9. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

10. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

CLOUD COMPUTING

1. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

2. A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems

3. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

4. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

5. Governance Model for Cloud Computing in Building Information Management

6. Identity-Based Encryption with Outsourced Revocation in Cloud Computing

7. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing

8. Proof of ownership in deduplicated cloud storage with mobile device efficiency

9. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

10. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

11. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

12. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

13. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

14. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

15. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

16. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks

17. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

18. Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency

19. Identity-Based Encryption with Outsourced Revocation in Cloud Computing

20. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers

21. Proof of ownership in deduplicated cloud storage with mobile device efficiency

22. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

WEB MINING

1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction

2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

4. Quality of Experience User's Perception about Web Services

5. Real-Time Detection of Traffic From Twitter Stream Analysis

6. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction

7. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

8. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

9. Quality of Experience User's Perception about Web Services

10. Real-Time Detection of Traffic From Twitter Stream Analysis

DATA MINING

1. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

2. RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data

3. i2MapReduce: Incremental MapReduce for Mining Evolving Big Data

4. A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information

5. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

6. A decision-theoretic rough set approach for dynamic data mining

7. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support

8. Data mining challenges and knowledge discovery in real life applications

9. Efficient Motif Discovery for Large-scale Time Series in Healthcare

DATA MINING OR DATA ENGINEERING

1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction

2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

4. Quality of Experience User's Perception about Web Services

5. Real-Time Detection of Traffic From Twitter Stream Analysis

IMAGE PROCESSING

1. Combining Left and Right Palmprint Images for More Accurate Personal Identification

2. Learning Compact Binary Face Descriptor for Face Recognition

3. Localized Multi-Feature Metric Learning for Image Set Based Face Recognition

4. Multiscale Logarithm Difference Edgemaps for Face Recognition Against Varying Lighting Conditions

5. Iterative Vessel Segmentation of Fundus Images

6. Content Based Image Retrieval by Metric Learning from Radiology Reports Application to Interstitial Lung Diseases

7. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval

8. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features

9. Local Diagonal Extrema Pattern A New and Efficient Feature Descriptor for CT Image Retrieval

10. An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation

11. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT

12. Towards Practical Self-Embedding for JPEG-Compressed Digital Images

BIG DATA

1. Real-Time Big Data Analytical Architecture for Remote Sensing Application

2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

3. Research Directions for Engineering Big Data Analytics Software

4. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors

5. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks

6. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage

7. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications

8. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms

9. Predicting Asthma-Related Emergency Department Visits Using Big Data

10. Real-Time Big Data Analytical Architecture for Remote Sensing Application

11. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

12. Research Directions for Engineering Big Data Analytics Software

13. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors

14. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks

15. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage

16. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications

17. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms

WEB SERVICES

1. Automatic Web Service Composition Based on Uncertainty Execution Effects

2. Constructing a Global Social Service Network for Better Quality of Web Service Discovery

3. Data-Driven Composition for Service-Oriented Situational Web Applications

4. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

5. Diversifying Web Service Recommendation Results via Exploring Service Usage History


APPLICATION PROJECT LIST - JAVA

ALGORITHM AND CONCEPT BASED

51. A fast clustering algorithm in image segmentation

52. Customer relationship management using data mining algorithm predict in insurance trade

53. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates

54. Face recognition using Eigen faces algorithm

55. Congestion avoidance over local area network using leaky bucket algorithm.

56. Duplicate file deletion in peer to peer storage systems using randomized algorithm

57. Optical character recognition based similarity measure for an editable machine readable digital text format

58. Iris authentication based application using entropy measure

59. Motion Detection Process using Web Cam

60. Files hiding on image based on stegno analysis format using least significant method

61. Edge detection using canny, Sobel, Robertson algorithm

62. Image compression and viewing based on visible watermarking

63. Intrusion Detection system using Data Mining Concepts

64. GPSR algorithms for different network topology

65. Barcode generator process for user inputs

66. Stenography using audio and video file hiding

67. Ant algorithm based start and ending system

68. Password Generation using Hash Message Authentication

69. Multiple Client Chatting Based On GUI Format in Windows Application

70. Distribute network Chat application for a client/server process

71. Travelling Salesman Problem Using Genetic Algorithm

72. Location Based Services Use Of Accidents Reporting

73. Remote Method Invocation using Monitoring System Process

74. Mobile Snake Game Using Java Swing

75. Wordix game in Mobile Application

APPLICATION AND DATABASE

76. Pay Roll Management System Using Windows Application

77. Budget Analysis System for Industries

78. Faculty Resource Management System

79. Crime File System

80. Resource Management system for travelers

81. Bus Scheduling and Management system

82. Online Address Book Maintenance system

83. University Management System

84. Vehicle management system using Java Server Page

85. HRMS for Consultancy

86. Mail Application Using Simple Mail Transfer Protocol In Intranet

87. Supply chain management in web application.

88. Online examination using J2EE

89. Campus Interview Management System

90. Airlines reservation using windows application

91. Advocate Management System using Windows application

92. Mobile Shop Billing Application System

93. Online Ad Server Website Management System

94. Online Advertising Agency Management System

95. Quiz Competition in windows application

96. Hospital Management System

97. Hotel Management System

98. Library management System

99. Entire Banking system in windows application.