Sunteți pe pagina 1din 4

APEX GLOBAL SOLUTIONS

2015 2016 IEEE PROJECTS


CLOUD COMPUTING
1) Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
2) Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
3) Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game
Theory
4) An efficient algorithm for the bursting of service-based applications in hybrid Clouds
5) Cloud-based Multimedia Content Protection System
6) A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
7) Orchestrating Bulk Data Transfers across geo-distributed datacenters
8) Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
9) Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
10) Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
11) Stealthy Denial of Service Strategy in Cloud Computing
12) A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
13) Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
14) SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
15) A Dynamic Secure Group Sharing Framework in Public Cloud Computing
DATA MINING
1) CAHR: A Contextually Adaptive Home-Based Rehabilitation Framework
2) Query Aware Determinization of Uncertain Objects
3) PAGE: A Partition Aware Engine for Parallel Graph Computation
4) Towards Effective Bug Triage with Software Data Reduction Techniques
5) Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions
6) Discovery of Ranking Fraud for Mobile Apps
7) Rule-Based Method for Entity Resolution
8) Subgraph Matching with Set Similarity in a Large Graph Database
9) Active Learning for Ranking through Expected Loss Optimization

APEX GLOBAL SOLUTIONS


10) ePeriodicity: Mining Event Periodicity from Incomplete Observations
11) Keyword Search Over Probabilistic RDF Graphs
12) Aggregate Estimation in Hidden Databases with Checkbox Interfaces
13) Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks
14) k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
15) Topological Transformation Approaches to Database Query Processing
NETWORKING AND WIRELESS COMMUNICATIONS
1) Detecting Malicious Facebook Applications
2) Coordinated Multi-Point Transmission with Imperfect CSI and Other-Cell Interference
3) Simultaneous Wireless Information and Power Transfer Under Different CSI Acquisition
Schemes
4) Power Control and Resource Allocation for Outage Balancing in Femtocell Networks
5) Channel Estimation for Massive MIMO Using Gaussian-Mixture Bayesian Learning
6) Design of Joint Sparse Graph for OFDM System
7) Energy Efficient Collaborative Spectrum Sensing Based on Trust Management in Cognitive
Radio Networks
8) Nomographic Functions: Efficient Computation in Clustered Gaussian Sensor Networks
9) Space-Time Network Coding With Transmit Antenna Selection and Maximal-Ratio Combining
10) Energy-Efficient Communications in MIMO Systems Based on Adaptive Packets and
Congestion Control With Delay Constraints
11) Optical load-balancing tradeoffs in wavelength-routing cloud data centers
12) Impact of band rejection in multichannel broadband subcarrier multiplexing
13) Integrity enhancement of flexible/semi-flexible grid networks that minimizes disruption in
spectrum defragmentation and bitrate-dependent blocking
14) Independent transient plane design for protection in OpenFlow-based networks
15) Minimizing energy and cost in fixed-grid and flex-grid networks
16) Multi-layer high-speed network design in mobile backhaul using robust optimization

MOBILE COMPUTING
1) User-Defined Privacy Grid System for Continuous Location-Based Services
2) Analysis of Smart Mobile Applications for Healthcare under Dynamic Context Changes

APEX GLOBAL SOLUTIONS


3) Context-Aware QoE Modeling, Measurement, and Prediction in Mobile Computing Systems
4) Cooperation without Synchronization: Practical Cooperative Relaying for Wireless Networks
5) Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc
Networks
6) Delay Bounds for Random Linear Coding in Parallel Relay Networks
7) Economic Analysis of 4G Upgrade Timing
8) Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks

IMAGE PROCESSING
1) Detection and Rectification of Distorted Fingerprints
2) Learning Fingerprint Reconstruction: From Minutiae to Image
3) Learning to Rank Image Tags with Limited Training Examples
4) Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled
Image
5) Multiview Alignment Hashing for Efficient Image
6) High-Resolution Face Verification Using Pore-Scale Facial Features
7) DERF: Distinctive Efficient Robust Features From the Biological Modeling of the P Ganglion
Cells
8) Approximation and Compression With Sparse Orthonormal Transforms
9) Progressive Halftone Watermarking Using Multilayer Table Lookup Strategy
10) Blind Inpainting Using L0 and Total Variation Regularization
11) A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery
12) Sorted Consecutive Local Binary Pattern for Texture Classification
13) PM-PM: PatchMatch With Potts Model for Object Segmentation and Stereo Matching
14) Adaptive Image Denoising by Targeted Databases
15) Matching of Large Images through Coupled Decomposition

APEX GLOBAL SOLUTIONS


9) Semi-Distributed Backoff: Collision-Aware Migration from Random to Deterministic Backoff
10) Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A StackelbergGame
Approach
11) Throughput-Optimal Queue Length Based CSMA/CA Algorithm for Cognitive Radio Networks
NETWORK SECURITY / SECURE COMPUTING
1) A Computational Dynamic Trust Model for User Authorization
2) Secure Distributed Deduplication Systems with Improved Reliability
3) Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
4) New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
5) Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based
Encryption
6) Short Dynamic Group Signature Scheme Supporting Controllable Linkability
7) Enabling Cloud Storage Auditing With Key-Exposure Resistance
8) Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA
Fingerprints
9) A New Bio-cryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
10) On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side
Information

S-ar putea să vă placă și