IEEE Proposed Projects

IEEE TRANSACTIONS ON DISTRIBUTED NETWORKING 

  • RING STRUCTURED PEER-TO-PEER OVERLAY NETWORKS USING CACHING SCHEME 
  • DYNAMIC LOAD BALANCING WITH PROVABLE PERFORMANCE IN DISTRIBUTED HASH TABLE NETWORKS 
  • OPPORTUNISTIC ROUTING WITH MANET ROUTING PROTOCOL 
  • DELAY ANALYSIS FOR MAXIMAL SCHEDULING ALGORITHMS TO MINIMIZE THE QUEUE-OVERFLOW PROBABILITY 
  • SCALE-FREE CHARACTERISTICS OF RANDOM NETWORKS AND MAXIMIZING RESTORABLE THROUGHPUT 
  • SECURED MOBILE COMMUNICATIONS 
  • GAME TRAFFIC ANALYSIS 
  • ALGORITHM ATTACKING THE TOPOLOGY 
  • LONG TIME NEIGHBOR SELECTION AND AVOIDING NODE SEPARATION FROM P2P NETWORK 
  • SERVICES WITHOUT NETWORK TRAFFIC 
  • IP FAST REROUTE USING RELAXED MRC 
  • PEER-TO-PEER OVERLAY NETWORKS USING NP-COMPLETE FOR DYNAMIC MULTICAST 
  • PERFORMANCE MONITORING 
  • A DECENTRALIZED METHOD FOR SCALING UP GENOME SIMILARITY SEARCH SERVICES 

 

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 

  • RELATIONSHIP BETWEEN SOFTWARE SIZE AND DEFECT PRONENESS 

 

IEEE TRANSACTIONS ON MOBILE COMPUTING 

  • AAA ACCOUNTING POLICIES IN MOBILE ENVIRONMENTS 
  • EFFICIENT AUTHENTICATION IN MULTICAST NETWORKS 
  • CACHE CONSISTENCY IN MOBILE ENVIRONMENTS 
  • LOAD-AWARE ROUTING SCHEME 
  • DISTRIBUTED AD HOC NETWORKS BASED ON SELF-PRUNING 
  • EVALUATING CONTEXT INFORMATION PREDICTABILITY FOR AUTONOMIC COMMUNICATION 
  • NON OVERLAP ROUTING IN WIRELESS NETWORK 

 

IEEE BASED ON NETWORK SECURITY 

  • RELIABILITY, ANONYMITY AND ACCOUNTABILITY IN PEER-TO-PEER TRUST MANAGEMENT SYSTEM 
  • DDOS DEFENSE MECHANISMS FOR DETECTING, TRACING, 
  • AND MITIGATING NETWORK-WIDE ANOMALIES 
  • EFFICIENT KEY MANAGEMENT IN MISSION-CRITICAL WIRELESS AD-HOC NETWORKS 
  • PROCEDURE FOR INTER DOMAIN TRANSFER ENGINEERING 
  • IDENTIFYING MALEVOLENT PACKET LOSS WHILE CONGESTION OCCURRED 
  • KTR:AN EFFICIENT KEY MANAGEMENT SCHEME 
  • IDENTITY ATTACKS

 

IEEE TRANSACTIONS ON DATA ENGINEERING (DATA MINING) 

 

  • A NON-BLOCKING JOIN FOR RESULT RATE OPTIMIZATION. 
  • A SECURE DISTRIBUTED ONLINE CERTIFICATION AUTHORITY AND DECENTRALIZED PEER TO PEER SYSTEMS. 
  • ELIMINATING REDUNDANCY IN RECORDS 
  • INTEREST-BASED PERSONALIZED SEARCH 
  • THE BETA REPUTATION SYSTEM 
  • CONTROLLING SKYLINE SIZES BY GROWING USER PREFERENCES 
  • EXACT BORDER-BASED APPROACH FOR HIDING SENSITIVE INFORMATION 
  • DELAY BOUNDED GENERAL RANGE QUERY 
  • DATA FRESHNESS IN REPLICATED DATABASES 

 

IEEE BASED ON GRID APPLICATIONS (GRID COMPUTING) 

  • A FLEXIBLE PHASOR FOR GRID 
  • GRID WORKLOAD PREDICTION 
  • LOAD BALANCING IN GRID ENVIRONMENT 

 

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 

  • BOTNET TRACKING 

 

IEEE TRANSACTIONS ON CLOUD COMPUTING 

  • UP IN THE AIR: MOVING YOUR APPLICATIONS TO THE CLOUD


Updates From Facebook


Created by

Engr. Mehran Mamonai

Lecturer

Department of Telecommunication,

Mehran UET, Jamshoro