Following are some sample topics related to highlighted Domains/Areas.The Title within these areas may not satisfy the criteria specified in title.For Beginner It is advised that (at initial level )follow the instructions#1,#2,#3.
Sample Topics in Data Mining
Evaluating the effectiveness of the personalized web search
Watermarking relational database using optimization based techniques
A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
Compression and Aggregation for Logistic Regression Analysis in Data Cubes(OLAP)
A Communication Perspective on Automatic Text Categorization
The Emerging Field of Semantic Scientific Knowledge Integration
Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
A Generic Local Algorithm for Mining Data Streams in Large Distributed Systems
Improving Personalization Solutions through Optimal Segmentation of Customer Bases
Web Security
• Security Decision Support Challenges in Data Collection and Use
• Making Smart Cards Truly Portable
• Designing Host and Network Sensors to Mitigate the Insider Threat
• Detecting Insider Theft of Trade Secrets
• Failures of Tamper-Proofing in PIN Entry Devices
• Side-Channel Attacks on Cryptographic Software
• A Semantic Search Agent Approach: Finding Appropriate Semantic Web Services Based On User Request Term(s)
Web conference
• A Query Processing Approach Based on Queuing Model for Cyber-Physical Systems
• Combining the Missing Link: an Incremental Topic Model of Document Content and Hyperlink
• Improving a News Recommendation System in Adapting to Interests of a User with Storage of a Constant Size
Web service
• Detecting Unauthorized Modification of HTTP Communication with Steganography
• Personalized Service-Oriented E-Learning Environments
• Rule-Based Coordination of Distributed Web Service Transactions
• A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations
• Design and Implementation of the Location-based Personalized Social Media Service
• Towards a Generic Context-Aware Framework for Self-Adaptation of Service-Oriented Architectures.
Mobile computing
• Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
• Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route
• A Coverage Inference Protocol for Wireless Sensor Networks
• Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
Internet Computing
• A Managed IPv6 Transitioning Architecture for Large Network Deployments
• Semantic Technology for Capturing Communication Inside an Organization
• Reducing Channel-Change Times with the Real-Time Transport Protocol
Pervasive
• Bridging Global Divides with Tracking and Tracing Technology
• Privacy-Preserving Admission to Mobile Peer-to-Peer Groups
• Service-based Development of Mobile Real-time Collaboration Applications for Social Networks OOP Modeling
Web intelligence and intelligent agent Technology
• Automated Web Site Evaluation – An Approach Based on Ranking SVM
• Managing context-dependent workspace awareness in an e-collaboration environment
• New Techniques for Data Preprocessing Based on Usage Logs for Efficient Web User Profiling at Client Side
• Recommending effort estimation methods for software project management
• Reinventing the Web Browser for the Semantic Web
Vehicular Technology
• Continuous Monitoring Using Event-Driven Reporting for Cluster-Based Wireless Sensor Networks
• Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
• Optimization of MANET Connectivity Via Smart Deployment/Movement of Unmanned Air Vehicles
Software Engineering Areas
Business Modeling
Casual Maps
Fish bone Strategies
Testing Strategies
Ergonomics
Development Strategies
Development Models
Design Strategies
Computer Ethics
Design patterns
Cyber Laws
Cyber Forensic
Broad Area/Domain in Information System Security & Authentication
• Botnets
• Cooperative Security
• Cyber Attacks
• Eavesdropping
• Intrusion Detection Systems
• Physical Security
• Privacy
• Theoretical Aspects
• Trust
• Wireless Sensor Networks
• Worms
• Ad-hoc Networks
• Routing
• Integrity
• Internet of Things (IoT)
• Anonymity
• Voice over IP (VoIP)
• WiMAX (IEEE 802.16)
• RFID
• Cryptographic Procedures
• Cloud Computing
• Security Management
• Smartphone
Bioinformatics Areas
Microarrays
Bioinformatics and Big Data
Big Data in genomics and cancer research
Bioinformatics and new cloud resources
Molecular dynamics and simulation; Molecular interactions
Molecular sequence classification, alignment and assembly
Molecular sequence and structure databases
Computational Systems Biology
Gene regulation
Gene pattern discovery and identification
Gene expression analysis; Gene expression databases
Genetic network modeling and inference
Comparative genomics
Evolution of regulatory genomic sequences
RNA and DNA structure and sequencing
Biomedical engineering
Combinatorics and bioinformatics
Biological data mining and knowledge discovery
Biological databases and information retrieval
Bio-ontologies + semantics
Biological data integration and visualization
Image processing in medicine and biological sciences
Pattern classification and recognition
Sequence analysis and alignment
Informatics and Statistics in Biopharmaceutical Research
Software tools and methods for computational biology and bioinformatics
Protein modeling
Proteomics; Protein folding and fold recognition
Metabolic modeling and pathways
Evolution and phylogenetics
Macromolecular structure prediction
Medical informatics
Epidemic models
Structural and functional genomics
Amino acid sequencing
Stochastic modeling
Cheminformatics
Computational drug discovery and experimental medicine
Cancer informatics
Experimental studies and results
Application of computational intelligence in drug design
High-performance computing and applications in biology
Computer-based medical systems (automation in medicine, ...)
Other aspects & applications relating to technological advancements in medicine & biological sciences & emerging roadmaps.
Sample Topics in Cloud Computing
Deployment of Services in a Cloud Subject to Memory and License Constraints
Cloud Analyst: A CloudSim-based Visual Modeller for Analyzing Cloud Computing Environments and Applications
Application Performance Isolation in Virtualization
Optimistic Synchronization of Parallel Simulations in Cloud Computing Environments
Intelligent Management of Remote Facilities through a Ubiquitous Cloud Middleware
An Efficient Resource Management System for On-line Virtual Cluster Provision
On Technical Security Issues in Cloud Computing
Cloud Computing for Satellite Data Processing on High End Compute Clusters
Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation & Management
An Energy-saving Application Live Placement Approach for Cloud Computing Environments
From Service Clouds to User-centric Personal Clouds
Semantic Modeling for Cloud Computing
Deployment issues of Services in a Cloud Subject to Memory and License Constraints
Activity-aware chat system based on a study of distributed collaborative learning
Application Performance Isolation in Virtualization
Optimistic Synchronization of Parallel Simulations in Cloud Computing Environments
SOA’s Last Mile Connecting Smartphones to the Service Cloud
Intelligent Management of Remote Facilities through a Ubiquitous Cloud Middleware
An Efficient Resource Management System for On-line Virtual Cluster Provision
The Method and Tool of Cost Analysis for Cloud Computing
Using Clouds to Elastically Extend Site Resources
On Technical Security Issues in Cloud Computing
Cloud Computing for Satellite Data Processing on High End Compute Clusters
Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation & Management
A RESTful Approach to the Management of Cloud Infrastructure
Architecture-Driven Variation Analysis for Designing Cloud Applications
Service Oriented Architecture for Cloud based Travel Reservation Software as a Service
Improving Scalability of Software Cloud for Composite Web Services
Ranking Mortgage Origination Applications using Customer, Product, Environment and Workflow Attributes
Understand Collaborative Authorization Policies: Models and Specifications
MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction
Miscellaneous
Distributed Throughput Maximization in Wifi Capable Methods via Pre-Partitioning
Continuous Circulation Wifi Information Delivering for High-Speed Environments
Network Visitors using Combined Security
Network tracking for Video Quality over IP
Fast Problem Point Activity Methods for CBIR
Computation of Powerful Multicast Key Distribution
On time syncing the log data files in cpa networks with regional wide toss media
One Bit Is Enough
Handling Very Big Numbers Of Emails In Allocated Hash Tables
Robust synchronization of utter and difference lamps over networks
Traffic which and proportional part caching for look to look networks
Man in the center attack
Risk evaluation of country wide protection Infrastructure
Trust worth processing under down policy
A Structure for Mitigating Assaults Against Measurement-Based Difference Systems in Unstructured Multicast Overlay Networks
Traffic Which and Proportional Partial Caching for look to look systems
Secure and Policy-Compliant Source Routing
Energy-efficient supply preparation methods for real-time marketing marketing and sales communications in a mobile wimax system
Fair Class-Based Downlink Scheduling with Income Factors in Next Technology High speed high speed internet Wifi Access to Systems-2009
A MIMO Centered Cross-layer Technique to Increase the Stability of Wifi Networks
Efficient and Safe Articles Producing and Submission by Accommodating Intermediaries
Lord of the Links: A Structure for Finding Losing Backlinks in the Online Topology
Securing User-Controlled Course-plotting Infrastructures
Efficient and secure information running and syndication by business intermediaries
Service driven Stability symptoms for use
Traffic Which and proportional Partial caching for Peer to look Systems
A Calculus Technique to Bare minimum amount Power Indication Guidelines with Good substantial quality of Assistance Guarantees
Energy–Robustness Tradeoff in Cell phone Program Power Control
Exploiting Clustering Methods for Web User-session Inference
Performance Research and Multi-channel Matched Access to Points
On the Time Synchronization of Allocated Log Files in Methods with Local Send out Media
Swing: Genuine and Sensitive Program Visitors Generation
Residual-Based Statistic of Peer and Link The world's in Gnutella Networks
A Multilayer Mistake Localization Structure for IP over All-Optical Multilayer Networks
Analysis of Least Path Course-plotting for Big Multi-Hop Wifi Networks
Multiple Course-plotting Styles for Quickly IP Program Recovery
A Visitors Technological innovation Technique for Location and Selection of Program Services
Large-Scale IP Traceback in High-Speed Internet: Genuine Methods and Theoretical Foundation
Traffic Which and Proportional Partial Caching for Peer-to-Peer Systems
LargeScale Selection and Sanitization of Program Stability Data: Dangers and Challenges
Network Stability Centered On Routine Matching: An Overview
MagicNET: The Human Defense Program and Program Stability System
Passive-Logging Assaults Against Private Communications Systems
Distributed Effective Seo (DRO)
Kinematics Research, Design, and Management of an Isoglide3 Similar Bot (IG3PR)
Controlling IP Spoofing through Interdomain Packet Filters
A way to increase the details swiftness responsible and information systems
A Powerful Hidden-ID Verification Structure Centered On 2-Dimensional Construction
A Cross-Layer Technique for Per-Station Equity in TCP over WLANs
A Genuine Password-Based Two-Server Verification and Key Exchange System
Sample Topics in Networking
Design issues of network based software
A Phonics Based Intelligent Airport Surveillance and Tracking System
Accountability Computing for e-Society
Performance Evaluation of Database Designs
Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints
Change Scheduling Based on Business Impact Analysis of Change-Related Risk
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
Algorithms for Reducing the Total Power Consumption in Data Communication-based Applications
Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments
Minimizing Execution Costs when using Globally Distributed Cloud Services
Schedule Distributed Virtual Machines in a Service Oriented Environment
A Visual Semantic Service Browser Supporting User-Centric Service Composition
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Bounded Fano Decoders over Intermediate Hops Excluding Packet Re-transmission
AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of web 2.0 Applications
Key Agreement in Peer-to-Peer Wireless Networks
Community-Aware Scheduling Protocol for Grids
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System
CAPTCHA Using Strangeness in Machine Translation
A DSL-based Approach to Software Development and Deployment on Cloud
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System
Mapping the Blogosphere with RSS-Feeds
Probabilistic proactive routing with active route trace-back for highly mobile Ad Hoc Networks
An Adaptive Routing Protocol for Bus Networks
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
Adaptive Clustering Protocol for Wireless Networks
A Novel Cache Management Using Geographically Partial Matching for Location-based Services
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement
A Cross-Layer Decision for Mobile IP Handover
A Novel Cross Layer Intrusion Detection System in MANET
A Secure Key Management Model for Wireless Mesh Networks
Acceleration Technique for S/W Update for Mobile Phones
Privacy-Preserving Collaborative Filtering Protocol based on Similarity between Items
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
Trustworthiness among Peer Processes in Distributed Agreement Protocol
New Approach to Quantification of Privacy on Social Network Sites
A Tree Graph Model Based on Mobile Environment
User-Eccentric Service Composition in Pervasive Environments
Context-aware Mobile Services Transactions
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes
MARS: Multi-stage Attack Recognition System
Against Spyware Using CAPTCHA in Graphical Password Scheme
Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
Empirical Analysis of Attackers Activity on Multi-Tier Web Systems
Key Parameters in Identifying Cost of Spam 2.0
Web Spambot Detection Based on Web Navigation Behavior
A Dynamic Normalized Weighting based Context Reasoning in Home-based Care
Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-oriented Middleware
Symbolic Routing for Location-based Services in Wireless Mesh Networks
Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
A hybrid technique for efficient Medium Access Control in Wireless Sensor Networks
Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks
Sink-initiated Geographic Multicasting Protocol in Wireless Sensor Networks
Using Recommendation to Limit Search Space in Web Services Discovery
Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies
HealthPass: Fine-grained Access Control to Portable Personal Health Records
Towards more Trustable Log Files for Digital Forensics by Means of “Trusted Computing”
Controlling File Distribution in The Share Network Through Content Poisoning
Database for Forensics
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
Non-Interactive Information Reconciliation for Quantum Key Distribution
Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber
Secure Communication For Internet Payment In Heterogeneous Networks
IDSec: an Identification Layer Security Model
Resist Intruders’ Manipulation via Context-based TCP/IP Packet Matching
Deployment of a Secure Wireless Infrastructure oriented to Vehicular Networks
Automatic Application Signature Construction from Unknown Traffic
Propagation Modeling of Peer-to-Peer Worms
Grid of Segment Trees for Packet Classification
Towards Near Real-Time Data Warehousing
Analyzing Human Behavior using Case-Based Reasoning with the help of Forensic Questions
Using Ontology for Personalized Mobile Message Computation
Knowledge sharing effectiveness measurement
Using Ontology for Personalized Mobile Message Computation
Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration
Knowledge sharing effectiveness measurement
A Workflow Fragmentation Framework for Enterprise GridWorkflow Systems
Analytical Temporal Specification Issues for Industrial Control Systems
Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing
Generating Optimum Number of Clusters using Median Search and Projection Algorithms
Effect of Virtual Techniques in Data Storage Access
Routing based on Message Attraction
Virtual Database Technology for Distributed Database
Requirements for Distributed Event-based Awareness in P2P Groupware Systems
Security Verification for Authentication and Key Exchange Protocols, Revisited
Practical Threshold One-Time Proxy Signature Scheme
Pyelin /Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones
SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet
Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database
An Authentication and Authorization protocol using Ticket in Pervasive Environment.
Quality Metrics for Software Process Certification based on K-model
Towards a Unified Trust Model in Pervasive Systems
Improved Gait Recognition Performance Using Cycle Matching
An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring System
Hi Trust: A Hybrid Tree based Trust Negotiation Service
A Context Conflict Resolution with Optimized Mediation
Analysis of Anonymity in P2P Anonymous Communication Systems
Peer-to-Peer Overlay Gateway Services for Home Automation and Management
SLA-based Online Charging Model in Mobile Environment
Improvement and Its Evaluation of Worker’s Motion Monitor System in Automobile Assembly Factory
Android, Java ME and Windows Mobile interplay
Detecting Suspicious Motion with Non imaging Sensors
mTracker: A Mobile Tracking Application for Pervasive Environment
Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP Application
An Improvement in Apriori algorithm Using Profit And Quantity
Stream Switching Resilience In P2P Streaming
Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints
Algorithms for Reducing the Total Power Consumption in Data Communication-based Applications
Minimizing Execution Costs when using Globally Distributed Cloud Services
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Key Agreement in Peer-to-Peer Wireless Networks
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System
Probabilistic proactive routing with active route trace-back for highly mobile Ad Hoc Networks
An Adaptive Routing Protocol for Bus Networks
Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement
A Secure Key Management Model for Wireless Mesh Networks
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
Empirical Analysis of Attackers Activity on Multi-Tier Web Systems
Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-oriented Middleware
A hybrid technique for efficient Medium Access Control in Wireless Sensor Networks
Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber
Secure Communication For Internet Payment In Heterogeneous Networks
Deployment of a Secure Wireless Infrastructure oriented to
An Authentication and Authorization protocol using Ticket in Pervasive Environment.
Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP Application