IEEE 2022-2023 PROJECTS
CLOUD COMPUTING
MICI18-001. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
MICI18-002. Hierarchical Cloud Computing Architecture for Context-Aware IoT Services
MICI18-003. Data security in cloud computing using AES under HEROKU cloud
MICI18-004. Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
MICI18- 005. Ensemble learning methods for power system cyber-attack detection
MICI18-006. Research on information security technology based on blockchain
MICI18-007. Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing
MICI18-008. Security and QoS guarantee-based resource allocation within cloud computing environment
MICI18-009. Designing and evaluating hybrid storage for high performance cloud computing
MICI18-010. Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
MICI18-011. Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory
MICI18-012. A VHO scheme for supporting healthcare services in 5G vehicular cloud computing systems
MICI18-013. TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone
MICI18-014. An Efficient Parallel Implicit Solver for LOD-FDTD Algorithm in Cloud Computing Environment
MICI18-015. Design and implementation of vsStor: A large-scale video surveillance storage system
MICI18-016. DwarfGC: A Space-Efficient and Crash-Consistent Garbage Collector in NVM for Cloud Computing
MICI18-017. A Novel Forwarding Policy under Cloud Radio Access Network with Mobile Edge Computing Architecture
MICI18-018. Prediction Based Mobile Data Offloading in Mobile Cloud Computing
MICI18-019. Transparency service model for data security in cloud computing
MICI18-020. Secured outsourcing towards a cloud computing environment based on DNA cryptography
MICI18-021. Secure cloud computing algorithm using homomorphic encryption and multi-party computation
MICI18-022. Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
MICI18-023. Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing
MICI18-024. Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service
MICI18-025. Reducing Energy Consumption With Cost Budget Using Available Budget Preassignment in Heterogeneous Cloud Computing Systems
MICI18-026. Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
MICI18-027 . Competitions Among Service Providers in Cloud Computing: A New Economic Model
MICI18-028. Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
MICI18-029. Context-aware reinforcement learning-based mobile cloud computing for telemonitoring
MICI18-030. Scene text detection based on enhanced multi-channels MSER and a fast text grouping process
MICI18-031. A new multi-resource allocation mechanism: A tradeoff between fairness and efficiency in cloud computing
MICI18-032. SMDP-Based Coordinated Virtual Machine Allocations in CloudFog Computing Systems
MICI18-033. Component Importance Analysis of Mobile Cloud Computing System in the Presence of Common-Cause Failures
MICI18- 034. Improving Privacy and Security in Decentralizing Multi-Authority AttributeBased Encryption in Cloud Computing
MICI18-035. Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
MICI18-036. System design for predictive road-traffic information delivery using edge-cloud computing
MICI18-037. Secure and Efficient Product Information Retrieval in Cloud Computing
MICI18-038. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
MICI18-039. Semantic-Aware Searching Over Encrypted Data for Cloud Computing
MICI18-040. Hybrid cloud computing for user location-aware augmented reality construction
MICI18-041. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
MICI18-042. An Offloading Strategy in Mobile Cloud Computing Considering Energy and Delay Constraints
MICI18-045. Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack
MICI18-046. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service
MICI18-047. Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing (
MICI18-048. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing
MICI18- 049 Scheduling for Time-Constrained Big-File Transfer Over Multiple Paths in Cloud Computing
MICI18-050 Empirical analysis on key influential factors on cultural hegemony construction based on big data
MICI18-051. Energy optimization protocol of heterogeneous WSN based on node energy
MICI18-052. Box office forecasting for a cinema with movie and cinema attributes
MICI18-053 Student source differences study and computer cartography representation of normal universities in recent 15 years — Take Sichuan Normal University as an example
MICI18-054 Text sentiment analysis based on multi-granularity joint solution
MICI18-055 Study on information recommendation of scientific and technological achievements based on user behavior modeling and big data mining
MICI17-056 Community detection based on unified Bayesian nonnegative matrix factorization
MICI17-057 Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
MICI17-058 Locality-aware Scheduling for Containers in Cloud Computing
MICI17-059 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
MICI17-060 On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
MICI17-061 Fair Resource Allocation for Data-Intensive Computing in the Cloud
MICI17-062 Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing
MICI17-063 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
MICI18-064 MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems
MICI18-065 Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems
MICI18-066 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
MICI18-067 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment
MICI18- 068 Privacy-Preserving Image Processing in the Cloud
MICI18-069 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
MICI18-070 Secure Data Collection, Storage and Access in Cloud-Assisted IoT
MICI18-071 Incorporating label and attribute information for enhanced network representation learning
MICI18-072 Message integration and optimization based on substation monitoring information source-side maintenance
MICI18-073 Big data analysis technology application in agricultural intelligence decision system
MICI18-075 On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
DATA MINING
MICI18-001. Combining web data extraction and data mining techniques to discover knowledge (04 June 2022)
MICI18-002. Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms (31 May 2022)
MICI18- 003. A brief analysis of the key technologies and applications of educational data mining on online learning platform (28 May 2022)
MICI18-004. Associationrules mining analysis of app usage based on mobile traffic flow data (28 May 2022)
MICI18-005. Using data mining technique to improve billing system performance in semiconductor industry (10 May 2022)
MICI18-006. A technique to aggregate classes of analog fault diagnostic data based on association rule mining (May 2022)
MICI18-007. Data mining technique with cluster anaysis use K-means algorithm for LQ45 index on Indonesia stock exchange (30 April 2022)
MICI18-008. Text mining based on tax comments as big data analysis using SVM and feature selection (30 April 2022)
MICI18-009. Using data mining approaches to build credit scoring model: Case study — Implementation of credit scoring model in microfinance institution (26 April 2022)
MICI18-010. Algorithm Optimization of Anomaly Detection Based on Data Mining (16 April 2022)
MICI18-011. Corporate Communication Network and Stock Price Movements: Insights From Data Mining (10 April 2022 )
MICI18-012. Evaluation of predictive data mining algorithms in soil data classification for optimized crop recommendation (09 April 2022)
MICI18-013. Using Data Mining to Predict Hospital Admissions From the Emergency Department (22 February 2022)
MICI18-014. Privacy preserving big data mining: association rule hiding using fuzzy logic approach ( 01 February 2022 )
MICI18-015. Event detection and identification of influential spreaders in social media data streams (March 2022 )
MICI18-016. Online Internet traffic monitoring system using spark streaming (25 January 2022)
MICI18-017. Location prediction on trajectory data: A review (12 April 2022 )
MICI18-018. Get To The Point: Summarization with Pointer-Generator Networks
NETWORK SECURITY & SECURE COMPUTING
MICI18- 001 . Secure Range Search over Encrypted Uncertain IoT Outsourced Data ( 07 June 2022)
MIC117-002. A secure client-side framework for protecting the privacy of health data stored on the cloud (04 June 2022)
MICI18-003. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing (17 May 2022 )
MICI18-004. A fast and resource efficient FPGA implementation of secret sharing for storage applications (23 April 2022)
MICI18-005. Research on Key Combination Management System Based on Identity Authentication (9 April 2022 )
MICI18-006. Efficient Traceable Authorization Search System for Secure Cloud Storage (29 March 2022 )
MICI18-007. Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” (March 2022 )
MICI18- 008. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices (March 2022)
MICI18-009. Anonymous and Traceable Group Data Sharing in Cloud Computing (APRIL 2022)
MICI18-010. SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks (23 January 2022)
MICI18-011. Network-based detection of mobile malware exhibiting obfuscated or silent network behavior (19 March 2022)
MOBILE COMPUTING
MICI18-001. A service migration strategy based on multiple attribute decision in mobile edge computing (17 May 2018)
MICI18-002. SaW: Video Analysis in Social Media with Web-Based Mobile Grid Computing (June 1 2018)
MICI18-003. SaW: Video Analysis in Social Media with Web-Based Mobile Grid Computing (30 April 2018)
MICI18-004. MAGA: A Mobility-Aware Computation Offloading Decision for Distributed Mobile Cloud Computing (Feb. 2018)
MICI18-005. Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing (08 January 2018)
MICI18-006. Classification and Mapping of Adaptive Security for Mobile Computing ( 09 January 2018)
MICI18-007. COAST: A Cooperative Storage Framework for Mobile Transparent Computing Using Device-to-Device Data Sharing (26 January 2018 )
MICI18-008. Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing (28 May 2018)
MICI18-009. A framework for efficient and secured mobility of IoT devices in mobile edge computing (31 May 2018)
MICI18-010. Task offloading and resource allocation in mobile-edge computing system (12 March 2018)
MICI18-011. Decentralized and Optimal Resource Cooperation in GeoDistributed Mobile Cloud Computing (Jan.-March 2018)
MICI18-012. Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing (Jan.-March 2018 )
MICI18-013. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing (Jan.-March 2018)
MICI18-014. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services (June 2018 )
MICI18-015. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services ( June 2018 )
MICI18-016. Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology (12 June 2018)
MICI18-017 Efficiency network construction of advanced metering infrastructure using Zigbee (18 June 2018)
MICI18-018 Differentially Private Mechanisms for Budget Limited Mobile Crowdsourcing ( 18 June 2018)
MICI18-019 Reward or Penalty: Aligning Incentives of Stakeholders in Crowdsourcing (18 June 2018)
MICI18-020 Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features (19 June 2018 )
MIC18-021 Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing (09 January 2018)
MIC18-022 A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing ( 22 March 2018 )
WIRELESS SENSOR NETWORKS
MICI18-001. Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks ( 08 June 2018)
MICI18-002. Energy storage options for environment monitoring Wireless Sensor Networks in rural Africa (07 June 2018)
MICI18-003. Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor Networks: Working with What the Node Can Offer (07 June 2018)
MICI18-004. Optimal weighted K-nearest neighbour algorithm for wireless sensor network fingerprint localisation in noisy environment (07 June 2018)
MICI18-005. Mobile Data Gathering with Bounded Relay in Wireless Sensor Networks (06 June 2018)
MICI18-006. A new autonomous data transmission reduction method for wireless sensors networks (04 June 2018)
MICI18-007. Novel order preserving encryption scheme for wireless sensor networks (04 June 2018)
MICI18-008. Time slotted channel hopping scheduling based on the energy consumption of wireless sensor networks (04 June 2018)
MICI18-009. A K-medoids based clustering algorithm for wireless sensor networks (31 May 2018)
MICI18-010. Exploring the Efficiency of Data Collection Schemes in Wireless Sensor Networks (31 May 2018)