CEG 7470 Term Pape
Instructor: Dr. Bin Wang
This document describes the research term paper requirements and deadlines. Some possible topics are listed. You are not required to choose your topic from the list. Instead, you are encouraged to formulate your own topic.
Your term paper should comprise of either (i) a thorough survey of a new topic or (ii) design, evaluation, and/or implementation of an algorithm/protocol in relevant areas. You can find relevant reference materials that appear in archive journals and conferences. Some potential topics are listed in this document.
Submit a short proposal (one to two typed pages maximum) by Jan 21. You should submit the following:
1. Tentative title, author name, and email address.
2. Term paper outline:
3. Survey paper: problem statement/overview, background materials, description of existing algorithms/schemes, the way you would like to survey on/compare among them (e.g., with respect to some performance measure or implementation overhead), and possible enhancement of existing algorithms/schemes.
4. Research-oriented project: problem statement/formulation and motivation, background materials, objectives to achieve, possible methods of attack, and any pertinent information you would like me to know.
5. Time schedule listing dates of major “milestone”.
6. References (list only those actually consulted in preparing the proposal).
Submit a short report (2 pages) by March 7 describing your progress. It should include (1) what has been achieved so far; (2) planned work for the rest of the quarter; (3) problems encountered and your plan of attack to keep your project on track.
Final Term Paper Submission
The term paper is due by April 22 in class. It should be of professional quality and be in the format of an IEEE transaction style. Figures must be clear and drawn by you. Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:
1. Title page.
2. Abstract (summary of the paper).
3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).
4. (i) Description of existing algorithms/protocols for survey papers; (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.
5. (i) Comparison among existing algorithms/protocols and discussion on possible improvements/enhancements; (ii) project results (derivation, proof, justification, or detailed design/simulation) in one or more numbered sections for research-oriented papers.
6. Conclusions (evaluation of results, suggestions for improvements, or future work).
7. References must follow IEEE Transactions format (at least 10 references). Proper citation of references must be embedded in the term paper.
8. Appendices (if appropriate).
In particular, references used must be clearly cited in your written report at proper locations. Finally, you will have to present your term paper (about 10-15 minutes presentation) at the end of the semester.
1. Body area networks
2. Bio-sensors: Needs and objectives
3. Applications of wireless sensor networks in Controlled Environments
4. Object Tracking using sensor networks
5. Unconventional use of sensor networks
6. Cross Layer Activity Management in sensor network
7. Extensible Authentication Protocol (EAP) and IEEE 802. 1x
8. Accuracy and efficiency of location determination in wireless sensor networks
9. Efficient key management in sensor networks
10. Need for heterogeneity in wireless sensor networks
11. Query Execution in sensor networks
12. Usefulness of multiple radios in Sensor Networks
13. Energy efficient MAC protocols for wireless mobile networks and sensor networks
14. Forming aggregation scheme in a sensor network connected as mesh, hex and triangular schemes
15. Approximating traffic in a Mesh Network
16. Impact of partitioning of a Mesh Network on the network performance
17. Modeling of a Mobile mesh network
18. Impact of agile and cognitive radios on wireless communication
19. Multiple packet receiving schemes in ad hoc networks
20. TCP in Wireless Environments: Problems and solutions
21. Unsaturated Capacity of Ad hoc Networks
22. Optimization of Wireless Network Security
23. Study the tradeoff between the amount of network state information maintained in a network and the performance of the network in terms of, for example, the ability of establishing connections (with or without protection consideration);
24. Peer-to-peer networks; distributed file storage system; look up and routing; modeling of peer-to-peer systems
25. Wireless ad-hoc networks
26. Delay tolerant networking
27. Wireless sensor networks; power control and management;
28. Network security: anonymity, traceback, DDos (distributed denial of service attack)
29. Quality of service provisioning, scalable QoS control, overlay networks and QoS provisioning
30. Multicast, application layer multicast multicast
31. Multicast congestion control algorithms, performance modeling
32. Schemes for providing differentiated services in wireless networks, e.g., IEEE XXXXXXXXXXwireless LAN, wireless Ad Hoc networks
33. Active queue
uffer management schemes, e.g., schemes that improve on RED, BLUE, RIO etc.
34. Multi-path routing algorithms in Internet
35. Multi-path routing algorithms in Ad Hoc wireless networks
36. Routing (unicast and multicast) algorithms in Ad Hoc wireless networks
37. Architectures and approaches for providing scalable differentiated services for Internet
38. Distributed fair bandwidth access algorithms for Ad Hoc wireless mobile hosts
39. Scheduling algorithms for fair bandwidth sharing in wireless networks
40. Routing algorithms/protocols for anycast
41. IP mobility support
42. Overlay networks
43. Study the impact of different placement policies of multicast grooming capable optical crossconnects (and/or optical light splitters) to the network performance in terms of, for example, throughput, connection blocking probability;
44. Traffic grooming techniques in WDM optical networks including ring network and mesh networks
45. Wavelength routing and assignment techniques for SONET optical networks, and general WDM optical networks
46. Study the feasibility and performance of p-cycle (or pre-configured cycle) approach to combat dual-failure in WDM optical networks
47. Survey the different approaches of modeling the connection establishment blocking probability in optical networks, both for unicast and multicast
48. Investigate the approach to modeling the connection establishment considering protection (i.e., a request of setting up a primary path as well as a protection path) blocking probability in optical networks
49. Metropolitan and Regional Wireless Networks: 802.16, XXXXXXXXXXand 802.22
50. Wireless Personal Area Networks
52. Recent Advances in the Wireless Physical Layer
53. Location Management in Wireless Data Networks
54. Location Management in Wireless Cellular Networks
55. Time Synchronization in Wireless Networks
56. Power Management in Wireless Networks
57. Energy Efficient Routing in Wireless Networks
58. Mobile IP
59. Network Mobility
60. Network Architectures for Mobility
61. IEEE802.21 Media Independent Handover Services
62. QoS over WiMAX
63. QoS in Wireless Data Networks
64. QoS in Cellular Networks
65. TCP Optimizations for Wireless
66. VoIP/Multimedia over WiMAX
67. Voice over Wireless
68. Security in Wireless Data Networks
69. Security In Wireless Cellular Networks
70. Aircraft Wireless Networks
Intra-Vehicle Wireless Communication
72. Medical Applications of Wireless Networks
73. Web information systems
74. Security, trust, and privacy
75. Software defined networking
76. Edge/fog computing
77. Internet of things security
78. Smart city/home