IEEE 2019 JAVA PROJECTS IN MADURAI-S3 TECHNOLOGIES
No
|
code
|
IEEE 2019 java project titles
|
domain
|
year
|
1
|
s301
|
a trust-based agent learning model
for service composition in mobile cloud computing environments
|
cloud computing
|
2019
|
2
|
s302
|
a practical attribute-based
document collection hierarchical encryption scheme in cloud computing
|
cloud computing
|
2019
|
3
|
s303
|
dynamic multi-keyword ranked search
based on bloom filter over encrypted cloud data
|
cloud computing
|
2019
|
4
|
s304
|
dynamic cloud network control under
reconfiguration delay and cost
|
cloud computing
|
2019
|
5
|
s305
|
reliability and availability
evaluation for cloud data center networks using hierarchical models
|
cloud computing
|
2019
|
6
|
s306
|
an attribute credential based
public key scheme for fog computing in digital manufacturing
|
cloud computing
|
2019
|
7
|
s307
|
verifiable and multi-keyword
searchable attribute-based encryption scheme for cloud storage
|
cloud computing
|
2019
|
8
|
s308
|
novel multi-keyword search on
encrypted data in the cloud
|
cloud computing
|
2019
|
9
|
s309
|
an advance cryptographic solutions
in cloud computing security
|
cloud computing
|
2019
|
10
|
s310
|
improving the efficiency of
e-healthcare system based on cloud
|
cloud computing
|
2019
|
11
|
s311
|
mining users trust from e commerce
reviews based on sentiment similarity analysis
|
cloud computing
|
2019
|
12
|
s312
|
a hierarchical attention model for
social contextual image recommendation
|
cloud computing
|
2019
|
13
|
s313
|
hidden ciphertext policy attribute
based encryption with fast decryption for personal health record
|
cloud computing
|
2019
|
14
|
s314
|
clustering based collaborative
filtering using an incentivized penalized user model
|
cloud computing
|
2019
|
15
|
s315
|
class:cloud log assuring soundness
and secrecy scheme for cloud forensics
|
cloud computing
|
2019
|
16
|
s316
|
provably secure and lightweight
identity based authenticated data sharing protocol for cyber physical
environment
|
cloud computing
|
2019
|
17
|
s317
|
efficient retrieval over documents
encrypted by attributes in cloud computing
|
cloud computing
|
2019
|
18
|
s318
|
efficient client-side deduplication
of encrypted data with public auditing in cloud storage
|
cloud computing
|
2019
|
19
|
s319
|
enabling efficient user revocation
in identity-based cloud storage auditing for shared big data
|
cloud computing
|
2019
|
20
|
s320
|
privacy-preserving indexing and
query processing for secure dynamic cloud storage
|
cloud computing
|
2019
|
21
|
s321
|
semantic-aware searching over
encrypted data for cloud computing
|
2019
|
|
22
|
s322
|
a new lightweight symmetric
searchable encryption scheme for string identification
|
cloud computing
|
2019
|
23
|
s323
|
achieving data truthfulness
and privacy preservation in data markets
|
cloud computing
|
2019
|
24
|
s324
|
an efficient ranked multi-keyword
search for multiple data owners over encrypted cloud data
|
cloud computing
|
2019
|
25
|
s325
|
anonymous and traceable group data sharing in cloud
computing
|
cloud computing
|
2019
|
26
|
s326
|
block design-based key agreement
for group data sharing in cloud computing
|
cloud computing
|
2019
|
27
|
s327
|
catch you if you misbehave: ranked
keyword search results verification in cloud computing
|
cloud computing
|
2019
|
28
|
s328
|
ciphertext-policy attribute-based
signcryption with verifiable outsourced designcryption for sharing personal
health records
|
cloud computing
|
2019
|
29
|
s329
|
cloud storage for electronic health
records based on secret sharing with verifiable reconstruction outsourcing
|
cloud computing
|
2019
|
30
|
s330
|
efficient regular language search for secure cloud
storage
|
cloud computing
|
2019
|
31
|
s331
|
enabling identity-based integrity
auditing and data sharing with sensitive information hiding for secure cloud
storage
|
cloud computing
|
2019
|
32
|
s332
|
automatic construction of vertical
search tools for the deep web
|
cloud computing
|
2019
|
33
|
s333
|
privacy-preserving
outsourced calculation toolkit in the cloud
|
cloud computing
|
2019
|
34
|
s334
|
secure and efficient product
information retrieval in cloud computing
|
cloud computing
|
2019
|
35
|
s335
|
semantic-based compound keyword search over encrypted
cloud data
|
cloud computing
|
2019
|
36
|
s336
|
a clinical decision support
framework for heterogeneous data sources
|
data mining
|
2019
|
37
|
s337
|
characterizing and predicting early
reviewers for effective product marketing on e-commerce websites
|
data mining
|
2019
|
38
|
s338
|
estimating social opinion dynamics models from
voting records
|
data mining
|
2019
|
39
|
s339
|
personalized market basket
prediction with temporal annotated recurring sequences
|
data mining
|
2019
|
40
|
s340
|
privacy-preserving social media
data publishing for personalized ranking-based recommendation
|
data mining
|
2019
|
41
|
s341
|
a novel machine learning algorithm
for spammer identification in industrial mobile cloud computing
|
machine learning
|
2019
|
42
|
s342
|
analyzing and detecting
money-laundering accounts in online social networks
|
social networking
|
2019
|
43
|
s343
|
detection of suicide-related
posts in twitter data streams
|
social networking
|
2019
|
44
|
s344
|
event detection and identification
of influential spreaders in social media data streams
|
social networking
|
2019
|
45
|
s345
|
health monitoring on social media over time
|
social networking
|
2019
|
46
|
s346
|
leveraging affective
hashtags for ranking music recommendations
|
social networking
|
2019
|
47
|
s347
|
getrust: a guarantee-based
trust model in chord-based p2p networks
|
secure computing
|
2019
|
48
|
s348
|
latent-data privacy preserving with
customized data utility for social network data
|
secure computing
|
2019
|
49
|
s349
|
searchable encryption over feature-rich data
|
secure computing
|
2019
|
50
|
s350
|
cloud-based fine-grained health
information access control framework for lightweight iot devices with dynamic
auditing and attribute revocation
|
iot (internet of things)
|
2019
|
51
|
s351
|
efficient rectification of
distorted fingerprints
|
image processing
|
2019
|
52
|
s352
|
new framework of reversible data hiding in
encrypted jpeg bitstreams
|
image processing
|
2019
|
53
|
s353
|
scalable access control for
privacy-aware media sharing
|
image processing
|
2019
|
54
|
s354
|
a developer centered bug
prediction model
|
software
engineering
|
2019
|
55
|
s355
|
enabling probabilistic
differential privacy protection for location
|
service computing
|
2019
|
56
|
s356
|
flexible wildcard searchable encryption system
|
service computing (web services)
|
2019
|
57
|
s357
|
transactional behavior verification
in business process as a service configuration
|
service computing (web services)
|
2019
|
58
|
s358
|
a secure and verifiable access
control scheme for big data storage in clouds
|
big data
|
2019
|
59
|
s359
|
accounttrade: accountability
against dishonest big data buyers and sellers
|
big data
|
2019
|
No comments:
Post a Comment