IEEE 2019 JAVA PROJECTS IN MADURAI-S3 TECHNOLOGIES
No
|
Code
|
IEEE 2019 JAVA Project Titles
|
Domain
|
Year
|
1
|
S301
|
A Trust-Based Agent Learning Model
for Service Composition in Mobile Cloud Computing Environments
|
CLOUD COMPUTING
|
2019
|
2
|
S302
|
A Practical Attribute-Based
Document Collection Hierarchical Encryption Scheme in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
3
|
S303
|
Dynamic Multi-Keyword Ranked Search
Based on Bloom Filter Over Encrypted Cloud Data
|
CLOUD COMPUTING
|
2019
|
4
|
S304
|
Dynamic Cloud Network Control Under
Reconfiguration Delay and Cost
|
CLOUD COMPUTING
|
2019
|
5
|
S305
|
Reliability and Availability
Evaluation for Cloud Data Center Networks Using Hierarchical Models
|
CLOUD COMPUTING
|
2019
|
6
|
S306
|
An Attribute Credential Based
Public Key Scheme for Fog Computing in Digital Manufacturing
|
CLOUD COMPUTING
|
2019
|
7
|
S307
|
Verifiable and Multi-keyword
Searchable Attribute-based Encryption Scheme for Cloud Storage
|
CLOUD COMPUTING
|
2019
|
8
|
S308
|
Novel Multi-Keyword Search on
Encrypted Data in the Cloud
|
CLOUD COMPUTING
|
2019
|
9
|
S309
|
An Advance Cryptographic Solutions
in Cloud Computing Security
|
CLOUD COMPUTING
|
2019
|
10
|
S310
|
Improving The Efficiency of
E-Healthcare System Based on Cloud
|
CLOUD COMPUTING
|
2019
|
11
|
S311
|
Mining Users Trust From E Commerce
Reviews Based on Sentiment Similarity Analysis
|
CLOUD COMPUTING
|
2019
|
12
|
S312
|
A Hierarchical Attention Model for
Social Contextual Image Recommendation
|
CLOUD COMPUTING
|
2019
|
13
|
S313
|
Hidden Ciphertext Policy Attribute
Based Encryption With Fast Decryption for Personal Health Record
|
CLOUD COMPUTING
|
2019
|
14
|
S314
|
Clustering Based Collaborative
Filtering Using an Incentivized Penalized User Model
|
CLOUD COMPUTING
|
2019
|
15
|
S315
|
CLASS:Cloud Log Assuring Soundness
and Secrecy Scheme for Cloud Forensics
|
CLOUD COMPUTING
|
2019
|
16
|
S316
|
Provably secure and lightweight
identity based authenticated data sharing protocol for cyber physical
environment
|
CLOUD COMPUTING
|
2019
|
17
|
S317
|
Efficient Retrieval over Documents
Encrypted by Attributes in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
18
|
S318
|
Efficient Client-Side Deduplication
of Encrypted Data With Public Auditing in Cloud Storage
|
CLOUD COMPUTING
|
2019
|
19
|
S319
|
Enabling Efficient User Revocation
in Identity-based Cloud Storage Auditing for Shared Big Data
|
CLOUD COMPUTING
|
2019
|
20
|
S320
|
Privacy-preserving Indexing and
Query Processing for Secure Dynamic Cloud Storage
|
CLOUD COMPUTING
|
2019
|
21
|
S321
|
Semantic-aware Searching over
Encrypted Data for Cloud Computing
|
|
2019
|
22
|
S322
|
A New Lightweight Symmetric
Searchable Encryption Scheme for String Identification
|
CLOUD COMPUTING
|
2019
|
23
|
S323
|
Achieving Data Truthfulness
and Privacy Preservation in Data Markets
|
CLOUD COMPUTING
|
2019
|
24
|
S324
|
An Efficient Ranked Multi-Keyword
Search for Multiple Data Owners Over Encrypted Cloud Data
|
CLOUD COMPUTING
|
2019
|
25
|
S325
|
Anonymous and Traceable Group Data Sharing in Cloud
Computing
|
CLOUD COMPUTING
|
2019
|
26
|
S326
|
Block Design-based Key Agreement
for Group Data Sharing in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
27
|
S327
|
Catch You if You Misbehave: Ranked
Keyword Search Results Verification in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
28
|
S328
|
Ciphertext-Policy Attribute-Based
Signcryption With Verifiable Outsourced Designcryption for Sharing Personal
Health Records
|
CLOUD COMPUTING
|
2019
|
29
|
S329
|
Cloud Storage for Electronic Health
Records Based on Secret Sharing with Verifiable Reconstruction Outsourcing
|
CLOUD COMPUTING
|
2019
|
30
|
S330
|
Efficient Regular Language Search for Secure Cloud
Storage
|
CLOUD COMPUTING
|
2019
|
31
|
S331
|
Enabling Identity-Based Integrity
Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud
Storage
|
CLOUD COMPUTING
|
2019
|
32
|
S332
|
Automatic construction of vertical
search tools for the deep web
|
CLOUD COMPUTING
|
2019
|
33
|
S333
|
Privacy-Preserving
Outsourced Calculation Toolkit in the Cloud
|
CLOUD COMPUTING
|
2019
|
34
|
S334
|
Secure and Efficient Product
Information Retrieval in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
35
|
S335
|
Semantic-based Compound Keyword Search over
Encrypted Cloud Data
|
CLOUD COMPUTING
|
2019
|
36
|
S336
|
A Clinical Decision Support
Framework for Heterogeneous Data Sources
|
DATA MINING
|
2019
|
37
|
S337
|
Characterizing and Predicting Early
Reviewers for Effective Product Marketing on E-Commerce Websites
|
DATA MINING
|
2019
|
38
|
S338
|
Estimating Social Opinion Dynamics Models from
Voting Records
|
DATA MINING
|
2019
|
39
|
S339
|
Personalized Market Basket
Prediction with Temporal Annotated Recurring Sequences
|
DATA MINING
|
2019
|
40
|
S340
|
Privacy-Preserving Social Media
Data Publishing for Personalized Ranking-Based Recommendation
|
DATA MINING
|
2019
|
41
|
S341
|
A Novel Machine Learning Algorithm
for Spammer Identification in Industrial Mobile Cloud Computing
|
MACHINE LEARNING
|
2019
|
42
|
S342
|
Analyzing and Detecting
Money-Laundering Accounts in Online Social Networks
|
SOCIAL NETWORKING
|
2019
|
43
|
S343
|
Detection of suicide-related
posts in Twitter data streams
|
SOCIAL NETWORKING
|
2019
|
44
|
S344
|
Event Detection and Identification
of Influential Spreaders in Social Media Data Streams
|
SOCIAL NETWORKING
|
2019
|
45
|
S345
|
Health Monitoring on Social Media over Time
|
SOCIAL NETWORKING
|
2019
|
46
|
S346
|
Leveraging Affective
Hashtags for Ranking Music Recommendations
|
SOCIAL NETWORKING
|
2019
|
47
|
S347
|
Getrust: A guarantee-based
trust model in Chord-based P2P networks
|
SECURE COMPUTING
|
2019
|
48
|
S348
|
Latent-Data Privacy Preserving With
Customized Data Utility for Social Network Data
|
SECURE COMPUTING
|
2019
|
49
|
S349
|
Searchable Encryption over Feature-Rich Data
|
SECURE COMPUTING
|
2019
|
50
|
S350
|
Cloud-based Fine-grained Health
Information Access Control Framework for Lightweight iot Devices with Dynamic
Auditing and Attribute Revocation
|
Iot (INTERNET OF THINGS)
|
2019
|
51
|
S351
|
Efficient Rectification of
Distorted Fingerprints
|
IMAGE PROCESSING
|
2019
|
52
|
S352
|
New Framework of Reversible Data Hiding in
Encrypted JPEG Bitstreams
|
IMAGE PROCESSING
|
2019
|
53
|
S353
|
Scalable Access Control For
Privacy-Aware Media Sharing
|
IMAGE PROCESSING
|
2019
|
54
|
S354
|
A Developer Centered Bug
Prediction Model
|
SOFTWARE ENGINEERING
|
2019
|
55
|
S355
|
Enabling Probabilistic
Differential Privacy Protection for Location
|
SERVICE COMPUTING
|
2019
|
56
|
S356
|
Flexible Wildcard Searchable Encryption System
|
SERVICE COMPUTING (WEB SERVICES)
|
2019
|
57
|
S357
|
Transactional Behavior Verification
in Business Process as a Service Configuration
|
SERVICE COMPUTING (WEB SERVICES)
|
2019
|
58
|
S358
|
A Secure and Verifiable Access
Control Scheme for Big Data Storage in Clouds
|
BIG DATA
|
2019
|
59
|
S359
|
Accounttrade: Accountability Against
Dishonest Big Data Buyers and Sellers
|
BIG DATA
|
2019
|
|
No comments:
Post a Comment