IEEE PROJECTS IN MADURAI-2019 DOTNET PROJECTS
IN MADURAI-S3 TECHNOLOGIES
No
|
Code
|
IEEE 2019 DOT NET Project
Titles
|
Domain
|
Year
|
1
|
S301
|
A Trust-Based Agent Learning Model
for Service Composition in Mobile Cloud Computing Environments
|
CLOUD COMPUTING
|
2019
|
2
|
S302
|
Data Integrity Auditing without
Private Key Storage for Secure Cloud Storage
|
CLOUD COMPUTING
|
2019
|
3
|
S303
|
A Practical Attribute-Based
Document Collection Hierarchical Encryption Scheme in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
4
|
S304
|
Dynamic Multi-Keyword Ranked Search
Based on Bloom Filter Over Encrypted Cloud Data
|
CLOUD COMPUTING
|
2019
|
5
|
S305
|
Dynamic Cloud Network Control Under
Reconfiguration Delay and Cost
|
CLOUD COMPUTING
|
2019
|
6
|
S306
|
Reliability and Availability
Evaluation for Cloud Data Center Networks Using Hierarchical Models
|
CLOUD COMPUTING
|
2019
|
7
|
S307
|
A Secure Searchable Encryption
Framework for Privacy-Critical Cloud Storage Services
|
CLOUD COMPUTING
|
2019
|
8
|
S308
|
Privacy-Preserving Attribute-Based
Keyword Search in Shared Multi-owner Setting
|
Data Mining
|
2019
|
9
|
S308
|
Privacy-Preserving Multi-keyword
Top-k Similarity Search Over Encrypted Data
|
Data Mining
|
2019
|
10
|
S3010
|
Revocable Identity-Based Broadcast
Proxy Re-encryption for Data Sharing in Clouds
|
Data Mining
|
2019
|
11
|
S3011
|
Towards Achieving Keyword Search
over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
|
Data Mining
|
2019
|
12
|
S3012
|
A Hybrid E-learning Recommendation
Approach Based on Learners' Influence Propagation
|
Data Mining
|
2019
|
13
|
S3013
|
A Probabilistic Source Location
Privacy Protection Scheme in Wireless Sensor Networks
|
Net Working
|
2019
|
14
|
S3014
|
Dating with Scambots: Understanding
the Ecosystem of Fraudulent Dating Applications
|
Net Working
|
2019
|
15
|
S3015
|
Authentication by Encrypted
Negative Password
|
Information Forensics and
Security
|
2019
|
16
|
S3016
|
Spammer Detection and Fake User
Identification on Social Networks
|
SOCIAL NETWORKS
|
2019
|
17
|
S3017
|
Personet Friend Recommendation
System Based on Big Five Personality Traits and Hybrid Filtering
|
SOCIAL NETWORKS
|
2019
|
18
|
S3018
|
Predicting Cyberbullying on Social
Media in the Big Data Era Using Machine Learning Algorithms: Review of
Literature and Open Challenges
|
SOCIAL NETWORKS
|
2019
|
19
|
S3019
|
Online Public Shaming on Twitter
Detection, Analysis and Mitigation
|
SOCIAL NETWORKS
|
2019
|
20
|
S3020
|
Cryptdac Cryptographically Enforced
Dynamic Access Control in the Cloud
|
CLOUD COMPUTING
|
2019
|
21
|
S3021
|
An Attribute Credential Based
Public Key Scheme for Fog Computing in Digital Manufacturing
|
CLOUD COMPUTING
|
2019
|
22
|
S3022
|
Verifiable and Multi-keyword
Searchable Attribute-based Encryption Scheme for Cloud Storage
|
CLOUD COMPUTING
|
2019
|
23
|
S3023
|
Novel Multi-Keyword Search on
Encrypted Data in the Cloud
|
CLOUD COMPUTING
|
2019
|
24
|
S3024
|
An Advance Cryptographic Solutions
in Cloud Computing Security
|
CLOUD COMPUTING
|
2019
|
25
|
S325
|
Improving The Efficiency of
E-Healthcare System Based on Cloud
|
CLOUD COMPUTING
|
2019
|
26
|
S326
|
Mining Users Trust From E Commerce
Reviews Based on Sentiment Similarity Analysis
|
CLOUD COMPUTING
|
2019
|
27
|
S327
|
A Hierarchical Attention Model for
Social Contextual Image Recommendation
|
CLOUD COMPUTING
|
2019
|
28
|
S328
|
Hidden Ciphertext Policy Attribute
Based Encryption With Fast Decryption for Personal Health Record
|
CLOUD COMPUTING
|
2019
|
29
|
S329
|
Clustering Based Collaborative
Filtering Using an Incentivized Penalized User Model
|
CLOUD COMPUTING
|
2019
|
30
|
S330
|
CLASS:Cloud Log Assuring Soundness
and Secrecy Scheme for Cloud Forensics
|
CLOUD COMPUTING
|
2019
|
31
|
S331
|
Provably secure and lightweight
identity based authenticated data sharing protocol for cyber physical
environment
|
CLOUD COMPUTING
|
2019
|
32
|
S332
|
Efficient Retrieval over Documents
Encrypted by Attributes in Cloud Computing
|
CLOUD COMPUTING
|
2019
|
No comments:
Post a Comment