About IEEE Projects:
NareshITis the best institute in Hyderabad and Chennai for IEEE Projects. We offer Real-Time IEEE Projects with Real-Time scenarios by the expert with the complete guidance of the IEEE Projects.
JAVA .NET Python Hadoop
Technology | Project Title | YEAR | Domain | Abstract | Enroll! |
---|---|---|---|---|---|
JAVA | Detecting Performance Anomalies in Cloud Platform Applications | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Efficient Traceable Authorization Search System for Secure Cloud Storage | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Profit Maximization for Cloud Brokers in Cloud Computing | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | RRect: A Novel Server-Centric Data Center Network with High Power Efficiency and Availability | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Towards Shared Ownership in the Cloud | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment | 2018 | Cloud Computing | Download | Reg.Now |
JAVA | Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior Analysis | 2018 | Data Mining | Download | Reg.Now |
JAVA | DLTA: A Framework for Dynamic Crowd sourcing Classification Tasks | 2018 | Data Mining | Download | Reg.Now |
JAVA | Finding Optimal Skyline Product Combinations under Price Promotion | 2018 | Data Mining | Download | Reg.Now |
JAVA | NAIS: Neural Attentive Item Similarity Model for Recommendation | 2018 | Data Mining | Download | Reg.Now |
JAVA | NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection In Online Social Networks | 2018 | Data Mining | Download | Reg.Now |
JAVA | Online Product Quantization | 2018 | Data Mining | Download | Reg.Now |
JAVA | SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy | 2018 | Data Mining | Download | Reg.Now |
JAVA | Secure and Efficient Skyline Queries on Encrypted Data | 2018 | Data Mining | Download | Reg.Now |
JAVA | TAKer: Fine-Grained Time-AwareMicroblog Search with Kernel Density Estimation | 2018 | Data Mining | Download | Reg.Now |
JAVA | TUB-HAUPM: Tighter Upper Bound for Mining High Average-Utility Patterns | 2018 | Data Mining | Download | Reg.Now |
JAVA | Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion | 2018 | Image Processing | Download | Reg.Now |
JAVA | SPSIM: A SuperPixel-based SIMilarity Index for Full-reference Image Quality Assessment | 2018 | Image Processing | Download | Reg.Now |
JAVA | AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network | 2018 | Information Security | Download | Reg.Now |
JAVA | Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage | 2018 | Information Security | Download | Reg.Now |
JAVA | Generation of Secure and Reliable Honey words, Preventing False Detection | 2018 | Information Security | Download | Reg.Now |
JAVA | RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security | 2018 | Information Security | Download | Reg.Now |
JAVA | Competitive Bike: Competitive Analysis and Popularity Prediction of Bike-Sharing Apps Using Multi-Source Data | 2018 | Mobile Computing | Download | Reg.Now |
JAVA | FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing. | 2018 | Mobile Computing | Download | Reg.Now |
JAVA | MOERA: Mobility-agnostic Online Resource Allocation for Edge Computing | 2018 | Mobile Computing | Download | Reg.Now |
JAVA | Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server | 2018 | Mobile Computing | Download | Reg.Now |
JAVA | An Efficient Computation Offloading Management Scheme in the Densely Deployed Small Cell Networks With Mobile Edge Computing | 2018 | NetWorking | Download | Reg.Now |
JAVA | ARTEMIS: Neutralizing BGP Hijacking Within a Minute | 2018 | NetWorking | Download | Reg.Now |
JAVA | Intelligent Data Transportation in Smart Cities: A Spectrum-Aware Approach | 2018 | NetWorking | Download | Reg.Now |
JAVA | ICE Buckets: Improved Counter Estimation For Network Measurement | 2018 | NetWorking | Download | Reg.Now |
JAVA | UniROPE: Universal and Robust Packet Trajectory Tracing for Software-Defined Networks | 2018 | NetWorking | Download | Reg.Now |
.NET | A New Lightweight Symmetric Searchable Encryption Scheme for String Identification | 2018 | Cloud Computing | Download | Reg.Now |
.NET | Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data | 2018 | Cloud Computing | Download | Reg.Now |
.NET | Hedonic Pricing of Cloud Computing Services | 2018 | Cloud Computing | Download | Reg.Now |
.NET | Karma: Cost-effective Geo-replicated Cloud Storage with Dynamic Enforcement of Causal Consistency. | 2018 | Cloud Computing | Download | Reg.Now |
.NET | On the efficiency of cloud providers: A DEA approach incorporating categorical variables | 2018 | Cloud Computing | Download | Reg.Now |
.NET | SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage. | 2018 | Cloud Computing | Download | Reg.Now |
.NET | An SLA-Aware Cloud Coalition Formation Approach for Virtualized Networks | 2018 | Cloud Computing | Download | Reg.Now |
.NET | SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud | 2018 | Cloud Computing | Download | Reg.Now |
.NET | TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain | 2018 | Cloud Computing | Download | Reg.Now |
.NET | Project: virtFlow: Guest Independent Execution Flow Analysis across Virtualized Environments. | 2018 | Cloud Computing | Download | Reg.Now |
.NET | Attributed Network Alignment: Problem Definitions and Fast Solutions | 2018 | Data Mining | Download | Reg.Now |
.NET | Automated Influence Maintenance in Social Networks: an Agent-based Approach | 2018 | Data Mining | Download | Reg.Now |
.NET | CFOND: Consensus Factorization for Co-Clustering Networked Data | 2018 | Data Mining | Download | Reg.Now |
.NET | CRAFTER: a Tree-ensemble Clustering Algorithm for Static Datasets with Mixed Attributes and High Dimensionality. | 2018 | Data Mining | Download | Reg.Now |
.NET | EMOMA: Exact Match in One Memory Access | 2018 | Data Mining | Download | Reg.Now |
.NET | Frequent Item sets Mining with Differential Privacy over Large-Scale Data | 2018 | Data Mining | Download | Reg.Now |
.NET | HPPQ: A Parallel Package Queries Processing Approach for Large-Scale Data | 2018 | Data Mining | Download | Reg.Now |
.NET | Learning Customer Behaviors for Effective Load Forecasting | 2018 | Data Mining | Download | Reg.Now |
.NET | Normalization of Duplicate Records from Multiple Sources | 2018 | Data Mining | Download | Reg.Now |
.NET | Private Graph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud | 2018 | Data Mining | Download | Reg.Now |
.NET | Reader Comment Digest through Latent Event Facets and News Specificity | 2018 | Data Mining | Download | Reg.Now |
.NET | TransPath: Representation Learning for Heterogeneous Information Networks via Translation Mechanism | 2018 | Data Mining | Download | Reg.Now |
.NET | User Preference Analysis for Most Frequent Peer/Dominator | 2018 | Data Mining | Download | Reg.Now |
.NET | Fast Adaptive Bilateral Filtering | 2018 | Image Processing | Download | Reg.Now |
.NET | New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams | 2018 | Image Processing | Download | Reg.Now |
.NET | ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid | 2018 | Information Security | Download | Reg.Now |
.NET | READ: Reverse engineering of automotive data frames | 2018 | Information Security | Download | Reg.Now |
.NET | Gene Wave: Fast Authentication and Key Agreement on Commodity Mobile Devices | 2018 | Networking | Download | Reg.Now |
.NET | Probability Prediction-Based Reliable and Efficient Opportunistic Routing Algorithm for VANETs | 2018 | Networking | Download | Reg.Now |
.NET | Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. | 2018 | Networking | Download | Reg.Now |
Python | ACHIEVING GENUINE DATA USING HOLOMORPHIC ENCRYPTION ALGORITHM | 2018 | Machine Learning | Download | Reg.Now |
Python | BRAIN TUMOR DIAGNOSYS USING CONVOLUTIONAL NEURAL NETWORKS | 2018 | Machine Learning | Download | Reg.Now |
Python | DIAGNOSE THE BREST CANCER WITH THE COMPARISION OF CNN & LR MACHINE LEARNING ALGORITHM | 2018 | Machine Learning | Download | Reg.Now |
Python | MULTI-TRAFFICSCENCE PERCEPTION BASED ON SUPERVISED LEARNING | 2018 | Machine Learning | Download | Reg.Now |
Python | Nonintrusive Smartphone User Verification Using Anonymzed Multimodal Data | 2018 | Machine Learning | Download | Reg.Now |
Python | DEFECT DETECTION IN NETWORKS USING MACHINE LEARNING ALGORITHMS | 2018 | Machine Learning | Download | Reg.Now |
Python | RECOMMENDATION SYSTEM FOR ECOMMERCE USING MACHINE LEARNING ALGORITHMS | 2018 | Machine Learning | Download | Reg.Now |
Python | DISTINGUISH RECOLORED IMAGES FROM NATURAL IMAGES USING MACHINE LEARNING | 2018 | Machine Learning | Download | Reg.Now |
Python | SECURING FROM CYBER ATTACKS | 2018 | Machine Learning | Download | Reg.Now |
Python | SHORT CONVERSATION PLATFORM USING MECHINE LEARNING | 2018 | Machine Learning | Download | Reg.Now |