IEEE Transactions on Big Data |
1. Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective |
|
|
|
|
2. Patient Oriented Framework Using Bigdata |
|
|
|
|
3. Improving Instance Selection Methods for Big Data Classification |
|
|
|
|
4. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks |
|
|
|
|
5. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
|
|
|
|
IEEE Transactions on Cloud Computing |
1. FINE A Framework for Distributed Learning |
|
|
|
|
2. Sentiment Analysis of Comment Texts based |
|
|
|
|
3. AIR5: Five Pillars of Artificial Intelligence Research |
 |
|
|
|
4. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
 |
|
|
|
5. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things |
 |
|
|
|
More Projects>> |
Transactions on Knowledge and Data Engineering |
1. Data Mining Analysis on Student's Academic Performance through Exploration of Student's Background and Social Activities |
|
|
|
|
2. Secure Data Group Sharing and Conditional |
|
|
|
|
3. A Generalized Locally Linear Factorization Machine with Supervised?Variational Encoding |
 |
|
|
|
4. Mining Users Trust From E-Commerce Reviews Based on Sentiment?Similarity Analysis |
 |
|
|
|
5. FraudFind Financial Fraud Detection by Analyzing Human Behavior |
|
|
|
|
More Projects>> |
Services Computing |
1. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER |
|
|
|
|
2. CONTENT BASED IMAGE RETRIEVAL |
|
|
|
|
3. Identifying At Risk Students for Early Interventions A Time Series Clustering |
|
|
|
|
4. Two Layer Clustering model for Mobile Customer Analysis |
|
|
|
|
5. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme |
|
|
|
|
More Projects>> |
IEEE/ACM TRANSACTIONS ON NETWORKING |
1. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |
|
|
|
|
IEEE Transactions on Security Computing |
1. Collusion Defender: Preserving Subscribers? Privacy in Publish and Subscribe Systems |
 |
|
|
|
2. Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data |
 |
|
|
|
3. OpinionAspect Relations in Cognizing Customer Feelings via Reviews |
|
|
|
|
4. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks |
|
|
|
|
5. A System for Profiling and Monitoring Database Access Patterns - SE |
|
|
|
|
Transactions on Parallel and Distributed Systems |
1. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems |
|
|
|
|
IEEE Transactions on Information Forensics and Security |
1. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage |
|
|
|
|
2. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
|
|
|
|
3. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
|
|
|
|
4. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
|
|
|
|
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|