ABOUT ORACLE PROJECT
Oracle Is An Object-Oriented Language That Allows Learners To Make Real-World Applications. Oracle Technology Based Mostly Software Package Works Almost Everywhere – From The Tiniest Devices To Super Computers!
IEEE ORACLE PROJECT
SNO | Projects List |
1 | Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming |
2 | ID2S Password Authenticated Key Exchange Protocols |
3 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
4 | CSecure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption |
5 | Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts |
6 | SeDas A DeyPoS DE duplicatable Dynamic Proof of Storage for Multi User Environments |
7 | TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud |
8 | Secure Auditing and Deduplicating Data in Cloud |
9 | Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
10 | Relevance Feedback Algorithms Inspired By Quantum Detection |
11 | Top k Dominating Queries on Incomplete Data |
12 | Cross Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
13 | Crowdsourcing for Top-K Query Processing over Uncertain Data |
14 | Understanding Short Texts through Semantic Enrichment and Hashing |
15 | Sentiment Embeddings with Applications to Sentiment Analysis |
16 | A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
17 | RSkNN kNN Search on Road Networks by Incorporating Social Influence |
18 | A Novel Recommendation Model Regularized with User Trust and Item Ratings |
19 | Topic Sketch: Real-Time Bursty Topic Detection from Twitter |
20 | Top-Down XML Keyword Query Processing |
21 | Inverted Linear Quad tree Efficient Top K Spatial Keyword Search |
22 | Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
23 | Analysis of customer churn prediction in telecom industry using decision trees and logistic regression |
34 | An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
25 | Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
26 | Dual Server Public Key Encryption with keyword search for secure cloud storage |
27 | Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially |
28 | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
29 | Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions |
30 | Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions |
31 | Fine-grained Two-factor Access Control for Web-based Cloud Computing Services |
32 | Profiling Online Social Behaviors for Compromised Account Detection |
33 | Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
34 | Cloud Armor Supporting Reputation based Trust Management for Cloud Services |
35 | An Efficient Privacy Preserving Ranked Keyword Search Method |
36 | Protecting Your Right Attribute based Keyword Search with Fine grained Owner |
37 | Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud |
38 | A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in Cloud |
39 | A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data |
40 | FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
41 | Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted |
42 | An enhanced system to identify mischievous social malwares on Facebook applications |
43 | Social Friend Recommendation Based on Multiple Network Correlation |
44 | Privacy Preserving Location Sharing Services for Social Networks |
45 | STAMP Enabling Privacy Preserving Location Proofs for Mobile Users |
46 | Detecting Malicious Facebook Applications |
47 | Answering Approximate Queries over XML Data |
48 | EPLQ Efficient Privacy Preserving Location Based Query Over Outsourced Encrypted Data |
49 | Mapping Bug Reports to Relevant Files A Ranking Model, a Fine Grained Benchmark, and Feature Evaluate |
50 | Personalized Travel Sequence Recommendation on Multi-Source Big Social Media |
51 | Trust Agent-Based Behavior Induction in Social Networks |