+91 9363932473 xpertieee@gmail.com
  • Facebook
  • X
  • RSS
  • Facebook
  • X
  • RSS
  • Franchise
  • Careers
  • Technologies
  • Privacy Policy
  • Sitemap
Ieee Xpert ,Ieee Xpert, ieee projects final year cse students
  • Home
  • About Us
  • Services
    • Online Projects
    • IEEE Projects
    • Workshops
    • Thesis and Journals
    • Web Developement
  • IEEE Projects
    • 2025 – 2026 Projects
      • Python Projects
      • CSE Projects
      • Blockchain Projects
      • Artificial Intelligence Projects
      • ECE Projects
      • NS2 PROJECTS
      • Power Electronics Projects
  • Contact Us
    • Head Office
    • Branches
Select Page

Building an intrusion detection system using a filter-based feature selection algorithm

by admin | Jun 24, 2016 | Uncategorized

Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification but also prevent a classifier from making accurate decisions, especially when coping with big...

Automatically Mining Facets for Queries from Their Search Results

by admin | Jun 24, 2016 | Uncategorized

We address the problem of finding query facets which are multiple groups of words or phrases that explain and summarize the content covered by a query. We assume that the important aspects of a query are usually presented and repeated in the query’s top retrieved...

Adaptive Processing for Distributed Skyline Queries over Uncertain Data

by admin | Jun 24, 2016 | Uncategorized

Adaptive Processing for Distributed Skyline Queries over Uncertain Data Query processing over uncertain data has gained growing attention, because it is necessary to deal with uncertain data in many real-life applications. In this paper, we investigate skyline queries...

A Novel Recommendation Model Regularized with User Trust and Item Ratings

by admin | Jun 24, 2016 | Uncategorized

We propose TrustSVD, a trust-based matrix factorization technique for recommendations. TrustSVD integrates multiple information sources into the recommendation model in order to reduce the data sparsity and cold start problems and their degradation of recommendation...

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

by admin | Jun 20, 2016 | Uncategorized

Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners’ direct control over their data in public cloud storage. The earlier ABE schemes involve only one authority to maintain the whole attribute set, which...

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

by admin | Jun 20, 2016 | Uncategorized

  ABSTRACT Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before...
« Older Entries

We Accept

  • Technologies
  • Careers
  • Franchise
  • Privacy Policy
  • Sitemap
  • IEEE Projects
  • Web Developement
  • Thesis and Journals
  • Workshops
  • Online Projects
  • Phd Sevices
  • Home
  • Services
  • About
  • Privacy Policy
  • Contact Us
  • Technologies
  • Careers
  • Franchise
  • Privacy Policy
  • Sitemap
  • Facebook
  • X
  • RSS
Powered by Ieee Xpert © 2025