Projectwale,Opp. DMCE,Airoli,sector 2
projectwale@gmail.com

cloud computing table

IDPROJECT NAMEIEEE
1774Study-on-Construction-of-Radio-Monitoring-System-Based-on-Cloud-Edge-DeviceIEEE-2023
1773Secure-and-Efficient-Data-Integrity-Verification-Scheme-for-Cloud-Data-StorageIEEE-2023
1772Cloud-based-E-Feedback-System-for-Hospitality-IndustryIEEE-2023
1771Design-of-cloud-based-video-sharing-platform-using-Machine-LearningIEEE-2023
1770Enabling-Balanced-Data-Deduplication-in-Mobile-Edge-ComputingIEEE-2023
1769The-Role-and-Potential-Applications-of-Cloud-Computing-in-the-Banking-IndustryIEEE-2023
1768Global-Identification-Passport:-A-Unique-Cloud-based-Passport-ModelIEEE-2023
1767An-evaluation-on-E-learning-with-Cloud-ComputingIEEE-2023
1766A-Review-on-Adoption-of-Green-Cloud-ComputingIEEE-2023
1765Software-Re-Engineering-using-Cloud-Computing-PlatformIEEE-2023
1553UNTRACEABLE-GROUP-DATA-SHARING-USING-AES-IN-NETWORK-SECURITYNON IEEE -2022
1552MAINTAINING-SEARCH-OVER-ENCRYPTED-DATA-AND-DATA-INTEGRITY-EVALUATION-IN-CLOUDNON IEEE -2022
1551DATA-STORAGE-SECURITY-IN-CLOUD-COMPUTINGNON IEEE -2022
1548A-PROFICIENT-PRIVACY-PROTECTION-METHOD-FOR-CLOUD-COMPUTINGNON IEEE -2022
1516FACE-RECOGNITION-IN-SOCIAL-NETWORKS-USING-BIG-DATANON IEEE -2022
1430ONLINE-VOTING-SYSTEM-USING-CLOUD-COMPUTINGNON IEEE-2022
1269Development-of-cloud-recognition-system-for-ground-based-cloud-images-based-on-machine-visionIEEE-2021
1268Application-of-Artificial-Intelligence-System-in-Smart-Education-in-Cloud-Environment-with-Optimization-ModelsIEEE-2021
1267Joint-Computation-Offloading-and-Bandwidth-Assignment-in-Cloud-Assisted-Edge-ComputingIEEE-2022
1266An-Integrative-and-Privacy-Preserving-Based-Medical-Cloud-PlatformIEEE-2021
1265The-Realization-of-Key-Algorithm-of-Mobile-Internet-Traffic-Information-Mining-Based-on-Cloud-ComputingIEEE-2021
1264Design-and-Implementation-of-E-commerce-Recommendation-System-Model-Based-on-Cloud-ComputingIEEE-2021
1263Towards-Solving-a-Mixture-of-Issues-Using-Artificial-Intelligence-and-Cloud-ComputingIEEE-2021
1262Providing-Resilience-on-Cloud-ComputingIEEE-2021
1261National-Defense-Cloud-StrategyIEEE-2021
1260A-Cost-Efficient-Auto-Scaling-Algorithm-for-Large-Scale-Graph-Processing-in-Cloud-Environments-with-Heterogeneous-ResourcesIEEE-2021
1259A-Cloud-Guided-Feature-Extraction-Approach-for-Image-Retrieval-in-Mobile-Edge-ComputingIEEE-2021
1258Thermal-Prediction-for-Efficient-Energy-Management-of-Clouds-Using-Machine-LearningIEEE-2021
1257AI-oriented-Workload-Allocation-for-Cloud-Edge-ComputingIEEE-2021
1256Protecting-Medical-Images-by-Using-Fused-Cryptographic-Technique-with-Fog-ComputingIEEE-2021
1255A-smartcard-based-key-agreement-framework-for-cloud-computing-using-ECCIEEE-2021
1254An-Analytical-Survey-for-Improving-Authentication-levels-in-Cloud-ComputingIEEE-2021
1253Enhancing-the-Reliability-of-Cloud-Data-by-Implementing-AES-AlgorithmIEEE-2021
1252The-Key-of-Application-Software-Service-in-Science-Cloud-ComputingIEEE-2021
1251Hedonic-Pricing-of-Cloud-Computing-ServicesIEEE-2021
1157Predicting-Workflow-Task-Execution-Time-in-the-Cloud-using-A-Two-Stage-Machine-Learning-ApproachNON IEEE -2020
1153Comments-on-“Secure-Data-Sharing-in-Cloud-Computing-Using-Revocable-Storage-Identity-Based-Encryption”NON IEEE -2020
1152An-Application-of-IoT-for-Conduct-of-Laboratory-Experiment-from-HomeNON IEEE -2020
1043Implementation-Of-An-Enhanced-Ciphertext-Policy-Attribute-Based-Encryption-With-User-Repudiation-MethodNON IEEE -2021
1042Energy-Efficient-And-Cost-Optimized-Resource-Provisioning-In-Cloud-ComputingNON IEEE -2021
1041Cloud-Based-Secure-File-Storage-Using-Hybrid-Cryptography-AlgorithmNON IEEE -2021
1040Characteristics-Based-Information-Out-Resource-With-Relating-Verify-In-CloudsNON IEEE -2021
1039An-Investigation-Of-An-Efficient-Attribute-Based-Encryption-Scheme-In-Cloud-ComputingNON IEEE -2021
1038Adopted-And-Verify-Contact-Manage-With-Several-File-Right-For-Cloud-StorageNON IEEE -2021
1037Administration-Of-Data-In-Cloud-ComputingNON IEEE -2021
1036A-Review-On-Cloud-Computing-Adoption-In-BanksNON IEEE -2021
1004Cloud-based-Protection-and-Performance-Improvement-in-the-E-Health-Management-Framework2020
1003Modeling-Smart-Cloud-Computing-Resource-Allocation-in-E-Learning2020
1002Speed-Limit-Camera-MonitoringTracking-System-Using-SaaS-Cloud-Computing-Module-and-GPS2020
1001Towards-Cloud-Computing-and-Blockchain-Integrated-Applications2020
1000Cloud-Computing-Data-Center-Structure-Based-on-Internet-of-Things-and-Its-Scheduling-Mechanism2020
999Fine-Grained-Access-Control-in-the-Era-of-Cloud-Computing-An-Analytical-Review2020
998An-Improvement-of-Task-Scheduling-Algorithms-for-Green-Cloud-Computing2020
997A-computational-and-analytical-approach-for-cloud-computing-security-with-user-data-management2020
996The-Design-of-a-Novel-Smart-Home-Control-System-using-Smart-Grid-Based-on-Edge-and-Cloud-Computing2020
995Green-computing-for-Internet-of-Things2020
994Transformation-of-Governance-through-Information-Technology-by-Cloud-Computing2020
993CLAWER-Context-aware-Cloud-Fog-based-Workflow-Management-Framework-for-Health-Emergency-Services2020
992Research-on-online-cloud-storage-technology2020
991Abnormal-Traffic-Monitoring-Methods-Based-on-a-Cloud-Computing-Platform2020
990Research-and-Application-of-Data-Privacy-Protection-Technology-in-Cloud-Computing-Environment-Based-on-Attribute-Encryption2020
989Heterogeneous-Task-Co-location-in-Containerized-Cloud-Computing-Environments2020
988MISSION-SWACHHTA2020
987Computation-Offloading-Strategy-Based-on-Deep-Reinforcement-Learning-in-CloudAssisted-Mobile-Edge-Computing2020
986Intrusion-Detection-and-Prevention-using-Honeypot-Network-for-Cloud-Security2020
322Development-of-Agricultural-Internet-of-Things-Monitoring-System-Combining-Cloud-Computing-and-WeChat-Technology2019
321A-New-Proposed-Sensor-Cloud-Architecture-Based-on-Fog-Computing-for-Internet-of-Things2019
320Efficient-load-Balancing-algorithm-analysis-in-Cloud-Computing2020
319Application-of-Steganography-Technique-in-Cloud-Computing2019
318Network-Traffic-based-Virtual-Machine-Migration-in-Cloud-Computing-Environment2019
317Cloud-Computing-Task-Scheduling-Algorithm-Based-On-Improved-Genetic-Algorithm2019
316Fine-Grained-Access-Control-in-the-Era-of-Cloud-Computing:-An-Analytical-Review2020
315Multi-level-Trust-Agreement-in-Cloud-Environment2019
314Comparison-of-Privacy-Preserving-Models-Based-on-a-Third-Party-Auditor-in-Cloud-Computing2020
313Research-of-Fine-Grit-Access-Control-Based-on-Time-in-Cloud-Computing2019
312Constructing-of-vulnerability-prevention-secure-model-for-the-cloud-computing2020
311An-IOT-Approach-to-Vehicle-Accident-Detection-using-Cloud-Computing2019
310Data-Protection-as-a-Service-in-the-Multi-Cloud-Environment2019
309Determination-of-Trustworthiness-of-Cloud-Service-Provider-and-Cloud-Customer2019
308Block-Chain-Based-Cloud-Computing-Model-on-EVM-Transactions-for-Secure-Voting2019
307Delivering-Data-Mining-Services-in-Cloud-Computing2019
306iPrivacy:-LWE-Enhanced-image-protection-over-cloud-storage2020
305Powering-Hands-on-Cybersecurity-Practices-with-Cloud-Computing2019
304Virtual-Machine-based-Hybrid-Auto-Scaling-for-Large-Scale-Scientific-Workflows-in-Cloud-Computing2020
303Comparison-of-RBAC-and-ABAC-Security-Models-for-Private-Cloud2019
302Multi-Objective-Resource-Mapping-and-Allocation-for-Volunteer-Cloud-Computing2019
301A-Simple-and-Secured-Cryptography-System-of-Cloud-Computing2019
300Towards-Ingestion-Processes-of-Kompsat-Data-in-Open-Data-Cube-on-Open-Source-Cloud-Computing-Environment2019
299A-Novel-Predictive-Resource-Allocation-Framework-for-Cloud-Computing2019
298DLECP:-A-Dynamic-Learning-based-Edge-Cloud-Placement-Framework-for-Mobile-Cloud-Computing2019
297Comparison-of-Various-Fault-Tolerance-Techniques-for-Scientific-Workflows-in-Cloud-Computing2019
296A-new-Security-Mechanism-for-Vehicular-Cloud-Computing-Using-Fog-Computing-System2019
295Online-Virtual-Machine-Assignment-Using-Multi-Armed-Bandit-in-Cloud-Computing2019
294Towards-a-Parallel-Constraint-Solver-for-Cloud-Computing-Environments2019
293Privacy-Preserving-Association-Rule-Mining-Algorithm-for-Encrypted-Data-in-Cloud-Computing2019
292Scalable-Pathogen-Pipeline-Platform-(SP^3):-Enabling-Unified-Genomic-Data-Analysis-with-Elastic-Cloud-Computing2019
291Analysis-and-Detection-of-DDoS-Attacks-on-Cloud-Computing-Environment-using-Machine-Learning-Techniques2019
290A-Deep-Learning-Based-Distributed-Smart-Surveillance-Architecture-using-Edge-and-Cloud-Computing2019
289Study-of-Cloud-Security-in-Hyper-scalers2020
288Cloud-of-Things-(CoT)-based-Smart-Cities2020
287IoT-and-Cloud-Computing-based-Smart-Water-Metering-System2019
286Fog-Computing-as-a-Complementary-Approach-to-Cloud-Computing2019
285Performance-Evaluation-of-Machine-Learning-Algorithms-for-Credit-Card-Fraud-Detection2019
284Movie-Recommender-System-Using-K-Means-Clustering-AND-K-Nearest-Neighbor2019
283Analysis-of-Educational-Data-Mining-using-Classification2019
282Collaborative-Validation-of-Public-Key-Certificates-for-IoT-by-Distributed-Caching2019
281A-Security-Model-for-the-Enhancement-of-Data-Privacy-in-Cloud-Computing2019
280Why-Does-Your-Data-Leak?-Uncovering-the-Data-Leakage-in-Cloud-from-Mobile-Apps2019
279Study-on-Deep-Unsupervised-Learning-Optimization-Algorithm-Based-on-Cloud-Computing2019
278Blockchain-based-Proxy-Re-Encryption-Scheme-for-Secure-IoT-Data-Sharing2019
277Developing-Realistic-Distributed-Denial-of-Service-(DDoS)-Attack-Dataset-and-Taxonomy2019
276Use-of-Machine-Learning-in-Detecting-Network-Security-of-Edge-Computing-System2019
275Docker-Swarm-and-Kubernetes-in-Cloud-Computing-Environment2019
274Game-Theoretical-Multi-user-Computation-Offloading-for-Mobile-Edge-Cloud-Computing2019
273Analysis-and-Evaluation-of-Kubernetes-Based-NFV-Management-and-Orchestration2019
272Study-on-Deep-Unsupervised-Learning-Optimization-Algorithm-Based-on-Cloud-Computing2019
271A-new-Security-Mechanism-for-Vehicular-Cloud-Computing-Using-Fog-Computing-System2019
270Automated-Cloud-Infrastructure-Continuous-Integration-and-Continuous-Delivery-using-Docker-with-Robust-Container-Security2019
269Real-time-Credit-Card-Fraud-Detection-Using-Machine-Learning2019