Poject List

advertisement
JAVA Projects
CLOUD COMPUTING
1
A Hybrid Cloud Approach for Secure Authorized Deduplication
IEEE
2
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store
IEEE
3
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
IEEE
4
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
IEEE
5
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
IEEE
6
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
7
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
IEEE
8
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
IEEE
9
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
IEEE
10
Consistency as a Service: Auditing Cloud Consistency
IEEE
11
Towards Differential Query Services in Cost-Efficient Clouds
IEEE
12
13
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
14
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
15
Privacy-Preserving Public Auditing for Secure Cloud Storage
16
QoS Ranking Prediction for Cloud Services
17
Winds of Change: From Vendor Lock-In to the Meta Cloud
18
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
IEEE
IEEE
IEEE
IEEE
IEEE
IEEE
IEEE
IEEE
19
Outsourcing Privacy-Preserving Social Networks to a Cloud
IEEE
20
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption
IEEE
21
Efficient similarity search over encrypted data
IEEE
22
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
IEEE
23
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
IEEE
DATA MINING
1
A Cocktail Approach for Travel Package Recommendation
IEEE
2
Efficient Prediction of Difficult Keyword Queries over Databases
IEEE
3
Fast Nearest Neighbor Search with Keywords
IEEE
4
Privacy-Preserving and Content-Protecting Location Based Queries
IEEE
5
Towards Online Shortest Path Computation
IEEE
6
Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks
IEEE
7
Task Trail: An Effective Segmentation of User Search Behavior
IEEE
8
Spatial Approximate String Search
9
A Survey of XML Tree Patterns
IEEE
10
Crowd sourcing Predictors of Behavioral Outcomes
IEEE
11
Mining User Queries with Markov Chains: Application to Online Image Retrieval
IEEE
12
m-Privacy for Collaborative Data Publishing
IEEE
13
Privacy Preserving Delegated Access Control in Public Clouds
IEEE
14
T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
IEEE
15
Dynamic Query Forms for Database Queries
IEEE
IEEE
16
Supporting Search-As-You-Type Using SQL in Databases
IEEE
17
Association Rule – Extracting Knowledge Using Market Basket Analysis
IEEE
18
Detecting Targeted Malicious Email
IEEE
19
Efficient Fuzzy Type-Ahead Search in XML Data
IEEE
20
BLINKS: Ranked Keyword Searches on Graphs
IEEE
NET WORKING & NETWORK SECURITY
1
Automatic Test Packet Generation
IEEE
2
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE
3
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
IEEE
4
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
IEEE
5
A Two-stage Deanonymization Attack Against Anonymized Social Networks
IEEE
6
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
7
Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
8
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
IEEE
9
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
IEEE
10
Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
IEEE
11
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed
Networks
IEEE
12
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
IEEE
13
DRINA A Lightweight And Reliable Routing
IEEE
14
Cut Detection In Wireless Sensor Network
IEEE
IEEE
IEEE
15
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
IEEE
16
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
IEEE
17
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
IEEE
18
Separable Reversible Data Hiding in Encrypted Image
IEEE
BIG DATA
1
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
IEEE
2
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
IEEE
3
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store
IEEE
4
Data Mining with Big Data
IEEE
5
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using
MapReduce on Cloud
IEEE
MOBILE COMPUTING
1
An Incentive Framework for Cellular Traffic Offloading
IEEE
2
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
IEEE
3
IP-Geo location Mapping for Moderately Connected Internet Regions
4
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
5
6
7
Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference
Cancellation
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
Search Me If You Can Privacy-preserving Location Query Service
IEEE
IEEE
IEEE
IEEE
IEEE
8
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of
Transmissions
IEEE
9
Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks
IEEE
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless
10
IEEE
Networks
SECURE COMPUTING
1
2
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Extracting Spread-Spectrum Hidden Data from Digital Media
IEEE
IEEE
3
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
IEEE
4
Detecting Spam Zombies by Monitoring Outgoing Messages
IEEE
PARALLEL & DISTRIBUTED SYSTEMS
1
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
IEEE
2
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
IEEE
3
A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy
Preserving of Intermediate Datasets in Cloud
IEEE
4
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
IEEE
5
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
IEEE
6
IP-Geo location Mapping for Moderately Connected Internet Regions
IEEE
7
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
IEEE
WEB APPLICATION
1
Automatic Time Table Generator
Non-IEEE
2
Online Pharmacy
Non-IEEE
3
Non-IEEE
4
E- Health Care
Meditracking System
5
Resume Building
Non-IEEE
6
Government Scheme Alerts
Non-IEEE
7
E commerce (Online Shopping)
Non-IEEE
Non-IEEE
8
HR Operations Manager
Non-IEEE
9
Crime Record Management System
Non-IEEE
10
Multi Banking Transaction System
Non-IEEE
11
Online Venue Booking
Non-IEEE
12
Birth Certificate Issue System
Non-IEEE
13
Online Student Portal
Non-IEEE
14
Change Request Tracker
Non-IEEE
Android Applications
1
Mobile super market
2
Mobile patient management system
3
Flight tracking system
4
Flat management system
5
Android Application for Autism and Cerebral palsy Patients
6
Design and Implementation of Improved Authentication System for Smartphone Users
Address:
Download Abstracts & Base Papers from Web site:
www.kresttechnology.com
Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434,
9885112363
Branches:
Dilsukhnagar, Ph: 9000404181, Vijayawada,
for more inquiries mail us:
java@kresttechnology.com
Ph: 9000404182.
Download