Web Applications (Non-IEEE)

advertisement
B. Tech JAVA Projects
Cloud Computing
1
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
IEEE
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
2
reserving of Intermediate Data Sets in Cloud
IEEE
3
Winds of Change: From Vendor Lock-In to the Meta Cloud
IEEE
4
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
IEEE
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
5
Sharing in the Clouds
IEEE
6
Outsourcing Privacy-Preserving Social Networks to a Cloud
IEEE
7
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
IEEE
8
Costing of Cloud Computing Services: A Total Cost of Ownership Approach
IEEE
9
Efficient similarity search over encrypted data
IEEE
10
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
IEEE
11
Ensuring Distributed Accountability for Data Sharing in the Cloud
IEEE
Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud:
IEEE
12
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-
13
IEEE
based Encryption
14
QOS Ranking Prediction for Cloud Services
IEEE
15
VM Management for Cross-Cloud Computing Environment
IEEE
16
A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
IEEE
17
Going Back and Forth: Efficient Multi deployment and Multi snapshot ting on Clouds
IEEE
18
Privacy-Preserving Public Auditing for Secure Cloud Storage
IEEE
DATA MINING
1
Spatial Approximate String Search
IEEE
2
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
IEEE
3
Mining User Queries with Markov Chains: Application to Online Image Retrieval
IEEE
4
Crowd sourcing Predictors of Behavioral Outcomes
IEEE
5
Privacy Preserving Delegated Access Control in Public Clouds
IEEE
6
T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
IEEE
7
A Survey of XML Tree Patterns
IEEE
8
m-Privacy for Collaborative Data Publishing
IEEE
9
10
11
12
13
Estimating Information from Image Colors: An Application to Digital Cameras and Natural
Scenes
IEEE
Facilitating Document Annotation Using Content And Querying Value
IEEE
FOCUS Learning to Crawl Web Forums
IEEE
PMSE A Personalized Mobile Search Engine
IEEE
Secure Mining of Association Rules in Horizontally Distributed Databases
IEEE
14
A Link-Based Cluster Ensemble Approach for Categorical Data Clustering
IEEE
15
A Probabilistic Scheme for Keyword-Based Incremental Query Construction
IEEE
16
Answering General Time-Sensitive Queries
IEEE
17
Creating Evolving User Behavior Profiles Automatically
IEEE
18
Effective Pattern Discovery for Text Mining
IEEE
19
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IEEE
20
Incremental Information Extraction Using Relational Databases
IEEE
21
Association Rule – Extracting Knowledge Using Market Basket Analysis
IEEE
22
Detecting Targeted Malicious Email
IEEE
23
Scalable Scheduling of Updates in Streaming Data Warehouses
IEEE
24
Detecting Spammers and Content Promoters in Online Video Social Networks
IEEE
25
An Improved Frequent Pattern Tree Based Association Rule Mining Technique.
IEEE
26
Efficient Fuzzy Type-Ahead Search in XML Data
IEEE
27
BLINKS: Ranked Keyword Searches on Graphs
Non-IEEE
Net Working & Network Security
1
Multiparty Access Control for Online Social Networks: Model and Mechanisms
IEEE
2
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
IEEE
3
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
IEEE
4
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
IEEE
5
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
IEEE
6
Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
IEEE
7
Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
IEEE
8
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed
IEEE
Networks
9
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
IEEE
10
Cut Detection In Wireless Sensor Network
IEEE
11
DRINA A Lightweight And Reliable Routing
IEEE
12
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
IEEE
13
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency
IEEE
14
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
IEEE
15
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
IEEE
16
A Novel Security Scheme for Online Banking Based on Virtual Machine
IEEE
17
Design And Implementation Of TARF
IEEE
18
Separable Reversible Data Hiding in Encrypted Image
IEEE
19
Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters
Non- IEEE
Mobile Computing
1
IP-Geo location Mapping for Moderately Connected Internet Regions
2
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
3
4
Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference
Search Me If You Can Privacy-preserving Location Query Service
Vampire attacks Draining life from wireless ad-hoc sensor networks
6
Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks
8
IEEE
IEEE
Cancellation
5
7
IEEE
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of
IEEE
IEEE
IEEE
IEEE
Transmissions
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless
IEEE
Networks
9
A Novel Association Rule Mining Mechanism in Wireless Sensor Networks
10
Resource-aware Video Multicasting via Access Gateways in Wireless Mesh Networks
IEEE
IEEE
Secure Computing
1
2
Risk-Aware Mitigation for MANET Routing Attacks
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency
3
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
4
Detecting Spam Zombies by Monitoring Outgoing Messages
IEEE
IEEE
IEEE
IEEE
PARALLEL & DISTRIBUTED SYSTEMS
1
A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy
2013
Preserving of Intermediate Datasets in Cloud
2
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
2013
3
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
2013
4
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
2013
5
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
2013
6
IP-Geo location Mapping for Moderately Connected Internet Regions
2013
7
Optimal Client-Server Assignment for Internet Distributed Systems
2013
Web Applications (Non-IEEE)
1
Online student portal
2
Change request tracker
3
Online video tutorial
4
Online time table generator
5
Highly confidential Security System
6
Smart Traffic management system
7
Multi banking transaction system
8
Corporate Employee Welfare System
9
HR Operations Manager
10
Online venue booking
11
Tender management system
12
Crime Record Management System
13
Birth certificate issue system
14
Car Pooling
Android Applications
1
Mobile super market
2
Mobile patient management system
3
Flight tracking system
4
Flat management system
5
Android Application for Autism and Cerebral palsy Patients
6
Design and Implementation of Improved Authentication System for Smartphone Users
Address:
Download Abstracts & Base Papers from Web site: www.kresttechnology.com
Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434, 9885112363
Branches:
Dilsukhnagar, Ph: 9000404181, Vijayawada,
for more inquiries mail us:
java@kresttechnology.com
Ph: 9000404182.
Download