B. Tech JAVA Projects Cloud Computing 1 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring IEEE A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy 2 reserving of Intermediate Data Sets in Cloud IEEE 3 Winds of Change: From Vendor Lock-In to the Meta Cloud IEEE 4 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud IEEE AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video 5 Sharing in the Clouds IEEE 6 Outsourcing Privacy-Preserving Social Networks to a Cloud IEEE 7 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE 8 Costing of Cloud Computing Services: A Total Cost of Ownership Approach IEEE 9 Efficient similarity search over encrypted data IEEE 10 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data IEEE 11 Ensuring Distributed Accountability for Data Sharing in the Cloud IEEE Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud: IEEE 12 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute- 13 IEEE based Encryption 14 QOS Ranking Prediction for Cloud Services IEEE 15 VM Management for Cross-Cloud Computing Environment IEEE 16 A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations IEEE 17 Going Back and Forth: Efficient Multi deployment and Multi snapshot ting on Clouds IEEE 18 Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE DATA MINING 1 Spatial Approximate String Search IEEE 2 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data IEEE 3 Mining User Queries with Markov Chains: Application to Online Image Retrieval IEEE 4 Crowd sourcing Predictors of Behavioral Outcomes IEEE 5 Privacy Preserving Delegated Access Control in Public Clouds IEEE 6 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence IEEE 7 A Survey of XML Tree Patterns IEEE 8 m-Privacy for Collaborative Data Publishing IEEE 9 10 11 12 13 Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes IEEE Facilitating Document Annotation Using Content And Querying Value IEEE FOCUS Learning to Crawl Web Forums IEEE PMSE A Personalized Mobile Search Engine IEEE Secure Mining of Association Rules in Horizontally Distributed Databases IEEE 14 A Link-Based Cluster Ensemble Approach for Categorical Data Clustering IEEE 15 A Probabilistic Scheme for Keyword-Based Incremental Query Construction IEEE 16 Answering General Time-Sensitive Queries IEEE 17 Creating Evolving User Behavior Profiles Automatically IEEE 18 Effective Pattern Discovery for Text Mining IEEE 19 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IEEE 20 Incremental Information Extraction Using Relational Databases IEEE 21 Association Rule – Extracting Knowledge Using Market Basket Analysis IEEE 22 Detecting Targeted Malicious Email IEEE 23 Scalable Scheduling of Updates in Streaming Data Warehouses IEEE 24 Detecting Spammers and Content Promoters in Online Video Social Networks IEEE 25 An Improved Frequent Pattern Tree Based Association Rule Mining Technique. IEEE 26 Efficient Fuzzy Type-Ahead Search in XML Data IEEE 27 BLINKS: Ranked Keyword Searches on Graphs Non-IEEE Net Working & Network Security 1 Multiparty Access Control for Online Social Networks: Model and Mechanisms IEEE 2 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality IEEE 3 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks IEEE 4 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System IEEE 5 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization IEEE 6 Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks IEEE 7 Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm IEEE 8 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed IEEE Networks 9 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks IEEE 10 Cut Detection In Wireless Sensor Network IEEE 11 DRINA A Lightweight And Reliable Routing IEEE 12 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks IEEE 13 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency IEEE 14 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies IEEE 15 FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks IEEE 16 A Novel Security Scheme for Online Banking Based on Virtual Machine IEEE 17 Design And Implementation Of TARF IEEE 18 Separable Reversible Data Hiding in Encrypted Image IEEE 19 Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters Non- IEEE Mobile Computing 1 IP-Geo location Mapping for Moderately Connected Internet Regions 2 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 3 4 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Search Me If You Can Privacy-preserving Location Query Service Vampire attacks Draining life from wireless ad-hoc sensor networks 6 Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks 8 IEEE IEEE Cancellation 5 7 IEEE Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of IEEE IEEE IEEE IEEE Transmissions Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless IEEE Networks 9 A Novel Association Rule Mining Mechanism in Wireless Sensor Networks 10 Resource-aware Video Multicasting via Access Gateways in Wireless Mesh Networks IEEE IEEE Secure Computing 1 2 Risk-Aware Mitigation for MANET Routing Attacks SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency 3 Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? 4 Detecting Spam Zombies by Monitoring Outgoing Messages IEEE IEEE IEEE IEEE PARALLEL & DISTRIBUTED SYSTEMS 1 A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy 2013 Preserving of Intermediate Datasets in Cloud 2 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 2013 3 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2013 4 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment 2013 5 Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems 2013 6 IP-Geo location Mapping for Moderately Connected Internet Regions 2013 7 Optimal Client-Server Assignment for Internet Distributed Systems 2013 Web Applications (Non-IEEE) 1 Online student portal 2 Change request tracker 3 Online video tutorial 4 Online time table generator 5 Highly confidential Security System 6 Smart Traffic management system 7 Multi banking transaction system 8 Corporate Employee Welfare System 9 HR Operations Manager 10 Online venue booking 11 Tender management system 12 Crime Record Management System 13 Birth certificate issue system 14 Car Pooling Android Applications 1 Mobile super market 2 Mobile patient management system 3 Flight tracking system 4 Flat management system 5 Android Application for Autism and Cerebral palsy Patients 6 Design and Implementation of Improved Authentication System for Smartphone Users Address: Download Abstracts & Base Papers from Web site: www.kresttechnology.com Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434, 9885112363 Branches: Dilsukhnagar, Ph: 9000404181, Vijayawada, for more inquiries mail us: java@kresttechnology.com Ph: 9000404182.