25-518 Up-Stairs, Srinivasa Nagar, Nandyal,
Behind Ramanath Theatre, Kurnool, Andhra Pradesh 518501
(9am - 8pm, Monday - Saturday , 9am - 1pm Sunday)
+91 9885091189 ,+91 9247277353 , info@Nationalcomputers.info
| Sno | Project Title | Tech |
|---|---|---|
| 1 | SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks | JAVA |
| 2 | On Summarization and Timeline Generation for Evolutionary Tweet Streams | JAVA |
| 3 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data | JAVA |
| 4 | EnDAS Efficient Encrypted Data Search as a Mobile Cloud Service | JAVA |
| 5 | FRAppE: Detecting Malicious Facebook Applications | JAVA |
| 6 | Steganography Using Reversible Texture Synthesis | JAVA |
| 7 | Smar tCrawler : A Two-stage Crawler for Efficiently Har vesting Deep-Web Interfaces | JAVA |
| 8 | PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System | DOTNET |
| 9 | Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter | JAVA |
| 10 | Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services | JAVA |
| 11 | Secure Auditing and Deduplicating Data in Cloud | JAVA |
| 12 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites | JAVA |
| 13 | A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks | JAVA |
| 14 | An Attribute-assisted Re ranking Model for Web Image Search | JAVA |
| 15 | Authenticated Key Exchange Protocols for Parallel Network File Systems | JAVA |
| 16 | Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks | JAVA |
| 17 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks | JAVA |
| 18 | EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval | JAVA |
| 19 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | JAVA |
| 20 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks | JAVA |
| 21 | Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks | JAVA |
| 22 | Tweet Segmentation and Its Application to Named Entity Recognition | JAVA |
| 23 | Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks | JAVA |
| 24 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | JAVA |
| 25 | Effective Key Management in Dynamic Wireless Sensor Networks | JAVA |
| 26 | Discovery of Ranking Fraud for Mobile Apps | JAVA |
| 27 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | JAVA |
| 28 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | JAVA |
| 29 | Anonymizing Collections of Tree-Structured Data | JAVA |
| 30 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | JAVA |
| 31 | A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems | JAVA |
| 32 | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation | JAVA |
| 33 | A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks | JAVA |
| 33 | Continuous and Transparent User Identity Verification for Secure Internet Services | JAVA |
| 33 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation | JAVA |
| 33 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing | JAVA |
| 33 | Progressive Duplicate Detection | JAVA |
| 33 | User-Defined Privacy Grid System for Continuous Location-Based Services | JAVA |