25-518 Up-Stairs, Srinivasa Nagar, Nandyal,
Behind Ramanath Theatre, Kurnool, Andhra Pradesh 518501
(9am - 8pm, Monday - Saturday , 9am - 1pm Sunday)
+91 9885091189 ,+91 9247277353 , info@Nationalcomputers.info
Sno | Project Title | Tech |
---|---|---|
1 | SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks | JAVA |
2 | On Summarization and Timeline Generation for Evolutionary Tweet Streams | JAVA |
3 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data | JAVA |
4 | EnDAS Efficient Encrypted Data Search as a Mobile Cloud Service | JAVA |
5 | FRAppE: Detecting Malicious Facebook Applications | JAVA |
6 | Steganography Using Reversible Texture Synthesis | JAVA |
7 | Smar tCrawler : A Two-stage Crawler for Efficiently Har vesting Deep-Web Interfaces | JAVA |
8 | PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System | DOTNET |
9 | Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter | JAVA |
10 | Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services | JAVA |
11 | Secure Auditing and Deduplicating Data in Cloud | JAVA |
12 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites | JAVA |
13 | A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks | JAVA |
14 | An Attribute-assisted Re ranking Model for Web Image Search | JAVA |
15 | Authenticated Key Exchange Protocols for Parallel Network File Systems | JAVA |
16 | Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks | JAVA |
17 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks | JAVA |
18 | EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval | JAVA |
19 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | JAVA |
20 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks | JAVA |
21 | Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks | JAVA |
22 | Tweet Segmentation and Its Application to Named Entity Recognition | JAVA |
23 | Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks | JAVA |
24 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | JAVA |
25 | Effective Key Management in Dynamic Wireless Sensor Networks | JAVA |
26 | Discovery of Ranking Fraud for Mobile Apps | JAVA |
27 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | JAVA |
28 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | JAVA |
29 | Anonymizing Collections of Tree-Structured Data | JAVA |
30 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | JAVA |
31 | A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems | JAVA |
32 | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation | JAVA |
33 | A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks | JAVA |
33 | Continuous and Transparent User Identity Verification for Secure Internet Services | JAVA |
33 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation | JAVA |
33 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing | JAVA |
33 | Progressive Duplicate Detection | JAVA |
33 | User-Defined Privacy Grid System for Continuous Location-Based Services | JAVA |