Home|Gallery|Bulk SMS| Employee Registration|Employer Registration|Verification| Contact Us|
 
  • ABOUT US
    • Aims & Objectives
    • Introduction
  • TRAINING
    • COMPUTER TRAINING
      • CHIPLEVEL COMPUTER TRAINING AT NANDYAL NATIONAL COMPUTERS
    • INDUSTRIAL & ITT TRAINING
    • OFFICE AUTOMATION
    • Spoken English
    • TECHNOLOGY
    • HOME TUTIONS
    • TALLY AUTHORIZED TRAINING PARTNER NATIONAL COMPUTERS
    • ONLINE COURSES
  • SALES
    • COMPUTERS
    • LAPTOPS
    • CC CAMS
    • Tally Software
      • BULK SMS
  • SERVICES
    • DOOR TO DOOR
    • OTHER SERVICES
    • OUR SERVICES
    • ONLINE SERVICES
  • WEBDESIGN
  • DISTANCE EDUCATION
  • PROJECTS
    • ACADEMIC PROJECTS
    • CUSTOMER RELATED SOFTWARE
  • CONSULTANCY
    • Education Consultancy
    • Job consultancy
      • JOBS
 
1 2 3 4 5 6 7 8 9
 

ACADEMIC PROJECTS


IEEE 2016 IT PROJECTS 

S.NO

Project Title

Tech

1

 

 

SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks

 

JAVA

2

On Summarization and Timeline Generation for Evolutionary Tweet Streams

 

JAVA

3

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

JAVA

4

EnDAS Efficient Encrypted Data Search as a Mobile Cloud Service

 

JAVA

5

FRAppE: Detecting Malicious Facebook Applications

JAVA

6

Steganography Using Reversible Texture Synthesis

JAVA

7

Smar tCrawler : A Two-stage Crawler for Efficiently Har vesting Deep-Web Interfaces

JAVA

8

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative  Authentication in Distributed m-Healthcare Cloud Computing System

DOTNET

9

Passive IP Traceback: Disclosing the Locations

of IP Spoofers From Path Backscatter

JAVA

10

Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services

JAVA

11

Secure Auditing and Deduplicating Data in Cloud

JAVA

12

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

JAVA

13

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

JAVA

14

An Attribute-assisted Re ranking Model for Web Image Search

JAVA

15

Authenticated Key Exchange Protocols for Parallel Network File Systems

JAVA

16

Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

JAVA

17

Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks

JAVA

18

EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

JAVA

19

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

JAVA

20

My Privacy My Decision: Control of Photo Sharing on Online Social Networks

JAVA

21

Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

JAVA

22

Tweet Segmentation and Its Application to Named Entity Recognition

JAVA

23

Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks

JAVA

24

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

JAVA

25

Effective Key Management in Dynamic Wireless Sensor Networks

JAVA

26

Discovery of Ranking Fraud for Mobile Apps

JAVA

27

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

JAVA

28

Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

 

JAVA

29

Anonymizing Collections of Tree-Structured Data

JAVA

30

Audit-Free Cloud Storage via Deniable Attribute-based Encryption

 

JAVA

31

A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

JAVA

32

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

JAVA

33

A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

JAVA

34

Continuous and Transparent User Identity Verification for Secure Internet Services

JAVA

35

Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

JAVA

36

A Profit Maximization Scheme with Guaranteed

Quality of Service in Cloud Computing

JAVA

37

Progressive Duplicate Detection

JAVA

38

User-Defined Privacy Grid System for Continuous Location-Based Services

JAVA

 

 

 

 

 

 


News & Announcements

2016-01-01National Computers at Padmavathi Nagar

2016-01-01SBTET Office Automation Admissions open

2017-12-06National Computers Another Branch at NGO Colony

2017-12-06TALLY AUTHORIZED PARTNER NATIONAL COMPUTERS

 

Quick Links

  • DOOR TO DOOR
  • COMPUTER TRAINING
  • INDUSTRIAL & ITT TRAINING
  • Aims & Objectives
  • Introduction
  • COMPUTERS
  • LAPTOPS
  • CC CAMS
  • Tally Software
  • ACADEMIC PROJECTS

Quick Links

  • CUSTOMER RELATED SOFTWARE
  • OTHER SERVICES
  • Education Consultancy
  • Job consultancy
  • OUR SERVICES
  • OFFICE AUTOMATION
  • ONLINE SERVICES
  • Spoken English
  • TECHNOLOGY
  • HOME TUTIONS

Find us

 


FIND US ON         
COPYRIGHT © 2016 ALL RIGHTS RESERVED - nationalcomputers.co