www.veexplore.
com
JAVA [ IEEE-2016]
S.NO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Email Id: veexplore.enquiry@gmail.com
Attribute-based encryption with efficient user revocation
Job service provider
Knowledge sharing & user behavior in the online social network
Rare side effect discovery
Attribute based methods for securing personal health records
Key-aggregate cryptosystem for scalable data sharing in cloud storage
SMS based policy intimation system for insurance agency
A model for predicting patient acuity on imbalanced dataset
Cross cloud service composition for big data processing
Efficient security in decentralized cipher-text-Policy attribute-based encryption
Fake profile detection in online social networks
High utility itemset mining from large database
Hostel management system
Improving privacy in cloud storage using regenerating code based approach
Investigation on ranking of active web forum users
Data mining over encrypted data on cloud
Mining fraud detection in mobile apps by analyzing user ratings and ranking
Mining high utility itemsets from large database using apriori algorithm
Multi keyword search with effective key aggregation in cloud computing
Multi replication with secure public auditing for dynamic big data storage in cloud
Online Training Portal
Efficient public auditing and user revocation in cloud
Personalized search with user privacy protection
Privacy-preserving algorithm for preventing data disclosure
Replicating dynamic data and multi keyword search in cloud computing
Secure de-duplication with effective key management in cloud
Secure proxy re-encryption scheme for big data storage
Securing patient records in distributed healthcare cloud computing system
A framework to facilitate multi cloud service providers based on QOS
Enabling public auditability using shared authority based privacy-preserving
authentication protocol
Retrieval of bug reports using software data reduction techniques
User behavior prediction using web usage mining
1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041
Mobile : 90 430 340 51 / 41
33
34
35
36
37
Virtual class room
Web based customer usage review analysis
Web service composition framework using genetic algorithm
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained
Owner-Enforced Search Authorization in the Cloud
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
Delegation in Cloud Computing
38
SecRBAC: Secure data in the Clouds
39
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based
Encryption
40
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
41
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
42
Distributed storage design for encrypted personal health record data
43
Toward a cloud-based security intelligence with big data processing
44
An Efficient and Fine-grained Big Data Access Control Scheme with Privacypreserving Policy
45
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud
Data
46
Efficient Cloud-Based Framework for Big Data Classification
47
An Efficient Privacy-Preserving Ranked Keyword Search Method
S.NO
NS2 PHP PROJECT TITLES
Website creation for furniture based company
Online Voting system
Online College management systems
Jewelery Shop stock management System
Student information system
Coffee Shop Store Website
www.veexplore.com
Email Id: veexplore.enquiry@gmail.com
Complain management system
Family financial budget Planning
Leave management system
10
Employee management system
11
Home renting system
12
Work order Management system
13
Insurance Management system
14
Water supply management
15
Fund Raising management in Trust
S.NO
DOT NET TITLES
1.
Data anonymization technique for securing personal health record
2.
Bug tracking system
3.
Credit card fraud detection
4.
Mail client for blind people
5.
Online building consultancy
6.
Online bus pass registration and renewal
1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041
Mobile : 90 430 340 51 / 41
7.
Online campus interview
8.
Online question bank system
9.
Online voting
10.
Replicating dynamic data and multi keyword search in cloud computing
11.
Packet hiding method for preventive selective jamming attacks
12.
Online School Management
13.
Security using colors and Armstrong number
14.
Robust Face-Name Graph Matching for Movie Character Identification
15.
SMS based online insurance
16.
Staff profile management system
17.
Vehicle management system
18.
Inter-college Event Management System
19.
Integrated Material Management System
20.
Online Staff Leave Management System
21.
Online Interior Design Management System
CODE
NS-2 [ IEEE-2016]
001
www.veexplore.com
Email Id: veexplore.enquiry@gmail.com
Recharging node based on the critical cluster head using in WSN
002
A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks
003
Target detection collaborative networks using Magnetic sensors in WSN
004
An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor
Networks
005
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
006
Efficient Coverage and Connectivity Preservation With Load Balance for Wireless Sensor
Networks
007
Effective Key Management in Dynamic Wireless Sensor Networks
008
Detect faults in sensor and communication in active state of sensor in WSN
009
Robot detection for automatically Hole Detection and Healing in WSN
010
1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041
Mobile : 90 430 340 51 / 41
Joint Cooperative Routing and Power Allocation for Collision Minimization in Wireless Sensor
Networks with Multiple Flows
011
Cost Minimization in Shortest Path communication for dual data uploading in wireless sensor
Network
012
Mobile Robots to sense the Obstacles for transmission in Wireless sensor Network
013
Sleep and awake scheduling for Packet Replication in Wireless sensor Network
014
PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network
015
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion
Attacks
016
Interference removing broadcasting message to selected path
017
Toward Energy-Efficient Trust System through Watchdog Optimization for WSNs
018
A Secure Scheme against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks
019
User Privacy and Data Trustworthiness in Mobile Crowd Sensing
020
MANET
Cooperative communication in Mobile Ad Hoc Networks to enhance transmission with lower
energy consumption
021
Optimal Configuration of Network Coding in Ad Hoc Networks
022
www.veexplore.com
Email Id: veexplore.enquiry@gmail.com
Mobile-Projected Trajectory Algorithm with Velocity-Change Detection for Predicting Residual Link
Lifetime in MANET
VANET
023
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and NonRepudiation for VANETs
024
BUS-VANET: A BUS Vehicular Network Integrated with Traffic Infrastructure
025
Clustering the vehicular nodes to control traffic based on channel allocation and node mobility
in VANET
026
Improved transportation system for updated vehicle movements in network
CRN
027
Cognitive Machine-to-Machine Communications for Internet-of-Things: a protocol stack
perspective
028
Moving object trajectory Prediction to avoid packet drop
029
Swarm optimization for load balancing in optimal path to Control Active Noise in searching
time
030
Array antenna feed wave for directional network
031
A Predictive Cross-Layered Interference Management in a Multichannel MAC with Reactive Routing
in VANET
1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041
Mobile : 90 430 340 51 / 41
032
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad
Hoc Networks
033
Dynamic Address allocation algorithm in MANET using
Cooperative communication
034
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
035
Multi touch Data authentication using wireless Networks
036
Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
037
Understanding Spurious Message Forwarding in VANET Beaconless Dissemination Protocols: An
Analytical Approach
038
Secure and Reliable Routing Protocols For Heterogeneous Multihop Wireless Networks
039
Detection and prevention of collusion attacks in WSN
040
Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks