S.No |
Name |
1 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
2 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
3 |
Two tales of privacy in online social networks |
4 |
Then and Now On The Maturity of the Cybercrime Markets |
5 |
SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces |
6 |
Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme |
7 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
8 |
Providing ranking for web urls based on user feedbacks |
9 |
Profiling Online Social Behaviors for Compromised Account Detection |
10 |
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
11 |
Privacy-Preserving and Content-Protecting Location Based Queries |
12 |
Personalized Geo-Specific Tag Recommendation for Photos on Social Websites |
13 |
Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks |
14 |
On the Security of Data Access Control for Multiauthority Cloud Storage Systems |
15 |
My Privacy My Decision Control of Photo Sharing on Online Social Networks |
16 |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing |
17 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage |
18 |
Identity Based Encryption with Outsourced Revocation in Cloud Computing |
19 |
FRAppE Detecting Malicious Facebook Applications |
20 |
FOCS Fast Overlapped Community Search |
21 |
EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
22 |
Effective Key Management in Dynamic Wireless Sensor Networks |
23 |
EAACK—A Secure Intrusion-Detection System for MANETs |
24 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
25 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
26 |
DROPS Division and Replication of Data in Cloud for Optimal Performance and Security |
27 |
Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network |
28 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
29 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
30 |
Cloud Computing Security From Single to Multi-Clouds |
31 |
Building an intrusion detection system using a filter-based feature selection algorithm |
32 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
33 |
An Incentive Framework for Cellular Traffic Offloading |
34 |
An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks |
35 |
A System to Filter Unwanted Messages from OSN User Walls |
36 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
37 |
A Novel Security Scheme for Online Banking Based on Virtual Machine |
38 |
A New Algorithm for Inferring User Search Goals with Feedback Sessions |
39 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
40 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
41 |
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
42 |
A Cocktail Approach for Travel Package Recommendation |
43 |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
44 |
Fast Nearest Neighbor Search with Keywords |
45 |
Identity Based Data Outsourcing with Comprehensive Auditing in Clouds |
S.No |
Name |
1 |
Placement Cell Management System |
2 |
A voice-based prescription generating system |
3 |
User Defined Spam Filtering Through Mail Server |
4 |
Ticket Reservation System in Indian Airlines |
5 |
Online Notice Board |
6 |
College Event Management System |
7 |
online grocery shopping |
8 |
Content-Based Image Retrieval System |
9 |
implementation of tambola game using node js |
10 |
Web-Pharmaceuticals |
11 |
Web Enabled Books Management Tool |
12 |
Warehouse Management System |
13 |
Voiced Based Encryption |
14 |
Visitors Management |
15 |
Visa Processing Information System |
16 |
View the City |
17 |
Vehicle Identification System |
18 |
Uplifting Of Farmer through Connected Ecosystem |
19 |
University Admission System |
20 |
Transport plus |
21 |
Online Construction and Cost Calculator |
22 |
Online College Voting |
23 |
Online Asset Management System |
24 |
Multi Keyword Ranked Search |
25 |
Freelancers Job Consultancies |
26 |
Institute Explorer |
27 |
Improving the Customer Relationship Management Using Data Mining |
28 |
Hr Sla’s For Hr Department |
29 |
Hr Manager |
30 |
Hospital Management System |
31 |
Help Desk |
32 |
Guest Hose Management System |
33 |
Govt Scheme Management System |
34 |
Government Medical Schemes |
35 |
Forest Resource Sales and Maintenance Automation |
36 |
Filtering Unwanted Messages from Online Social Networks |
37 |
Examination Results and Notifications |
38 |
E-Solution Provider |
39 |
Employee Resource Management Systems |
40 |
Employee Performance and Recognition Portal |
41 |
Employee Leave Management |
42 |
E-Tendering System |
43 |
E - Wheelz |
44 |
Digital Steganography |
45 |
DIGITAL LIBRARY MANAGEMENT SYSTEM |
46 |
Digital Data Security through Water Marking |
47 |
Dashboard To Track Medical Records Of Patients In Government Hospitals |
48 |
Online Courier Service Management System |
49 |
College Incubation and Innovation Cell |
50 |
City Vehicle and Traffic Control System |
51 |
Citizen Card Maintenance for E-Governess |
52 |
Captcha as Graphical Password Authentication System |
53 |
Bug Tracking For Improving Software Reliability |
54 |
Book Resale with Lending and Donation |
55 |
Automobile trailing system |
56 |
An Online Social Network Based Question And Answer System |
57 |
108 - Public Health Emergency Services |
58 |
Employee Payroll Management System |
59 |
SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY |
60 |
MAINTENANCE OF DATABASE OF BENEFICIARIES OF GOVERNEMENT MEDICAL SCHEMES |
61 |
Spear phishing detection |
62 |
WEB BASED COLLEGE FORUM |
63 |
DRUG ADDICTION COUNSELING AND GUIDENCE SYSTEM |
64 |
GOOGLE MAPS BASED EVENT MANAGEMENT SYSTEM |
65 |
Film Success Prediction |
66 |
TRAVELS MANAGEMENT SYSTEM |
67 |
Online Pharmacy Performance Finder on User Ratings |
68 |
online Blood Bank and Blood Donor Management System |
69 |
Driving School Student Management System |
70 |
COLLEGE EVENT CALENDAR |
71 |
Online College Magazine |
S.No |
Name |
1 |
Voice-Based Email System for Visually Impaired Individuals to Access and Send Emails |
2 |
Graphical Password to prevent Shoulder Surfing |
3 |
Classifying Fake News Articles Using Natural Language Processing |
4 |
Recognition of Handwritten Textual Annotations using Tesseract Open Source OCR Engine |
5 |
Vehicle Detection and Speed Tracking using OpenCv |
6 |
Heart Disease PredictionUsing Naives Bayesian |
7 |
Rainfall Prediction using Machine Learning |
8 |
RESUME BUILDER |
9 |
Driver drowsiness monitoring system using visual behavior and machine learning |
10 |
Stationary Manageement System |
11 |
Automatic Shadow Detection in Image Using Adaptive Thresholding Segmentation |
12 |
Identifying those responsible for stealing the credit cards risk management |
13 |
Finding the principal components in Software Defects using randomized PCA |
14 |
personality prediction based on twitter tweets using machine learning algorithms |
15 |
Detect Fraud App in Google Play Store by Sentiment Analysis |
16 |
lung cancer detection |
17 |
Vehicle detection in a Video frame |
18 |
Image Classifier using CNN |
19 |
Vehicle number plate detection |