CSE 2017-2018
Branch: CS/IT
Topic: M.Tech CS 2018-19 Projects
S.NO | TITLES | DOMAIN | DOWNLOAD |
CLOUD COMPUTING | |||
DST TO C 01 | A cost Effective Deadline-constrained Dynamic scheduling algorithm for scientific workflows in a cloud Environment | CLOUD COMPUTING | |
DST TO C 02 | A Distributed Auction based Framework for Scalable IaaS Provisioning in Geo Data Centers | CLOUD COMPUTING | |
DST TO C 03 | A key policy attribute based temporary keyword search scheme for secure cloud storage | CLOUD COMPUTING | |
DST TO C 04 | A New Lightweight Symmetric Searchable Encryption Scheme for String Identification | CLOUD COMPUTING | |
DST TO C 05 | A Shapley value Mechanism for Bandwidth on Demand between Datacenters | CLOUD COMPUTING | |
DST TO C 06 | Catch You if You Misbehave Ranked Keyword Search Results Verification in Cloud Computing | CLOUD COMPUTING | |
DST TO C 07 | Detecting Performance Anomalies in Cloud Platform Applications | CLOUD COMPUTING | |
DST TO C 08 | Efficient Regular Language Search for Secure Cloud Storage | CLOUD COMPUTING | |
DST TO C 09 | Efficient Traceable Authorization Search System | CLOUD COMPUTING | |
DST TO C 010 | On the Feasibility of Using Current Data Centre Infrastructure for Latency-sensitive Applications | CLOUD COMPUTING | |
DST TO C 011 | Optimizing Information Leakage in Multi cloud Storage Services | CLOUD COMPUTING | |
DST TO C 012 | Privacy Aware Data Deduplication for Side Channel in Cloud Storage | CLOUD COMPUTING | |
DST TO C 013 | Revenue Maximization for Dynamic Expansion of Geo-distributed Cloud Data Centers | CLOUD COMPUTING | |
DST TO C 014 | Risk-Aware Management of Virtual Resources in Access Controlled Service-oriented Cloud Datacenters | CLOUD COMPUTING | |
DST TO C 015 | Towards Efficient Resource Allocation for Heterogeneous Workloads in IaaS Clouds | CLOUD COMPUTING | |
DST TO C 016 | Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing | CLOUD COMPUTING | |
DST TO C 017 | Towards Security-based Formation of Cloud | CLOUD COMPUTING | |
DST TO C 018 | EDoS ADS An Enhanced Mitigation Technique against Economic Denial of Sustainability (EDoS) Attacks | CLOUD COMPUTING | |
DST TO C 019 | Improving Operational Efficiency of Applications via Cloud Computing | CLOUD COMPUTING | |
DST TO C 020 | Locality-aware Scheduling for Containers in Cloud Computing | CLOUD COMPUTING | |
DST TO C 021 | Planning Approach for Reassigning Virtual Machines in IaaS Clouds | CLOUD COMPUTING | |
DST TO C 022 | Supporting Data-intensive Workflows in software defined Federated Multiple clouds | CLOUD COMPUTING | |
DST TO C 023 | Translating algorithms to handle fully Homomorphic Encrypted data on the cloud | CLOUD COMPUTING | |
DST TO C 024 | Dynamic VM scaling: provisioning and pricing through an online auction | CLOUD COMPUTING | |
DST TO C 025 | Enhancing performance and energy Efficiency for Hybrid workloads in virtualized cloud Environment | CLOUD COMPUTING | |
DST TO C 026 | Price based Resource allocation for Edge computing :A market equilibrium approach | CLOUD COMPUTING | |
DST TO C 027 | A Robust Generic Multi-Authority Attributes Management System for Cloud Storage Services | CLOUD COMPUTING | |
DST TO C 028 | Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds | CLOUD COMPUTING | |
DST TO C 029 | KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption | CLOUD COMPUTING | |
DST TO C 030 | Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage | CLOUD COMPUTING | |
DST TO C 031 | Outsourcing Proofs of Retrievability | CLOUD COMPUTING | |
DST TO C 032 | SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud | CLOUD COMPUTING | |
DST TO C 033 | Hedonic Pricing of Cloud Computing Services | CLOUD COMPUTING | |
DST TO C 034 | Cloud Resource Scaling for Time-Bounded and Unbounded Big Data Streaming Applications | CLOUD COMPUTING | |
DST TO C 035 | Dependable Data Outsourcing Scheme Based on Cloud-of- Clouds Approach with Fast Recovery | CLOUD COMPUTING | |
DST TO C 036 | Network and Application-Aware Cloud Service Selection in Peer-Assisted Environments | CLOUD COMPUTING | |
DST TO C 037 | Optimizing Quality-Aware Big Data Applications in the Cloud | CLOUD COMPUTING | |
DST TO C 038 | Virtual Network Recognition and Optimization in SDN- enabled Cloud Environment | CLOUD COMPUTING | |
DATA MINING | |||
DST TO C 01 | DATA MININGFinding optimal skyline product combinations under price promotion | DATA MINING | |
DST TO C 02 | Multi label learning with Emerging new labels | DATA MINING | |
DST TO C 03 | On Generalizing Collective Spatial Keyword queries | DATA MINING | |
DST TO C 04 | Online Product Quantization | DATA MINING | |
DST TO C 05 | Optimizing quality for probabilistic skyline computation and probabilistic similarity search | DATA MINING | |
DST TO C 06 | Order-Sensitive Imputation for Clustered Missing values | DATA MINING | |
DST TO C 07 | Partially Related Multi-Task Clustering | DATA MINING | |
DST TO C 08 | Relationship between variants of one-class nearest neighbors and creating their accurate Ensembles | DATA MINING | |
DST TO C 09 | Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy | DATA MINING | |
DST TO C 010 | Privacy preserving collaborative model Learning: The case of word vector training | DATA MINING | |
DST TO C 011 | Relationship between variants of one-class nearest neighbors and creating their accurate Ensembles | DATA MINING | |
DST TO C 012 | Rules based entity Entity Resolution on Database with DATA MINING hidden temporal information | DATA MINING | |
DST TO C 013 | Self-Tuned Descriptive Document Clustering using a predictive network | DATA MINING | |
DST TO C 014 | Semi-supervised ensemble clustering based on selected constraint projection | DATA MINING | |
DST TO C 015 | SIMkNN A Scalable Method for In-Memory kNN search over moving objects in Road Networks | DATA MINING | |
DST TO C 016 | Top-k Critical Vertices Query on Shortest Path | DATA MINING | |
DST TO C 017 | Unsupervised Coupled Metric Similarity for Non IID Categorical data | DATA MINING | |
DST TO C 018 | We Like, We Post A Joint User-Post Approach for face book post stance Labeling | DATA MINING | |
DST TO C 019 | A Correlation based feature weighting filter for Naive Bayes. | DATA MINING | |
DST TO C 020 | A note on the behavior of majority voting in Multi class domain with biased annotators | DATA MINING | |
DST TO C 021 | Automated Discovery of process models from Event DATA MINING Logs: Review and Benchmark | DATA MINING | |
DST TO C 022 | Efficient vertical mining of High Average utility item sets based on Novel-upper Bounds | DATA MINING | |
DST TO C 023 | Hierarchical Multi clue Modeling for popularity prediction with Heterogeneous Tourist information | DATA MINING | |
DST TO C 024 | Normalization of Duplicate records from multiple Resources | DATA MINING | |
DST TO C 025 | On spatial aware community search | DATA MINING | |
DST TO C 026 | Privacy preserving social media data publishing for personalized Ranking based recommendation | DATA MINING | |
DST TO C 027 | Progressive approaches for pareto optimal groups computation | DATA MINING | |
DST TO C 028 | Structure preserved unsupervised domain adaptation | DATA MINING | |
DST TO C 029 | Super graph search in Graph databases via Hierarchical Feature -Tree | DATA MINING | |
DST TO C 030 | Towards confidence interval estimation in Truth Discovery | DATA MINING | |
DST TO C 031 | Visual cascade probability estimation and maximization in Diffusion Networks | DATA MINING | |
DST TO C 032 | Webpage depth viewability prediction using Deep Sequential Neural Networks | DATA MINING | |
DST TO C 033 | Analysis of University Fitness Center Data Uncovers Interesting Patterns, Enables Prediction | DATA MINING | |
DST TO C 034 | D2HistoSketch: Discriminative and Dynamic Similarity-Preserving Sketching of Streaming Histograms | DATA MINING | |
DST TO C 035 | Efficient Scheduling of Scientific Workflows using Hot Metadata in a Multisite Cloud | DATA MINING | |
DST TO C 036 | Low-rank Sparse Subspace for Spectral Clustering | DATA MINING | |
DST TO C 037 | MUSE: Minimum Uncertainty and Sample Elimination Based Binary Feature Selection | DATA MINING | |
DST TO C 038 | Pair-Linking for Collective Entity Disambiguation: Two Could Be Better Than All | DATA MINING | |
DST TO C 039 | Pricing Average Price Advertising Options When Underlying Spot Market Prices Are Discontinuous | DATA MINING | |
DST TO C 040 | Reader Comment Digest Through Latent Event DATA MINING Facets and News Specificity | DATA MINING | |
DST TO C 041 | Relative Pairwise Relationship Constrained Non-negative Matrix Factorisation | DATA MINING | |
DST TO C 042 | User Preference Analysis for Most Frequent Peer/Dominator | DATA MINING | |
DST TO C 043 | Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior Analysis | DATA MINING | |
BIG DATA | |||
DST TO C 01 | A Meta path based Method for Entity set Expansion in knowledge graph | BIG DATA | |
DST TO C 02 | Trident: Distributed Storage, Analysis, and Exploration of Multidimensional Phenomena | BIG DATA | |
DST TO C 03 | A bilinear ranking SVM for knowledge based relation prediction and classification | BIG DATA | |
DST TO C 04 | A Stack-Centric Processing Model For Iterative Processing | BIG DATA | |
DST TO C 05 | On scalable and robust Truth Discovery in Big data social media sensing applications | BIG DATA | |
DST TO C 06 | Clustering Analysis in the Wireless Propagation Channel with a Variational Gaussian Mixture Model | BIG DATA | |
DST TO C 07 | Modeling and Visualizing Student Flow | BIG DATA | |
DST TO C 08 | A bilinear ranking SVM for knowledge based relation prediction and classification | BIG DATA | |
DST TO C 09 | A Novel Hilbert Curve for Cache-locality Preserving Loops | BIG DATA | |
DST TO C 010 | Sampling Big Trajectory Data for Traversal Trajectory Aggregate Query Yichen | BIG DATA | |
DST TO C 011 | Closed Walk Sampler: An Efficient Method for Estimating Eigenvalues of Large Graphs | BIG DATA | |
DST TO C 012 | Efficient Path Query Processing over Massive Trajectories on the Cloud | BIG DATA | |
DST TO C 013 | Link Prediction in Knowledge Graphs: A Hierarchy-Constrained Approach | BIG DATA | |
DST TO C 014 | Sampling Big Trajectory Data for Traversal Trajectory Aggregate Query | BIG DATA | |
DST TO C 015 | Cost-efficient Heterogeneous Worker Recruitment under Coverage Requirement in Spatial Crowdsourcing | BIG DATA | |
DST TO C 016 | Modeling and visualizing student flow | BIG DATA | |
DST TO C 017 | A Shared-Memory Algorithm for Updating Tree-Based Properties of Large Dynamic Networks | BIG DATA | |
DST TO C 018 | Parallel Grid-based Colocation Mining Algorithms on GPUs for Big Spatial Event Data | BIG DATA | |
DST TO C 019 | Short-term Rainfall Forecasting Using Multi-layer Perceptron | BIG DATA | |
DST TO C 020 | I/O Workload Management for All-Flash Datacenter Storage Systems Based on Total Cost of Ownership | BIG DATA | |
NETWORKING | |||
DST TO C 01 | A Decentralized Replica placement algorithm for Edge computing | NETWORKING | |
DST TO C 02 | Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse? | NETWORKING | |
DST TO C 03 | Effects of C/U plane separation and Bearer aggregation in mobile core Network | NETWORKING | |
DST TO C 04 | Efficient deep neural network serving fast and furious | NETWORKING | |
DST TO C 05 | Enhancing information resilience in Disruptive information centric networks | NETWORKING | |
DST TO C 06 | Ghost Riders :sybil Attacks on crowd sourced Mobile mapping services | NETWORKING | |
DST TO C 07 | Joint mobility management and Multicast Rate adaption in software defined Enterprise WLANs | NETWORKING | |
DST TO C 08 | Probabilistic Code book based fault localization in Data networks | NETWORKING | |
DST TO C 09 | Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks | NETWORKING | |
DST TO C 010 | Traffic Classification Based on Zero-Length Packets | NETWORKING | |
DST TO C 011 | Traffic Classification Based on Zero-Length Packets | NETWORKING | |
DST TO C 012 | Charging Utility Maximization in Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously | NETWORKING | |
DST TO C 013 | Context-Aware Hierarchical Online Learning for Performance Maximization in Mobile Crowd sourcing | NETWORKING | |
DST TO C 014 | ECN Marking With Micro-Burst Traffic: Problem, Analysis, and Improvement | NETWORKING | |
DST TO C 015 | Minimum-Weight Link-Disjoint Node-“Somewhat Disjoint” Paths | NETWORKING | |
DST TO C 016 | Oblivious Routing in IP networks | NETWORKING | |
DST TO C 017 | Optimal network service chain provisioning | NETWORKING | |
DST TO C 018 | Sponsoring mobile data analyzing the impact on internet stack holders | NETWORKING | |
DST TO C 019 | BitCoding: Network Traffic Classification Through Encoded Bit Level Signatures | NETWORKING | |
DST TO C 020 | Merlin: A Language for Managing Network Resources | NETWORKING | |
DST TO C 021 | A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems | NETWORKING | |
DST TO C 022 | Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks | NETWORKING | |
DST TO C 023 | Data Center Demand Response With On-Site Renewable Generation: A Bargaining Approach | NETWORKING | |
DST TO C 024 | Task Allocation Scheme for Cyber Physical Social Systems | NETWORKING | |
DST TO C 025 | Trust-based Social Networks with Computing, Caching and Communications: A Deep Reinforcement Learning Approach | NETWORKING | |
SECURE COMPUTING | |||
DST TO C 01 | A Shoulder Surfing Resistant Graphical Authentication System | SECURE COMPUTING | |
DST TO C 02 | Efficient Anonymous Message Submission | SECURE COMPUTING | |
DST TO C 03 | Risk Assessment in Social Networks based on User Anomalous Behaviors | SECURE COMPUTING | |
DST TO C 04 | Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis | SECURE COMPUTING | |
DST TO C 05 | Building PUF based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database | SECURE COMPUTING | |
DST TO C 06 | MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANE | SECURE COMPUTING | |
DST TO C 07 | Multi-CDN: Towards Privacy in Content Delivery Networks | SECURE COMPUTING | |
DST TO C 08 | On the Efficiency of FHE-based Private Queries | SECURE COMPUTING | |
DST TO C 09 | PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups | SECURE COMPUTING | |
DST TO C 010 | Randomness Tests in Hostile Environments | SECURE COMPUTING | |
DST TO C 011 | Understanding JavaScript Vulnerabilities in Large Real- World Android Applications | SECURE COMPUTING | |
DST TO C 012 | Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains | SECURE COMPUTING | |
SERVICE COMPUTING | |||
DST TO C 01 | Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems | SERVICE COMPUTING | |
DST TO C 02 | Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes | SERVICE COMPUTING | |
DST TO C 03 | Privacy Preserving Location-Aware Personalized Web Service Recommendations | SERVICE COMPUTING | |
DST TO C 04 | Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach | SERVICE COMPUTING |
DST TO C 05 | Scheduling Inter-Datacenter Video Flows for Cost Efficiency | SERVICE COMPUTING | |
DST TO C 06 | Semantics Mining&Indexing-based Rapid Web Services Discovery Framework | SERVICE COMPUTING | |
DST TO C 07 | Similarity-maintaining Privacy Preservation and Location-aware Low-rank Matrix Factorization for QoS Prediction based Web Service Recommendations | SERVICE COMPUTING | |
DST TO C 08 | A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing | SERVICE COMPUTING | |
DST TO C 09 | A Dynamic Virtual Machine Placement and Migration Scheme for Data Center | SERVICE COMPUTING | |
DST TO C 010 | An Instance Reservation Framework for Cost Effective Services in Geo-Distributed Data Centers | SERVICE COMPUTING | |
DST TO C 011 | Efficient and Adaptive Procurement Protocol with Purchasing Privacy. | SERVICE COMPUTING | |
DST TO C 012 | Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing | SERVICE COMPUTING | |
DST TO C 013 | SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage | SERVICE COMPUTING | |
DST TO C 014 | Towards Deadline Guaranteed Cloud Storage Services | SERVICE COMPUTING | |
SOFTWARE ENGINEERING | |||
DST TO C 01 | An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving | SOFTWARE ENGINEERING | |
DST TO C 02 | Automatically Categorizing Software Technologies | SOFTWARE ENGINEERING | |
DST TO C 03 | Need for Sleep: the Impact of a Night of Sleep Deprivation on Novice Developers’ Performance | SOFTWARE ENGINEERING | |
DST TO C 04 | On the Semantics of Distributed Reactive Programming: the Cost of Consistency | SOFTWARE ENGINEERING | |
DST TO C 05 | Asymmetric Release Planning | SOFTWARE ENGINEERING | |
DST TO C 06 | Detecting Bugs by Discovering Expectations and Their Violations | SOFTWARE ENGINEERING | |
DST TO C 07 | How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool | SOFTWARE ENGINEERING | |
DST TO C 08 | Predictive Mutation Testing | SOFTWARE ENGINEERING | |
DST TO C 09 | Uni DoSA: The Unified Specification and Detection of Service Anti patterns | SOFTWARE ENGINEERING | |
DST TO C 010 | VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System | SOFTWARE ENGINEERING | |
IMAGE PROCESSING | |||
DST TO C 01 | MIO-TCD-A new benchmark dataset for vehicle classification and localization | IMAGE PROCESSING | |
DST TO C 02 | Retrieval Oriented Deep Feature Learning with Complementary Supervision Mining | IMAGE PROCESSING | |
DST TO C 03 | Structured Auto Encoders for Subspace Clustering | IMAGE PROCESSING | |
PARALLEL & DISTRIBUTED SYSTEMS | |||
DST TO C 01 | An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 02 | BiGNoC: Accelerating Big Data Computing withApplication Specific Photonic Network-on-Chip Architectures | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 03 | Core Maintenance in Dynamic Graphs: A Parallel Approach based on Matching | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 04 | Encoding-Aware Data Placement for Efficient Degraded Reads in XOR-Coded Storage Systems: Algorithms and Evaluation | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 05 | Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 06 | Multi-objective Optimization for Virtual Machine Allocation and Replica Placement in Virtualized Hadoop. | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 07 | Profit-Driven Dynamic Cloud Pricing for Multi server Systems Considering User Perceived Value | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 08 | Asynchronous and Exact Forward Recovery for Detected Errors in Iterative Solvers | PARALLEL & DISTRIBUTED SYSTEMS | |
DST TO C 09 | RoB-Router : A Reorder Buffer Enabled Low Latency Network-on-Chip Router | PARALLEL & DISTRIBUTED SYSTEMS | |
ARTIFICITIAL INTELLIGENCE | |||
DST TO C 01 | Automatic Vacant Parking Places Management System Using Multi camera Vehicle Detection. | ARTIFICITIAL
INTELLIGENCE |
|
DST TO C 02 | Energy Aware Driving: Optimal Electric Vehicle Speed Profiles for Sustainability in Transportation | ARTIFICITIAL INTELLIGENCE | |
DST TO C 03 | Identifying Regional Trends in Avatar Customization. | ARTIFICITIAL INTELLIGENCE | |
DST TO C 04 | Machine Learning Approaches to Competing in Fantasy Leagues for the NFL. | ARTIFICITIAL INTELLIGENCE | |
DST TO C 05 | PCCA: Position Confidentiality Conserving Algorithm for Content Protection in e-Governance Services and Applications. | ARTIFICITIAL INTELLIGENCE | |
DST TO C 06 | Simultaneous Spectral Data Embedding and Clustering. | ARTIFICITIAL INTELLIGENCE | |
MACHINE LEARNING | |||
DST TO C 01 | Applying Code Vectors for Presenting Software Features in Machine Learning | MACHINE LEARNING | |
DST TO C 02 | Improving the Smartness of Cloud Management via Machine Learning Based Workload Prediction. | MACHINE LEARNING | |
DST TO C 03 | Toward Firmware-Type Analysis using Machine Learning Technique | MACHINE LEARNING | |
IOT | |||
DST TO C 01 | A Scalable Blockchain Framework for Secure Transactions in IoT | IOT | |
DST TO C 02 | Privacy Preserving Data Aggregation Scheme IOT for Mobile Edge Computing Assisted IoT Applications | IOT | |
DST TO C 03 | Probabilistic Recovery of Incomplete Sensed Data in IoT | IOT | |
ARTIFICIAL INTELLIGENCE – APPLICATIONS TITLES | |||
DST TO C 01 | A Commodity Search Key For E-commerce | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 02 | AI Desktop collaborator | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 03 | Analysis For Career Aptitude Tests. | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 04 | Analysis of TV shows popularity using Data mining. | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 05 | Attendance system in android | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 06 | smart city guide in android | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 07 | Automatic answer checker | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 08 | Client Related E-commerce | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 09 | Client in attentive E-commerce site with AI | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 010 | College enquiry system | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 011 | Computer intelligence to answer your queries with AI | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 012 | Fake Product Review Monitoring and Removal for Genuine Online Product Reviews Using Opinion Mining | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 013 | General knowledge App | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 014 | Health care system using AI | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 015 | Health predictor | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 016 | Health care assistant using fat secret API | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 017 | Heart disease prediction | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 018 | Intelligent tourist system | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 019 | Movie rating predictor with data mining php | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 020 | Online book adviser using collaborative filtering | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 021 | Online shopping with AI | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 022 | Personality prediction system through CV analysis | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 023 | Product review analysis for genuine rating | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 024 | Question paper generator system | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 025 | Smart banking using AI | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 026 | Student information system | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 027 | Triggers that spark trends on the micro blogging site Twitter Using Latent Dirichlet Allocation. | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 028 | Website appraisal using opinion mining | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 029 | Sentiment movie ratings project | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
DST TO C 030 | Your personal Healthcare using fat secret | ARTFICIAL INTELLIGENCEA PPLICATIONS | |
ANDROID APPLICATIONS | |||
DST TO C 01 | Android Digi Locker | ANDROID APPLICATIONS | |
DST TO C 02 | Android Tour guide | ANDROID APPLICATIONS | |
DST TO C 03 | Android crime reporter and missing person finder | ANDROID APPLICATIONS | |
DST TO C 04 | Android storage manager | ANDROID APPLICATIONS | |
DST TO C 05 | Blood bank system | ANDROID APPLICATIONS | |
DST TO C 06 | Book parking area using android app | ANDROID APPLICATIONS | |
DST TO C 07 | Book store | ANDROID APPLICATIONS | |
DST TO C 08 | Campus Recruiting system | ANDROID APPLICATIONS | |
DST TO C 09 | City new information app | ANDROID APPLICATIONS | |
DST TO C 010 | Civil administration reporting system | ANDROID APPLICATIONS | |
DST TO C 011 | Course recommendation through online | ANDROID APPLICATIONS | |
DST TO C 012 | Digitalized canteen system | ANDROID APPLICATIONS | |
DST TO C 013 | E-judgement system | ANDROID APPLICATIONS | |
DST TO C 014 | Electricity Bill payment | ANDROID APPLICATIONS | |
DST TO C 015 | Floating camera | ANDROID APPLICATIONS | |
DST TO C 016 | Genuine Rater for project reviews | ANDROID APPLICATIONS | |
DST TO C 017 | Mobile voting system | ANDROID APPLICATIONS | |
DST TO C 018 | Mobile vallet with merchant payment system | ANDROID APPLICATIONS | |
DST TO C 019 | Monitor your child | ANDROID APPLICATIONS | |
DST TO C 020 | Music instrument store | ANDROID APPLICATIONS | |
DST TO C 021 | Number plate recognizer | ANDROID APPLICATIONS | |
DST TO C 022 | Online furniture shopping mobile application design | ANDROID APPLICATIONS | |
DST TO C 023 | Pay your bus season | ANDROID APPLICATIONS | |
DST TO C 024 | Phone theft security with GPS Tracking | ANDROID APPLICATIONS | |
DST TO C 025 | Restaurant management system | ANDROID APPLICATIONS | |
DST TO C 026 | Self attendance system using OTP | ANDROID APPLICATIONS | |
DST TO C 027 | Smart alarm system | ANDROID APPLICATIONS | |
DST TO C 028 | Smart city traveler with android | ANDROID APPLICATIONS | |
DST TO C 029 | Smart health consulter | ANDROID APPLICATIONS | |
DST TO C 030 | Stock management system | ANDROID APPLICATIONS | |
DST TO C 031 | Task monitoring with android app | ANDROID APPLICATIONS | |
DST TO C 032 | Android based vehicle mechanic system | ANDROID APPLICATIONS | |
DST TO C 033 | Android smart ticketing using RFID | ANDROID APPLICATIONS | |
DST TO C 034 | Student profile management system using QR code | ANDROID APPLICATIONS | |
DST TO C 035 | Posta Delivery management system | ANDROID APPLICATIONS | |
DST TO C 036 | Active authentication on mobile devices via stylometry application usage web browsing & GPS location | ANDROID APPLICATIONS | |
JAVA APPLCATIONS | |||
DST TO C 01 | Implementing one India card using advance technology | JAVA APPLCATIONS | |
DST TO C 02 | a dynamic show case application for web music system | JAVA APPLCATIONS | |
DST TO C 03 | online global mailing system in java | JAVA APPLCATIONS | |
DST TO C 04 | packet sniffer project in java | JAVA APPLCATIONS | |
DST TO C 05 | loan approval system in java | JAVA APPLCATIONS | |
DST TO C 06 | online address book | JAVA APPLCATIONS | |
DST TO C 07 | tech mart | JAVA APPLCATIONS | |
DST TO C 08 | download website copier project in java | JAVA APPLCATIONS | |
DST TO C 09 | automated teller machine atm banking systemNew Tab | JAVA APPLCATIONS | |
DST TO C 010 | hi-fi infirmary portal java project | JAVA APPLCATIONS | |
DST TO C 011 | telecom management system | JAVA APPLCATIONS | |
DST TO C 012 | i net phone java project | JAVA APPLCATIONS | |
DST TO C 013 | integrated application for employee | JAVA APPLCATIONS | |
DST TO C 014 | aadhaar secure travel identity java project | JAVA APPLCATIONS | |
DST TO C 015 | enterprise scheme planner and monitoring java project | JAVA APPLCATIONS | |
DST TO C 016 | development of computerised maintenance management system (cmms) | JAVA APPLCATIONS | |
DST TO C 017 | global communication java project | JAVA APPLCATIONS | |
DST TO C 018 | medicate search java project | JAVA APPLCATIONS | |
DST TO C 019 | online recruitment system an java project | JAVA APPLCATIONS | |
DST TO C 020 | online polling system | JAVA APPLCATIONS | |
DST TO C 021 | one point transaction banking projects | JAVA APPLCATIONS | |
DST TO C 022 | employee rewarding system | JAVA APPLCATIONS | |
DST TO C 023 | student supervision system | JAVA APPLCATIONS | |
DST TO C 024 | student result system | JAVA APPLCATIONS | |
DST TO C 025 | hostel seat booking system | JAVA APPLCATIONS | |
DST TO C 026 | i-card generator system | JAVA APPLCATIONS | |
DST TO C 027 | club registration system | JAVA APPLCATIONS | |
DST TO C 028 | spa appointment system | JAVA APPLCATIONS | |
DST TO C 029 | flower bouquet management system | JAVA APPLCATIONS | |
DST TO C 030 | course management system | JAVA APPLCATIONS | |
DST TO C 031 | luggage import-export system | JAVA APPLCATIONS | |
DST TO C 032 | patent record system | JAVA APPLCATIONS | |
DST TO C 033 | library book issue and return systemlibrary book issue and return system | JAVA APPLCATIONS | |
DST TO C 034 | laboratory management system | JAVA APPLCATIONS | |
DST TO C 035 | shop management system | JAVA APPLCATIONS | |
DST TO C 036 | article search engine | JAVA APPLCATIONS | |
DST TO C 034 | zoo management system | JAVA APPLCATIONS | |
DST TO C 038 | agro-forestry management system | JAVA APPLCATIONS | |
DST TO C 039 | bus depot management system | JAVA APPLCATIONS | |
DST TO C 040 | jail/prison management system | JAVA APPLCATIONS | |
DST TO C 041 | circus management system | JAVA APPLCATIONS | |
DST TO C 042 | Online Handicrafts | JAVA APPLCATIONS | |
DST TO C 043 | Grama panchayat system | JAVA APPLCATIONS | |
DST TO C 044 | Fashnet | JAVA APPLCATIONS | |
DST TO C 045 | Government school Education development system | JAVA APPLCATIONS | |
DST TO C 046 | No Due Management system | JAVA APPLCATIONS | |
DST TO C 047 | Resort Management system | JAVA APPLCATIONS | |
DST TO C 048 | Working women’s Hostel management system | JAVA APPLCATIONS | |
DST TO C 049 | City Information system | JAVA APPLCATIONS | |
DST TO C 050 | Management of Highway construction system | JAVA APPLCATIONS |