Projects / B.Tech / CSE & IT / / List
 
IEEE JAVA Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Blockchain Based Management for Organ Donation and Transplantation
2 Enhancing Organ Donor Matching and Transparency with Aadhar Based Registration
3 Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
4 Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
5 Verifiable and Multi Keyword Searchable Attribute Based Encryption Scheme for Cloud Storage
6 Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
7 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT
8 User-Defined Privacy Grid System for Continuous Location-Based Services
9 Performance and power consumption evaluation in smart phone based image processing for medical applications
10 Filtering Instagram hash tags through crowd tagging and the HITS algorithm
11 Cloud Data Protection for the Masses
12 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
13 Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
14 Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
15 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
16 Predicting Cyber bullying on Social Media in the Big Data Era Using Machine Learning Algorithms
17 Online Public Shaming on Twitter Detection Analysis and Mitigation
18 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
19 Hate Speech on Twitter A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection
20 Follow But No Track Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
21 Detecting Malicious Social Bots Based on Clickstream Sequences
22 DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction
23 Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud
24 Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
25 Automated Phrase Mining from Massive Text Corpora
26 An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
27 A Hierarchical Attention Model for Social Contextual Image Recommendation
28 A Credibility Analysis System for Assessing Information on Twitter
29 Authentication by Encrypted Negative Password
30 ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks
31 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
32 Two tales of privacy in online social networks
33 Then and Now On The Maturity of the Cybercrime Markets
34 SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
35 Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
36 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
37 Providing ranking for web urls based on user feedbacks
38 Profiling Online Social Behaviors for Compromised Account Detection
39 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
40 Privacy-Preserving and Content-Protecting Location Based Queries
41 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
42 Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks
43 On the Security of Data Access Control for Multiauthority Cloud Storage Systems
44 My Privacy My Decision Control of Photo Sharing on Online Social Networks
45 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
46 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
47 Identity Based Encryption with Outsourced Revocation in Cloud Computing
48 FRAppE Detecting Malicious Facebook Applications
49 FOCS Fast Overlapped Community Search
50 EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
51 Effective Key Management in Dynamic Wireless Sensor Networks
52 EAACK—A Secure Intrusion-Detection System for MANETs
53 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
54 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
55 DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
56 Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network
57 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
58 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
59 Cloud Computing Security From Single to Multi-Clouds
60 Building an intrusion detection system using a filter-based feature selection algorithm
61 Authenticated Key Exchange Protocols for Parallel Network File Systems
62 An Incentive Framework for Cellular Traffic Offloading
63 An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks
64 A System to Filter Unwanted Messages from OSN User Walls
65 A Stable Approach for Routing Queries in Unstructured P2P Networks
66 A Novel Security Scheme for Online Banking Based on Virtual Machine
67 A New Algorithm for Inferring User Search Goals with Feedback Sessions
68 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
69 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
70 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
71 A Cocktail Approach for Travel Package Recommendation
72 User Vitality Ranking and Prediction in Social Networking Servicesa Dynamic Network Perspective
73 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
74 Toward Shared Ownership in the Cloud
75 The Server Provisioning Problem for Continuous Distributed Interactive Applications
76 Tag Based Image Search by Social Re-ranking
77 SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks
78 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
79 SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors
80 SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud
81 Securing Aggregate Queries for DNA Databases
82 Secure Range Search over Encrypted Uncertain loT Outsourced Data
83 SDE A Novel Clustering Framework Based on Sparsity-Density Entropy
84 Resource renting for periodical cloud workflow applications
85 RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem
86 QoS Recommendation in Cloud Services
87 Profiling Online Social Behaviors for Compromised Account Detection
88 PrivacyProtectionAccessControlScheme
89 Privacy Characterization and Quantification in Data Publishing
90 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
91 NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
92 Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
93 Mitigating Cross-Site Scripting Attacks with a Content Security Policy
94 Location Aware Keyword Query Suggestion Based on Document Proximity
95 Joint Optimization of Multicast Energy in Delay Constrained Mobile WSNs
96 Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
97 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
98 Identity-Based Private Matching over Outsourced Encrypted Datasets
99 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
100 Ghost Riders Sybil Attacks on Crowdsourced Mobile Mapping Services
101 Generating Query Facets using Knowledge Bases
102 FRoDO Fraud Resilient Device for Off-Line Micro-Payments
103 Frequent Itemsets Mining with Differential Privacy over Large-scale Data
104 FraudFind Financial Fraud Detection by Analyzing Human Behavior
105 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
106 Fast Phrase Search for Encrypted Cloud Storage
107 EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
108 Enhancing Information Resilience in Disruptive Information-Centric Networks
109 Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks
110 Efficient Keyword-aware Representative Travel Route Recommendation
111 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
112 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
113 Distributed Faulty Node Detection in Delay Tolerant Networks Design and Analysis
114 DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments
115 Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
116 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
117 CryptCloud+ Secure and Expressive Data Access Control for Cloud Storage
118 CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING
119 Crawling Hidden Objects with kNN Queries
120 CoDetect Financial Fraud Detection with Anomaly Feature Detection
121 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
122 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
123 Block Design-based Key Agreement for Group Data Sharing in Cloud Computing
124 Automatically Mining Facets for Queries from Their Search Results
125 Audience Behavior Mining Integrating TV Ratings with Multimedia Conten
126 Aspect-level Influence Discovery from Graphs
127 Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach
128 Analysis of users behaviour in structured e-commerce websites
129 An Efficient Privacy-Preserving Ranked Keyword Search Method
130 Active Trust Secure and Trustable Routing in Wireless Sensor Network Networks
131 Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
132 Achieving Data Truthfulness and Privacy Preservation in Data Markets
133 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
134 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
135 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
136 A Hybrid Approach for Detecting Automated Spammers in Twitter
137 A Cross Tenant Access Control (CTAC) Model for Cloud Computing Formal Specification and Verification
138 A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
139 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
140 Secure Data Sharing In Cloud Computing Using Revocable-Storage Identity-Based Encryption
141 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
142 A Shoulder Surfing Resistant Graphical Authentication System
143 SocialQ&A An Online Social Network Based Question and Answer System
144 Using Data Mining to Predict Hospital Admissions from the Emergency Department
145 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys (Big Data)
146 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers (NETWORKING)
147 Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis with Co-Occurrence Data
148 Fast Nearest Neighbor Search with Keywords
149 Identity Based Data Outsourcing with Comprehensive Auditing in Clouds
150 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
151 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach (KNOWLEDGE AND DATA ENGINEERING)
152 iPath Path Inference in Wireless Sensor Networks
153 SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces (SERVICES COMPUTING)
154 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems (PARALLEL AND DISTRIBUTED SYSTEMS)
155 Continuous Answering Holistic Queries over Sensor Networks(PARALLEL AND DISTRIBUTED SYSTEMS)
156 FRAppE Detecting Malicious Facebook Applications (NETWORKING)
157 Search Me If You Can Privacy-preserving Location Query Service (MOBILE COMPUTING)
158 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach (MOBILE COMPUTING)
159 An Incentive Framework for Cellular Traffic Offloading(MOBILE COMPUTING)
160 Privacy-Preserving and Content-Protecting Location Based Queries (KNOWLEDGE AND DATA ENGINEERING)
161 Location Aware Keyword Query Suggestion Based on Document Proximity (KNOWLEDGE AND DATA ENGINEERING)
162 Resolving Multi-party Privacy Conflicts in Social Media (KNOWLEDGE AND DATA ENGINEERING)
163 FOCS Fast Overlapped Community Search (KNOWLEDGE AND DATA ENGINEERING)
164 DiploCloud Efficient and Scalable Management of RDF Data in the Cloud
165 Automatically Mining Facets for Queries from Their Search Results (KNOWLEDGE AND DATA ENGINEERING)
166 A Cocktail Approach for Travel Package Recommendation (KNOWLEDGE AND DATA ENGINEERING)
167 EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data (INTERNET OF THINGS)
168 Geometric Range Search on Encrypted Spatial Data (INFORMATION Forensics and Security)
169 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Computers)
170 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email (Computers)
171 Building an intrusion detection system using a filter-based feature selection algorithm (Computers)
172 Identity Based Encryption with Cloud Revocation Authority and Its Applications (Cloud Computing)
NON IEEE JAVA Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 CBD Cyberbullying Detection
2 Interview Insight Hub
3 Placement Cell Management System
4 A voice-based prescription generating system
5 Shuffling Algorithm based Dynamic Question Paper generation
6 User Defined Spam Filtering Through Mail Server
7 Ticket Reservation System in Indian Airlines
8 Automated Detecting Spammers in social media
9 Online Notice Board
10 College Event Management System
11 online grocery shopping
12 Content-Based Image Retrieval System
13 implementation of tambola game using node js
14 Web-Pharmaceuticals
15 Web Enabled Books Management Tool
16 Warehouse Management System
17 Voiced Based Encryption
18 Visitors Management
19 Visa Processing Information System
20 View the City
21 Vehicle Identification System
22 Uplifting Of Farmer through Connected Ecosystem
23 University Admission System
24 Transport plus
25 Online Construction and Cost Calculator
26 Online College Voting
27 Online Asset Management System
28 Multi Keyword Ranked Search
29 Freelancers Job Consultancies
30 Institute Explorer
31 Improving the Customer Relationship Management Using Data Mining
32 Hr Sla’s For Hr Department
33 Hr Manager
34 Hospital Management System
35 Help Desk
36 Guest Hose Management System
37 Govt Scheme Management System
38 Government Medical Schemes
39 Forest Resource Sales and Maintenance Automation
40 Filtering Unwanted Messages from Online Social Networks
41 Examination Results and Notifications
42 E-Solution Provider
43 Employee Resource Management Systems
44 Employee Performance and Recognition Portal
45 Employee Leave Management
46 E-Tendering System
47 E - Wheelz
48 Digital Steganography
49 DIGITAL LIBRARY MANAGEMENT SYSTEM
50 Digital Data Security through Water Marking
51 Dashboard To Track Medical Records Of Patients In Government Hospitals
52 Online Courier Service Management System
53 College Incubation and Innovation Cell
54 City Vehicle and Traffic Control System
55 Citizen Card Maintenance for E-Governess
56 Captcha as Graphical Password Authentication System
57 Bug Tracking For Improving Software Reliability
58 Book Resale with Lending and Donation
59 Automobile trailing system
60 An Online Social Network Based Question And Answer System
61 108 - Public Health Emergency Services
62 Employee Payroll Management System
63 SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY
64 MAINTENANCE OF DATABASE OF BENEFICIARIES OF GOVERNEMENT MEDICAL SCHEMES
65 Spear phishing detection
66 WEB BASED COLLEGE FORUM
67 DRUG ADDICTION COUNSELING AND GUIDENCE SYSTEM
68 Bug Tracking for Improving Software Reliability
69 Improving the customer relationship management Using Data Mining
70 GOOGLE MAPS BASED EVENT MANAGEMENT SYSTEM
71 Film Success Prediction
72 TRAVELS MANAGEMENT SYSTEM
73 Online Pharmacy Performance Finder on User Ratings
74 online Blood Bank and Blood Donor Management System
75 Driving School Student Management System
76 COLLEGE EVENT CALENDAR
77 Online College Magazine
78 comprehensive analysis of security algorithm in cloud computing
79 MEASURING CLINICAL HEALTH DATABASE SIMILARITY USING CLUSTERING AND CLASSIFICATION
80 Training and Placement system
Non IEEE Android Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 LIBRARY ACCESS SYSTEM BY SMARTPHONE APPLICATION USING ANDROID
2 LOCATION BASED ONLINE BLOOD BANK SYSTEM
3 KISAN SEVA
4 INSTITUTE EXPLORER
5 I CHAT
6 GROUP EXPENSE TRACKER
7 GPS Alarm
8 FRIEND MAPPER
9 APARTMENT MANAGEMENT SYSTEM
10 METRO RAIL INFORMATION
11 Student Assessment System
12 College Application For Student
13 E CONTACT FOR EMERGENCY
14 WAKE ME UP
15 SMART SCHEDULAR
16 Travel and Tourism Solutions
IEEE Android Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Hiding in the Mobile Crowd: Location Privacy through Collaboration
2 Face-to-Face Proximity Estimation Using Bluetooth On Smartphones
3 Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
Python Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Aerial Image Segmentation with Class-wise Analysis and Visualization
2 Intelligent Video Interview Analysis System for Enhancing Interview Skills and Performance
3 DentScan-Cavity Detection & Diagnostic Reporting System
4 Mock Interview Platform for Enhanced Performance
5 AI-Powered Address Matching for Accurate Postal Delivery Enhancing Efficiency with Fuzzy Logic
6 Handwritten English Character and Digit (0-9) Recognition Using Deep Learning
7 Real-Time Earthquake Prediction Using Machine Learning and Geospatial Analytics
8 Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques
9 Fast and Lightweight Encryption for Image Data Protection
10 A Novel LSTM-CNN Framework for Detecting and Mitigating Botnet Attacks in Software-Defined Networks
11 A Lightweight Image Encryption Algorithm Based on Secure Key Generation
12 Predicting cattle diseases using symptom-based machine learning
13 Deep Learning-Based Parkinsons Disease Detection Using ResNet50A-Web Application
14 Early Detection Method for Parkinsons disease Using Deep Ensemble Learning on MRI Dataset
15 WEATHER PREDICTION
16 Fraud Detection on E-Commerce Transactions Using Machine Learning Technique
17 College Event Management System using MongoDB
18 Traffic Signs Recognition
19 AI-Enhanced Mental Health Support system
20 Content-Based Image Retrieval System
21 READEASE EMPOWERING DYSLEXIA
22 Automated Multi-Language Video Subtitle Generation with English Translation
23 MediBot Drug Recommendations system
24 Deep Learning-based Auto Accident Detection and Alert System
25 Large Language Model (LLM) for Blog Article Generator with both text and images
26 Detecting Suspicious Activities in Exam Halls to Prevent Cheating
27 AI-Assisted Search for Identifying Missing Persons by Facial Recognition
28 Intelligent Social Distancing Enforcement for Health Security
29 Secured E-voting system based on iris identification
30 Educational Certificate Verification System Using Blockchain
31 Cervical Spine Fracture Detection Using Deep Neural Networks
32 Video-Text Retrieval Using Deep Learning
33 Secure and Transparent Donation Platform with Blockchain
34 Language Detection Using Machine Learning
35 Automatic Timetable Generator Using Python
36 Cough Sound Diagnostics for Lung Infection Identification
37 Malware Classification Is Used To Distinguish Unique Types of Malware from Each Other
38 An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning
39 Voice-Based Email System for Visually Impaired Individuals to Access and Send Emails
40 Graphical Password to prevent Shoulder Surfing
41 Classifying Fake News Articles Using Natural Language Processing
42 A Controllable False Data Injection Attack for a Cyber Physical System
43 Movie Recommendation System Using Collaborative Filtering
44 ONLINE DIGITAL CHEQUE CLEARANCE AND VERIFICATION SYSTEM
45 Cyber Attack Detection Model (CADM) Based on Machine Learning
46 Spammer Detection and Fake User Identification on Social Networks
47 Currency Detection For Visually Impaired
48 Automatic Text Transcribes and Summarize From Length Audio
49 Generating Synthetic Images from textual description using GAN
50 Smart Suspect Tracker Using ML
51 Image forgery detection based on fusion of lightweight deep learning model
52 End-to-end Conversion Speed Analysis of an FPT AI-based Text-to-Speech Application
53 Machine Learning Methods For Calories Measurement of Fruits and Vegetables
54 Skin Disease Classification using Convolutional Neural Network
55 Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
56 Recognition of Handwritten Textual Annotations using Tesseract Open Source OCR Engine
57 Vehicle Detection and Speed Tracking using OpenCv
58 Diabetes Prediction Using Machine Learning Algorithm
59 Social Media and Misleading Information in a Democracy A Mechanism Design Approach
60 Heart Disease Prediction
61 Real Time Object detection and Recognition Using Deep Learning
62 Rainfall Prediction using Machine Learning
63 Sign language recognition to text and voice using Cnn
64 Image Based Question and Answering System
65 RESUME BUILDER
66 Drug Recommendation System based on Sentiment Analysis of Drug Reviews using Machine Learning
67 Driver drowsiness monitoring system using visual behavior and machine learning
68 Facial Recognition for Crime Detection
69 Gender and Age classification using CNN
70 Machine learning techniques for cyber attacks detection in network
71 Stationary Manageement System
72 DocEnTr-An End-to-End Document Image Enhancement Transformer
73 Phishing Website Detection Using Machine Learning Algorithm
74 IPL MATCH PREDICTION
75 Disease Prediction using Machine Learning
76 Online Food Ordering System
77 Automatic Shadow Detection in Image Using Adaptive Thresholding Segmentation
78 Identifying those responsible for stealing the credit cards risk management
79 Finding the principal components in Software Defects using randomized PCA
80 Clustering News Headlines using k-means and Hierarchical algorithm
81 Serendipitous Drug Usage In Social Media
82 personalized recommendataion of social images by constrcuting a user interest tree with deep features and tag trees
83 machine learning based error detection and dell design optimisation in signal intergrity application
84 Hitboost survival analysis via a multi-output gradient boosting decision tree method
85 Efficient vertical mining of high average utility itemset based on novel upper bonds
86 classified different users with mulitple instance learning from social network data
87 block chain a a game charnger for securing iot data
88 assessing the effectiveness of riparian restoration projects using landsat and preception data from the cloud computing application
89 A Generic Human Machine Annotation Framework Based on Dynamic Cooperative Learning
90 Securing ATM Transactions using Face Recognition
91 Estimate the Height Weight and BMI from Face Using Machine Learning
92 TwitPersonality-Computing Personality Traits from Tweets Using Word Embeddings and Supervised Learning
93 personality prediction based on twitter tweets using machine learning algorithms
94 Fault Detection and Isolation in Industrial Processes Using Deep Learning Approaches
95 Number Plate Recognition by using ML algorithm
96 Blockchain-based Electronic Voting System with Special Ballot and Block Structures that Complies with Indonesian Principle of Voting
97 SUPERMARKET SALES ANALYSIS
98 user ratings and reviews based fraud app detection in google playstore
99 Mark It For Down Article Maker
100 EMOTION DETECTION FROM LIVE CAMERA USING CNN
101 Solving Nurse Scheduling Problem Using Constraint Programming Technique
102 Facial Movements Based Mouse Cursor Control for Physically Disabled Individual
103 Detect Fraud App in Google Play Store by Sentiment Analysis
104 Weakly-supervised Deep Embedding for Product Review Sentiment Analysis
105 Toward Better Statistical Validation of Machine Learning-Based Multimedia Quality Estimators
106 Semi-supervised machine learning approach for DDoS detection
107 Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
108 Rich Short Text Conversation Using Semantic-Key-Controlled Sequence Generation
109 Price-based Resource Allocation for Edge Computing A Market Equilibrium Approach
110 Prediction of Crude Oil Prices using Support Vector Regression (SVR) with grid search cross validation algorithm
111 Personalized Affective Feedback to Address Students Frustration in ITS
112 Multi-Traffic Scene Perception Based on Supervised Learning
113 Modeling and Predicting Cyber Hacking Breaches
114 Loan Approval Prediction based on Machine Learning Approach
115 Image Based Appraisal of Real Estate Properties
116 How Data-Driven Entrepreneur Analyzes Imperfect Information for Business Opportunity Evaluation
117 Generating Wikipedia By Summarizing Long Sequences
118 Exploratory Visual Sequence Mining Based on Pattern-Growth
119 Efficient Vertical Mining of High Average-Utility Itemsets Based on Novel Upper-Bounds
120 Designing Cyber Insurance Policies The Role of Pre-Screening and Security Interdependence
121 Deep Learning Applications in Medical Image Analysis
122 Data-Driven Design of Fog-Computing-Aided Process Monitoring System for Large-Scale Industrial Processes
123 Correlated Matrix Factorization for Recommendation with Implicit Feedback
124 Characterizing And Predicting Early Reviewers For Effective Product Marketing On E-Commerce Websites
125 Cancer Scenario in India with Future Perspectives
126 Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
127 A user-centric machine learning framework for cyber security operations center
128 A Data Mining Based Model For Detection Of Fraudulent Behaviour In Water Consumption
129 A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security
130 Spammer Detection and Fake User Identification on Social Networks
131 Credit card Fraud Detection using Predictive Modeling
132 Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes
133 lung cancer detection
134 Vehicle detection in a Video frame
135 Image Classifier using CNN
136 Vehicle number plate detection
137 A Method for Hybrid Personalized Recommender based on Clustering of Fuzzy User Profiles
R-Language Based Projects Note: We are not restricted for this list, We will do out of list also.
S.No Name
No records found.
.net Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Online Art Gallery
IOT Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Google Assistant Based Home Automation (IOT)
2 Home Automation Using IOT
3 Password Based Door Locking System Over IOT
4 Smart Energy Meter over IOT
5 IOT Based Garbage Monitoring System
6 Smart Street Lighting Control over IOT
7 Smart Environmental Parameters Monitoring Systme Over IOT
8 Industrial Automation over IOT
9 An IoT based Patient Health Monitoring System
10 Weather Reporting Over IOT (Temp and Humidity)
11 Dam Gate Level Monitoring For Water Resource Analysis over IOT
12 Plant Irrigation Pump Control over IOT
13 SMART STREET LIGHTS
paper preparation Note: We are not restricted for this list, We will do out of list also.
S.No Name
No records found.
MATLAB Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images
PHP Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Email Alerts on Whatsapp Web Clone
2 Library Management System
3 college lab management system
4 Hybrid Lab
5 Online Voting System
6 Fake Product Review Monitoring and Removal for Genuine Online Product Reviews
7 E-Learning System
8 E-Marketplace for Tribals
9 location map development using leafletjs
10 Online Hotel Management System
11 Online Ration Slot Booking System
Angular js Note: We are not restricted for this list, We will do out of list also.
S.No Name
1 Loan EMI Calculator AngularJS
2 apartment management system AngularJS