S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV101 | A System to Filter Unwanted Messages from OSN User Walls | |
2 | CTJV102 | Fully Anonymous Profile Matching in Mobile Social Networks | |
3 | CTJV103 | Mining Contracts for Business Events and Temporal Constraints in Service Engagements | |
4 | CTJV104 | Price Differentiation for Communication Networks | |
5 | CTJV105 | Sensitive Label Privacy Protection on Social Network Data | |
6 | CTJV106 | Supporting Privacy Protection in Personalized Web Search | |
7 | CTJV107 | Spatial Approximate String Search | |
8 | CTJV108 | Understanding the Performance and Potential of Cloud Computing for Scientific Applications | |
9 | CTJV109 | Fast Nearest Neighbor Search with Keywords | |
10 | CTJV110 | Towards Online Shortest Path Computation | |
11 | CTJV11 | A Load Balancing Model Based on Cloud Partitioning | |
12 | CTJV112 | Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems | |
13 | CTJV13 | Friendbook:A Semantic-based Friend Recommendation System for Social Networks | |
14 | CTJV114 | Stock Market Prediction Analysis | |
15 | CTJV115 | Advance Security In Cloud Computing For Military Weapons | 16 | CTJV116 | Sub-graph Matching with Set Similarity in a Large Graph Database |
17 | CTJV117 | Automatic Personality Classification | |
18 | CTJV118 | Active City Administration | |
19 | CTJV119 | Mail received Authentication System | |
20 | CTJV120 | Online Rental Web Portal | |
21 | CTJV121 | A novel Anti-Fishing Framework based on visual Cryptography | |
22 | CTJV122 | E-Assessment Instructor | |
23 | CTJV123 | Automatic DB Schema Generation | |
24 | CTJV124 | Client Server Protocol Implementation | |
25 | CTJV125 | Data Transmission Using Multi-Tasking-Sockets | |
26 | CTJV126 | Dual-Stenography for hiding text in video by linked list method | |
27 | CTJV127 | Hostel Management System | |
28 | CTJV128 | An Object-Oriented Web Test Model for Testing Web Applications | |
29 | CTJV129 | Attendance Management System | |
30 | CTJV130 | Friends Meeting point | |
31 | CTJV131 | SQL work bench | |
32 | CTJV132 | CARGO management system | |
33 | CTJV133 | Bug tracking system | |
34 | CTJV1354 | Hospital management system | |
35 | CTJV135 | Online examination system | |
36 | CTJV136 | Citizen card system | |
37 | CTJV137 | Company vehicle management system | |
38 | CTJV138 | Corporate recruitment system | |
39 | CTJV139 | Crime records management system | |
40 | CTJV140 | Data transmission using multi tasking sockets | |
41 | CTJV141 | Online registration for Voter card | |
42 | CTJV142 | Computerization of Ration Dispensing | |
43 | CTJV143 | Security system for DNS using Cryptography | |
44 | CTJV144 | Data leakage detecting | |
45 | CTJV145 | Certificate issue system | |
46 | CTJV146 | College event calendar | |
47 | CTJV147 | Fraud detection system | |
48 | CTJV148 | Engineering books resale management system | |
49 | CTJV149 | Material feedback system | |
50 | CTJV150 | Online book review management | |
51 | CTJV151 | Placement tracking system | |
52 | CTJV152 | Online clinic | |
53 | CTJV153 | Training hub | |
54 | CTJV154 | Online Java compiler with security editor | |
55 | CTJV155 | Detecting malicious face book applications | |
56 | CTJV156 | Connecting Social media to e-commerce for Product recommendation | |
57 | CTJV157 | Towards real-time country level location classification of worldwide tweets | |
58 | CTJV158 | A system for profiling and monitoring data base access patterns by application programs for anomaly detection | |
59 | CTJV159 | Follow but no track: privacy preserved profile publishing in cyber physical social systems | |
60 | CTJV160 | Social Q&A: An Online Social Network Based Question and Answer System | |
61 | CTJV161 | Collaborative Filtering-Based Recommendation of Online Social Voting | |
62 | CTJV162 | Efficient cache supported path planning on roads | |
63 | CTJV163 | Inference attack on browsing history of twitter users using public click analytics and twitter meta data | |
64 | CTJV164 | Automatic generation of social event story board from image click through data | |
65 | CTJV165 | Pro guard: Detecting malicious accounts in social network based online promotions | |
66 | CTJV166 | Blood Donor Symbiosis | |
67 | CTJV167 | A parallel patient treatment time prediction algorithm & its applications | |
68 | CTJV168 | Maximizing p2p file access availability in mobile adhoc networks | |
69 | CTJV169 | Online venue booking | |
70 | CTJV170 | Finding verb for written for written test | |
71 | CTJV171 | Weather report management | |
72 | CTJV172 | Soci Rank: Identifying and Ranking Prevalent News Topics Using Social Media Factors | |
73 | CTJV173 | Hybrid page rank algorithms | |
74 | CTJV174 | Detecting Stress Based on Social Interactions in Social Networks | |
75 | CTJV175 | Document clustering using ANT colony algorithm | |
76 | CTJV176 | Graduate selection process | |
77 | CTJV177 | Discovery of Ranking Fraud for Mobile Apps | |
78 | CTJV178 | I-injection: Towards effective collaborative filtering using an interested items | |
79 | CTJV179 | Military equipment rental system |
© 2011-20 Conscience Technologies - All Rights Reserved