Application- .NET
Authorized Data Transfer using Key Classification
The network security is the main goal of this project. Key exchange (also known as "key establishmen..
Automatic-backup-application-for-organization
This System is designed for the purpose of backup for an organization. This project is mainly used ..
Automating Online ICM Scheduling
This is an Online event management system software project that serves the functionality of an event..
Automation information System
Automated office systems are emerging as an interdisciplinary research area with a strong computer s..
Backward Path Growth for Efficient Mobile Sequential Recommendation
The sequential recommendation from data mining has high computational risks. For avoiding that key c..
Bank Transaction Process
To create regulative methodology which is abide by the certain constraints by which the financial ..
Beyond Text QA Multimedia Answer Generation by Harvesting Web Information
Community question answering (cQA) services have gained popularity over the past years. It not only ..
Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems
A vast amount of text data is recorded in the forms of repair verbatim in railway maintenance secto..
Billing For Silvershop
The main aim of this project is to develop an interactive and dynamic application that provides the ..
BiSet Semantic Edge Bundling with Biclusters for Sensemaking
The emerging field of visual analytics seeks to address the needs of exploratory discovery in big da..
Block Design based Key Agreement for Group Data Sharing in Cloud Computing
Data sharing in cloud computing enables multiple participants to freely share the group data, which ..
Blood donation system
BLOOD DONATION MANAGEMENTSYSTEM is a software application to maintain day to day transactions in a b..
Book Store Management System
The Book Store Management System provides real time information about the books available in the Li..
Bootstrapping Ontologies for Web Services
Ontology have become the de-facto modeling tool of choice, employed in many applications and promine..
Botnet Detection based on Anomaly and Community Detection
A novel two-stage approach for the important cyber-security problem of detecting the presence of a..