IT

Home / IT

CSC/IT projects

C#

  • Generation of Vital Event Notifications from DHIS2 for Strengthening CRVS System
  • Factor Analysis on Student Loan Consideration in Higher Education Level
  • Elastic Password: A New Mechanism for Strengthening Passwords using Time Delays between Keystrokes
  • An efficient privacy-preserving multi-keyword ranked search over encrypted data in cloud computing
  • Preserving location privacy in geosocial applications
  • Management Information Systems Development for Veterinary Hospital Patient Registration Using FIFO
  • Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
  • Knowledge Extraction from Online Vacancies for Effective Job Matching
  • Privacy Preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data
  • Secure and Efficient Public Auditing scheme for Cloud Storage
  • Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data
  • Performance analysis of MANET in the presence of malicious nodes
  • E-mentoring: Mentoring evolution with new technologies
  • Extended ERP for Inventory Management: The Case of a Multi-National Manufacturing Company
  • Game theoretical analysis on the projects of knowledge transfer among public housing
  • Geo Spatial Info Tech Solutions
  • Smart farming system using sensors for agricultural task automation
  • An enterprise resource management model for business intelligence, data mining and predictive analytics
  • User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective
  • Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
  • Privacy-Preserving Selective Aggregation of Online User Behaviour Data
  • Keyword Search with Access Control Over Encrypted Cloud Data
  • Directly revocable Attribute Based Encryption scheme under Ciphertext-policy
  • Enhanced IOT aware online Shopping System
  • Privacy Preserving Data Analytics in Cloud Based Smart Home with Community Hierachy.
  • Reliable and Confidential Cloud Storage with efficient data forwarding functionality
  • The affecting factors of career coaching implementation on college training programs in innovation and creativity – a case study
  • Budget Distribution Strategies for Scientific Workflow Scheduling in Commercial Clouds
  • Application of a HID Certificate Issue Algorithm for Strengthening Private Information Security Over the V2V Environment
  • A risk emergency management model for software project based on stochastic Petri Nets
  • OPERA-Net 2 project — An environmental global approach for radio access networks-achievements for off-grid systems
  • The Teaching in ASP.NET Programming and the Development in E-commerce Project
  • Concept of rural intelligent grid interactive planning methodology
  • Cross-heterogeneous-database age estimation with co-representation among them
  • Design efficient schemes of applied algorithms parallelization based on semantic Petri-Mark
  • On Further Reduction of Constraints in “Nonpure Petri Net Supervisors for Optimal Deadlock Control of Flexible Manufacturing Systems
  • Method for calculating Net Radiative Forcing from contrails from airline operations
  • Model of data collection controller of automated processing systems for passenger traffic public transport «smart» city based on Petri nets
  • A novel approach to noise clustering in multivariate fuzzy c-Means
  • Optimal Joint Remote Radio Head Selection and Beamforming Design for Limited Fronthaul C-RAN
  • Grey Clustring Evalutaion on regional tourism Economy
  • Design and implementation of hospital emergency nursing information management system
  • Framework for secure data sharing in dynamic group using public cloud

PYTHON

  • Optimization detection of eye blinking faces using Open Source Computer Vision Software
  • Gaming Based Learning in construction Education

PHP

  • Management and Evaluation of Tasks Using an Online System
  • An Email Application with Active Spoof Monitoring and Control
  • Applying of Innovative Methods in Warehouse Management
  • Folksonomy based Trend Analysis on Community Question Answering Sites: A Perspective on Software Technologies
  • Design and implementation of short message service (SMS) based blood bank
  • A framework for quality management of e-commerce websites
  • Two-Level Security in Shared m-Healthcare System Using OwnCloud
  • An Empirical Study on the Usage of SQL Execution Traces for Program Comprehension
  • Image Based Appraisal of Real Estate Properties
  • Secret Suffrage in Remote Electronic Voting Systems
  • An Introduction to QR Code Technology
  • Adjusting the Balance Sheet by Appending Technical Debt
  • Smart Expense Management Model for Smart Homes
  • Implementation of Web Image Search Portal with automated concealed annotation
  • Query Construction Patterns in PHP
  • Safe user authentication in a network environment
  • Comparison the processing speed between PHP and ASP.NET
  • Software for Academic Registration for IUT SAIDA: Web-Based Online Academic Registration and Management
  • Intent-Based Extensible Real-Time PHP Supervision Framework
  • Efficient and Flexible Discovery of PHP Application Vulnerabilities
  • ZenIDS: Introspective Intrusion Detection for PHP Applications
  • Efficient and Flexible Discovery of PHP Application Vulnerabilities
  • Behavior of MVC (Model View Controller) based Web Application developed in PHP and .NET framework
  • Towards Secure SPARQL Queries in Semantic Web Applications Using PHP
  • SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks
  • Smartphone Application for Tracking Students’ Class Attendance
  • A proposal of clustering techniques applied to a Library Management System
  • Design and Implementation of a Web-Based Thesis Coordinator System (TCS)
  • Transient performance & availability modelling in high volume outpatient clinics
  • A Template Independent Approach for Web News and Blog Content Extraction
  • Effective Blog Pages Extractor for Better UGC Accessing
  • An accelerated application monitoring environment with accelerated servers
  • Secret suffrage in remote electronic voting systems
  • Minimization of SQL injection in scheduling application development Using intelligent systems in pharmacy
  • A secured Mobile-Based Password Manager
  • A research on the model of university apartment occupancy distribution based on the student preferences
  • Improving Bug Reporting, Duplicate Detection, and Localization
  • An exploratory policy analysis of electric vehicle sales competition and sensitivity to infrastructure in Europe

DOT NET

  • Hotel’s online booking segmentation for heterogenous customers
  • Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
  • Transaction authorization from Know Your Customer (KYC) information in online banking
  • The selection of the corporate information system for innovative project management tasks
  • PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
  • Cloud Provider Selection Models for Cloud Storage Services to Meet Availability Requirements
  • Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
  • Implementing Secure E-Mail on the Open Internet with MailTrust
  • Secure and Dependable storage services in cloud Computing
  • New fractal features and data mining to determine food quality based on MRI
  • Mining Twitter Data for a More Responsive Software Engineering Process
  • A Systematic Review on Educational Data Mining
  • Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data
  • The Application of Data Mining Technology to Big Data
  • Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys
  • Mining Human Activity Patterns From Smart Home Big Data for Health Care Applications
  • Application of data mining technology to optimize the city transport network
  • Using IoT technology to improve online education through data mining
  • Application of educational data mining on analysis of students’ online learning behaviour
  • Analysis of road traffic fatal accidents using data mining techniques
  • SeDaSC: Secure Data Sharing in Clouds
  • ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability

JAVA

  • A robust and secure authentication mechanism in online banking
  • Security and accountability for sharing the data stored in the cloud
  • Web-based ranking signature using cluster retrieval similarity
  • Architecture-oriented design method for smart tourism innovative service systems
  • Semantic based trust recommendation system for social networks using virtual groups
  • The Selection of the Corporate Information System for Innovative Project Management Tasks
  • My Privacy My Decision: Control of Photo Sharing on Online Social Networks
  • Decision tree based rules for entity identification
  • Considerations on the functions and importance of a web crawler
  • Topic summaresation on tweets
  • SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces
  • Efficient joint encryption and data hiding algorithm for medical images security
  • A novel approach for data retrieval using watermark technique
  • Secure data transmission through reversible data hiding
  • A survey on duplicate record detection in real world data
  • Personalization and privacy in profile-based web search
  • Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
  • A survey on customer relationship management
  • Tenants Attested Trusted Cloud Service
  • An enhanced approach for securing authorized deduplication in hybrid cloud
  • NFC4Sure: Mobile ticketing system
  • Virtualization technologies in web conferencing systems: A performance overview
  • On the fog of RSA key lengths: Verifying public key cryptography strength recommendations
  • Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
  • Anonymous authentication for secure data stored on cloud with decentralized access control
  • Implementing the Required Degree of Multitenancy Isolation: A Case Study of Cloud-Hosted Bug Tracking System
  • Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers
  • Enabling re-executable workflows with near-realtime visualization, provenance capture and advanced querying for mass spectrometry data
  • Hazardous cargo information management via the flight object
  • Enhanced IoT-Aware Online Shopping System
  • Crime file system
  • A framework for modelling population registration and national identification system
  • Student performance analysis using clustering algorithm
  • User specific product recommendation and rating system by performing sentiment analysis on product reviews
  • A Fairness-Aware and Privacy-Preserving Online Insurance Application System
  • Tackling cruising for parking with an online system of curb parking space reservations
  • Traffic Violation Management Web Application with Online Tracking and Fine Payment
  • Investigation of the revenue management practices of accommodation establishments in Turkey: An exploratory study
  • Exploring the role of telemedicine in improving access to healthcare services by women and girls in rural Nepal
  • Key success factors in establishing end-of-life vehicle management system: A primer for Malaysia