0% found this document useful (0 votes)
19 views

Python Major EDITED

Python syllabus on major

Uploaded by

dont subscribe
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Python Major EDITED

Python syllabus on major

Uploaded by

dont subscribe
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Erstwhile TCSiON Training Partner

SL.NO PYTHON TITLE LIST


CRIME TYPE AND OCCURRENCE PREDICTION USING MACHINE LEARNING
1

2 DETECTING WEB ATTACKS WITH END-TO-END DEEP LEARNING

DETECTING BOTNET ATTACKS IN IOT ENVIRONMENTS: AN OPTIMIZED MACHINE LEARNING


3
APPROACH

4 CURRENCYMASTER: YOUR ALL-IN-ONE CURRENCY CONVERTER

5 DISTRIBUTED AND PRIVACY PRESERVING GRAPH DATA COLLECTION IN INTERNET OF THING SYSTEMS

POLICE COMPLAINT MANAGEMENT SYSTEM


6

7 EXAM INVIGILATION DUTY

DEEP LEARNING TECHNIQUES BASED PREDICTING CREDIT DEFAULT/PREDICTING BANK LOAN


8
DEFAULTS
BLOCKCHAIN BASED EVENT DETECTION AND TRUST VERIFICATION USING NATURAL LANGUAGE
9
PROCESSING & MACHINE LEARNING

10 PRIVACY PRESERVING AND SECURE MACHINE LEARNING

11 A SPARK BASED BIG DATA ANALYTICS FRAMEWORK FOR COMPETITIVE INTELLIGENCE

12 SECURING DATA IN THE IMAGE USING SHA & ECC

13 BLOCKCHAIN ENABLED FOG RESOURCES ACCESS AND GRANTING

14 ANALYSING TOURIST BEHAVIOUR USING BIG DATA TECHNOLOGY

IPFS BASED FILE STORAGE ACCESS CONTROL AND AUTHENTICATION MODEL FOR SECURE DATA
15
TRANSFER USING BLOCKCHAIN TECHNIQUE
DETECTION OF PCB SURFACE DEFECTS WITH IMPROVED FASTER-RCNN AND FEATURE PYRAMID
16
NETWORK

17 MOBILE EDGE COMPUTING TARGETED TASK OFFLOADING BASED ON LOAD BALANCING CONCEPT

18 AL POWERED SERVER LOG MANAGEMENT SOFTWARE

STREAMLINING CREDENTIAL VERIFICATION FOR HIRING PROCESSES WITH BLOCKCHAIN


19
TECHNOLOGY

20 TWO FACTOR WORM DETECTION BASED ON SIGNATURE & ANOMALY

SENSITIVE ATTRIBUTE PRIVACY PRESERVATION OF TRAJECTORY DATA PUBLISHING BASED ON


21
L‑DIVERSITY
22 A NOVEL APPROACH TO DETECT COPY MOVE FORGERY USING DEEP LEARNING
NATURE-BASED PREDICTION MODEL OF BUG REPORTS BASED ON ENSEMBLE MACHINE LEARNING
23 MODEL

24 BLOCKCHAIN TRACEABILITY FOR SUSTAINABLE AGRICULTURE

25 CONTROLLABLE IMAGE SYNTHESIS WITH ATTRIBUTE-DECOMPOSED GAN

HIMAYATHNAGAR: #205, Sagar View Complex, Opp. GHMC Office. Ph: 9666607505.
DILSUKHNAGAR: 1st Floor, Above Airtel Office, Near Metro Pillar No. MSBNP-28. Ph: 9291430931.
Erstwhile TCSiON Training Partner

SL.NO PYTHON TITLE LIST


26 MACHINE LEARNING BASED DESIGN PATTERNS PREDICTION

27 CHILDREN ADHD DISEASE DETECTION USING POSE ESTIMATION TECHNIQUE

28 CLASSIFICATION OF PESTS USING COMPUTER VISION CNN ALGORITHM

FINSENTIX: CONTEXTUAL ENRICHMENT IN FINANCIAL SCRIPT THROUGH SENTIMENT AND TERM


29
EXTRACTION

30 FUTURE OF LOAN APPROVALS WITH EXPLAINABLE AI

CLASSIFICATION OF DIABETIC RETINOPATHY DISEASE LEVELS BY EXTRACTING TOPOLOGICAL


31
FEATURES USING GRAPH NEURAL NETWORKS

32 SECURE COMMUNICATION USING DIFFIEHELLMAN KEY EXCHANGE, AES & SHA FOR DATA INTEGRITY

A MORPHOLOGICAL APPROACH TO TEXT STRING EXTRACTION FROM REGULAR PERIODIC


33
OVERLAPPING TEXT/BACKGROUND IMAGES

34 TRAFFIC LIGHTS DETECTION AND CLASSIFICATION USING RESNET50

35 IOT BASED SMART IRRIGATION SYSTEM USING REINFORCEMENT LEARNING

36 CRIME DATA ANALYSIS

PAACDA: COMPREHENSIVE DATA CORRUPTION DETECTION ALGORITHM


37

QUANTUM SECURE EMAIL CLIENT APPLICATION


38

AUTHORSHIP ATTRIBUTION USING DEEP LEARNING


39

REMAINING SHELF-LIFE ESTIMATION OF FRESH FRUITS AND VEGETABLES DURING TRANSPORTATION


40

41 PREDICTING HOURLY BOARDING DEMAND OF BUS PASSENGERS USING IMBALANCED RECORDS

42 RMT-NET REJECT-AWARE MULTI-TASK NETWORK FOR MODELING MISSING-NOT-AT-RANDOM DATA

43 NET FENSE: ADVERSARIAL DEFENSES AGAINST PRIVACY ATTACKS ON NEURAL NETWORKS FOR GRAPH
DATA
44 OPTIMAL AMBULANCE POSITIONING FOR ROAD ACCIDENTS WITH DEEP EMBEDDED CLUSTERING

PERSONALIZED FEDERATED LEARNING FOR IN-HOSPITAL MORTALITY PREDICTION OF MULTI-CENTER


45
ICU
LANGUAGE IDENTIFICATION FOR MULTILINGUAL MACHINE TRANSLATION
46

47 AN EFFICIENT PRIVACY-ENHANCING CROSS-SILO FEDERATED LEARNING AND APPLICATIONS

48 DATAFITS A HETEROGENEOUS DATA FUSION FRAMEWORK FOR TRAFFIC AND INCIDENT PREDICTION

49 FRAUDAUDITOR A VISUAL ANALYTICS APPROACH FOR COLLUSIVE FRAUD IN HEALTH INSURANCE

50 A NOVEL APPROACH FOR DISASTER VICTIM DETECTION UNDER DEBRIS ENVIRONMENTS

HIMAYATHNAGAR: #205, Sagar View Complex, Opp. GHMC Office. Ph: 9666607505.
DILSUKHNAGAR: 1st Floor, Above Airtel Office, Near Metro Pillar No. MSBNP-28. Ph: 9291430931.
Erstwhile TCSiON Training Partner

SL.NO PYTHON TITLE LIST


51 DATA AUGMENTATION WITH PGGAN & MULTICLASS CLASSIFICATION WITH VGG16

PUPILHEART HEART RATE VARIABILITY MONITORING VIA PUPILLARY FLUCTUATIONS ON MOBILE


52
DEVICES

53 PROPOUNDING FIRST ARTIFICIAL INTELLIGENCE APPROACH FOR PREDICTING ROBBERY BEHAVIOR

54 PHIKITA PHISHING KIT ATTACKS DATASET FOR PHISHING WEBSITES IDENTIFICATION FELIPE

55 EFFECTIVE SOFTWARE EFFORT ESTIMATION LEVERAGING MACHINE LEARNING

MOVIE RECOMMENDATION
56

57 IDENTIFYING ALCOHOL-RELATED INFORMATION FROM UNSTRUCTURED BILINGUAL CLINICAL NOTES

58 PHISHCATCHER CLIENT-SIDE DEFENSE AGAINST WEB SPOOFING ATTACKS USING MACHINE LEARNING

59 FIGHTING MONEY LAUNDERING WITH STATISTICS AND ML

60 A NOVEL APPROACH TO IMPROVE SOFTWARE DEFECT PREDICTION USING ML

61 DEEPSIDE A DEEP LEARNING FRAMEWORK FOR DRUG SIDE EFFECT PREDICTION

IDENTIFYING HOT TOPIC TRENDS IN STREAMING TEXT DATA USING SEQUENTIAL EVALUATION MODEL
62
BASED ON DISTRIBUTION

63 CAMPUS ABNORMAL BEHAVIOUR RECOGNITION WITH TEMPORAL SEGMENT TRANSFORMERS

64 HEART-DISEASE-PREDICTION-SYSTEM

BLOCKCHAIN BASED FEDERATED LEARNING WITH SMPC MODEL VERIFICATION AGAINST POISONING
65
ATTACK
66 DISEASE DIAGNOSIS CHATBOT

67 SECURE CARPOOLING SERVICES BASED ON A CONSORTIUM BLOCKCHAIN

68 SECURE SHARING OF IDENTITY (KYC)

HIMAYATHNAGAR: #205, Sagar View Complex, Opp. GHMC Office. Ph: 9666607505.
DILSUKHNAGAR: 1st Floor, Above Airtel Office, Near Metro Pillar No. MSBNP-28. Ph: 9291430931.

You might also like