Public projects map

Browse by

Programming Language

Projects in category

Project name Short description Categories Creation Date
fslchain fslchain API's manifest chain code
Not categorized
2024-04-30 15:55
ftpindea ftpindea project
Not categorized
2019-01-29 15:39
gallantry awards gallantry awards
Not categorized
2021-01-12 13:19
GallantryAwards GallantryAwards
Not categorized
2021-02-11 14:57
GallantryAwardsNative GallantryAwardsNative
Not categorized
2021-06-09 14:30
Gallantry_Award GallantryAward
Not categorized
2021-02-01 11:40
GAMAN Version 2.0 This project aims to reduce the amount of road accidents on the traffic by creating an awareness to the Driver.
Not categorized
2018-04-15 20:38
Gap analysis and identification Gap analysis and identification of new projects on public schemes & projects.
Not categorized
2016-11-16 11:42
Garbo It is made as a part of open data gov hack phase 2.
Not categorized
2018-04-15 18:08
Garuda Garuda project and task management
Not categorized
2023-05-23 11:47
Gauseva Android app source code of Gauseva UP project
Not categorized
2019-10-10 16:49
GAUTAM KUMAR GAUTAM Respected sir, I Biggest request you i am Gautam kumar gautam. I need a job. i am Belong to a middle class family .
Not categorized
2017-11-13 11:33
Gazetted Entitlement Management Software GEMS for Ags Office
Not categorized
2017-08-10 17:40
GCCS 2017 Web Potal Repository for GCCS 2017 web portal 2017-09-11 12:57
GCCS-Aggies Developed detection algorithm to detect cyber attacks on ICS, and presented proof of concept.
Not categorized
2017-11-22 01:14
GCCS-anonymous To increase reachabilty of digital awareness.
Not categorized
2017-11-11 12:58
GCCS-ATM CARD HIJACKER .test
Not categorized
2017-11-10 17:04
GCCS-CARD TEST ----
Not categorized
2017-11-11 12:18
GCCS-CHANDIGARH- We address the frauds do by malicious person by pretending himself as an bank employee and threaten peoples to aces the account details along with OTP and do the illegal transactions. In all such frauds one thing is common that the device which verifies the OTP is different from the device which receives the OTP. Using this we deduce three solutions which prevents illegal transactions even after knowing of the OTP. 2017-11-11 14:14
GCCS-CHANDIGARH-SPIDER-P3 For IoT security at physical level like hardware key is necessary insted of network or transfer layer security. 2017-11-12 20:40
821840 of 2588