Search Constraints

Search Results

  • Tt44pn234?file=thumbnail
    Rajguru, Aniruddha Shekhar
    Over the years, data privacy has been a major concern amongst consumers. Applications such as Facebook, Uber, and Instagram collect a huge amount of data from users in return for the free service. Some of this data collection is necessary for the serv . . .
  • 7h149q29s?file=thumbnail
    Luman, Rijul
    Since the rise of internet and e-commerce, buying and selling goods over the internet has relied heavily on financial institutions acting as 3rd parties to process financial transactions. These 3rd parties often charge a good percentage of the payment . . .
  • 2f75r844w?file=thumbnail
    Kollu, Sindhu
    In modern economic times, everyone wants to save their money and keep expenses with in their budget limit. But, due to our busy schedules in our day to day life, we may lose track of our expenses and end up overspending which leads to debts. In this p . . .
  • F1881m35f?file=thumbnail
    Jain, Anshul
    Indoor localization has become one of the most talked about services in today’s technology. We have observed that there have been huge demand of Indoor Location services due to increase in smartphone market in last few years. GPS is widely used to fin . . .
  • Wp988k17c?file=thumbnail
    Devarakonda, Divya Sindhuri
    USA has been grappling with crime for decades now and had made significant improvement. However, crime remains to be one of the core societal problems. To build a safer society, we need to take advantage of 21st century’s technology. With current tech . . .
  • K35694820?file=thumbnail
    Poon, Dennis Yiuwing
    Refactoring is a process used by programmers to improve the non-functional qualities of code. It does not affect the actual output of the program, but it is useful for making the code easier to read and maintain. In practice, it often requires a lot o . . .
  • J9602102w?file=thumbnail
    Shah, Jinaliben
    Active database systems support applications by moving the reactive behavior from applications into database management systems. It is a database system that includes an event-driven architecture that can respond to different types of events automatic . . .
  • 73666490x?file=thumbnail
    Palanisamy, Sharmila
    A stochastic prediction modeling method such as Hidden Markov Model (HMM) is a complex system. The HMM is suitable to analyze and predict time-dependent phenomena and has been widely used in applications such as speech recognition, weather and stock m . . .
  • M326m2061?file=thumbnail
    Shenoy, Shweta
    Security and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords are a typical example in which usability, psychology, and security meet. Absurd password rules fo . . .
  • Jq085k40f?file=thumbnail
    Pinto, Rodney
    One of the most critical resources that ensure the current working of the internet is the domain name system (DNS). It is a decentralized, hierarchical naming system that is responsible for translating the human-readable domain name to its associated . . .
  • 8s45q927v?file=thumbnail
    Bavishi, Ujaliben Kalpesh
    This project is focusing on creating a chatbot to be used by students to get their queries responded easily from the college website. The College Enquiry Chatbot has the capacity to make friendly conversations; respond the course and faculty details; . . .
  • B5644r94c?file=thumbnail
    Shojaei, Radoyeh
    The Sequential Ordering Problem (SOP) is a combinatorial optimization problem. Given a directed weighted graph and an unweighted directed graph representing precedence constraints among vertices, find a minimum-cost Hamiltonian path that satisfies the . . .
  • Rf55z813d?file=thumbnail
    Singh, Shweta Amarjeet
    One of the biggest innovations recently in the field of computer science is cryptocurrencies and Blockchain is at the heart of it. Cryptocurrency is one use case of blockchain and there can be many more. Blockchain is an incorruptible digital ledger o . . .
  • Hd76s035z?file=thumbnail
    Narendra, Pragathi
    The diagnosis of a disease is the most critical and vital job in medicine and it mostly depends on a doctor’s intuition based on past experiences. The unfortunate case of recognizing the incorrect symptoms results in a misdiagnosis. To avoid such medi . . .
  • 2j62s530s?file=thumbnail
    Bibodi, Jay Nikhil
    This system will eliminate the need for common platforms to publish pod-cast. The methods create a new ERC-20 token named as 'Pods.' Users will have an ability to create an account and get some specific number of tokens (that is, Pods) as joining bonu . . .
  • V405s975q?file=thumbnail
    Suryavanshi, Rajani Mohan
    Defending today’s enterprise network has become more and more challenging considering the increasing amount of cyber-attacks. It is critical to understand how an attack happens and how the intrusion propagates inside the enterprise network. System Obj . . .
  • 5h73pw50c?file=thumbnail
    Singh, Aditya
    Nowadays it is very widespread to see attacks in the system. The attackers try automated tools and programs to attempt and gain access to the data of the users. However, for attackers, it is hard to boycott system calls. System calls are used by the u . . .
  • Tb09j607p?file=thumbnail
    Raja Lemarji, Godson Miller
    Students in a university tends to have various resources to trade. Trading has become an essential thing in our day-today life. In this project, I would like to recall barter system which is one of the oldest method of exchange. This has been used bef . . .
  • Bc386j677?file=thumbnail
    Ghonsikar, Kasturi Kiran
    Today with fast growing technology and increasing computing needs, industry is opting for deploying and using cloud to fulfill their extensive computing requirements. Deployment of cloud is a lengthy and convoluted process. Manual installation of clou . . .
  • Dr26xx72f?file=thumbnail
    Gampa, Ravali
    This work presents a visual analytical tool, to assist instructors of introductory computer science courses to manage students’ learning. The first half of this project is an investigation on various visualization tools which inspired the motivation a . . .