Search Constraints

Search Results

  • Tt44pn234?file=thumbnail
    Project
    Rajguru, Aniruddha Shekhar
    Over the years, data privacy has been a major concern amongst consumers. Applications such as Facebook, Uber, and Instagram collect a huge amount of data from users in return for the free service. Some of this data collection is necessary for the serv . . .
  • 7h149q29s?file=thumbnail
    Project
    Luman, Rijul
    Since the rise of internet and e-commerce, buying and selling goods over the internet has relied heavily on financial institutions acting as 3rd parties to process financial transactions. These 3rd parties often charge a good percentage of the payment . . .
  • 2f75r844w?file=thumbnail
    Project
    Kollu, Sindhu
    In modern economic times, everyone wants to save their money and keep expenses with in their budget limit. But, due to our busy schedules in our day to day life, we may lose track of our expenses and end up overspending which leads to debts. In this p . . .
  • F1881m35f?file=thumbnail
    Project
    Jain, Anshul
    Indoor localization has become one of the most talked about services in today’s technology. We have observed that there have been huge demand of Indoor Location services due to increase in smartphone market in last few years. GPS is widely used to fin . . .
  • Wp988k17c?file=thumbnail
    Project
    Devarakonda, Divya Sindhuri
    USA has been grappling with crime for decades now and had made significant improvement. However, crime remains to be one of the core societal problems. To build a safer society, we need to take advantage of 21st century’s technology. With current tech . . .
  • K35694820?file=thumbnail
    Project
    Poon, Dennis Yiuwing
    Refactoring is a process used by programmers to improve the non-functional qualities of code. It does not affect the actual output of the program, but it is useful for making the code easier to read and maintain. In practice, it often requires a lot o . . .
  • J9602102w?file=thumbnail
    Project
    Shah, Jinaliben
    Active database systems support applications by moving the reactive behavior from applications into database management systems. It is a database system that includes an event-driven architecture that can respond to different types of events automatic . . .
  • 73666490x?file=thumbnail
    Project
    Palanisamy, Sharmila
    A stochastic prediction modeling method such as Hidden Markov Model (HMM) is a complex system. The HMM is suitable to analyze and predict time-dependent phenomena and has been widely used in applications such as speech recognition, weather and stock m . . .
  • M326m2061?file=thumbnail
    Project
    Shenoy, Shweta
    Security and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords are a typical example in which usability, psychology, and security meet. Absurd password rules fo . . .
  • Jq085k40f?file=thumbnail
    Project
    Pinto, Rodney
    One of the most critical resources that ensure the current working of the internet is the domain name system (DNS). It is a decentralized, hierarchical naming system that is responsible for translating the human-readable domain name to its associated . . .
  • 8s45q927v?file=thumbnail
    Project
    Bavishi, Ujaliben Kalpesh
    This project is focusing on creating a chatbot to be used by students to get their queries responded easily from the college website. The College Enquiry Chatbot has the capacity to make friendly conversations; respond the course and faculty details; . . .
  • B5644r94c?file=thumbnail
    Project
    Shojaei, Radoyeh
    The Sequential Ordering Problem (SOP) is a combinatorial optimization problem. Given a directed weighted graph and an unweighted directed graph representing precedence constraints among vertices, find a minimum-cost Hamiltonian path that satisfies the . . .
  • Rf55z813d?file=thumbnail
    Project
    Singh, Shweta Amarjeet
    One of the biggest innovations recently in the field of computer science is cryptocurrencies and Blockchain is at the heart of it. Cryptocurrency is one use case of blockchain and there can be many more. Blockchain is an incorruptible digital ledger o . . .
  • Hd76s035z?file=thumbnail
    Project
    Narendra, Pragathi
    The diagnosis of a disease is the most critical and vital job in medicine and it mostly depends on a doctor’s intuition based on past experiences. The unfortunate case of recognizing the incorrect symptoms results in a misdiagnosis. To avoid such medi . . .
  • 2j62s530s?file=thumbnail
    Project
    Bibodi, Jay Nikhil
    This system will eliminate the need for common platforms to publish pod-cast. The methods create a new ERC-20 token named as 'Pods.' Users will have an ability to create an account and get some specific number of tokens (that is, Pods) as joining bonu . . .
  • V405s975q?file=thumbnail
    Project
    Suryavanshi, Rajani Mohan
    Defending today’s enterprise network has become more and more challenging considering the increasing amount of cyber-attacks. It is critical to understand how an attack happens and how the intrusion propagates inside the enterprise network. System Obj . . .
  • 5h73pw50c?file=thumbnail
    Project
    Singh, Aditya
    Nowadays it is very widespread to see attacks in the system. The attackers try automated tools and programs to attempt and gain access to the data of the users. However, for attackers, it is hard to boycott system calls. System calls are used by the u . . .
  • Tb09j607p?file=thumbnail
    Project
    Raja Lemarji, Godson Miller
    Students in a university tends to have various resources to trade. Trading has become an essential thing in our day-today life. In this project, I would like to recall barter system which is one of the oldest method of exchange. This has been used bef . . .
  • Bc386j677?file=thumbnail
    Project
    Ghonsikar, Kasturi Kiran
    Today with fast growing technology and increasing computing needs, industry is opting for deploying and using cloud to fulfill their extensive computing requirements. Deployment of cloud is a lengthy and convoluted process. Manual installation of clou . . .
  • Dr26xx72f?file=thumbnail
    Project
    Gampa, Ravali
    This work presents a visual analytical tool, to assist instructors of introductory computer science courses to manage students’ learning. The first half of this project is an investigation on various visualization tools which inspired the motivation a . . .
  • Cf95jb83g?file=thumbnail
    Project
    Shegakula Nagaraj, Sumukha
    In this generation, when an entrepreneur wants to bring his ideas to life he will start searching for funds. There are people around the globe who have small amounts of money that they can invest in ideas that might grow bigger or solve problems faced . . .
  • 3x816n03q?file=thumbnail
    Project
    Kaja, Krishna Chaitanya
    Extensible Access Control Markup Language (XACML) is an access control policy language. Typically, an XACML policy has configurable standard extension points to define new functions, data types and the ways to combine them as a single unit. With this . . .
  • X059c764k?file=thumbnail
    Project
    Ladde, Bhushan Arun
    The PC2 Contest Control System provides for the ability of teams in a programming contest to submit runs – that is, programs which are attempts at solving a contest problem specified by the contest judges. In Version 10 (V10) of PC2, runs are submitte . . .
  • Xw42n8281?file=thumbnail
    Project
    Mitra, Karan
    Information-based systems have allowed researchers from all aspects of sciences to study their data better. Environmental studies is one such area where timely and accurate data is critical for research and development of the science. The energy-water . . .
  • Fx719m76s?file=thumbnail
    Project
    Babhulkar, Aditya
    Self-driving cars has become a trending subject with a significant improvement in the technologies in the last decade. The project purpose is to train a neural network to drive an autonomous car agent on the tracks of Udacity’s Car Simulator environme . . .
  • Dn39x186q?file=thumbnail
    Project
    Deo, Sudarshan
    This project collects several experiments in Deep Learning Convolutional Neural Network for Image predictions. It makes use of Google TensorFlow and TFlearn Deep Learning libraries for computations, training, and testing of images. The project is deve . . .
  • Dr26xx715?file=thumbnail
    Project
    An, Dong
    The purpose of this project is to learn about OpenStack Cloud infrastructure-as-aService Platform (IaaS) through manual installation of core OpenStack cloud services and to create an automated cloud deployment script using BASH shell scripting. The pr . . .
  • 12579s505?file=thumbnail
    Project
    Kalyanaraman, Saranya
    These days, most software companies work on complex projects that require a collaboration of multiple people across many geographic locations. Managers in such companies are responsible for integrating many complex projects while maintaining high accu . . .
  • Js956g19d?file=thumbnail
    Project
    Vellore Ramesh, Ramya
    For any statistical study, from predicting the winner of an election, to governing the health statistics, a huge amount of real time data is necessary. Twitter data is extensively used in recent times for such statistical studies. The speed at which n . . .
  • M900nt80d?file=thumbnail
    Project
    Tiptur Ravindra, Thrilok
    3D graphics programming is generally done using libraries such as OpenGL, DirectX and Vulkan. Some effects such as lighting, reflection have well defined approaches, however simulating water is known to be a little difficult to achieve. This project o . . .
  • Fn106z26t?file=thumbnail
    Project
    Vadlamannati Lakshmi, Venkata Sai Raja Bharath
    A graph database presents data and the relationship among data based on the graph model. Graph Databases uses graph structures for semantic queries with nodes, edges, and properties. A graph database has two defining elements: 1) Node, which represent . . .
  • M900nt79n?file=thumbnail
    Project
    Wani, Gaurav Dilip
    In 21st century it has become a norm that companies are using virtual assistants such as Siri, Google assistant or Alexa to resolve many problems faced by customers. These technologies are empowered by using natural language processing and are good at . . .
  • 7d278t34d?file=thumbnail
    Project
    Shiroor, Shekhar Vikas
    This project to implements a generalized neural network agent that plays different video games using reinforcement learning algorithm. This project uses OpenAIs simulated video game environment ‘gym’ for training and testing the proposed reinforcement . . .
  • D791sg633?file=thumbnail
    Project
    Muriki, Satya Tejaswi
    Online reviews are highly influential, with consumers preferring the advice of other consumers rather than information provided through advertisements. Hence, review consistency and trustworthiness became an urgent need and a necessity for both indivi . . .
  • 9k41zd85n?file=thumbnail
    Project
    Poosarla, Akshay
    Skeletal bone age assessment is a common clinical practice to analyze and assess the biological maturity of pediatric patients. This process generally involves taking X-ray of the left hand, along with fingers and wrist, then followed by image analysi . . .
  • 1n79h466t?file=thumbnail
    Project
    Rawlani, Bhagyashree
    Convolutional neural networks are generally assumed to be the best neural networks for classifying images. In November 2017, Geoffrey Hinton et al. introduced another neural network approach known as Capsule Network. He and his team have claimed that . . .
  • 41687h85j?file=thumbnail
    Project
    Natesh, Adarsh
    In this work, we present a novel visual analytical tool, intended to improve the Facebook experience which produces an interactive visual analytic presentation of a user’s newsfeed to help understand bias trends existing among the user’s social group. . . .
  • Work
    Project
    Minton, Suzanne Louise
    Statement of Problem The problem of missing data in statistical analysis is one that the field of social research has failed to adequately address despite its potential to significantly affect results and subsequent substantive conclusions. The purpos . . .
  • Work
    Project
    Onitsuka, Lynne Midori
    The purpose of this project is to develop a data analysis tool for assessment. There are three tiers of users: public, data entry, and faculty. The public can view non-sensitive assessment information. In addition to accessing public information, the . . .
  • Work
    Project
    Norton, Ryan Joseph
    Self-splitting neural networks provide a new method for solving complex problems by using multiple neural networks in a divide-and-conquer approach to reduce the domain space each network must solve. However, choosing optimal points for splitting the . . .
  • Work
    Project
    Manjunath Leelavathi, Jyothi
    In this project, I am planning to develop a plug in module that can be integrated into the web based application. The aim of this application is to provide email-services, calendar services and chat services dynamically within the browser. I am respon . . .
  • Work
    Project
    Lavender, Brian Eugene
    netGA takes networking theory and artificial intelligence theory and combines them together to form an attack detection system. netGA is an implementation of the method proposed by the paper titled A Software Implementation of a Genetic Algorithm Base . . .
  • Work
    Project
    Wadhwani, Hitesh
    The intent of this project is to explore the tracking capabilities of V1KU a neural network system. V1KU is a product by General Vision Company that comprises of CogniMem neural network chip for real-time image learning and CogniSight image recognitio . . .
  • Work
    Project
    Jadia, Neel
    This project provides an overview into the life cycle of a cable modem. It demonstrates the initialization stages a cable modem would pass through. Once self-initialization of a cable modem is complete, it comes online. This project discusses the stat . . .
  • Work
    Project
    Veerappan, Sangeetha
    Databases based on relational models support crisp and precise data. In the real world scenario, there exists a lot of uncertainty and imprecise information. Fuzzy logic breaks the rigid crisp logic boundaries and allows decisions to be taken in a mor . . .
  • Work
    Project
    Patel, Kamleshkumar
    The central component of any operating system is the Memory Management Unit (MMU). As the name implies, memory-management facilities are responsible for the management of memory resources available on a machine. Virtual memory (VM) in MMU allows a pro . . .
  • Work
    Project
    Song, Chunhui
    SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by submitting malicious SQL query segments to change the intended application-generated SQL . . .
  • Work
    Project
    Bandara, Hennayake M.
    Nowadays database management systems are the most crucial factors in managing and storing the data. Security enforcement in a database is very important to assure that the data stored is properly secured. Most of the database management systems are oc . . .
  • Work
    Project
    Vasireddy, Jaipaul
    The goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for . . .
  • Work
    Project
    Krishna, Chetan
    Truck Data Warehouse (TDW) System is a web-based application developed at the California State University Sacramento for the California Department of Transportation (Caltrans). The TDW System allows Caltrans to use this web-based application system to . . .
  • Work
    Project
    Lakkaraju, Venkata
    A cyber defense competition is a competition where teams compete and learn how to defend and maintain computer security. The competition provides ground to learn the real time scenarios like defending security loopholes and adding new software or serv . . .
  • Work
    Project
    Bartholomew, Dylan
    The intent of this project is to explore whether the Two Dimensional Chunk Extraction algorithm for the Self-Splitting Modular Neural Network is more effective than the original algorithm. This experiment uses the same data and compares the results of . . .
  • Work
    Project
    Nanjaiah, Shashi Kumar
    The multi-core era brings new challenges to the programming community. Parallelization requirements of applications in mainstream computing and applications in emergent fields of high performance computing, such as informatics, must be explored. With . . .
  • Work
    Project
    Pandya, Kunal
    Student transcripts are a critical component of admission, transfer credit processing, and graduation processing. The majority of transcripts come into the University in paper form through multiple points of entry and are processed in multiple areas d . . .
  • Work
    Project
    Gorla, Sharone
    “Combination of cryptography and Steganography for secure communication” is an application, which combines both Cryptography methods (i.e. Encryption, decryption) and Steganography techniques to make the communication more secure. The outcome of this . . .
  • Work
    Project
    Vora, Komil B.
    It is usually observed that small to medium sized organization with many assets do not have a have a reliable and efficient system for tracking orders, their usage within along with inventory of supplies, equipment and assets. As a result, often there . . .
  • Work
    Project
    Palasamudram Ramesh, Balaji
    BPEL stands for Business Process Execution Language; it is a standard executable language for specifying interactions with web-services. “BPEL is [1] essentially a workflow graph that describes interactions between various web services, dependencies a . . .
  • Work
    Project
    Muralidharan, Mukundan
    Sharing of information is done in many ways and one such way is the online mock tests. The online practice tests are the model tests that are designed exactly like the online competitive exams. This will help people who are preparing to ace competitiv . . .
  • Work
    Project
    Veeramachaneni, Kalyana Valli
    In today’s environment, people operate in a hectic environment than ever before. For Lawyers and certain practices, the ability to do online scheduling of appointments may work well. Hence, a web-based scheduling calendar is developed for all the empl . . .
  • Work
    Project
    Wangnoo, Samit
    The intent of the project is to study the MySQL design limitations and tradeoffs; and produce a solution of how to tackle these limitations and tradeoffs. Thereby improving the efficiency of the MySQL queries and making the system fast. The goal of th . . .
  • Work
    Project
    Chittimalli, Vijaya Lakshmi
    Steganography is the art of hiding messages inside an image file/Audio file or a Video file such that the very existence of the message is unknown to third party. Cryptography is used to encrypt the data so that it is unreadable by a third party. Keep . . .
  • Work
    Project
    Gujjar, Krishna Deepak
    Today there are several different databases systems in the market and many organizations work with multiple databases, heterogeneous in nature. Each of these systems store data and have applications running with them. In such a scenario there are inst . . .
  • Work
    Project
    George, Nixon Sunny
    Formal languages use mathematical notations to capture the software specifications precisely. Design by Contract is a technique used during software implementation to ensure that the software conforms to the specifications. However, there is a semanti . . .
  • Work
    Project
    Gautam, Abhimanyu
    This report is the written document of the Master Project I have completed for my Masters Degree at CSUS. This report will help future CSUS students pursuing their masters to get valuable knowledge about the report writing. Also this report will provi . . .
  • Work
    Project
    Khoja, Ashif
    The business of software development and maintenance has become increasingly competitive. Software projects need to be cost-effective and provide high-quality products to compete in today's market. Today's software applications are very complex and so . . .
  • Work
    Project
    Thakkar, Ravi
    Hundreds of landslides are mobilized along highway corridors that can affect public safety as well as the trip quality, reliability and maintenance cost of the transportation network. Caltrans GeoResearch Group pioneered the project to identify the la . . .
  • Work
    Project
    Anumakonda, Ashwin
    The Defense Information provides expert analysis on various areas like National security, International security and Defense policy. This Information promotes wide-range of discussions and debate on security issues such as nuclear weapons, space secur . . .
  • Work
    Project
    Jadhav, Pramukh Narayan Rao
    To utilize the vast number of resources like multi-processors and large amount of memory that are available with the new age computers, Oracle has come out with Oracle Parallel Execution that enables to enhance the performance of queries by reducing t . . .
  • Work
    Project
    Nakate, Alok Bhaskar
    Training a neural network with backpropagation algorithm is a systematic process to model a set of given data. This training process involves, among other things, scaling the input and output datasets provided to the neural network. The reason that th . . .
  • Work
    Project
    Mukkamala, Rohan
    Smart Grid is the modernization of the existing power grid, which utilizes the digital technology for the two-way exchange of information and electricity between the utilities and consumers. It requires a ‘communication overlay’ network, which facilit . . .
  • Work
    Project
    Varma, Navin Krishna
    This project involves building a lightweight, robust web application for managing the inventory of the College of Engineering & Computer Science. Using progressive enhancement techniques, this project helps managing the lifecycle of equipment: req . . .
  • Work
    Project
    Azad, Vinit
    Due to the prevalent use of internet-enabled devices, confidentiality and privacy in communication has been more important than ever. Encryption algorithms, such as AES and RSA, are used to ensure the security and privacy of such communications. Howev . . .
  • Work
    Project
    Swargam, Vinod
    The purpose of this Project is to develop and implement the enhanced features of Internet Interpreter Scheduling System as mobile application in healthcare domain and made it synchronize with the existing web application as well. This project includes . . .
  • Work
    Project
    Buhacoff, Jonathan
    In client-server environments, clients need a mechanism to determine that a server can be trusted to provide services to the client. Transport layer security (TLS) provides a mechanism to trust the server’s identity by relying on certificates signed b . . .
  • Work
    Project
    Raghavendra, Swetha
    Today there are several ways in which the students and the professors communicate. Some of them are emails, instant messages, blogs, groups, etc. This project involves developing a message center and calendar plug-ins for Professor’s website. The mess . . .
  • Work
    Project
    Dadaga Arkakeerthy, Abhijith
    Effective communication is an important aspect of any technology that involves exchange of information. Smart Grid is one such technology whose success depends on exchange of messages. This project analyses the transport protocols for sending and rece . . .
  • Work
    Project
    Bhatia, Nitin
    Intelligent Intrusion Detection System (IIDS) is a multi-tier enterprise-level Bayesian algorithm based application written in Perl scripting language. A knowledgebased discovery process uses weights added to Snort. rules which Bayesian algorithm proc . . .
  • Work
    Project
    Krishan, Vikram
    Student grade calculation among different subjects is a key part in determining the academic performance of student. Teacher evaluates the student performance grade in a subject on the basis of different elements for example quiz, homework assignments . . .
  • Work
    Project
    Suresh Kumar, Karthik
    Oracle Advanced Queuing (AQ) is a queue management facility for Oracle Databases. Oracle Streams AQ enables user applications to enqueue messages into a queue, ande subsequently dequeued by subscribers or recipients. A queue can contain a message of a . . .
  • Work
    Project
    Wyeth, Andrew Michael
    Designing the software architecture of a system is an important step in creating a system that will meet both the functional and non-functional requirements. Bass, Clements and Kazman in "Software Architecture in Practice" propose a method to use desi . . .
  • Work
    Project
    Asavachivanthornkul, Prakarn
    When electricity demand is peak, utilities and other electric Independent Systems Operators (ISOs) keep electric generators on-line in order to meet the high demand. In some cases, new power plants have to be built. This solution increases costs, wast . . .
  • Work
    Project
    Kankanawadi, Jyoti Manjunath
    Testing has become a major part of any project in IT industry. Testing is done at every phase of SDLC because the cost and risk involved in fixing bugs/ defects will be very high once the project is under production. To make testing more effective and . . .
  • Work
    Project
    Kulkarni, Manashree Laxmikant
    Data warehousing is one of the important approaches for data integration and data preprocessing. The objective of this project is to develop a web-based interactive courseware to help beginning data warehouse designers to reinforce the key concepts of . . .
  • Work
    Project
    Vijayendra, Nithin
    Extract, Transform and Load (ETL) is a fundamental process used to populate a data warehouse. It involves extracting data from various sources, transforming the data according to business requirements and loading them into target data structures. Insi . . .
  • Work
    Project
    Togrikar, Akshaya Vishnu
    In this work a secure photo sharing application has been developed for increasing the privacy of users by empowering them with more controls to protect images than are typically available in other photo sharing applications. The application allows use . . .
  • Work
    Project
    Shams, Yusra
    Computer Forensics involves analysis of a digital artifact to look for evidence associated with an illegal activity. With the growing role of electronic media in our daily lives, most crimes involve the use of electronic media in the process and hence . . .
  • Work
    Project
    Gopalapuram, Rajashekhar
    In this project, I will be propagating the messages between Oracle Server and WebSphere MQ through a Messaging Gateway. When web based business applications communicate, the producer application enqueue messages and the consumer applications dequeue t . . .
  • Work
    Project
    Paranjpe, Mithila
    Demand response programs are used in smart grid to improve stability of the electric grid and to reduce consumption of electricity and costs during peak times. One of the key aspects in demand response programs is for utilities to provide secure infor . . .
  • Work
    Project
    Malpani, Rakhi
    Breast cancer is a cancer that starts in the tissues of the breast. Over the course of a lifetime, 1 in 8 women will be diagnosed with breast cancer. There are existing therapies for treatment of cancer like chemotherapy, radiation therapy, and target . . .
  • Work
    Project
    Patel, Ketul Rajanikant
    Security is an important non-functional requirement for nearly any software system. There should not be any room for security errors in software systems like databases and other critical systems, where data is stored and should be retrieved through au . . .
  • Work
    Project
    Dalwadi, Payal
    This project is an implementation of a software application to provide real-time video chat experience for a user on a local area network (LAN). Generally, chat applications require their users to create detailed profiles before starting to use the ap . . .
  • Work
    Project
    Sheth, Parag
    My project would be to explore Intel’s open source library (for C++), named TBB (Threading Building Blocks), and make its use to analyze performance gain for the implementation of OCB (Offset Codebook). The analysis would begin with identifying the pa . . .
  • Work
    Project
    Prakash Kapai, Deepa
    Databases are fundamental part of managing data. Storing multimedia-based objects like graphics image, videos, audio, etc in databases is a basic need of everyday users. However, storing these objects in the relational databases is not possible becaus . . .
  • Work
    Project
    Aedama, Venkat Sudheer Reddy
    Statement of Problem: Enterprise Job Schedulers and Rule Engines are an expensive class of software. According to an IDC report, the market for job scheduling software licenses in 2009 was 1.5 billion USD. Over the past 25 years, since job schedulers . . .
  • Work
    Project
    Hajiyani, Nadir
    The project is related to “not-for-profits.” These organizations as their name suggest do things for-purpose and don’t have very extensive financial budget for their entire projects. It is expected that they spend most of the money they have towards r . . .
  • Work
    Project
    Gandhi, Maulik M.
    Online Campus Tour Registration Management system is a web site project, which will help prospective, newly admitted students and their family or a member of group, to schedule an individual or group campus tour. Currently there is a campus tour regis . . .
  • Work
    Project
    Ruggles, Adam
    The V1KU is a product by Cognimem Technologies, Inc., which combines a hardware neural network chip, a Micron/Aptina monochrome CMOS sensor (camera) and CogniSight image recognition engine. It is capable of learning the target either by giving it exam . . .
  • Work
    Project
    Meyer, Roger
    Smart meters are typically equipped with a ZigBee wireless interface. ZigBee enables a customer to connect intelligent displays (called In-Home Displays, or IHD) wirelessly to the smart meter to receive real-time energy consumption data. ZigBee gives . . .
  • Work
    Project
    Desai, Tanvi
    The web applications are very popular. There are many users who can log into a system and access, update, or delete the information. In traditional approach, users are recognized by the username and password provided to gain access, which were stored . . .
  • Work
    Project
    Chintala, Uday Kanth
    The purpose of CDSER is to improve the software productivity and quality. As the software plays an important role in businesses and various fields, mining the software data and analyzing it later on by the experts will help in prediction and improveme . . .