Search Constraints
Search Results
-
ProjectRawat, AnandSocial networks are the hub of social interactions in today’s world and conversations are a treasure trove of sentiments on these platforms. Currently, to the best of our knowledge, there is no system in place in any of the social networking platforms . . .
-
ProjectColson, Michael BradleyOne of the main responsibilities of an Operating System (OS) is to ensure system stability and security. Most OSes utilize mechanisms built into the CPU hardware to prevent user-mode processes from altering the state of the system or accessing protect . . .
-
ProjectAhmed, SatiaMongoDB is a document based NoSQL database system which stores data in the form of JSON documents. The de-normalized structure of MongoDB document makes query performance efficient and cost effective. In this project, a daycare application is implemen . . .
-
ProjectKamble, NikhitaBug tracking is defined as a procedure of tracking reported software bugs of any product of an organization. While developing any product or software, there are chances of bug occurrences. Keeping track of these bugs/issues manually is not feasible. A . . .
-
ProjectVemuri, PujithaWith advances in technology, there is a constant need of sharing resources in the form of social media, blogs, and through links to websites. To make sharing easier, URL shortening services like bit.ly, goog.gl, tinyurl.com, ow.ly are used, but often . . .
-
ProjectSaxena, PrachiWith the high increase of Web applications and websites devolvement and usage, monitoring web applications and websites became a necessity to minimize the risk of vulnerability, failures and customer dissatisfaction. The aim of this project is address . . .
-
ProjectBhatia, BhuvanNowadays, the aviation industry plays a crucial role in the world's transportation sector, and a lot of businesses rely on various airlines to connect them with other parts of the world. But, extreme weather conditions may directly affect the airline . . .
-
ProjectMelnik, Victor VladimirovichFollowing secure coding rules while developing software is challenging, but necessary due to the prevalence of large data breaches attributed to insecure code that have occurred for companies and government entities such as Equifax, Uber, and U.S. Sec . . .
-
ProjectKilaru, SindhuraThe 0-1 Knapsack Problem is a combinatorial optimization problem that can be described as follows. Given a set of items with weights and values and a knapsack with a certain capacity, find a subset of the items that fit in the knapsack and produce a m . . .
-
ProjectPatil, ToshitGraphical Processing Units (GPUs) used in embedded systems such as cars, robotics, mobile devices are usually required to run multiple tasks at the same time. But traditionally GPUs are designed to run only one task at a time. Prior studies have intro . . .
-
ProjectKhiria, RitikaIn this project, the Personal Dietitian android application will use food ontology APIs, which is a part of knowledge representation and semantic web technology to produce diet plans for the users. Additionally, the app will provide an activity tracke . . .
-
ProjectBhokare, MitaliVirtualization means to create a virtual or software-based representation of something rather than having a physical one. Beyond expanding the computing potential, virtualization can be used as a technique to increase security. This project has implem . . .
-
ProjectKuan, NientzuAnalyzing the U.S. stock market is a big data challenge due to its high volume of data and large price volatility. This project demonstrated how deep learning, specifically the Long Short Term Memory (LSTM) recurrent neural network, could make use of . . .
-
ProjectDalavi, Reena PrakashEmotions play an important role in shaping how we think and how we behave in many situations. Our action depends upon the surrounding emotions and paying attention to the surrounding emotions helps us take a decision. When we interact with other peopl . . .
-
ProjectPatel, Nevil DilipkumarPC2v10 is a web-based contest management framework which supports the ability to create and configure contests, control who can participate in defined contests, start/stop contests, and a variety of similar operations. [10] PC2v10 consists of various . . .
-
ProjectDong, YulongNowadays, online social networking is becoming one of the options for botnet command and control (C&C) communication, and QR codes have been widely used in the area of software automation. In this paper, we exploit QR codes, Twitter, Tor network, . . .
-
ProjectWahane, Arundhati VThere are various approaches for Extensible access control markup language (XACML) security policies implementation. This project demonstrated a solution to use graph database to implement XACML Role-based access control in Neo4j. The project consists . . .
-
ProjectAldausari, NuhaDesign by contract (DBC) is an effective methodology that dynamically checks whether a program meets its specifications which are also called design contracts. The contracts for object-oriented programs are defined in terms of preconditions and postco . . .
-
ProjectAppana, PranaviAn intruder attacks a computer network and breaks into it by exploiting a combination of system vulnerabilities. An attack graph models security vulnerabilities of a network and a sequence of all possible exploits that an intruder can use to get incre . . .
-
ProjectLin, ZhaoyanThis project is the implementation of Test Run, a test-run feature for the web version of PC2. PC2 is a programming contest control system developed at California State University, Sacramento. PC2 is widely used for conducting programming contests inc . . .
-
ProjectGanorkar, Chinmay SanjayInternational Collegiate Programming Contest (ICPC) is a competition between university teams around the world. Local university contests, regional contests and world finals contest are part of ICPC. The contest usually consists of teams, judges, prob . . .
-
ProjectMakwana, Mrunal GovindBhaiA very interesting field of Computer Science called Artificial Intelligence is concerned with the study and design of intelligent machines and applications. Advanced AI technologies are already at work around us in almost all areas, and medical scienc . . .
-
ProjectMegerssa, IyoelIn this body of work, we look at implementing the Generative Adversarial Network to a palliative care dataset. The implementation requires that our model, which we call the Palliative Care Generative Adversarial Network(PCGAN), train on a relatively s . . .
-
ProjectUtkhede, PrachiThe Internet of Things refers to the connection of everyday objects to the Internet. This allows humans to monitor and interact with these objects from anywhere in the world. With IoT, we can envision a future where everyday objects such as toasters, . . .
-
ProjectLadkhedkar, Ajinkya RajendraInternational Collegiate Programming Contest (ICPC) is a competition between university teams around the world. It was established by ACM in 1977 and sponsored by IBM since 1997. It is a multi-tiered contest which consists of local university contests . . .
-
ProjectSrinivasan, SrivatsOnline auctions have become an increasingly important aspect of e-commerce. The major problem with online bidding/auctioning is that there is no way of identifying if the user is a human or a bot. Human bidders are becoming increasingly frustrated wit . . .
-
ProjectBachu, SushmithaThe current Automated Teller Machine (ATM) systems require users to authenticate with unique 4 or 6 digits Personal Identification Number (PIN) to make transactions. These systems have physical keypads to do this, so the numeric key positions are cons . . .
-
ProjectVardhamane, PallaviOver the past few years, many cybersecurity incidents were reported worldwide through distributed denial of service attacks. Many of these attacks were conducted through botnet, which usually consists of a group of infected computers, smartphones or I . . .
-
ProjectShah, ParilMobile Learning Application is an Android application that communicates with a server using RESTful API. The application provides a collaborative platform for administrators, instructors, and students, and is used for enrollment of students, managing . . .
-
ProjectBalasubramanian, SindujaAnalyzing the feedback on a product or a service helps to improve the quality of the product or service. That way, reviews from online shopping sites (such as Amazon) not only help a consumer to buy a product but also can help a manufacturer or seller . . .
-
ProjectSrinivasan, SuganyaThere are lot of movies available to watch and nowadays people prefer to watch movies at home rather than going to theatres. They don’t want to waste spending time and money on a worthless movie. So how are they going to figure out what’s good and wha . . .
-
ProjectBharat, PuneethaBluetooth is a short-range communication system that was developed with the intent of replacing cables that link portable and fixed electronic devices. Given its widespread adoption, especially in mobile devices, new uses are possible today. Although . . .
-
Graduate ProjectTrivedi, UtkarshIn this generation, we have a lot of investment opportunities such as fixed deposits, mutual funds, bullion, properties, and stock market. Due to lack of proper knowledge and experience, people are unable to invest in the stock market and often deem i . . .
-
ProjectMiller, Kurt DanielArgument Mining is a relatively new field that aims to detect and classify arguments and their relations from input text. Link prediction is a subtask of Argument Mining that attempts to determine the structure of arguments by predicting relationships . . .
-
ProjectTinney, JonathanConsumer grade virtual reality (VR) headsets have led to a rise in the popularity of VR development. Game engines such as Unity and Unreal Engine have developed Application Programming Interfaces (API) for rendering content to VR headsets, allowing fo . . .
-
ProjectJackson, Cody JamesVirtual Reality (VR) technology has become relatively inexpensive and accessible for consumers in recent years. In this project, many small technical demonstrations of key VR concepts are presented. These concepts and their supporting tech demos can b . . .
-
ProjectRobles, Kristofer CarlosWhen file system metadata is corrupted, missing, or otherwise unreliable, file carving is the strategy used to recover files from a data volume. Difficulties arise when files within the data volume are stored in more than one fragment. These difficult . . .
-
ProjectPatel, BhargiCloud is a collection of computers that are used for their services. Out of the many services offered, cloud is best known for its data storage. Cloud backs up files and folders varying from photos, music files to sensitive documents, mitigating the c . . .
-
ProjectHariharan, SubashiniPeople shop on both weekdays and weekends, but most people find free time during the weekends to get groceries, household items. Studies show that around 40 million people shop on the weekends in the USA. The difficult part of the shopping after spend . . .
-
ProjectPatel, MeetkumarThe goal of this project was to code and assemble a web browser with voice recognition abilities. The project aims to simplify the usage of a web browser. Existing web browsers are complicated to use and focus on feasibility but sometimes lack the use . . .
-
ProjectSherje, KunalThe purpose of this project is to set up the OpenStack Cloud manually and automate installation and uninstallation process of OpenStack Infrastructure as a Service (IAAS) Cloud. In today’s computing world many organizations are deploying the cloud to . . .
-
ProjectEathalapaka, SurajConsumer products industry constitutes a major chunk of the country’s economy and commerce activities. In an effort to cut costs and increase revenue on these consumer products, manufacturers often resort to using poor quality raw materials or set low . . .
-
ProjectRegonda, Dinesh KumarThe majority of mobile applications which offer turn by turn navigation services provide minimal instruction assistance features to its user’s. There is a real need of providing extra assistance while using turn by turn navigation services for people . . .
-
ProjectKhadke, AmoghToday, in the age of growing technology, the theoretical and practical understanding of any subject has become a key part in everyone’s lives. The amount of knowledge that people need to obtain today is more than ever before as rightly quoted by the C . . .
-
ProjectPantula, Narasimha SagarThe idea of this project is to develop an android version of several Authenticated Encryption algorithms which are qualified for the third round of CAESAR competition and run them on android platform/application to analyze the performance based on tim . . .
-
ProjectBaviskar, NeelamA smart city can be referred as a city developed and maintained with the help of Information Technology (IT) to improve the quality of life of citizens. Smart city researches and projects are considered as integral part of city modernization. The huge . . .
-
ProjectThirupathy, DiveenaOnline shopping is the shortest distance between two states: full wallet to an empty wallet. The advent of online shopping and the joy of getting things you want at your doorstep with just few clicks has been popular among most people. The experience . . .
-
ProjectAnanda Subramaniam, NivedaaaiyerIn today’s world, a computer is highly exposed to attacks. In here, I try to build a predictive model to identify if the connection coming is an attack or genuine. Machine learning is that part of computer science in which instead of programming a mac . . .
-
ProjectVunnam, NishithaReview websites, such as Yelp, Google Places and Zagat, play a major role in determining a user’s choice of business. The overall rating provided by these review applications is critical because many times, users do not have enough time to read all th . . .
-
Graduate ProjectShah, ParitaThe purpose of a Sandbox software is to execute a program under restricted environment to protect a computer system from malicious activities. The Security Sandbox tool will be developed to be used for the Programming Contest Control System, called PC . . .