Search Constraints

Filtering by: Department Computer Science Remove constraint Department: Computer Science

Search Results

  • G445cd59x?file=thumbnail
    Soundararajan, Thilak Raj
    Shoulder surfing is the process of stealing one’s personal information such as personal identification number or password by looking over the victim’s shoulder. Nowadays, a hacker can use a video camera to actively record a user entering the password . . .
  • 0v838089r?file=thumbnail
    Annapragada, Laxmi Subhamkar
    Promoter sequences are the main regulatory elements of gene expression. The accurate prediction of promoters remains a challenge because the key DNA regulatory regions have variable structures, but their recognition by computer algorithms is fundament . . .
  • Cf95jb87k?file=thumbnail
    Chhabria, Pooja
    LEACH is a TDMA (Time-Division Multiple Access) based clustering MAC (Medium Access Control) protocol in wireless sensor networks. This protocol frequently forms clusters of nodes and selects one of the cluster members as the cluster head. The two-tie . . .
  • 7s75dc78g?file=thumbnail
    Maheshwari, Aastha
    The world is getting advanced, and it becomes our responsibility to be on the same pace as the world. With the increase in the amount of data, it is becoming difficult to accommodate everything in our brain in a small span of time. Data Visualization . . .
  • Sj139245q?file=thumbnail
    Panneer Selvam, Pratima
    During medical emergencies, patients are often shunted from hospital to hospital due to lack of ICU beds leading to loss of many lives. Also crucial time is lost calling up every individual blood bank trying to find blood of the required group in an e . . .
  • 41687h88c?file=thumbnail
    Panchal, Jalanilbhai
    The use of Smartphones and its complementary technologies like wearable devices have gained immense momentum over the decade, which has led to their vast amount of use in various daily activities. On top of that, the new technologies plus their variou . . .
  • H128nf20b?file=thumbnail
    Sudak, Bartosh
    In software development, software teams receive bug reports that describe unintended performance of the software products frequently. When a new bug report is received, software developers usually need to recreate the bug, perform code reviews, and us . . .
  • Fx719m836?file=thumbnail
    Pandiri, Venkat Shiva
    This project carried out a systematic investigation to predict the final price of each home using machine learning techniques. Various machine learning techniques such as multiple linear regression (base model), random forest regression and polynomial . . .
  • Ww72bb93g?file=thumbnail
    Ramamurthy, Kishore
    An Annotation is a metadatum (comment, explanation) attached to a specific section of a document (text, image, video or other formats) after it has been created. Annotations have been used in several fields such as literature and education, software e . . .
  • F1881m388?file=thumbnail
    Chang, Lianghuang Eric
    A Learning Management System (LMS) is a core component of distance education over the Internet. Although a number of venders have released their LMS products, such as WebCT and Blackboard, the lack of interoperability with other related systems and co . . .