Follow


Master's Projects from 2016

PDF

Supervised Learning for Multi-Domain Text Classification, Siva Charan Reddy Gangireddy

PDF

Hybrid Similarity Function for Big Data Entity Matching with R-Swoosh, Vimal Chandra Gorijala

PDF

Detection of Locations of Key Points on Facial Images, Manoj Gyanani

PDF

A Fully Automated Solver for Multiple Square Jigsaw Puzzles Using Hierarchical Clustering, Zayd Hammoudeh

PDF

Handling Relationships in a Wiki System, Yashi Kamboj

PDF

Taint and Information Flow Analysis Using Sweet.js Macros, Prakasam Kannan

PDF

Static and Dynamic Analysis for Android Malware Detection, Ankita Kapratwar

PDF

Processing Posting Lists Using OpenCL, Radha Kotipalli

PDF

Analyze Large Multidimensional Datasets Using Algebraic Topology, David Le

PDF

Interactive Computer Science Exercises In edX, Hong Le

PDF

Deep Data Analysis on the Web, Xuanyu Liu

PDF

Analyzing Clustered Web Concepts with Homology, Eric Nam

PDF

Machine Learning on the Cloud for Pattern Recognition, Tien Nguyen

PDF

Analysis on ALERGIA Algorithm: Pattern Recognition by Automata Theory, Xuanyi Qi

PDF

Multiple Sequence Alignment with Pro le Hidden Markov Models, Shubhangi Rakhonde

PDF

Concept Based Search Engine: Concept Creation, Aishwarya Rastogi

PDF

Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio

PDF

Malicious JavaScript Detection using Statistical Language Model, Anumeha Shah

PDF

Movie Script Shot Lister, David Robert Smith

PDF

Defeating n-gram Scores for HTTP Attack Detection, Samyuktha Sridharan

PDF

EFFICIENT PAIR-WISE SIMILARITY COMPUTATION USING APACHE SPARK, Parineetha Gandhi Tirumali

PDF

Web-based Integrated Development Environment, Hien T. Vu

PDF

Secure Declassification in Faceted JavaScript, Tam Wing

PDF

Real-time Online Chinese Character Recognition, Wenlong Zhang

PDF

Cryptanalysis of Homophonic Substitution Cipher Using Hidden Markov Models, Guannan Zhong

Master's Projects from 2015

PDF

Clustering Web Concepts Using Algebraic Topology, Harleen Kaur Ahuja

PDF

Predicting Autism over Large-Scale Child Dataset, Arpit Arya

PDF

Pattern-Aided Regression Modelling and Prediction Model Analysis, Naresh Avva

PDF

Extensible Authentication Protocol Vulnerabilities and Improvements, Akshay Baheti

PDF

Metamorphic Java Engine, Sailee Choudhary

PDF

Combining Dynamic and Static Analysis for Malware Detection, Anusha Damodaran

PDF

A Secured Cloud System based on Log Analysis, Sindhusha Doddapaneni

PDF

Static Analysis of Malicious Java Applets, Nikitha Ganesh

PDF

NEURAL NETWORK CAPTCHA CRACKER, Geetika Garg

PDF

A JavaScript and PHP EPUB reader web application, Xiaqing He

PDF

FIREFOX ADD-ON FOR METAMORPHIC JAVASCRIPT MALWARE DETECTION, Sravan Kumar Reddy Javaji

PDF

Interactive Phishing Filter, Rushikesh Joshi

PDF

Implementing Type Inference in Jedi, Vaibhav Kamble

PDF

Using Neural Networks for Image Classification, Tim Kang

PDF

Cheating Detection in Online Examinations, Gaurav Kasliwal

PDF

STUDY OF BIG DATA ARHITECTURE LAMBDA ARHITECTURE, Jaideep Katkar

PDF

LOAD BALANCING FOR BIG DATA ENTITY MATCHING USING BLOCK SPLIT, Akhilesh Kondra

PDF

A Recommendation Engine Using Apache Spark, Swapna Kulkarni

PDF

Adding Syntax Parameters to the Sweet.JS Macro Library for JavaScript, Vimal Kumar

PDF

RECOMMENDATION SYSTEM USING COLLABORATIVE FILTERING, Yunkyoung Lee

PDF

Operational Semantics for Featherweight Lua, Hanshu LIN

PDF

SocioBot: Twitter for Command and Control of a Botnet, Ismeet Kaur Makkar

PDF

Comparative Analysis of Two Clustering Algorithms: K-means and FSDP (Fast Search and Find of Density Peaks), Li Miao

PDF

A SCALABLE SEARCH ENGINE AGGREGATOR, Pooja Mishra

PDF

Energy Efficiency and Quality of Services in Virtualized Cloud Radio Access Network, Khushbu Mohta

PDF

Scalable Techniques for Similarity Search, Siddartha Reddy Nagireddy

PDF

Introducing Faceted Exception Handling for Dynamic Information Flow, Sri Tej Narala

PDF

Clustering versus SVM for Malware Detection, Usha Narra

PDF

Using Hidden Markov Models to Detect DNA Motifs, Santrupti Nerli

PDF

CONTEXT-BASED AUTOSUGGEST ON GRAPH DATA, Hai Nguyen

PDF

GRAPH BASESD WORD SENSE DISAMBIGUATION FOR CLINICAL ABBREVIATIONS USING APACHE SPARK, Veebha Padavkar

PDF

Improving the Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering, Sai Kiran Padooru

PDF

A Comparison of Clustering Techniques for Malware Analysis, Swathi Pai

PDF

Pattern-driven Programming in Scala, Huaxin Pang

PDF

Question Answering System for Yioop, Niravkumar Patel

PDF

Measuring Malware Evolution, Poonkodi Ponnambalam

PDF

Entity and Relational Queries over Big Data Storage, Nachappa Achakalera Ponnappa

PDF

On-the-fly Map Generator for OpenStreetMap Data Using WebGL, Sreenidhi Pundi Muralidharan

PDF

Function Call Graph Score for Malware Detection, Deebiga Rajeswaran

PDF

Designing a Programming Contract Library for Java, Neha Rajkumar

PDF

Author recognition using Locality Sensitive Hashing & Alergia (Stochastic Finite Automata), Prashanth Sandela

PDF

Metamorphic Code Generator based on bytecode of LLVM IR, Arjun Shah

PDF

Predicting 'Attention Deficit Hyperactive Disorder' using large scale child data set, Arpi Shah

PDF

BitFed, A Centralized Cryptocurrency with Distributed Miners, Shruti Sharma

PDF

Collaboration Prototyper: Automatic Generation of Prototypes from UML Collaborations, Ramya Badthody Shenoy

PDF

Cryptanalysis of the Purple Cipher using Random Restarts, Aparna Shikhare

PDF

PATTERN DISCOVERY IN DNA USING STOCHASTIC AUTOMATA, Shweta Shweta

PDF

Support Vector Machines and Metamorphic Malware Detection, Tanuvir Singh

PDF

SSCT Score for Malware Detection, Srividhya Srinivasan

PDF

SHAREDWEALTH: A CRYPTOCURRENCY TO REWARD MINERS EVENLY, Siddiq Ahmed Syed

PDF

A Completely Covert Audio Channel in Android, Sukanya Thakur

PDF

Optimization of Scheduling and Dispatching Cars on Demand, Vu Tran

PDF

An Open Source Advertisement Server, Pushkar Umaranikar

PDF

Driver Telematics Analysis, Karthik Vakati

PDF

Malware Detection Using Dynamic Analysis, Swapna Vemparala

PDF

Relationship based Entity Recommendation System, Rakhi Poonam Verma

PDF

Cryptanalysis of Classic Ciphers Using Hidden Markov Models, Rohit Vobbilisetty

PDF

INDEX STRATEGIES FOR EFFICIENT AND EFFECTIVE ENTITY SEARCH, Huy T. Vu

PDF

MAXIMIZING THE SPEED OF INFLUENCE IN SOCIAL NETWORKS, Yubo Wang

PDF

Load Balancing for Entity Matching over Big Data using Sorted Neighborhood, Yogesh Wattamwar

PDF

Using Probabilistic Graphical Models to Solve NP-complete Puzzle Problems, Fengjiao Wu

PDF

COMPARATIVE ANALYSIS OF PARTICLE SWARM OPTIMIZATION ALGORITHMS FOR TEXT FEATURE SELECTION, Shuang Wu

PDF

MINING CONCEPT IN BIG DATA, Jingjing Yang

Master's Projects from 2014

PDF

Application of Message Passing and Sinkhorn Balancing Algorithms for Probabilistic Graphical Models, Lakshmi Ananthagopal

PDF

OneCareer-A Visualization approach to job search process, Avinash Anantharamu

PDF

IMPROVING THE EFFICIENCY OF TESSERACT OCR ENGINE, Sahil Badla

PDF

Automating NFC Message Sending for Good and Evil, Nikki Benecke Brandt

PDF

A Hash-Cash Based Music Streaming Payment System, Timothy Chen

PDF

Text Summarization for Compressed Inverted Indexes and Snippets, Mangesh Dahale

PDF

Big Data Analysis Using Neuro-Fuzzy System, Amir Eibagi

PDF

HIDING BEHIND THE CLOUDS: EFFICIENT, PRIVACY-PRESERVING QUERIES VIA CLOUD PROXIES, Surabhi Gaur

PDF

A Tiered Approach to Detect Metamorphic Malware With Hidden Markov Models, Ashwin Kalbhor

PDF

A Smart Web Crawler for a Concept Based Semantic Search Engine, Vinay Kancherla

PDF

Spartan Web Application Firewall, Brian C. Lee

PDF

Compression-Based Analysis of Metamorphic Malware, Jared Lee