Master's Projects from 2011
A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in a Cloud Computing Environment, Shailesh Sawant
Enhancing Productivity of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena
FBchatters: A Facebook application for Gtalk, Ronak Shah
PROTECTIVE SHIELD FOR POLYMORPHIC VIRUSES, Priyadarshini Shanmuganathan
Algorithms Analysis System: Recurrences, Anchit Sharma
Dynamic Code Checksum Generator, Ashish Sharma
Improving the Performance of a Proxy Server using Web log mining, Akshay Shenoy
AUGMENTED-LIFE PHONE ORGANIZER, Chao-Hsin Shih
X10 vs Java: Concurrency Constructs and Performance, Anh Trinh
Online and Offline eBook Management System using W-CMS, Rohan Vibhandik
Scanned Wireless Network Setup Fake Access Point & its Detection, Saurabh Vishal
BitTorrent Traffic Detection with Deep Packet Inspection and Deep Flow Inspection, Raymond Wong
CENTRALIZED SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS, Li Yang
Learning Author’s Writing Pattern System By Automata, Qun Yu
ActiBot: A Botnet to Evade Active Detection, Xinjun Zhang
Master's Projects from 2010
Online Application Monitoring Tool, Sathya Anandan
UNDO: A System for Neutralizing Nuisance Attacks, Eilbroun Waltin Benjamin
Extending OWL with Finite Automata Constraints, Jignesh Borisa
A Framework for Active Learning: Revisited, Yue Chen
The ActiveLecture System, Sanuja Dabade
Japanese Kanji Suggestion Tool, Sujata Dongre
Enhancing open-source localization, Farzana Forhad
WiSeNetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale
Exhaustive Statistical Analysis for Detection of Metamorphic Malware, Aditya Govindaraju
A Study on Masquerade Detection, Lin Huang
Reliable Broadcasting in VANET, Pat Jangyodsuk
Clustering and Validation of Microarray Data Using Consensus Clustering, Sarbinder Kallar
Finding Duplication Events Using GenomeVectorizer, Elena Kochetkova
An Online Versions of Hyperlinked-Induced Topics Search (HITS) Algorithm, Amith Kollam Chandranna
Food Phone Application, Shengyu Li
Intrusion Detection And Prevention System: SQL-Injection Attacks, Varian Luong
Auto-Generation of Use Case Controllers, Pushkar Marathe
Security in Peer-to-Peer SIP VoIP, Richa Marwaha
How Smart is your Android Smartphone?, Deepika Mulani
Bookmarklet Builder for Offline Data Retrieval, Sheetal Naidu
Mobile Search Engine using Clustering and Query Expansion, Huy Nguyen
Parallel Programming Recipes, Thuy C. Nguyenphuc
Web-Based IDE for Interfacing View Controller, Tejasvi Palvai
Automatic Grading of Programming Assignments, Ashlesha Patil
APPROXIMATE DISASSEMBLY, Dhivyakrishnan Radhakrishnan
Geometrical Structure and Analysis of Association Rules, Sar Rajat
Scala Server Faces, Vikas Vittal Rao
Analysis of False Cache Line Sharing Effects on Multicore CPUs, Suntorn Sae-eung
One Social, Sowmya Sampath
Geometrical Structure and Analysis of Association Rule, Rajat Sar
Approximate Disassembly using Dynamic Programming, Abhishek Shah
Metamorphic Viruses with Built-In Buffer Overflow, Ronak Shah
Open Source Analysis of Biomedical Figures, David Shao
A MicroRNA TARGET PREDICTION ALGORITHM, Rupinder Singh
Improved Worm Simulator and Simulations, Arnold Suvatne
Computational miRNA Target Prediction in Animals, Leyan Tang
Document Builder, Thien Tran
EMail Data Mining: An Approach to Construct an Organization Position-wise Structure While Performing EMail Analysis, Bhargav Vadher
View Component of Web-based IDE to develop Web Applications in CakePHP, Swathi Vegesna
DETECTING UNDETECTABLE COMPUTER VIRUSES, Sujandharan Venkatachalam
Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP, Sugiharto Widjaja
Automatic Execution Path Finding Tool, Fan Yang
IMPROVED SOFTWARE ACTIVATION USING MULTITHREADING, Jian Rui Zhang
Master's Projects from 2009
World Wide Web – Common Communication Language, Mohamed Ali
Visualization of Tree-Structured Data Through a Multi Touch User Interface, David Andrews
Online Circular Calendar, Praveen Athmanathan Panneerselvam
Intrusion Detection And Prevention System: CGI Attacks, Tejinder Aulakh
Intrusion detection and prevention system: CGI attacks., Tejinder Aulakh
Knowledge Engineering from Data Perspective: Granular Computing Approach, Rushin Barot
Heuristic Search Cryptanalysis of the Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju
Video Conferencing Tool, Sapna Blesson
A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang
Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang
Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan
Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi
Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho
Software reverse engineering education, Teodoro Cipresso
Objective Measurement of Speech Quality in VoIP over Wireless LAN during Handoff, Nidhi Marwaha Gambhir
Triggering of Just-In-Time Compilation in the Java Virtual Machine, Rouhollah Gougol
Chinese Wall Security Policy, Varun Gupta
MSG: A Gap-Oriented Genetic Algorithm for Multiple Sequence Alignment, Philip Heller
Network traffic clustering and geographic visualization, Ali Hushyar
Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka
MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke
Event based propagation approach to constraint configuration problems, Rajhdeep Jandir
Automatic Video Classification, Don Jayakody
Is Four File Chess a Draw?, Michael Karbushev
Client-Side Page Element Web-Caching, Ramya Karri
Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul
Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim
Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan
Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy
Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy
Hunting for Undetectable Metamorphic Viruses, Da Lin
Hunting for Undetectable Metamorphic Viruses, Da Lin
Removing the Digital Divide for Senior Web Users, Chiu Luk
An Automata Based Text Analysis System, Yue Lu
Enhancing spammer detection in online social networks with trust-based metrics., Alexander J. Murmann
Web based Recommender Systems and Rating Prediction, Tho Nguyen
Information Flow Model for Commercial Security, Jene Pan
Automated Artice Generation Using the Web, Gaurang Patel
Intrusion Alerts Analysis Using Attack Graphs and Clustering, Hardik Patel
Analysis of rxbot, Esha Patil
Total Recall for AJAX applications – Firefox extension, Smita Periyapatna
Hybrid Clustering with Application to Web Pages, Ameya Sabnis