Follow


Master's Projects from 2015

PDF

Combining Dynamic and Static Analysis for Malware Detection, Anusha Damodaran

PDF

A Secured Cloud System based on Log Analysis, Sindhusha Doddapaneni

PDF

Static Analysis of Malicious Java Applets, Nikitha Ganesh

PDF

NEURAL NETWORK CAPTCHA CRACKER, Geetika Garg

PDF

A JavaScript and PHP EPUB reader web application, Xiaqing He

PDF

FIREFOX ADD-ON FOR METAMORPHIC JAVASCRIPT MALWARE DETECTION, Sravan Kumar Reddy Javaji

PDF

Interactive Phishing Filter, Rushikesh Joshi

PDF

Implementing Type Inference in Jedi, Vaibhav Kamble

PDF

Using Neural Networks for Image Classification, Tim Kang

PDF

Cheating Detection in Online Examinations, Gaurav Kasliwal

PDF

STUDY OF BIG DATA ARHITECTURE LAMBDA ARHITECTURE, Jaideep Katkar

PDF

LOAD BALANCING FOR BIG DATA ENTITY MATCHING USING BLOCK SPLIT, Akhilesh Kondra

PDF

A Recommendation Engine Using Apache Spark, Swapna Kulkarni

PDF

Adding Syntax Parameters to the Sweet.JS Macro Library for JavaScript, Vimal Kumar

PDF

RECOMMENDATION SYSTEM USING COLLABORATIVE FILTERING, Yunkyoung Lee

PDF

Operational Semantics for Featherweight Lua, Hanshu LIN

PDF

SocioBot: Twitter for Command and Control of a Botnet, Ismeet Kaur Makkar

PDF

Comparative Analysis of Two Clustering Algorithms: K-means and FSDP (Fast Search and Find of Density Peaks), Li Miao

PDF

A SCALABLE SEARCH ENGINE AGGREGATOR, Pooja Mishra

PDF

Energy Efficiency and Quality of Services in Virtualized Cloud Radio Access Network, Khushbu Mohta

PDF

Scalable Techniques for Similarity Search, Siddartha Reddy Nagireddy

PDF

Introducing Faceted Exception Handling for Dynamic Information Flow, Sri Tej Narala

PDF

Clustering versus SVM for Malware Detection, Usha Narra

PDF

Using Hidden Markov Models to Detect DNA Motifs, Santrupti Nerli

PDF

CONTEXT-BASED AUTOSUGGEST ON GRAPH DATA, Hai Nguyen

PDF

GRAPH BASESD WORD SENSE DISAMBIGUATION FOR CLINICAL ABBREVIATIONS USING APACHE SPARK, Veebha Padavkar

PDF

Improving the Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering, Sai Kiran Padooru

PDF

A Comparison of Clustering Techniques for Malware Analysis, Swathi Pai

PDF

Pattern-driven Programming in Scala, Huaxin Pang

PDF

Question Answering System for Yioop, Niravkumar Patel

PDF

Measuring Malware Evolution, Poonkodi Ponnambalam

PDF

Entity and Relational Queries over Big Data Storage, Nachappa Achakalera Ponnappa

PDF

On-the-fly Map Generator for OpenStreetMap Data Using WebGL, Sreenidhi Pundi Muralidharan

PDF

Function Call Graph Score for Malware Detection, Deebiga Rajeswaran

PDF

Designing a Programming Contract Library for Java, Neha Rajkumar

PDF

Author recognition using Locality Sensitive Hashing & Alergia (Stochastic Finite Automata), Prashanth Sandela

PDF

Metamorphic Code Generator based on bytecode of LLVM IR, Arjun Shah

PDF

Predicting 'Attention Deficit Hyperactive Disorder' using large scale child data set, Arpi Shah

PDF

BitFed, A Centralized Cryptocurrency with Distributed Miners, Shruti Sharma

PDF

Collaboration Prototyper: Automatic Generation of Prototypes from UML Collaborations, Ramya Badthody Shenoy

PDF

Cryptanalysis of the Purple Cipher using Random Restarts, Aparna Shikhare

PDF

PATTERN DISCOVERY IN DNA USING STOCHASTIC AUTOMATA, Shweta Shweta

PDF

Support Vector Machines and Metamorphic Malware Detection, Tanuvir Singh

PDF

SSCT Score for Malware Detection, Srividhya Srinivasan

PDF

SHAREDWEALTH: A CRYPTOCURRENCY TO REWARD MINERS EVENLY, Siddiq Ahmed Syed

PDF

A Completely Covert Audio Channel in Android, Sukanya Thakur

PDF

Optimization of Scheduling and Dispatching Cars on Demand, Vu Tran

PDF

An Open Source Advertisement Server, Pushkar Umaranikar

PDF

Driver Telematics Analysis, Karthik Vakati

PDF

Malware Detection Using Dynamic Analysis, Swapna Vemparala

PDF

Relationship based Entity Recommendation System, Rakhi Poonam Verma

PDF

Cryptanalysis of Classic Ciphers Using Hidden Markov Models, Rohit Vobbilisetty

PDF

INDEX STRATEGIES FOR EFFICIENT AND EFFECTIVE ENTITY SEARCH, Huy T. Vu

PDF

MAXIMIZING THE SPEED OF INFLUENCE IN SOCIAL NETWORKS, Yubo Wang

PDF

Load Balancing for Entity Matching over Big Data using Sorted Neighborhood, Yogesh Wattamwar

PDF

Using Probabilistic Graphical Models to Solve NP-complete Puzzle Problems, Fengjiao Wu

PDF

COMPARATIVE ANALYSIS OF PARTICLE SWARM OPTIMIZATION ALGORITHMS FOR TEXT FEATURE SELECTION, Shuang Wu

PDF

MINING CONCEPT IN BIG DATA, Jingjing Yang

Master's Projects from 2014

PDF

Application of Message Passing and Sinkhorn Balancing Algorithms for Probabilistic Graphical Models, Lakshmi Ananthagopal

PDF

OneCareer-A Visualization approach to job search process, Avinash Anantharamu

PDF

IMPROVING THE EFFICIENCY OF TESSERACT OCR ENGINE, Sahil Badla

PDF

Automating NFC Message Sending for Good and Evil, Nikki Benecke Brandt

PDF

A Hash-Cash Based Music Streaming Payment System, Timothy Chen

PDF

Text Summarization for Compressed Inverted Indexes and Snippets, Mangesh Dahale

PDF

Big Data Analysis Using Neuro-Fuzzy System, Amir Eibagi

PDF

HIDING BEHIND THE CLOUDS: EFFICIENT, PRIVACY-PRESERVING QUERIES VIA CLOUD PROXIES, Surabhi Gaur

PDF

A Tiered Approach to Detect Metamorphic Malware With Hidden Markov Models, Ashwin Kalbhor

PDF

A Smart Web Crawler for a Concept Based Semantic Search Engine, Vinay Kancherla

PDF

Spartan Web Application Firewall, Brian C. Lee

PDF

Compression-Based Analysis of Metamorphic Malware, Jared Lee

PDF

ANALYZING BIG DATA WITH DECISION TREES, Lok Kei Leong

PDF

Parallelized Rigid Body Dynamics, John Calvin Linford

PDF

Attribute Selection Methods in Rough Set Theory, Xiaohan Li

PDF

Improving the Performance and Energy Efficiency for Mobile Cloud Computing, Seungbeom Ma

PDF

IMPROVING SMART GRID SECURITY USING MERKLE TREES, Melesio Calderón Muñoz

PDF

Hunting For Metamorphic JavaScript Malware, Mangesh Musale

PDF

Automatic Evaluation of Python and C Programs with codecheck, Kiet Nguyen

PDF

Incorporating WordNet in an Information Retrieval System, Shailesh Padave

PDF

Comparative Analysis of Naive Bayes and Tree Augmented Naive Bayes Models, Harini Padmanaban

PDF

INCORPORATING PRIVACY AND SECURITY FEATURES IN AN OPEN SOURCE SEARCH ENGINE A Project Report Presented to, Akash Patel

PDF

Bayesian Classification Using Probabilistic Graphical Models, Mehal Patel

PDF

A Content-Sensitive Wiki Help System, Eswara Satya Pavan Rajesh Pinapala

PDF

Hunting for Pirated Software Using Metamorphic Analysis, Hardikkumar Rana

PDF

DART: DECLARATIVELY RENDERING 2D SKETCHES IN CANVAS, Jesus Rocha

PDF

Concept Based Semantic Search Engine, Pradeep Roy

PDF

Opinion Mining on Twitter Data Stream to Give Companies an Up-to-Date Feedback on Their Free Products, Lokmanyathilak Govindan Sankar Selvan

PDF

Masquerade detection using Singular Value Decomposition, Sweta Vikram Shah

PDF

Big Data Analytics Using Neural networks, Chetan Sharma

PDF

Analyzing Automatically Assessed Programming Assignments in CS1/2, Kiruthika Sivaraman

PDF

SEMANTIC SIMILARITY BASED INFORMATION RETRIEVAL AS APPLIED TO MOOCs, Krishna Nitin Tenali

PDF

Optimization of Scheduling and Dispatching Cars on Demand, Vu Tran

PDF

FINANCIAL RATIO ANALYSIS FOR STOCK PRICE MOVEMENT PREDICTION USING HYBRID CLUSTERING, Tom Tupe

PDF

Backward Sequential Feature Elimination And Joining Algorithms In Machine Learning, Sanya Valsan

PDF

A TUNABLE WORKFLOW SCHEDULING ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION FOR CLOUD COMPUTING, Kai Wu

PDF

Cryptanalysis of Homophonic Substitution-Transposition Cipher, Jeffrey Yi

Master's Projects from 2013

PDF

Pattern Recognition of DNA Sequences using Automata with application to Species Distinction, Parnika P. Achrekar

PDF

User Profiling in GUI based Windows Systems for Intrusion Detection, Arshi Agrawal

PDF

Cloud Based Complaint Management Service, Ajinkya Amrute

PDF

Hidden Markov Models for Malware Classification, Chinmayee Annachhatre

PDF

Recommendation System for News Reader, Shweta Athalye