Follow


Master's Projects from 2012

PDF

An Algorithm for Data Reorganization in a Multi-dimensional Index, Urvashi Samaresh Nair

PDF

JAVASCRIPT GAME ENGINE FOR MOBILE USING HTML5, Nakul Vishwas Natu

PDF

The Visualization of Historical Structures and Data in a 3D Virtual City, Bryant Panyarachun

PDF

Cloud Information Summarization With Mobile Interface, Hrishikesh Paranjape

PDF

VISUAL SEARCH APPLICATION FOR ANDROID, Harsh Patel

PDF

BLOG INFORMATION CLASSIFICATION, Nishant Patel

PDF

Secure Media Streaming for Android, Jaie Patil

PDF

Keyword Search in Social Networks, Vijeth Patil

PDF

Extending Yioop! Abilities to Search the Invisible Web, Tanmayee Potluri

PDF

IMPROVING YIOOP! USER SEARCH DATA USAGE, Tarun Pepira Ramaswamy

PDF

Online Collaborative Editor, Aditya Rao

PDF

Algorithms For Predicting Secondary Structures Of Human Viruses, Hardik Shah

PDF

Face Detection from Images Using Support Vector Machine, Parin M. Shah

PDF

Motion Learning Using The Neural Network, Priyank Shah

PDF

Simple Substitution Distance and Metamorphic Detection, Gayathri Shanmugam

PDF

MapMyVTA, Gaurav Sharma

PDF

IDENTIFYING INFLUENTIAL BLOGGERS, SivaNaga Prasad Shola

PDF

SOCIAL NETWORKING FOR BOTNET COMMAND AND CONTROL, Ashutosh Singh

PDF

Extending Yioop! With Geographical Location Local Search, Vijaya Sinha

PDF

METAMORPHIC WORM THAT CARRIES ITS OWN MORPHING ENGINE, Sudarshan Madenur Sridhara

PDF

Visualization of Online Deals, Praveen Thiruvathilingam

PDF

Chi-Squared Distance and Metamorphic Virus Detection, Annie Hii Toderici

PDF

Desktop Sharing Portal, Ming-Chen Tsai

PDF

YIOOP! INTRODUCING AUTOSUGGEST AND SPELL CHECK, Sandhya Vissapragada

PDF

Algorithms for solving the reducts problem in rough sets, Shuang Wang

PDF

Promoter Prediction Based on E. coli Characteristics, Li Wen

PDF

Analysis of DPA and DEMA Attacks, Cheuk Wong

PDF

Ad-hoc Stream Adaptive Protocol, Ray Xie

PDF

Computational Modeling of Protein Dynamics with GROMACS and Java, Miaoer Yu

PDF

CROSS-LINGUAL TEXT CLASSIFICATION WITH MODEL TRANSLATION AND DOCUMENT TRANSLATION, Zhang Zhang

Master's Projects from 2011

PDF

An Executable Packer, Neel Bavishi

PDF

GENERATION OF FORESTS ON TERRAIN WITH DYNAMIC LIGHTING AND SHADOWING, Jonathan Ben-David

PDF

Clustering of twitter technology tweets and the impact of stopwords on clusters, Surya Bhagvat

PDF

Model-Controller Interfacing using Struts-Based Web Application, Deepti Bhardwaj

PDF

User Monitor & Feedback Mechanism for Social Scientific Study on Laptop Energy Reduction, Namrata Buddhadev

PDF

IMPROVING MOLECULAR FINGERPRINT SIMILARITY VIA ENHANCED FOLDING, Victor Chen

PDF

Video Chat Application for Facebook, Shirali Chokshi

PDF

EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS, Amrapali Dhavare

PDF

EC2LAB: SAAS USING AMAZON ELASTIC CLOUD COMPUTE, Manisha Gaikwad

PDF

RECIPE SUGGESTION TOOL, Sakuntala Padmapriya Gangaraju

PDF

Data Mining and Data Warehouse ------ Maximal Simplex Method, Madhuri Gollu

PDF

Social Network Leverage Search, Payal Gupta

STOP Using Just GO: A Multi-Ontology Enrichment Analysis Tool, Emily J. Howe

PDF

N-Grams Assisted Long Web Search Query Optimization, Jehann Kersi Irani

PDF

RiverLand 2.0: Blending of Multiple User-defined Slopes in a Procedurally Modeled Terrain, Jeffrey Jensen

PDF

Association Rule Mining -- Geometry and Parallel Computing Approach, Dongyi Jia

PDF

Association Mining in Database Machine, Jindou Jiao

PDF

EVALUATION OF CLASSICAL INTER-PROCESS COMMUNICATION PROBLEMS IN PARALLEL PROGRAMMING LANGUAGES, Arunesh Joshi

PDF

AB INITIO PROTEIN STRUCTURE PREDICTION ALGORITHMS, Maciej Kicinski

PDF

Jshield: A Java Anti-Reversing Tool, Deepti Kundu

PDF

JShield: A Java Anti-Reversing Tool, Deepti Kundu

PDF

A Machine Learning and Compiler-based Approach to Automatically Parallelize Serial Programs Using OpenMP, Nam Quang Lam

PDF

JDPET: Java Dynamic Programming Educational Tool, Aaron Lemoine

PDF

Improving Performance of BitTorrent Network through Incentive Mechanism, Mingzhe Li

PDF

RNA SECONDARY STRUCTURE PREDICTION TOOL, Meenakshee Mali

PDF

Java Smell Detector, Nitin Mathur

PDF

Interface Design for Graphics Editor on Multi- Touch Point Systems, Srujitha Mullapudi

PDF

Robust Watermarking using Hidden Markov Models, Mausami Mungale

PDF

Substitution Cipher with Non­Prefix Codes, Rashmi Bangalore Muralidhar

PDF

Medical Analysis Question and Answering Application for Internet Enabled Mobile Devices, Loc Nguyen

PDF

Smart Search: A Firefox Add-On to Compute a Web Traffic Ranking, Vijaya Pamidi

PDF

Decompiler For Pseudo Code Generation, Ankit Patel

PDF

Similarity Tests for Metamorphic Virus Detection, Mahim Patel

PDF

URL Recommender using Parallel Processing, Ravi Kishore Penta

PDF

Metamorphic Detection via Emulation, Sushant Priyadarshi

PDF

Users Positions in Social Networks, Jasim Qazi

PDF

DISCOVERING KNOWLEDGE STRUCTURE IN THE WEB, Siddharth Ramu

PDF

Graph Technique For Metamorphic Virus Detection, Neha Runwal

PDF

AUTOMATED PENETRATION TESTING, Neha Samant

PDF

A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in a Cloud Computing Environment, Shailesh Sawant

PDF

Enhancing Productivity of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena

PDF

FBchatters: A Facebook application for Gtalk, Ronak Shah

PROTECTIVE SHIELD FOR POLYMORPHIC VIRUSES, Priyadarshini Shanmuganathan

PDF

Algorithms Analysis System: Recurrences, Anchit Sharma

PDF

Dynamic Code Checksum Generator, Ashish Sharma

PDF

Improving the Performance of a Proxy Server using Web log mining, Akshay Shenoy

PDF

AUGMENTED-LIFE PHONE ORGANIZER, Chao-Hsin Shih

PDF

X10 vs Java: Concurrency Constructs and Performance, Anh Trinh

PDF

Online and Offline eBook Management System using W-CMS, Rohan Vibhandik

PDF

Scanned Wireless Network Setup Fake Access Point & its Detection, Saurabh Vishal

PDF

BitTorrent Traffic Detection with Deep Packet Inspection and Deep Flow Inspection, Raymond Wong

PDF

CENTRALIZED SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS, Li Yang

PDF

Learning Author’s Writing Pattern System By Automata, Qun Yu

PDF

ActiBot: A Botnet to Evade Active Detection, Xinjun Zhang

Master's Projects from 2010

PDF

Online Application Monitoring Tool, Sathya Anandan

PDF

UNDO: A System for Neutralizing Nuisance Attacks, Eilbroun Waltin Benjamin

PDF

Extending OWL with Finite Automata Constraints, Jignesh Borisa

PDF

A Framework for Active Learning: Revisited, Yue Chen

PDF

The ActiveLecture System, Sanuja Dabade

PDF

Japanese Kanji Suggestion Tool, Sujata Dongre

PDF

Enhancing open-source localization, Farzana Forhad

PDF

WiSeNetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale

PDF

Exhaustive Statistical Analysis for Detection of Metamorphic Malware, Aditya Govindaraju

PDF

A Study on Masquerade Detection, Lin Huang

PDF

Reliable Broadcasting in VANET, Pat Jangyodsuk

PDF

Clustering and Validation of Microarray Data Using Consensus Clustering, Sarbinder Kallar

PDF

Finding Duplication Events Using GenomeVectorizer, Elena Kochetkova

PDF

An Online Versions of Hyperlinked-Induced Topics Search (HITS) Algorithm, Amith Kollam Chandranna

PDF

Food Phone Application, Shengyu Li

PDF

Intrusion Detection And Prevention System: SQL-Injection Attacks, Varian Luong