DSpace Repository

COMPUTER SCIENCE AND ENGINEERING

COMPUTER SCIENCE AND ENGINEERING

 

Collections in this community

Recent Submissions

  • Kulshrestha, Tarun Kumar (I.I.T Roorkee, 2019-04)
    Smart city integrates various intelligent devices, infrastructures, and services to monitor and control human activities with efficiency. Smart city management requires aggregation of urban informatics for sustainable ...
  • Saini, Rajkumar (I.I.T Roorkee, 2019-01)
    Object motion trajectory classification is the important task, especially when we aim to detect abnormal movement patterns in order to take appropriate actions for prohibiting unwanted events to occur. Given a set of ...
  • Gautam, Anjali (I.I.T Roorkee, 2019-01)
    Brain stroke is a life threatening medical emergency which requires immediate medical care. This may be caused due to the blockage or bursting of brain's blood vessel. Based on the cause, it is named as ischemic or ...
  • Gupta, Swati (I.I.T Roorkee, 2018-09)
    Nowadays, digital media has become a source of huge amount of up-to-date information which increases exponentially day by day. The information is concealed with unstructured data and the end user cannot directly access ...
  • Purohit, Lalit (I.I.T Roorkee, 2018-12)
    The potential of web service to automate machine to machine interaction has developed faith in using web service technology for building smart applications. It leads to increase in the interest of software developers ...
  • Thukral, Kapil (I I T ROORKEE, 2019-09)
    If we place an agent in an environment and leave it to the agents to learn the map of the envi- ronment, then there are many ways to learn the static topological/metric map of the environment, the problem considered in ...
  • Javiya, Ravi (I I T ROORKEE, 2019-05)
    As the use of sensor network, GPS, and telecommunication technology increased, the availability of spatio-temporal data is also increasing exponentially. The use of these technologies also increased in the eld of ...
  • Jindal, Sajal (I I T ROORKEE, 2019-05)
    Phishing attacks are one of the most serious threats faced by the users on the internet the attackers try to steal sensitive information such as login details, credit card details, etc. by deceiving the users to enter ...
  • Pal, Surbhi (I I T ROORKEE, 2019-05)
    Microfluidics is the branch of science which deals with the manipulation of fluids in the sub-millimeter scale. With the evolution of technology, digital microfluidic (DMF) biochips have become a vital part of biochemical ...
  • Pandey, Neha (I I T ROORKEE, 2019-05)
    The aim is to address the problem of exploiting multiple sources of information for object classi cation tasks when additional modali- ties that are present in the labeled training set are not available for inference. ...
  • Nigade, Nagendra Sunil (I I T ROORKEE, 2019-05)
    In current situation, each user is generating gigabytes of data each day. The quantity of data is so huge that we have dependent on machine learning models to capture import data / to capture patterns from data that can ...
  • Agrawal, Nishtha (I I T ROORKEE, 2019-05)
    Frequent itemset mining is a field of data mining where frequent itemsets are extracted from the dataset. This may reveal some sensitive information which is not meant to be shared with third party. Privacy Preserving Data ...
  • Maheshwari, Anmol (I I T ROORKEE, 2019-05)
    Mobile phones now days have different kinds of sensors such as accelerometer, gyroscope, proximity sensors, barometer etc. Nowadays most people have smart phones and almost all smart phones have these sensors. So data ...
  • Omer, Aman (I I T ROORKEE, 2019-05)
    With increasing applications of software, quality assurance becomes an important phase of software life cycle which makes Software Fault Prediction an essential research topic. Software fault prediction uses existing ...
  • Deshpande, Tejas (I I T ROORKEE, 2019-04)
    Convolutional Neural Networks (CNNs) dominate various computer vision tasks since Alex Krizhevsky showed that they can be trained effectively and reduced the top-5 error from 26.2 % to 15.3 % on the ImageNet large scale ...
  • Sharma, Saurabh (I I T ROORKEE, 2019-05)
    Given a con guration involving n objects in an environment, the planning problem considered in this theses is to nd a plan that re- arranges these objects so as to place a new object. The challenging aspect here involves ...
  • Chauhan, Rahul (I I T ROORKEE, 2019-05)
    Detecting Violence in videos automatically and fast is very much essential as it's neither possible nor feasible to continuously monitor a huge database of videos. It's critical to quickly determine violence as it can ...
  • Bhasin, Harsimran (I I T ROORKEE, 2019-05)
    During the last two decades of the 20th century, scientists have sought to combine elements of quantum mechanics and information processing. This has given birth to a new eld of quantum computing. The importance of this ...
  • Himanshi (I I T ROORKEE, 2019-05)
    Software fault prediction is the procedure to foresee whether a module in software is faulty or not by utilizing the past information and some learning models. From the previous version of the software past information is ...
  • Jhunjhunuwala, Khushbu (I I T ROORKEE, 2019-05)
    The opinions on online platforms like Amazon, Goibibo, TripAdvisor for products or services are widely used by customers or users for their decision making in recent years. The products or services which are highest rated ...

View more