COMPUTER SCIENCE AND ENGINEERING: Recent submissions

  • Raikwar, Meenakshi (I I T ROORKEE, 2019-05)
    The data loss due to connection failure from an Internet-of-Things (IoT) device to a Cloud may occur due to disruption or many other reasons. Buffering is one of the ways to handle such data losses. The work in this thesis ...
  • Sood, Akriti (I I T ROORKEE, 2019-05)
    Internet of Things (IoT) is the interconnection of Internet-enabled devices that can share information with each other or to Cloud servers. The communication between the delivering nodes and the Cloud server is vulnerable ...
  • Gupta, Naveen (I I T ROORKEE, 2019-05)
    In response phase of disaster management, immediate actions are taken by various organizations to fulfill humanitarian needs. In a post-disaster scenario, the aim of disaster relief team is to serve maximum people within ...
  • Rai, Nitesh Kumar (I I T ROORKEE, 2019-05)
    Due to explosive evolution and popularity of electronic media, Online shopping and Social media sites, vast amount of user review and experience available in the form of raw data. It can be used for opining mining or ...
  • Sharma, Shanu (I I T ROORKEE, 2019-05)
    O ine handwritten text recognition from images is a signi cant is- sue for the organisa- tions endeavoring to digitize huge volumes of handmarked scanned. Handwriting recogni- tion is the capability of the computers to ...
  • Rocky, Swagatam Roy (I I T ROORKEE, 2019-05)
    Since its public availability in 1994, RC4 has been extensively used for data – security measures. The specialty of RC4 lies within its formation – it is very easy to implement compared to other stream ciphers while ...
  • Bagdi, Mohit Kumar (I I T ROORKEE, 2018-12)
    Applying Multi-agent coordination techniques in RoboCup Saving model rivalries has been an important part of RoboCup and the knowledge grown during the RoboCup Rescue Simulation rivalries has enhanced coordination among ...
  • Singh, Alok (IIT ROORKEE, 2019-05)
    Taxis play an important role in transportation service. Unlike other transportation service like train, buses, etc., they provide service at your desired time and place. Taxicabs cruise for passengers at taxis stands, along ...
  • Singh, Vipin (I I T ROORKEE, 2018-05)
    The availability of location-tracking devices such as GPS, Cellular Networks and other devices provides the facility to log a person or device locations automatically. This creates spatio-temporal datasets of user's movement ...
  • Khurana, Vaishali (I I T ROORKEE, 2018-05)
    The appearance of unknown words often disturbs communication and reading. The proposed system focuses on detecting those words which are unfamiliar to the users using temporal data, Electroencephalography (EEG) and facial ...
  • Chauhan, Sneha (I I T ROORKEE, 2018-05)
    Internet is today’s buzz. It brings with it, many advantages and disadvantages. One such disadvantage is security. The communication done through the Internet must be secure so that no third party could read the information ...
  • Sharma, Shubham (I I T ROORKEE, 2018-05)
    With the evolution of the software industry, the growing software complexity led to the increase in the number of software faults. According to the study, the software faults are responsible for many unplanned system ...
  • Jaiswal, Shubhangi (I I T ROORKEE, 2017-11)
    In recent years, with increase in the use of Internet the multimedia contents on it have rapidly increased. Users may want to go through a video in top down manner i.e. browsing the videos, or in bottom up manner i.e. ...
  • Sharma, Shivali (I I T ROORKEE, 2018-05)
    Generative Adversarial Networks that fall under the class of generative models, aim at taking training examples from the training set and learning the probability distribution that generates those samples. The network ...
  • Yadav, Sheetal (I I T ROORKEE, 2018-05)
    The success behind Deep Learning have mostly relied on Convolutional Neural Network. Convolutional Neural Networks became popular because of their e - cient ability to exploit signi cant statistical properties of images, ...
  • Sharma, Renuka (I I T ROORKEE, 2018-05)
    Action recognition seems to be a very easy task for us humans but it requires a lot of information processing in terms of recognizing patterns when it comes to computer systems. Here, we try to devise a new way of ...
  • Sharma, Rajat (I I T ROORKEE, 2018-05)
    With the enormous amount of data, especially images, getting produced every minute and the ease of availability of cloud services at cheaper rates, there is an exponential increase in the amount of data being moved to the ...
  • Tak, Raghu (I I T ROORKEE, 2017-11)
    To detect emotions of the writer in any textual corpus is a requirement that has been persistent in the industry. In the current phase of this research work, we are focusing only on the eight primary bipolar emotions ...
  • Rani, Rachna (I I T ROORKEE, 2018-05)
    The social opinion for products and services advertised on online platforms such as Amazon, TripAdvisor or YouTube plays a vital role in shaping the decision of users. The products and services most liked by the users ...
  • Mishra, Akshat (I I T ROORKEE, 2018-05)
    Phishing isawayofobtainingpersonalinformationthroughillegitimatewebsitesthatare exactly sameaslegitimatewebsite.Therearemanytechniquesavailabletodetectphishing websites, butcurrenttechniquesleavemuchtobeobtained.Aprima ...