DSpace Repository

Browsing MASTERS' THESES (CSE) by Issue Date

Browsing MASTERS' THESES (CSE) by Issue Date

Sort by: Order: Results:

  • Jaiswal, Shubhangi (I I T ROORKEE, 2017-11)
    In recent years, with increase in the use of Internet the multimedia contents on it have rapidly increased. Users may want to go through a video in top down manner i.e. browsing the videos, or in bottom up manner i.e. ...
  • Tak, Raghu (I I T ROORKEE, 2017-11)
    To detect emotions of the writer in any textual corpus is a requirement that has been persistent in the industry. In the current phase of this research work, we are focusing only on the eight primary bipolar emotions ...
  • Gahalawat, Monika (I I T ROORKEE, 2018-05)
    Sentiment Analysis is a rapidly growing field of research due to the explosive growth in digital information, there is a need to filter out unnecessary information and get meaningful results out of this huge information. ...
  • Spandana, Dola (I I T ROORKEE, 2018-05)
    Software engineering is partial without Software reliability prediction. “For characterizing any software product quality quantitatively during phase of testing, the most important factor is software reliability assessment. ...
  • Kartik (I I T ROORKEE, 2018-05)
    In this Internet era, multimedia content is drastically increasing over the Internet and distributed over thousands of servers. In order to nd content over the large scale database, content-based search strategies(CBIR) ...
  • Rani, Rachna (I I T ROORKEE, 2018-05)
    The social opinion for products and services advertised on online platforms such as Amazon, TripAdvisor or YouTube plays a vital role in shaping the decision of users. The products and services most liked by the users ...
  • Kadam, Deepika (I I T ROORKEE, 2018-05)
    In the past few years, many object classification techniques have been developed. However, these techniques do not perform very well when categorizing objects belonging to fine-grained categories. It is easier to ...
  • Sharma, Shivali (I I T ROORKEE, 2018-05)
    Generative Adversarial Networks that fall under the class of generative models, aim at taking training examples from the training set and learning the probability distribution that generates those samples. The network ...
  • Dixit, Deepanshu (I I T ROORKEE, 2018-05)
    In inter-releases software fault prediction, the data from the previous version of the software that is used for training the classifier might not always be of same granularity as that of the testing data. The same ...
  • Rathi, Ayush (I I T ROORKEE, 2018-05)
    Time Series data are of crucial importance as they depict trends among various entities over time. Finding similarity in patterns in time series data can help in getting meaningful insights in it. This work presents a ...
  • Singh, Vipin (I I T ROORKEE, 2018-05)
    The availability of location-tracking devices such as GPS, Cellular Networks and other devices provides the facility to log a person or device locations automatically. This creates spatio-temporal datasets of user's movement ...
  • Kaur, Manpreet (I I T ROORKEE, 2018-05)
    In this report, a di erent approach for the semantic segmentation of images is presented. It mainly focuses on the semantic analysis of images that lessen the gap between semantics and low level visual features of images. ...
  • Katta, Mridul (I I T ROORKEE, 2018-05)
    With Cloud and Internet among the essential pillars on which the world resides in this era. With the increasing advancements in technology, network speed and a need of greater, more reliable and feasible processing power, ...
  • Mitra, Anirban (I I T ROORKEE, 2018-05)
    Thermal Comfort indicates human interpretation of comfort level of an environment. Predicting Thermal Comfort for a certain future date can have several applications. Predictive Mean Vote (PMV) is one of the most used ...
  • Chauhan, Sneha (I I T ROORKEE, 2018-05)
    Internet is today’s buzz. It brings with it, many advantages and disadvantages. One such disadvantage is security. The communication done through the Internet must be secure so that no third party could read the information ...
  • Khurana, Vaishali (I I T ROORKEE, 2018-05)
    The appearance of unknown words often disturbs communication and reading. The proposed system focuses on detecting those words which are unfamiliar to the users using temporal data, Electroencephalography (EEG) and facial ...
  • Jaiswal, Govind (I I T ROORKEE, 2018-05)
    Linear Programming is a way of allocating resources in e cient manner so that cost in allocation can be minimized and pro t can be maximized. Linear Pro- gramming is based on mathematical formulations .Transportation ...
  • Koshti, Girish (I I T ROORKEE, 2018-05)
    A grid usually is two or more sets of parallel lines in 2D or planes in 3D that intersect one another (called as grid points) at particular angle. It divides the plane or space into many congruent polytopes. Most common ...
  • Makkar, Himanshu (I I T ROORKEE, 2018-05)
    Frequent itemset mining is a field of data mining wherein we extract frequent itemsets from the dataset. This may reveal sensitive patterns. Privacy Preserving Data Mining(PPDM) approaches are used to hide sensitive ...
  • Sagar, Himanshu (I I T ROORKEE, 2018-05)
    Whenever an individual start planning for a trip, one basic question arises in front of him, “where”? This problem of finding a tourist place is very common in today’s world. At first the suggestion for place to visit, ...