MASTERS' THESES (CSE): Recent submissions

  • Thukral, Kapil (I I T ROORKEE, 2019-09)
    If we place an agent in an environment and leave it to the agents to learn the map of the envi- ronment, then there are many ways to learn the static topological/metric map of the environment, the problem considered in ...
  • Javiya, Ravi (I I T ROORKEE, 2019-05)
    As the use of sensor network, GPS, and telecommunication technology increased, the availability of spatio-temporal data is also increasing exponentially. The use of these technologies also increased in the eld of ...
  • Jindal, Sajal (I I T ROORKEE, 2019-05)
    Phishing attacks are one of the most serious threats faced by the users on the internet the attackers try to steal sensitive information such as login details, credit card details, etc. by deceiving the users to enter ...
  • Pal, Surbhi (I I T ROORKEE, 2019-05)
    Microfluidics is the branch of science which deals with the manipulation of fluids in the sub-millimeter scale. With the evolution of technology, digital microfluidic (DMF) biochips have become a vital part of biochemical ...
  • Pandey, Neha (I I T ROORKEE, 2019-05)
    The aim is to address the problem of exploiting multiple sources of information for object classi cation tasks when additional modali- ties that are present in the labeled training set are not available for inference. ...
  • Nigade, Nagendra Sunil (I I T ROORKEE, 2019-05)
    In current situation, each user is generating gigabytes of data each day. The quantity of data is so huge that we have dependent on machine learning models to capture import data / to capture patterns from data that can ...
  • Agrawal, Nishtha (I I T ROORKEE, 2019-05)
    Frequent itemset mining is a field of data mining where frequent itemsets are extracted from the dataset. This may reveal some sensitive information which is not meant to be shared with third party. Privacy Preserving Data ...
  • Maheshwari, Anmol (I I T ROORKEE, 2019-05)
    Mobile phones now days have different kinds of sensors such as accelerometer, gyroscope, proximity sensors, barometer etc. Nowadays most people have smart phones and almost all smart phones have these sensors. So data ...
  • Omer, Aman (I I T ROORKEE, 2019-05)
    With increasing applications of software, quality assurance becomes an important phase of software life cycle which makes Software Fault Prediction an essential research topic. Software fault prediction uses existing ...
  • Deshpande, Tejas (I I T ROORKEE, 2019-04)
    Convolutional Neural Networks (CNNs) dominate various computer vision tasks since Alex Krizhevsky showed that they can be trained effectively and reduced the top-5 error from 26.2 % to 15.3 % on the ImageNet large scale ...
  • Sharma, Saurabh (I I T ROORKEE, 2019-05)
    Given a con guration involving n objects in an environment, the planning problem considered in this theses is to nd a plan that re- arranges these objects so as to place a new object. The challenging aspect here involves ...
  • Chauhan, Rahul (I I T ROORKEE, 2019-05)
    Detecting Violence in videos automatically and fast is very much essential as it's neither possible nor feasible to continuously monitor a huge database of videos. It's critical to quickly determine violence as it can ...
  • Bhasin, Harsimran (I I T ROORKEE, 2019-05)
    During the last two decades of the 20th century, scientists have sought to combine elements of quantum mechanics and information processing. This has given birth to a new eld of quantum computing. The importance of this ...
  • Himanshi (I I T ROORKEE, 2019-05)
    Software fault prediction is the procedure to foresee whether a module in software is faulty or not by utilizing the past information and some learning models. From the previous version of the software past information is ...
  • Jhunjhunuwala, Khushbu (I I T ROORKEE, 2019-05)
    The opinions on online platforms like Amazon, Goibibo, TripAdvisor for products or services are widely used by customers or users for their decision making in recent years. The products or services which are highest rated ...
  • Raikwar, Meenakshi (I I T ROORKEE, 2019-05)
    The data loss due to connection failure from an Internet-of-Things (IoT) device to a Cloud may occur due to disruption or many other reasons. Buffering is one of the ways to handle such data losses. The work in this thesis ...
  • Sood, Akriti (I I T ROORKEE, 2019-05)
    Internet of Things (IoT) is the interconnection of Internet-enabled devices that can share information with each other or to Cloud servers. The communication between the delivering nodes and the Cloud server is vulnerable ...
  • Gupta, Naveen (I I T ROORKEE, 2019-05)
    In response phase of disaster management, immediate actions are taken by various organizations to fulfill humanitarian needs. In a post-disaster scenario, the aim of disaster relief team is to serve maximum people within ...
  • Rai, Nitesh Kumar (I I T ROORKEE, 2019-05)
    Due to explosive evolution and popularity of electronic media, Online shopping and Social media sites, vast amount of user review and experience available in the form of raw data. It can be used for opining mining or ...
  • Sharma, Shanu (I I T ROORKEE, 2019-05)
    O ine handwritten text recognition from images is a signi cant is- sue for the organisa- tions endeavoring to digitize huge volumes of handmarked scanned. Handwriting recogni- tion is the capability of the computers to ...