Research reports: Recent submissions

  • Wonganusorn, Chayawit (AIT, 2017-08)
    Most information from residential rental Web applications does not have enough detailed information, coverage, or maintenance. In this research study, I explore the hypothesis that residential rental Web applications are ...
  • Rana, Anubhav (AIT, 2017-05)
    Millions of posts on social media are related to product reviews of a company’s products. To understand how these products are performing, sentiment analysis which is an application of text mining can be applied to extract ...
  • Arunkumar, Godugu (2017-07)
    Email is the most widely used method for interaction today. It is fundamental asset for business communication. As it is most prominent and regular method of interaction on web, it likewise makes interest for intruders or ...
  • Gangisetty, Sai Sathwik (AIT, 2017-07)
    To reduce traffic problems , violation reporting should be nearly universal and automatic. With study violation reporting, the violation can be reduced,helping to reduce traffic problems. Instead of conventional violation ...
  • V, Satya Kiriti (AIT, 2017-07)
    Security and customer service are major issues all over the world. To take security a step ahead, CCTV cameras are being brought in, and now video analytic models are being applied to these CCTV feeds. Displaying data ...
  • Ponnuru, Anitha (AIT, 2017-07)
    In the digital era, police forces have access to quickly expanding sources of information. The enormous increase in the amount of available data has made the use of data mining techniques essential in finding important ...
  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Dontamsetti, Ranjith Venkata (AIT, 2017-07)
    Chat-bot technology is gaining immense popularity in the field of computer science. Multiple approaches have been taken to build chat-bots that have conversations close enough to humans. Natural Language Processing , AIML ...
  • Shakya, Manish (AIT, 2017-07)
    The combination of two languages to make a new language by merging the features of two will always be beneficiary. Java programming language is a popular languages with many feature of modularity, abstraction among other ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Bhattarai, Shyam (AIT, 2017-07)
    Pacman is a popular arcade game developed in 1980 and is well known among the masses. The main character in the game is Pacman, whose movement is controlled by the player. The other characters in the game are four ghosts ...
  • Raja, Vyshnavi (AIT, 2017-05-08)
    Mining techniques have proven to be effective in exploring data. In my research study I want to use Data mining Techniques on the Yelp Data set. Yelp is one of the best website for users to review the local business of ...
  • Naing, Zin Hsu (2016-12)
    This research system was built to help preschoolers, pre-kindergarteners, and kindergarteners for their English Learning. Nowadays, technologies are very much improving and using internet websites are enormously increasing. ...
  • Yang, Jiawei (AIT, 2016-07)
    Collaborative filtering algorithms are among the most widely used in recommender systems. Since CF algorithms follow a common assumption, that similar users will give similar rating to similar items, I explore four techniques ...
  • Ali, Umar (AIT, 2016-07)
    The world is going to be more and more digital with effective utilization of information and communication technologies in government services, to provide services to their citizens. In developing counties, public cloud ...
  • Mohsin, Mazhar (AIT, 2016-07)
    In recent years there has been an increasing number of terrorist attacks and bomb blasts in many public places. Video surveillance systems used in these places currently require monitoring by human operators constantly. ...
  • Klaypu, Sornrak (AIT, 2016-07)
    Integration of CCTV cameras and video analytics increase the value of the CCTV camera networks. Advanced analytics are needed almost everywhere, but they are not easy to de- velop and deploy. Luckily, the OpenCCTV ...
  • Tangthamniyom, Sariya (AIT, 2016-05)
    XSLT is a style sheet language for transforming XML documents. The structure of XML and XSLT is dealing with a tree, while the key structure of semantic analyzer phases in compiler technology also is a tree. The aim of ...
  • Sarmadi, Paul-Darius (AIT, 2016-05-11)
    The problem of recognizing a previously identified criminal, hoping to follow him or her through video cameras feeds is a key issue. However, police require a great deal of human resources to perform this task. Automating ...
  • Shakya, Sanindra (AIT, 2016-06)
    The development in technology has made easier to access and use Internet, which has increased the use of the web in mathematics tutoring and education. This growth has helped the students to gain the mathematical knowledge ...

Search DSpace


Advanced Search

Browse

My Account