CS Research reports, 2017: Recent submissions

  • K R, Sree Sainath Reddy (AIT, 2017-12)
    Mobile games are gaining immense popularity in the gaming industry. Deloitte Global predicted that by 2016, the revenue generated by mobile games (smartphone and tablet) will be around \$35 billion, but it exceeded the ...
  • Wonganusorn, Chayawit (AIT, 2017-08)
    Most information from residential rental Web applications does not have enough detailed information, coverage, or maintenance. In this research study, I explore the hypothesis that residential rental Web applications are ...
  • Rana, Anubhav (AIT, 2017-05)
    Millions of posts on social media are related to product reviews of a company’s products. To understand how these products are performing, sentiment analysis which is an application of text mining can be applied to extract ...
  • Arunkumar, Godugu (2017-07)
    Email is the most widely used method for interaction today. It is fundamental asset for business communication. As it is most prominent and regular method of interaction on web, it likewise makes interest for intruders or ...
  • Gangisetty, Sai Sathwik (AIT, 2017-07)
    To reduce traffic problems , violation reporting should be nearly universal and automatic. With study violation reporting, the violation can be reduced,helping to reduce traffic problems. Instead of conventional violation ...
  • V, Satya Kiriti (AIT, 2017-07)
    Security and customer service are major issues all over the world. To take security a step ahead, CCTV cameras are being brought in, and now video analytic models are being applied to these CCTV feeds. Displaying data ...
  • Ponnuru, Anitha (AIT, 2017-07)
    In the digital era, police forces have access to quickly expanding sources of information. The enormous increase in the amount of available data has made the use of data mining techniques essential in finding important ...
  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Dontamsetti, Ranjith Venkata (AIT, 2017-07)
    Chat-bot technology is gaining immense popularity in the field of computer science. Multiple approaches have been taken to build chat-bots that have conversations close enough to humans. Natural Language Processing , AIML ...
  • Shakya, Manish (AIT, 2017-07)
    The combination of two languages to make a new language by merging the features of two will always be beneficiary. Java programming language is a popular languages with many feature of modularity, abstraction among other ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Bhattarai, Shyam (AIT, 2017-07)
    Pacman is a popular arcade game developed in 1980 and is well known among the masses. The main character in the game is Pacman, whose movement is controlled by the player. The other characters in the game are four ghosts ...
  • Raja, Vyshnavi (AIT, 2017-05-08)
    Mining techniques have proven to be effective in exploring data. In my research study I want to use Data mining Techniques on the Yelp Data set. Yelp is one of the best website for users to review the local business of ...

Search DSpace


Advanced Search

Browse

My Account