DSpace Repository

Research reports

Research reports

Recent Submissions

  • Ramya, Parupudi Swathi (2018-08)
    SAT exam has been recognized for more than seven decades. It gives a standardized platform for both college and students. Universities can determine which student will shine on their campus and students can showcase their ...
  • Karri, Surya Rao (AIT, 2018-08)
    The research study is to build an evaluation system for a test taker for the TOEFL examination, which is standardized test to evaluate the proficiency of English language. This system focus on the security I.e. to guarantee ...
  • Kotipalli, Shiva Kumar (AIT, 2018-08-04)
    Modern innovations in imaging technologies and image processing has lead to various inter- esting applications in diverse fields such as medicine,s cience and engineering, agriculture, the live telecasts on a television. ...
  • Alfian, Alfian (2018-05)
    Retail stores strive to optimize sales. However, optimizing sales is difficult for retailers who do not understand their customers' behavior and how that behavior is correlated with sales. Stores that do not understand ...
  • K R, Sree Sainath Reddy (AIT, 2017-12)
    Mobile games are gaining immense popularity in the gaming industry. Deloitte Global predicted that by 2016, the revenue generated by mobile games (smartphone and tablet) will be around \$35 billion, but it exceeded the ...
  • Wonganusorn, Chayawit (AIT, 2017-08)
    Most information from residential rental Web applications does not have enough detailed information, coverage, or maintenance. In this research study, I explore the hypothesis that residential rental Web applications are ...
  • Rana, Anubhav (AIT, 2017-05)
    Millions of posts on social media are related to product reviews of a company’s products. To understand how these products are performing, sentiment analysis which is an application of text mining can be applied to extract ...
  • Arunkumar, Godugu (2017-07)
    Email is the most widely used method for interaction today. It is fundamental asset for business communication. As it is most prominent and regular method of interaction on web, it likewise makes interest for intruders or ...
  • Gangisetty, Sai Sathwik (AIT, 2017-07)
    To reduce traffic problems , violation reporting should be nearly universal and automatic. With study violation reporting, the violation can be reduced,helping to reduce traffic problems. Instead of conventional violation ...
  • V, Satya Kiriti (AIT, 2017-07)
    Security and customer service are major issues all over the world. To take security a step ahead, CCTV cameras are being brought in, and now video analytic models are being applied to these CCTV feeds. Displaying data ...
  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Dontamsetti, Ranjith Venkata (AIT, 2017-07)
    Chat-bot technology is gaining immense popularity in the field of computer science. Multiple approaches have been taken to build chat-bots that have conversations close enough to humans. Natural Language Processing , AIML ...
  • Shakya, Manish (AIT, 2017-07)
    The combination of two languages to make a new language by merging the features of two will always be beneficiary. Java programming language is a popular languages with many feature of modularity, abstraction among other ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Bhattarai, Shyam (AIT, 2017-07)
    Pacman is a popular arcade game developed in 1980 and is well known among the masses. The main character in the game is Pacman, whose movement is controlled by the player. The other characters in the game are four ghosts ...
  • Raja, Vyshnavi (AIT, 2017-05-08)
    Mining techniques have proven to be effective in exploring data. In my research study I want to use Data mining Techniques on the Yelp Data set. Yelp is one of the best website for users to review the local business of ...
  • Naing, Zin Hsu (2016-12)
    This research system was built to help preschoolers, pre-kindergarteners, and kindergarteners for their English Learning. Nowadays, technologies are very much improving and using internet websites are enormously increasing. ...
  • Yang, Jiawei (AIT, 2016-07)
    Collaborative filtering algorithms are among the most widely used in recommender systems. Since CF algorithms follow a common assumption, that similar users will give similar rating to similar items, I explore four techniques ...
  • Ali, Umar (AIT, 2016-07)
    The world is going to be more and more digital with effective utilization of information and communication technologies in government services, to provide services to their citizens. In developing counties, public cloud ...
  • Mohsin, Mazhar (AIT, 2016-07)
    In recent years there has been an increasing number of terrorist attacks and bomb blasts in many public places. Video surveillance systems used in these places currently require monitoring by human operators constantly. ...

View more