DSpace Repository

Computer Science (CS)

Computer Science (CS)

 

Sub-communities within this community

Recent Submissions

  • Wonganusorn, Chayawit (AIT, 2017-08)
    Most information from residential rental Web applications does not have enough detailed information, coverage, or maintenance. In this research study, I explore the hypothesis that residential rental Web applications are ...
  • Rana, Anubhav (AIT, 2017-05)
    Millions of posts on social media are related to product reviews of a company’s products. To understand how these products are performing, sentiment analysis which is an application of text mining can be applied to extract ...
  • Arunkumar, Godugu (2017-07)
    Email is the most widely used method for interaction today. It is fundamental asset for business communication. As it is most prominent and regular method of interaction on web, it likewise makes interest for intruders or ...
  • Gangisetty, Sai Sathwik (AIT, 2017-07)
    To reduce traffic problems , violation reporting should be nearly universal and automatic. With study violation reporting, the violation can be reduced,helping to reduce traffic problems. Instead of conventional violation ...
  • V, Satya Kiriti (AIT, 2017-07)
    Security and customer service are major issues all over the world. To take security a step ahead, CCTV cameras are being brought in, and now video analytic models are being applied to these CCTV feeds. Displaying data ...
  • Ponnuru, Anitha (AIT, 2017-07)
    In the digital era, police forces have access to quickly expanding sources of information. The enormous increase in the amount of available data has made the use of data mining techniques essential in finding important ...
  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Dontamsetti, Ranjith Venkata (AIT, 2017-07)
    Chat-bot technology is gaining immense popularity in the field of computer science. Multiple approaches have been taken to build chat-bots that have conversations close enough to humans. Natural Language Processing , AIML ...
  • Shakya, Manish (AIT, 2017-07)
    The combination of two languages to make a new language by merging the features of two will always be beneficiary. Java programming language is a popular languages with many feature of modularity, abstraction among other ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Bhattarai, Shyam (AIT, 2017-07)
    Pacman is a popular arcade game developed in 1980 and is well known among the masses. The main character in the game is Pacman, whose movement is controlled by the player. The other characters in the game are four ghosts ...
  • Alexandre, Jayet-Laraffe (AIT, 2017-05)
    Surveillance and security are two main notions in public debates all around the world. Due to both terrorist attacks and crime, people want more surveillance but want it to be less intrusive. That is why video surveillance ...
  • Bazard, Benoit (AIT, 2017-05)
    The aim of the present paper is to design a way to perform character segmentation on license plates using convolutional neural networks without explicitely performing character recognition so as to keep the segmentation ...
  • Raja, Vyshnavi (AIT, 2017-05-08)
    Mining techniques have proven to be effective in exploring data. In my research study I want to use Data mining Techniques on the Yelp Data set. Yelp is one of the best website for users to review the local business of ...
  • Karim, Nabil Tahmidul (AIT, 2017-05)
    Customer experience, feedback and keeping a customer engaging surrounding are influential factors for any retail store. Acknowledging these facts enhance the development of businesses. Acquiring constructive statistics ...
  • Jain, Sanjana (AIT, 2017-05)
    Applications for identifying and tracking target individuals in stores are now rapidly finding their way onto retail businesses' agendas. Many retailers would like to implement a blacklisted tracking system, and other ...
  • Tissera, Ponsuge Anjana Chandani (AIT, 2017-05)
    Surveillance cameras and infrastructure such as Video Management Systems (VMSs) and Digital Video Recorders (DVRs) have become a ubiquitous commodities in the present day world. Video streams obtained from these cameras ...
  • Jayet-laraffe, Alexandre (AIT, 2017-05)
    Surveillance and security are two main notions in public debates all around the world. Due to both terrorist attacks and crime, people want more surveillance but want it to be less intrusive. That is why video surveillance ...
  • K.C., Dharma Raj (AIT, 2017-04-26)
    Today, road accidents are one of the major causes of human deaths. Among the different type of road accidents, motorcycle accidents are common in Asia and cause severe injuries. The helmet is the main protection device ...
  • Majeed, Muhammad Faran (AIT, 2017-01)
    From its origin, the Internet was based on sharing resources among end-systems. With the passage of time, it has spread world wide, and the primary purpose of the network has evolved from resource sharing among small ...

View more