Department of Computer Science and Technology
Collections in this Department
Recent Submissions
-
Time series data analysis of stock price movement using machine learning techniques
(Springer, 2020)Stock market also called as equity market is the aggregation of the sellers and buyers. It is concerned with the domain where the shares of various public listed companies are traded. For predicting the growth of economy, ... -
Comparative Analysis of Salt and Pepper Removal Techniques for Binary Images
(Springer, 2020)Binarization is the most important step in the OCR system that converts the gray level or colored images into bi-level form. In the case of degraded images, results after binarization mostly contain noises. Salt and pepper ... -
Modified Sauvola binarization for degraded document images
(Elsevier, 2020)The binarization of historical documents is a difficult job due to the presence of many degradations. Many existing local binarization techniques use certain manually adjusted parameters. The output of these techniques is ... -
Clustering of tweets: A novel approach to label the unlabelled tweets
(Springer, 2020)Twitter is one of the fastest growing microblogging and online social networking site that enables users to send and receive messages in the form of tweets. Twitter is the trend of today for news analysis and discussions. ... -
Static, dynamic and intrinsic features based android malware detection using machine learning
(Springer, 2020)Android is one of the smartest and advanced operating systems in the mobile phone market in the current era. The number of smartphone users based on the Android platform is rising swiftly which increases its popularity all ... -
Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data
(Springer, 2020)Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The ... -
Investigating the role of code smells in preventive maintenance
(University of Tehran, 2019)The quest for improving the software quality has given rise to various studies which focus on the enhancement of the quality of software through various processes. Code smells, which are indicators of the software quality ... -
Detection and prevention of de-authentication attack in real-time scenario
(Blue Eyes Intelligence Engineering and Sciences Publication, 2019)Wireless Local Area Network (WLAN) is an infrastructure network in which nodes are connected to a centralized system to provide Internet access to mobile users by radio waves. But WLANs are vulnerable to Medium Access ... -
Enhanced routing protocol for VANET
(Blue Eyes Intelligence Engineering and Sciences Publication, 2019)A class of networks called VANET(vehicular adhoc network),the extension of MANETs(mobile adhoc network) are based on the principle of the formation of wireless network for exchange of data and the creation of network is ... -
Fake news detection of Indian and United States election data using machine learning algorithm
(Blue Eyes Intelligence Engineering and Sciences Publication, 2019)The world of digital media is thriving by the day and hence, there is an urge of businesses to magnify it more gaining them maximum financial benefits. This particular urge calls for more and more expansions concerning ... -
Detection of counterfeit indian currency note osing image processing
(Blue Eyes Intelligence Engineering and Sciences Publication, 2019)Most of the country suffering from the problem of counterfeit note. Indian is also part of such problem. As advance in technology, it is possible for anyone to print counterfeit note. Such counterfeit notes are produced ... -
Implementation and analysis of enhanced obfuscation technique for data security
(Blue Eyes Intelligence Engineering and Sciences Publication, 2019)With the fast development of digital exchange of data in an electronic way, data and information security are becoming more important in both transmission and data storage. Cryptography is used as a solution which plays ... -
Handover between Wi-Fi and WiMAX technologies using GRE tunnel
(Springer, 2019)The next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible ... -
Face detection techniques: a review
(Springer, 2019)With the marvelous increase in video and image database there is an incredible need of automatic understanding and examination of information by the intelligent systems as manually it is getting to be plainly distant. Face ... -
Code clone detection and analysis using software metrics and neural network: A Literature Review
(Eighth Sense Research Group, 2015)Code clones are the duplicated code which degrade the software quality and hence increase the maintenance cost. Detection of clones in a large software system is very tedious tasks but it is necessary to improve the design, ... -
Prevention of black hole attack over AODV and DSR MANET routing protocol
(WARSE, 2015)Wireless technology is one of the biggest contributions to mankind. In wireless system, transmission of information can be done without the need of wires and cables. Mobile Adhoc Networks (MANETs) do not have any centralized ... -
Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol.
(IJRET, 2015)Vehicular Ad Hoc Network (VANET) is a kind of Wireless Ad hoc Network in which node has high mobility, and thus the topology of the network is highly dynamic. VANET has thepotential to increase road safety, improve traffic ... -
Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System
(IJCTT, 2015)Distributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically ... -
Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing
(IASIR, 2014)Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means ... -
A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model
(IJRET, 2014)Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified ...