Browsing by Subject Computer Science and Engineering

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 332  next >
Upload DateAward DateTitleResearcherGuide(s)
19-Mar-2018Jun-20153D Modelling of Tezpur University campus for android devicesBhattacharyya, AnuragSingh, S. Ibotombi
6-May-20162014Addressing some issues in packet dropping attack detection in MANETsKakoty, Bobby SharmaSarma, Nityananda; Hazarika, Shyamanta Moni
1-Feb-2018Jun-2012Analysis and design of an anomaly detection algorithm using SNMP dataChakraborty, Barnali; Hoque, ArifulSarma, Nityananda
7-Feb-2019Oct-2015Analysis of gene expression and protein-protein interaction data using supervised and unsupervised ensemble methodsNagi, SajidBhattacharyya, Dhruba Kumar
1-Feb-2018May-2014An analysis on suitability of using CAI for gene expression predictionJha, VidyapatiSatapathy, Siddhartha Sankar
1-Feb-2018Jun-2015Android based scoring system for archery sportMedhi, Mithulesh Kumar; Gohain, MridulSingh, S. Ibotombi
1-Feb-2018May-2014Android based voice call processing application for mobile devicesSaikia, BirendrajitDeka, Sanjib Kr
12-May-20162012Anomaly based network intrusion detection using data mining techniquesGogoi, PrasantaBhattacharyya, D. K.; Borah, Bhogeswar
1-Feb-2018May-2014Anonymization of networkkumar, ManishKarmakar, Arindam
1-Feb-2018May-2015Appbuilder: report generationSoni, RahulGoswami, Deepak
1-Feb-2018May-2014Application layer DDoS attack detection using machine learning approachGohain, AnupamBhattacharyya, Dhruba Kumar
1-Feb-2018Jun-2013Application of GIS & modeling tools for simulation of water flow & soil lossThawait, Arvind KumarSatapathy, Siddhartha Sankar; Patra, S. C.
19-Mar-2018Jun-2015Application of rough set in diagnosis of heart diseaseJaishi, ShivPatra, Swarnajyoti
6-May-20162014Applications of soft computing in time series forecastingSingh, PritpalBorah, Bhogeswar
6-May-20162013Applying data mining techniques in anomaly based network intrusion detectionBhuyan, Monowar HussainBhattacharyya, D. K.; Kalita, Jugal K.
1-Feb-2018May-2013An approach to source protection in sensor networksBhuyan, AnujKarmakar, Arindam
1-Feb-2018May-2014An approach towards preventing DDoS flooding attack using bandwidth comparison methodKalita, Kausthav PratimBhattacharyya, Dhruba Kumar
1-Feb-2018Jun-2011Authentication & encryption in wireless sensor networksDas, Santonu KumarSarma, Nityananda
1-Feb-2018Jun-2015Automatic digitization of mapRana, DivyaSaharia, Sarat
1-Feb-2018Jun-2015Automatic upgrade estimation tool for software AGMedhi, NitishBhattacharyya, Dhruba Kumar