Showing results 1 to 20 of 332
next >
Upload Date | Award Date | Title | Researcher | Guide(s) |
19-Mar-2018 | Jun-2015 | 3D Modelling of Tezpur University campus for android devices | Bhattacharyya, Anurag | Singh, S. Ibotombi |
6-May-2016 | 2014 | Addressing some issues in packet dropping attack detection in MANETs | Kakoty, Bobby Sharma | Sarma, Nityananda; Hazarika, Shyamanta Moni |
1-Feb-2018 | Jun-2012 | Analysis and design of an anomaly detection algorithm using SNMP data | Chakraborty, Barnali; Hoque, Ariful | Sarma, Nityananda |
7-Feb-2019 | Oct-2015 | Analysis of gene expression and protein-protein interaction data using supervised and unsupervised ensemble methods | Nagi, Sajid | Bhattacharyya, Dhruba Kumar |
1-Feb-2018 | May-2014 | An analysis on suitability of using CAI for gene expression prediction | Jha, Vidyapati | Satapathy, Siddhartha Sankar |
1-Feb-2018 | Jun-2015 | Android based scoring system for archery sport | Medhi, Mithulesh Kumar; Gohain, Mridul | Singh, S. Ibotombi |
1-Feb-2018 | May-2014 | Android based voice call processing application for mobile devices | Saikia, Birendrajit | Deka, Sanjib Kr |
12-May-2016 | 2012 | Anomaly based network intrusion detection using data mining techniques | Gogoi, Prasanta | Bhattacharyya, D. K.; Borah, Bhogeswar |
1-Feb-2018 | May-2014 | Anonymization of network | kumar, Manish | Karmakar, Arindam |
1-Feb-2018 | May-2015 | Appbuilder: report generation | Soni, Rahul | Goswami, Deepak |
1-Feb-2018 | May-2014 | Application layer DDoS attack detection using machine learning approach | Gohain, Anupam | Bhattacharyya, Dhruba Kumar |
1-Feb-2018 | Jun-2013 | Application of GIS & modeling tools for simulation of water flow & soil loss | Thawait, Arvind Kumar | Satapathy, Siddhartha Sankar; Patra, S. C. |
19-Mar-2018 | Jun-2015 | Application of rough set in diagnosis of heart disease | Jaishi, Shiv | Patra, Swarnajyoti |
6-May-2016 | 2014 | Applications of soft computing in time series forecasting | Singh, Pritpal | Borah, Bhogeswar |
6-May-2016 | 2013 | Applying data mining techniques in anomaly based network intrusion detection | Bhuyan, Monowar Hussain | Bhattacharyya, D. K.; Kalita, Jugal K. |
1-Feb-2018 | May-2013 | An approach to source protection in sensor networks | Bhuyan, Anuj | Karmakar, Arindam |
1-Feb-2018 | May-2014 | An approach towards preventing DDoS flooding attack using bandwidth comparison method | Kalita, Kausthav Pratim | Bhattacharyya, Dhruba Kumar |
1-Feb-2018 | Jun-2011 | Authentication & encryption in wireless sensor networks | Das, Santonu Kumar | Sarma, Nityananda |
1-Feb-2018 | Jun-2015 | Automatic digitization of map | Rana, Divya | Saharia, Sarat |
1-Feb-2018 | Jun-2015 | Automatic upgrade estimation tool for software AG | Medhi, Nitish | Bhattacharyya, Dhruba Kumar |