Collection's Items (Sorted by Upload Date in Descending order): 81 to 100 of 347
Upload Date | Award Date | Title | Researcher | Guide(s) |
7-Mar-2018 | May-2011 | Reliable spectrum a ware routing protocol design for cognitive radio network | Ali, Imran | Sarma, Nityananda |
7-Mar-2018 | May-2012 | Reconstruction of torn document | Nag, Abralekha | Nath, Bhabesh |
7-Mar-2018 | Jun-2013 | Recognizing qualitative spatio-temporal patterns from video | Das, Monjyoti | Hazarika, Shyamanta M. |
7-Mar-2018 | May-2013 | Recognition of sign language using moments and support vector machine | Kushwaha, Akhilesh | Saharia, Sarat |
7-Mar-2018 | Jun-2010 | Receive buffer identification & protocol variable location at run-time for generation of protocol level vulnerability signature for protection against internet worm attacks | Pathak, Amarjyoti | Saikia, D. K. |
7-Mar-2018 | May-2013 | Prototyping of algorithm for extracting content structure for web pages on visual representation | Sarma, Kulajyoti | Dash, Dinesh; Chellappan, Sandeep |
7-Mar-2018 | May-2011 | Protocol variable to path variable mapping for generation of protocol-level vulnerability signatures | Gogoi, Bronjon | Saikia, D. K. |
7-Mar-2018 | May-2014 | Detection of cross-site request forgery attacks | Bhowal, Arpita; Tai, Supriya | Das, Debasish |
7-Mar-2018 | May-2011 | Project management system | Dutta, Amar Jyoti | Singh, Loitongbam Basantakumar; Lahkar, Paresh Chandra |
7-Mar-2018 | Jun-2012 | Process visibility: an application to enable higher-level visibility and automation of the internal operational processes at software AG | Goswami, Bhaskarjyoti | Subramanian, Thanikachilam; Nath, Sanghamitra |
7-Mar-2018 | May-2014 | Proactive approach for mitigating SLA violation by workload management in SaaS cloud | Kakati, Partha | Dash, Dinesh |
7-Mar-2018 | May-2012 | Privacy preserving reputation system | Singh, Nungleppam Gopil | Singh, Loitongbam Basantakumar |
7-Mar-2018 | Jun-2015 | Prevention of cross site scripting using blacklist and whitelist approach | Singh, Sanjeev; Mandai, Subodh | Das, Debasish |
7-Mar-2018 | May-2011 | Predictive business with JMS technology: a typical case | Saikia, Navajeet | Dutta, P. J.; Goswami, Deepak |
7-Mar-2018 | Jun-2015 | PKHSN: a pairing based key management scheme for heterogeneous sensor networks | Buragohain, Madhurima | Sarma, Nityananda |
7-Mar-2018 | May-2014 | Phrase and idiom identification in Assamese | Borah, Shinjit Kamal | Sharma, Utpal |
7-Mar-2018 | May-2013 | Phonetic transcription of Assamese speech | Sarma, Himangshu | Sarma, Utpal |
7-Mar-2018 | May-2014 | Phoneme to phoneme & grapheme to grapheme conversion techniques for Bangla | Das, Barsha | Sinha, Smriti Kumar; Basu, Joyanta; Bepari, Milton S. |
7-Mar-2018 | May-2011 | Performance tuning and benchmarking of web methods broker server and MQ adapter | Saikia, Deepjyoti | Patra, Bidyut Kumar; Aprahasam, Sivakumar Siv |
7-Mar-2018 | May-2014 | Performance enhancement of IEEE 802.11 distributed coordination function (DCF) | Dutta, Somojoti; Konda, Avinash Kumar | Sarma, Nityananda |
Collection's Items (Sorted by Upload Date in Descending order): 81 to 100 of 347