PG Thesis: Recent submissions

  • Reshma, Krishnan; Vaheetha, Salam (2022-07)
    Fire is one among the most frequently occurring hazards and is the primary cause of disastrous individual injury and crushing property harm. Hence a framework for the early recognition of fire is important to keep fires ...
  • Rasika, V V; Natheera Beevi, M (2022-07)
    Today, many people practise yoga on a regular basis. Yoga pose identification uses technology to assist with exercises and sports. Self-learning is a crucial component of yoga, however poor posture while practising yoga ...
  • ASWIN, PRABHAKARAN; FOUSIA M, SHAMSUDEEN (2022-07)
    Nowadays, there is a big problem with mental stress, especially in young people. The time period that was formerly thought to be the most carefree is currently under a lot of stress. Today’s increased stress causes a ...
  • ARUN V, DAS; ALSHAINA, S (2022-07)
    Agriculture is one among the major sectors of the Indian economy. As we know farmers detect plant disease through their naked eye. But it requires more efforts to discover in large number of plants and also it is time ...
  • Arjun V, Pankajakshan; Vaheetha, Salam (2022-07)
    UPTIME - ”No Time for Downtime”, is a multi-tenant smart ticketing system that receives anomalies as events from self-diagnosable critical systems of multiple OEM’s which then creates tickets and assigns a support engineer ...
  • ANUSHREE; JASMIN, M. R (2022-07)
    One of the key detection methods that offers benefits in a variety of fields, including video surveillance, video captioning, security, content censorship, and military applications, is human action recognition. The main ...
  • Ananya, B; Vaheetha, Salam (2022-07)
    When a service in an event-driven architecture completes a task that other services might find interesting, that it creates an event, which serves as a record of the action that was completed. Other services use such ...
  • ANANTHAPADMANABHAN, S; Alshaina, S (2022-07)
    Malware is any programme that is intended to cause harm to other software or hardware. The growth of malware poses a grave threat to cyber security. Malware can result in sluggish computation, frequent system crashes, ...
  • EVENTPUB 
    Amjiyad Ahsan, K S; Vaheetha, Salam (2022-07)
    In event-driven architecture, when a service performs a task that other services may be interested in, it generates an event, which is a record of the action. These events are consumed by other services so that they can ...
  • Nidhi, Raj; Fousia M, Shamsudeen (2022-07)
    MDS OPERATIONS, Applications nowadays are highly data driven. The project is about understanding how the Market Data unit operates for providing seem less and error free data for trading platform .The primary goal of MDS ...
  • NANDANA, ANIL; JASMIN, M R (2022-07)
    It's a difficult task to automatically generate natural language descriptions of an image's content. Though, unlike humans, it does not come readily to machines. However, implementing this capability would surely alter ...
  • JOMIN K, MATHEW; NADERA BEEVI, S (2022-07)
    The mouse is one of the wonderful inventions of Human-Computer Interaction (HCI) technology. Currently, wireless mouse or a Bluetooth mouse still uses devices and is not free of devices completely since it uses a battery ...
  • BLESSY P, ROY; T A SHAHUL, HAMEED (2022-07)
    The overall crime rate is rising daily in the modern day, and in order to keep up, law enforcement agencies must also discover ways to streamline investigations and aid in bringing offenders to justice. Utilizing face ...
  • Amal, S; Vaheetha, Salam (2022-07)
    In an event-driven architecture, when a service performs a task that may be of interest to other services, that service generates an event, a record of the action performed. Other services use these events so that they ...
  • Amal Bhas, P; Vaheetha, Salam (2022-07)
    Portal for Regulation of Air-pollution in Non-Attainment cities (PRANA), is a portal for monitoring of implementation of National Clean Air Programme (NCAP). It will assist in tracking the financial and physical status ...
  • Agna, Antony; Vaheetha, Salam (2022-07)
    The term ”audit” typically refers to an examination of financial statements. A financial audit is an independent review and assessment of an organization’s financial statements to ensure that they fairly and accurately ...
  • Abhilash, John; Natheera Beevi, M (2022-07)
    A Decentralized Crypto Exchange is a place where people can go to trade cryptocurrencies without an intermediary. A DEX, lets people trade directly from their crypto wallets. The exchange doesn’t take control of their ...
  • Rajeesh, Raj; Nadera, Beevi S (2022-05)
    In today’s digital age, the ever-increasing dependency on computer technology has left the average citizen vulnerable to crime such as data breaches and possible identity theft. These breaches or crime often target social ...
  • Badarnisa; Jasmin, M R (2022-05)
    Payment cards offer a simple and convenient method for making purchases. Generally credit card fraud activities can happen in both online and offline. But in today’s world online fraud transaction activities are increasing ...
  • Varsha, Viswanath (2022-05)
    Dermatological disorders are one of the most widespread diseases in the world. Despite being common its diagnosis is extremely difficult because of its complexities of skin tone, color, presence of hair. This paper ...

Search DSpace


Advanced Search

Browse

My Account