Master of Computer Applications (MCA): Recent submissions

  • ASWIN, PRABHAKARAN; FOUSIA M, SHAMSUDEEN (2022-07)
    Nowadays, there is a big problem with mental stress, especially in young people. The time period that was formerly thought to be the most carefree is currently under a lot of stress. Today’s increased stress causes a ...
  • ARUN V, DAS; ALSHAINA, S (2022-07)
    Agriculture is one among the major sectors of the Indian economy. As we know farmers detect plant disease through their naked eye. But it requires more efforts to discover in large number of plants and also it is time ...
  • Arjun V, Pankajakshan; Vaheetha, Salam (2022-07)
    UPTIME - ”No Time for Downtime”, is a multi-tenant smart ticketing system that receives anomalies as events from self-diagnosable critical systems of multiple OEM’s which then creates tickets and assigns a support engineer ...
  • ANUSHREE; JASMIN, M. R (2022-07)
    One of the key detection methods that offers benefits in a variety of fields, including video surveillance, video captioning, security, content censorship, and military applications, is human action recognition. The main ...
  • Ananya, B; Vaheetha, Salam (2022-07)
    When a service in an event-driven architecture completes a task that other services might find interesting, that it creates an event, which serves as a record of the action that was completed. Other services use such ...
  • ANANTHAPADMANABHAN, S; Alshaina, S (2022-07)
    Malware is any programme that is intended to cause harm to other software or hardware. The growth of malware poses a grave threat to cyber security. Malware can result in sluggish computation, frequent system crashes, ...
  • EVENTPUB 
    Amjiyad Ahsan, K S; Vaheetha, Salam (2022-07)
    In event-driven architecture, when a service performs a task that other services may be interested in, it generates an event, which is a record of the action. These events are consumed by other services so that they can ...
  • Nidhi, Raj; Fousia M, Shamsudeen (2022-07)
    MDS OPERATIONS, Applications nowadays are highly data driven. The project is about understanding how the Market Data unit operates for providing seem less and error free data for trading platform .The primary goal of MDS ...
  • NANDANA, ANIL; JASMIN, M R (2022-07)
    It's a difficult task to automatically generate natural language descriptions of an image's content. Though, unlike humans, it does not come readily to machines. However, implementing this capability would surely alter ...
  • JOMIN K, MATHEW; NADERA BEEVI, S (2022-07)
    The mouse is one of the wonderful inventions of Human-Computer Interaction (HCI) technology. Currently, wireless mouse or a Bluetooth mouse still uses devices and is not free of devices completely since it uses a battery ...
  • BLESSY P, ROY; T A SHAHUL, HAMEED (2022-07)
    The overall crime rate is rising daily in the modern day, and in order to keep up, law enforcement agencies must also discover ways to streamline investigations and aid in bringing offenders to justice. Utilizing face ...
  • Amal, S; Vaheetha, Salam (2022-07)
    In an event-driven architecture, when a service performs a task that may be of interest to other services, that service generates an event, a record of the action performed. Other services use these events so that they ...
  • Amal Bhas, P; Vaheetha, Salam (2022-07)
    Portal for Regulation of Air-pollution in Non-Attainment cities (PRANA), is a portal for monitoring of implementation of National Clean Air Programme (NCAP). It will assist in tracking the financial and physical status ...
  • Agna, Antony; Vaheetha, Salam (2022-07)
    The term ”audit” typically refers to an examination of financial statements. A financial audit is an independent review and assessment of an organization’s financial statements to ensure that they fairly and accurately ...
  • Abhilash, John; Natheera Beevi, M (2022-07)
    A Decentralized Crypto Exchange is a place where people can go to trade cryptocurrencies without an intermediary. A DEX, lets people trade directly from their crypto wallets. The exchange doesn’t take control of their ...
  • Rajeesh, Raj; Nadera, Beevi S (2022-05)
    In today’s digital age, the ever-increasing dependency on computer technology has left the average citizen vulnerable to crime such as data breaches and possible identity theft. These breaches or crime often target social ...
  • Badarnisa; Jasmin, M R (2022-05)
    Payment cards offer a simple and convenient method for making purchases. Generally credit card fraud activities can happen in both online and offline. But in today’s world online fraud transaction activities are increasing ...
  • Varsha, Viswanath (2022-05)
    Dermatological disorders are one of the most widespread diseases in the world. Despite being common its diagnosis is extremely difficult because of its complexities of skin tone, color, presence of hair. This paper ...
  • Sruthimol, Biju; Nadera, Beevi S (2022-05)
    SARS-CoV-2 is a novel virus, responsible for causing the COVID-19 pandemic that has emerged as a pandemic in recent years. Humans are becoming infected with the virus. In 2019, the city of Wuhan reported the first-ever ...
  • Sreelekshmi, Sunish; Vaheetha, Salam (2022-05)
    KL Pulse is an internal application of Knowledge Lens which is designed to track employee’s performance, daily tasks, attendance etc.. It also helps the managers to evaluate and monitor their performance. KL Pulse is a ...

Search DSpace


Advanced Search

Browse

My Account