Prabhat Kumar |
Steganography Technique for Hiding Text Information in Color Image |
Completed |
2022 |
|
Neha Rani |
Classification of Breast Cancer Abnormalities using Screening Mammograms |
Completed |
2022 |
|
Pooja Audichya |
Anime to Anime Deepfake using Generative Adversarial Networks |
Completed |
2022 |
Dr Amritpal Singh |
Garima Gupta |
Mental disorder Prediction through facial expressions using deep learning |
Completed |
2021 |
|
Md Zeeshan Mohanavi |
Data-Driven Framework for Human Motion Trajectory Prediction using LSTMs & GANs |
Completed |
2021 |
|
Prabhleen |
An optimized approach for Covid-19 detection from X-Ray using Deep Convolution Neural Networks |
Completed |
2021 |
|
Utkarsh Singh |
Hybrid Approach for Detecting High Level Clones in an Object-Oriented Software |
Completed |
2020 |
Dr Kuldeep Kumar |
Abhisheik Singh |
Detection of Fraudulent Credit Card Transactions through Machine Learning techniques |
Completed |
2020 |
Dr Avtar Singh |
Sanjiu Raja Brahma |
Reversible Data hiding with lower magnitude error channel pair selection |
Completed |
2020 |
Dr Samayveer Singh |
Sahil Mahajan |
Multi Heuristic Approach for reducing Make span and Flow time for Large Data |
Completed |
2019 |
|
Alankar Sharma |
Automated Early Detection of Diabetic Retinopathy using Deep Learning |
Completed |
2019 |
|
Manish Kumar |
Extreme Event Forecasting using Machine Learning Models for Uber Cabs |
Completed |
2019 |
Dr Samayveer Singh |
Atri Saxena |
An Effective Animal Detection Approach based on Deep Learning Techniques |
Completed |
2019 |
Dr Samayveer Singh |
Pankaj Chowdhary |
Outcome Prediction of Patients for different stages of Sepsis using Machine Learning Models |
Completed |
2019 |
Dr Samayveer Singh |
Richa |
Time Series Data Analysis for Stock Indices using Data Mining Technique with R |
Completed |
2018 |
|
Poonam Saini |
An Optimal Congestion Control Protocol at Wireless Sensor Networks using Priority Queue Mechanism |
Completed |
2018 |
|
Ashwani Kumar |
Bird Image classification using visual feature descriptors |
Completed |
2018 |
|
Abhijeet Mendhe |
Secure QR- Code based Message sharing system using Cryptography and Stenography |
Completed |
2018 |
|
Pushpendra Rajawat |
Predictive analysis of Medical data using hybrid machine learning technique |
Completed |
2018 |
|
Rekha |
Opinion Mining of Restaurant reviews on Yelp with Comparative evaluation of Random forest, Bootstrap Aggregation and Adaptive Boosting Classifiers |
Completed |
2018 |
|
Bhupinder Jit Singh |
Improvements in Focused Crawler based on Content and Link Analysis and Optimization of Search Engine Ranking based on User Implicit Feedback. |
Completed |
2017 |
|
Akhilesh Kumar Singh |
Political Election and Twitter Sentiment Analysis of Twitter User on Punjab Legislative Assembly Elections , 2017 |
Completed |
2017 |
|
Avinash Sirohi |
Analysis of Black hole Attack in Wireless Body Area Network |
Completed |
2017 |
|
Rohit Nagar |
Time effective workflow Scheduling using genetic algorithm in cloud computing |
Completed |
2017 |
|
Vikalp Jain |
Detailed Analysis and Prediction of NIFTY 50 Index |
Completed |
2017 |
|
Rakesh Gagneja |
Modified Key Generation Algorithm using AES as a new mode of Operation |
Completed |
2016 |
|
Paramjit Rana |
Restricted External Gradient Time Synchronization Protocol for Wireless Sensor Networks |
Completed |
2016 |
|
Anita Bhatia |
Spam & Sentimental Analysis Model for Twitter Data using Statistical learning |
Completed |
2016 |
|
Rajendra Bhagat |
Information hiding using DNA Stenography |
Completed |
2016 |
|
Sangita Kumari |
A Novel Methodology for Vehicle Number Plate Recognition using Artificial Neural Network |
Completed |
2016 |
|
Monika |
DoS Attack Detection Technique Using Back Propagation Neural Network |
Completed |
2016 |
|
Aman Kamboj |
An improved Halftone Visual secret sharing scheme for gray-level images based on error diffusion in forward and backward direction |
Completed |
2015 |
|
Nilu Kumari |
Improved TEEN Protocol with Multi-Hop & Multi-path in Wireless Sensor Networks |
Completed |
2015 |
|
Parul Nabiyal |
Reducing Buffer overhead in a Reliable Multi casting Protocol for MANET'S |
Completed |
2015 |
|
Anshu Chauhan |
Detection of Packet Dropping Nodes in MANET using DSR Protocol |
Completed |
2015 |
|
Deepika Kamboj |
Efficient Scalar Multiplication in Elliptic Curve Cryptography |
Completed |
2015 |
|
Vinay Dwivedi |
Comparison of Energy Efficient Algorithm for Optical Network based on Different Clustering Techniques |
Completed |
2014 |
|
Parminder Singh |
An Efficient concept based Mining Model for Analysis Partitioning Clustering |
Completed |
2014 |
|
Hartej Singh |
A modified Pixel Value Differentiating method for Information Hiding |
Completed |
2014 |
|
Brijesh Kumar |
Comparative Analysis of Putnam’s SLIM using various Fuzzy Membership Functions |
Completed |
2014 |
|
Bhupesh Kumar |
Hierarchical Agglomeration Clustering using K-nearest Neighbor and Digraph |
Completed |
2014 |
|
Ramesh Kumar |
CPU Scheduling using Genetic Algorithm |
Completed |
2014 |
|
Gunjan |
Modified TEEN (MTEEN) Protocol with improved Network lifetime and Optimized efficiency for Wireless Sensor Networks |
Completed |
2014 |
Dr Ajay Sharma |