Student |
Title |
AAYUSH MORONEY | Applications of Network Analysis: Recommendation, Community Detection
|
ABHINASH KHARE | Automated generation of Android Graphics User Interface Code
|
AKANKSHA SISODIYA | Uncovering the Relevance of Academic Citations Through Semantic Pagerank
|
AKSHAY JAIN | Use of spatial audio in immersive analytics
|
ALKH NIRANJAN SHARMA | Classification Learning From Imbalanced Classes
|
AMIT | Extending Falcon to support Mesh Datatype
|
ANANTHA RAO CHUKKA (DRDO) | Detection of Malicious Binaries by Machine Learning Methods
|
ANURAG YADAV | Adaptive Traffic Signal Control Using Reinforcement Learning Algorithms
|
ARUN JOSEPH | A Framework for Efficient Secure Three-Party Computation
|
SQD. LDR. ASHOK RAWAT (DEF) | Secure and Reliable Transport Protocol Using Dynamic Authentication Encryption
|
BIRADAR VAIJENATH SHANKARRAO | One-Shot Learning of Text Documents using Siamese Architecture
|
DARA SINGH VOHRA (DEF) | Periodic Network Load-based MAC Protocol on Contention-based Approach for Wireless Sensor Networks (WSNs) using roughly synchronized clocks
|
DEBOTTAM KUNDU | Structural and Functional Biomarkers of Conversion to Alzheimer's Disease
|
DHARMENDRA KUMAR SINGH | Synthetic Data Generator
|
DONTHAGANI ANIL KUMAR | Knowledge Base Question Answering and Relation Classification with Deep Learning
|
GAJABE PRATIK RAVINDRA | Handwritten Devanagari script recognition
|
GOURAV KUMAR | Sub-query Based Approach for Robust Query Processing
|
HARSH KARA | Learning node embedding in Information Network based on Structure and Content
|
WING CMD. JIBIN SURENDRAN (DEF) | Secure and Reliable Broadcast Communication with Dynamic grouping in Distributed Networks
|
MANOHARAN M. (DRDO) | Enhanced PFair Based Fault Tolerant Multi-Core Real-Time Scheduler
|
NIDIN LAL KOILPARAMPIL | Automated Test Generation to find Orphan AsyncTask for Android Application
|
NITIN KUMAR | Audio Classification using Deep Learning
|
NITISH SANDHU | Design and Implementation of Blockchain Based Smart Contracts for Procurement and Crowdsourcing Markets
|
PARANKUSHAM KESHAV | Traffic Signal Optimization using Multi - Agent Reinforcement Learning
|
PATIL BHUSHAN SUDHIR JAYASHRI | Optimization of Hawkeye: A Practical approach for leveraging Belady's Algorithm
|
PATIL KETAN PRABHAKAR | Greybox fuzzing as a contextual bandits problem
|
PHILIPS GEORGE JOHN | Distributed Control of Autonomous Mobile Robots and Extractors for Polynomial Sources
|
POOJA RAVI KULKARNI | Asymptotically Faster Winnow like algorithm for Linear Feasibility Problem
|
PURANDARE SANKET JAYANT | Dimensionality Reduction Techniques for Bouquet Based Approaches
|
RAZI UR REHMAN | Identifying task-specific timescales and brain maps using Gaussian Process Factor Analysis
|
RISHABH DESHMUKH | Diversified Groupings and Recommendations
|
ROHITH A. P. | Unsupervised Deep Domain Adaptation using Discriminative Encoder
|
RONIT HALDER | A memory optimized convolutional layer implementation for low powered devices
|
SHARUN S THAZHACKAL | A Hybrid Deep Learning Model to Predict Business Closure from Reviews & User Attributes using SATM
|
SHIKHAR VERMA | Deep Learning Methods for Cell Cycle Detection and Cell Segmentation
|
SHINDE TUSHAR KADUBARAO | Control Policies for Textual Games using Deep Reinforcement Learning
|
SHUBHAM GOEL | Computation Graph Partitioning and Scheduling in Distributed TensorFlow
|
SOUMALYA SEAL | Learning Representations using Structural Information
|
SRINIDHI R. | Study of hierarchical networks for document representation
|
URVASHI RAJ | Design and Implementation of QUEST 2.0
|
V. NIDHIN KRISHNAN | Multiple Vehicle Tracking using Deep Learning
|
VYSAKH. P. R. | Simulation of A/B Tests using Historical Logs
|
YASHWANT KRISHNADAS | Real-time Intelligent Traffic Management using Multi-agent Deep Reinforcement Learning
|
ZAD BASHEER | Analysis of Security of Mobile Payment Applications
|