<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/123456789/26">
    <title>DSpace Collection:</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/123456789/26</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22695" />
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22646" />
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22640" />
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22281" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-28T04:03:40Z</dc:date>
  </channel>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22695">
    <title>OPTIMIZING INVESTMENT PORTFOLIOS IN BANKING USING INTEGER PROGRAMMING TECHNIQUES</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22695</link>
    <description>Title: OPTIMIZING INVESTMENT PORTFOLIOS IN BANKING USING INTEGER PROGRAMMING TECHNIQUES
Authors: AGGARWAL, MANAN; ANAND, NAMAN; DAS, L.N. (SUPERVISOR)
Abstract: In the modern banking system, optimizing the allocation of capital across various loan aspects&#xD;
is a critical task that directly impacts profitability and risk management. Traditional portfolio&#xD;
optimization methods often rely on linear programming techniques that assume continuous&#xD;
investment decisions. However, real-world banking constraints—such as regulatory limits,&#xD;
discrete investment units, and risk thresholds—demand more realistic and implementable&#xD;
models.&#xD;
This thesis explores the application of Integer Programming (IP) techniques to optimize&#xD;
investment portfolios in the banking domain. The primary objective is to maximize net profit&#xD;
from three major loan categories—Home Loans, Personal Loans, and Business Loans—while&#xD;
adhering to operational constraints such as investment caps, borrower creditworthiness, and&#xD;
diversification rules. The dataset used in this study was manually created to simulate realistic&#xD;
banking scenarios, including data on expected profits, borrower creditworthiness, and&#xD;
administrative costs. A Mixed Integer Linear Programming (MILP) model was formulated&#xD;
to reflect these constraints, with investment decisions modelled in discrete ₹1 lakh units.&#xD;
The results indicated an optimal allocation of ₹50 lakhs each to Home and Personal Loans,&#xD;
yielding a maximum net profit of ₹8.50 lakhs. Business loans, though offering a competitive&#xD;
return, were excluded from the final allocation due to relatively lower risk-adjusted&#xD;
performance and constraint tightness. Graphical visualizations were used to interpret allocation&#xD;
patterns and profit contributions, while sensitivity analysis highlighted the binding nature of&#xD;
budget and diversification constraints.&#xD;
The study demonstrates that Integer Programming not only improves the practical feasibility&#xD;
of financial decisions but also allows banks to manage risk while achieving profitability. The&#xD;
model’s structure provides a robust foundation for extending into multi-period investment&#xD;
strategies, stochastic interest rate environments, or incorporating credit scoring models in&#xD;
future work.</description>
    <dc:date>2025-06-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22646">
    <title>RECENT APPLICATIONS OF PCA AND SVD</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22646</link>
    <description>Title: RECENT APPLICATIONS OF PCA AND SVD
Authors: AHUJA, ADITI
Abstract: In this thesis, Principal Component Analysis is a powerful dimensionality reduction technique that&#xD;
transforms high-dimensional data into a lower-dimensional space while preserving variance. By comput-&#xD;
ing the covariance matrix and its eigenvectors, PCA finds principal components that best represent the&#xD;
data. It is used on large scale in image compression, face recognition, and feature extraction, simplifying&#xD;
complex datasets without losing critical information. SVD is a matrix factorization method that decom-&#xD;
poses any matrix into three distinct matrices: A = U ΣV T . This decomposition reveals hidden patterns&#xD;
in data and has applications in data compression, noise reduction, and recommendation systems. Unlike&#xD;
PCA, which relies on eigenvectors of the covariance matrix, SVD works directly on the data matrix,&#xD;
making it more versatile. PCA and SVD are two fundamental techniques in linear algebra that have&#xD;
revolutionized data science, machine learning, and image processing. This presentation explores their&#xD;
mathematical foundations, geometric interpretations, and real-world applications.</description>
    <dc:date>2025-12-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22640">
    <title>IMAGE SEGMENTATION</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22640</link>
    <description>Title: IMAGE SEGMENTATION
Authors: GUPTA, DIKSHA; DHINGRA, SUSHANT
Abstract: Fuzzy C-Means (FCM) is one of the popular techniques used for segmenting sci-&#xD;
entific images. It is suggested in the literature to use intuitionistic fuzzy c-means&#xD;
(IFCM), which is based on the notion of intuitionistic fuzzy sets (IFSs), to handle&#xD;
the ambiguity and uncertainty related to real data.The hesitation and member-&#xD;
ship degrees are used to determine the objective function.However, FCM is used to&#xD;
achieve the approximate answer rather than analytically computing the objective&#xD;
function. Even though there are numerous variations of intuitionistic fuzzy set the-&#xD;
ory, all of them struggle with the issue of noise in images during the segmentation&#xD;
process.In order to address this issue, we have proposed using a picture fuzzy set&#xD;
theoretic approach, which improves the data’s ability to be represented and aids&#xD;
in handling the noise structures present in the image. In our proposed work, the&#xD;
picture fuzzy Euclidean distance is swapped out for the Manhattan distance (City&#xD;
Block Distance), as Manhattan distance produces significantly better noise suppres-&#xD;
sion.The method was applied to a fake image that had been ”Gaussian” and ”salt&#xD;
and pepper” distorted.Partition efficiency, average segmentation accuracy (ASA),&#xD;
and dice score (DS) were the performance metrics used. We can utilize the distance&#xD;
measure and dissimilarity between fuzzy sets to calculate the difference between two&#xD;
fuzzy sets or intuitionistic sets as it can be used for pattern recognition, and image&#xD;
segmentation.Results show that the proposed method gives the better result.</description>
    <dc:date>2023-05-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22281">
    <title>KWG-RFE: A TRI-STAGE HYBRID FEATURE REDUCTION FRAMEWORK FOR ANDROID MALWARE DETECTION</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22281</link>
    <description>Title: KWG-RFE: A TRI-STAGE HYBRID FEATURE REDUCTION FRAMEWORK FOR ANDROID MALWARE DETECTION
Authors: DWIVEDI, KUNIKAA
Abstract: Mobile computing has been transformed by the quick development and broad use of An-&#xD;
droid smartphones, but this has also given cybercriminals a larger attack surface. Among&#xD;
these, mobile malware poses the greatest threat to data, privacy, and system integrity&#xD;
for both individuals and companies. As a result, reliable, effective, and precise malware&#xD;
detection techniques that are exclusive to the Android ecosystem are desperately needed.&#xD;
This thesis introduces KWG-RFE, a hybrid feature selection strategy that offers a fresh&#xD;
approach to Android malware detection. This strategy combines three complementing&#xD;
techniques: Recursive Feature Elimination (RFE), Graph-based feature analysis, and the&#xD;
Kruskal-Wallis statistical test. These elements function in concert to filter and rank fea-&#xD;
tures according to their significance and effect on classification performance.&#xD;
The proposed method was validated using a large dataset of over 111,000 Android appli-&#xD;
cations, which included both malicious and benign samples. Each program had a num-&#xD;
ber of components removed, including hardware-related parts, intent filters, permissions,&#xD;
and API calls. In order to reduce dimensionality while maintaining crucial information&#xD;
pertinent to malware identification, these features were subsequently put through the&#xD;
KWG-RFE selection procedure.&#xD;
Both the full and reduced feature sets were used to train and assess a number of ma-&#xD;
chine learning classifiers, such as Random Forests, Decision Trees, and Support Vector&#xD;
Machines. With a full feature set of 97.75% and a competitive 94.50% accuracy after ap-&#xD;
plying the KWG-RFE feature reduction, the Random Forest classifier showed the highest&#xD;
detection accuracy among them. The findings show that, without compromising classi-&#xD;
fication performance, the suggested hybrid feature selection approach is quite successful&#xD;
at removing superfluous and unnecessary characteristics.&#xD;
All things considered, this study shows how effective it is to combine algorithmic, struc-&#xD;
tural, and statistical feature selection methods when it comes to Android malware de-&#xD;
tection. The suggested KWG-RFE approach is a useful addition to the field of mobile&#xD;
cybersecurity since it maintains a high level of accuracy while increasing detection effi-&#xD;
ciency by lowering computational overhead.</description>
    <dc:date>2025-05-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

