Browsing by Title

Sort by: Order: Results:

  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Zaid, Kunwar; Ghatak, Gourab (Advisor) (IIIT-Delhi, 2020)
    The stationary multi-armed bandit (MAB) framework is a well-studied problem in literature, with many rigorous mathematical treatments and optimal solutions. However, for a non-stationary environment, i.e., when the reward ...
  • Tyagi, Arjun; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-08)
    Correlation filter (CF) based tracker often disregard or weakly incorporate the importance of feature channels as well as channel similarity. To address this, we propose a channel-graph regularization correlation filter-based ...
  • Tyagi, Arjun; Subramanyam, A.V. (Advisor) (IIIT-Delhi, 2020-07-01)
    Correlation filter (CF) based tracker often disregard or weakly incorporate the importance of feature channels as well as channel similarity. To address this, we propose a channel-graph regularization correlation filter-based ...
  • Mrinal; Gautam, Prutyay; Ray, Arjun (Advisor) (IIIT-Delhi, 2020-12)
    The project is based on applying Machine Learning tools and di erent analysis techniques to identify which protein features in metagenomes sampled from Human and Non-Human (other mammal species) microbiomes help them impart ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Vithalkar, Amogh; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2018-04-18)
    Radio Frequency Identification(RFID) has been gaining popularity recently over barcodes for a wide range of applications like inventory control, supply chain management, manufacturing,etc. With the increasing popularity ...
  • Ummalaneni, Vahini; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2017-04-18)
    In the course of this BTP,low cost chipless RFID tags have been designed. The proposed RFID tags are fully passive devices. They do not require chip assembly or any power supply. In the previous semester, the tag studied ...
  • Jain, Sagar; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2019-09)
    A Fabry Perot cavity (FPC) antenna consists of a primary radiator at the base of a dielectric cavity sealed with a partially reflecting surface at the other end. Excitation from the radiator is partially reflected by the ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Khurana, Prerna; Majumdar, Angshul (Advisor) (2016-09-13)
    In this work we propose a classification framework called class-wise deep dictionary learning (CWDDL). For each class, multiple levels of dictionaries are learnt using features from the previous level as inputs (for first ...
  • Aggarwal, Bhavay; Ray, Arjun (Advisor) (IIIT-Delhi, 2021-05)
    Proteins are essential for carrying out the activities our cells perform. Agonist and Antagonist molecules are essential in dictating cell activities and hence the Identi cation of the action of such complexes will help ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Prusty, Ayush; Bohara, Vivek (Advisor) (IIIT-Delhi, 2023-11-29)
    This study conducts a comprehensive analysis of India’s climatic trends, emphasizing Delhi’s climate specifics by analyzing extensive datasets encompassing diverse Indian landscapes. It reveals temporal and spatial variations ...
  • Vinayak (IIIT- Delhi, 2021-06)
    Clique counting is a well studied problem in low memory models like graph streaming. There are algorithms which provide good space complexity bounds for general graphs. For constant pass, approximation algorithms counting ...
  • Sethi, Kiran; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2022-08)
    Human cancers are composed of cells with varying genotypes, epigenetic states, and gene expression profiles. Intra and inter-tumor clonal heterogeneity is now recognized as one of the biggest drawbacks for therapeutic ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Sharma, Siddhant; Naik, Vinayak (Advisor) (2017-04-18)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers, but not quite there yet in implementation. However, with the heavy penetration of the Internet in the ...
  • Singh, Aditya; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2023-11-29)
    Cloud Labs enable hardware based courses in remote environments and developing self paced learning modules. The integrated hardware and software solutions developed allow for remote access to physical labs and offer a ...

Search Repository

Browse

My Account