Browsing by Title

Sort by: Order: Results:

  • Mrinal; Gautam, Prutyay; Ray, Arjun (Advisor) (IIIT-Delhi, 2020-12)
    The project is based on applying Machine Learning tools and di erent analysis techniques to identify which protein features in metagenomes sampled from Human and Non-Human (other mammal species) microbiomes help them impart ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Vithalkar, Amogh; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2018-04-18)
    Radio Frequency Identification(RFID) has been gaining popularity recently over barcodes for a wide range of applications like inventory control, supply chain management, manufacturing,etc. With the increasing popularity ...
  • Ummalaneni, Vahini; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2017-04-18)
    In the course of this BTP,low cost chipless RFID tags have been designed. The proposed RFID tags are fully passive devices. They do not require chip assembly or any power supply. In the previous semester, the tag studied ...
  • Jain, Sagar; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2019-09)
    A Fabry Perot cavity (FPC) antenna consists of a primary radiator at the base of a dielectric cavity sealed with a partially reflecting surface at the other end. Excitation from the radiator is partially reflected by the ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Khurana, Prerna; Majumdar, Angshul (Advisor) (2016-09-13)
    In this work we propose a classification framework called class-wise deep dictionary learning (CWDDL). For each class, multiple levels of dictionaries are learnt using features from the previous level as inputs (for first ...
  • Aggarwal, Bhavay; Ray, Arjun (Advisor) (IIIT-Delhi, 2021-05)
    Proteins are essential for carrying out the activities our cells perform. Agonist and Antagonist molecules are essential in dictating cell activities and hence the Identi cation of the action of such complexes will help ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Prusty, Ayush; Bohara, Vivek (Advisor) (IIIT-Delhi, 2023-11-29)
    This study conducts a comprehensive analysis of India’s climatic trends, emphasizing Delhi’s climate specifics by analyzing extensive datasets encompassing diverse Indian landscapes. It reveals temporal and spatial variations ...
  • Vinayak (IIIT- Delhi, 2021-06)
    Clique counting is a well studied problem in low memory models like graph streaming. There are algorithms which provide good space complexity bounds for general graphs. For constant pass, approximation algorithms counting ...
  • Sethi, Kiran; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2022-08)
    Human cancers are composed of cells with varying genotypes, epigenetic states, and gene expression profiles. Intra and inter-tumor clonal heterogeneity is now recognized as one of the biggest drawbacks for therapeutic ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Sharma, Siddhant; Naik, Vinayak (Advisor) (2017-04-18)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers, but not quite there yet in implementation. However, with the heavy penetration of the Internet in the ...
  • Singh, Aditya; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2023-11-29)
    Cloud Labs enable hardware based courses in remote environments and developing self paced learning modules. The integrated hardware and software solutions developed allow for remote access to physical labs and offer a ...
  • Goel, Pulkit; Anand, Saket (Advisor); Fell, Alexander (Advisor) (IIITD-Delhi, 2019-04-28)
    Deep learning neural networks have revolutionized the elds of Computer Vision, Robotics, Artifi cial Intelligence. However, these State of the art algorithms come at a high computational cost, huge memory requirements and ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor); Bera, Aniket (Advisor) (IIIT-Delhi, 2021-12-14)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of virtual agents and humanoid robots, researchers have been trying to make the virtual agents more ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2021-03-17)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of humanoid robots and virtual agents, researchers have been trying to make the robots more human-like, ...
  • Malhotra, Hrithik; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-12)
    Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. Most of the techniques for code ...

Search Repository

Browse

My Account